FYI for easier use, this patch now lives at https://github.com/google/openssl-tests, rebased against BoringSSL latest (thanks David!) and OpenSSL-1.1.0-pre4 (Beta 1). I've also checked in a log from Beta 1.
Cheers, Emilia On Thu, Mar 10, 2016 at 4:33 PM David Benjamin <david...@google.com> wrote: > On Thu, Mar 10, 2016 at 1:30 AM Kanaka Kotamarthy <kotamart...@gmail.com> > wrote: > >> And also Openssl fails with Resume-Client-NoResume cases. Do you have >> any report on which test cases do fail and reasons for the failure? >> >> >> RT tickets 4387 through 4395 were the failures I've triaged. I'm sure >> there's more things in there to look through. >> >> I don't believe Resume-Client-NoResume fails for me. Perhaps something >> was fixed between master and 1.1.0-pre2. >> >> >> Openssl doesn't gives any error. For Resume-Client-NoResume-SSL3-TLS11 >> test case, we expect the new session's handshake to be done with TLS11. But >> with Openssl handshake is done using SSL3. As in ssl3_clear, we set back >> s->version to s->method->version. >> > > Oh, sorry, I keep forgetting our runner doesn't make it clear when a -test > option fails to match anything. (I should fix that...) I looked > for Resume-Client-NoResume without noticing it had suffixes. :-) > > I would expect most things addResumptionVersionTests to fail. See > https://github.com/openssl/openssl/pull/603 > > David > > >> Thank you >> Durga. >> >> On Wed, Mar 9, 2016 at 10:38 PM, David Benjamin <david...@google.com> >> wrote: >> >>> On Wed, Mar 9, 2016 at 5:07 AM Kanaka Kotamarthy <kotamart...@gmail.com> >>> wrote: >>> >>>> Hi >>>> >>>> I am even testing OpenSSL with BoringSSL's test cases using >>>> Openssl-1.1.0-pre2. Trying to find out reasons of OpenSSL's failures >>>> for particular cases. >>>> >>>> DTLS 1.0 session resumption has some thing wrong. If s_server started >>>> with -dtls and s_client -dtls1 -reconnect , session resumption is not >>>> being done. The reason for this may be, version negotiation for DTLS >>>> is done after loading previous session and check for s->version and >>>> s->session->version fails in tls_process_client_hello. >>>> >>> >>> See RT #4392. >>> https://rt.openssl.org/Ticket/Display.html?id=4392 >>> >>> >>>> And also Openssl fails with Resume-Client-NoResume cases. Do you have >>>> any report on which test cases do fail and reasons for the failure? >>>> >>> >>> RT tickets 4387 through 4395 were the failures I've triaged. I'm sure >>> there's more things in there to look through. >>> >>> I don't believe Resume-Client-NoResume fails for me. Perhaps something >>> was fixed between master and 1.1.0-pre2. >>> >>> David >>> >>> >>>> Thank you >>>> Durga. >>>> >>>> On Tue, Mar 8, 2016 at 3:19 AM, David Benjamin <david...@google.com> >>>> wrote: >>>> > Hi folks, >>>> > >>>> > So, we've by now built up a decent-sized SSL test suite in BoringSSL. >>>> I was >>>> > bored and ran it against OpenSSL master. It revealed a number of >>>> bugs. One >>>> > is https://github.com/openssl/openssl/pull/603. I'll be filing >>>> tickets >>>> > shortly for the remaining ones I've triaged, but I thought I'd send >>>> this >>>> > separately rather than duplicate it everywhere. >>>> > >>>> > Emilia also suggested there may be room to collaborate on testing. If >>>> > nothing else, just borrowing ideas or porting tests to/from your >>>> TLSProxy >>>> > setup. (Like, say, the ones that caught the bugs I'll be reporting. >>>> :-) ) >>>> > So, here's an introduction on how it all works: >>>> > >>>> > To run the tests on OpenSSL, clone BoringSSL: >>>> > https://boringssl.googlesource.com/boringssl/ >>>> > Then patch in this change. (Click the "Download" in the upper-right >>>> for >>>> > options.) >>>> > https://boringssl-review.googlesource.com/#/c/7332/ >>>> > Then follow the instructions in the commit message. >>>> > >>>> > The tests themselves and the runner logic live in >>>> ssl/test/runner/runner.go: >>>> > >>>> https://boringssl.googlesource.com/boringssl/+/22ce9b2d08a52e399bf2ab86851952d727be034d/ssl/test/runner/runner.go#922 >>>> > >>>> > They work by running an unmodified TLS stack in a shim binary against >>>> a copy >>>> > of Go's. We patch our copy with options for weird behavior to test >>>> against: >>>> > >>>> https://boringssl.googlesource.com/boringssl/+/22ce9b2d08a52e399bf2ab86851952d727be034d/ssl/test/runner/common.go#414 >>>> > >>>> > Go and shim communicate entirely with sockets and (tons of) >>>> command-line >>>> > flags, though it is slightly overfit to BoringSSL's behavior and >>>> checks >>>> > error strings a lot. The shim also has options like -async mode which >>>> we use >>>> > on a subset of tests to stress state machine resumption. (This has >>>> saved me >>>> > from state machine bugs so many times.) >>>> > >>>> https://boringssl.googlesource.com/boringssl/+/22ce9b2d08a52e399bf2ab86851952d727be034d/ssl/test/runner/runner.go#2770 >>>> > >>>> https://boringssl.googlesource.com/boringssl/+/22ce9b2d08a52e399bf2ab86851952d727be034d/ssl/test/bssl_shim.cc#826 >>>> > >>>> > I hope this is useful! Bugs and patches will follow this mail, as I >>>> write >>>> > them up. >>>> > >>>> > David >>>> > >>>> > -- >>>> > openssl-dev mailing list >>>> > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >>>> > >>>> -- >>>> openssl-dev mailing list >>>> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >>>> >>> >>> -- >>> openssl-dev mailing list >>> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >>> >>> >> -- >> openssl-dev mailing list >> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >> > -- > openssl-dev mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev >
-- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev