-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
using ciphersuite_strong for tests. #216
Conversation
What is your goal here? |
The purpose is to use
The current test only covers 5 cipher suites. I don't mind if If the test for handshake failures should be kept, I would like to cover no common ciphersuite and groups in addition to no common hash-signatures. |
Extending is good, but at the same time we should keep tests with non-DH ciphers, with MD5, RC4, etc. Yes I think we must test both successes and failures. |
I agree and done. |
I added test cases which I hit upon. Please review this PR again. |
c3e3c19
to
228b4a4
Compare
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a good step forward.
) where | ||
|
||
import Test.Tasty.QuickCheck | ||
import Certificate | ||
import PubKey | ||
import PipeChan | ||
import Network.TLS | ||
import Network.TLS as TLS |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Probably not needed.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is necessary for HashSHA512
etc.
Since ECDHE would be an only common cipher, client/server groups should always have a common group. prop_handshake_initiate_tls12 is removed since no common hash-signature does not always cause a handshake error. Rather, supportedHashSignatures is specified with available hash-signatures shuffled.
Probably, the client side should also set SNI if the server returns an empty SNI and this test case should check it in the client side.
fe2af73
to
0b4b1f2
Compare
Merged. |
Since ECDHE would be an only common cipher, client/server groups
should always have a common group.
prop_handshake_initiate_tls12 is removed since no common hash-signature
does not always cause a handshake error. Rather, supportedHashSignatures
is specified with available hash-signatures shuffled.