# https://www.openssl.org/source/license.html
use OpenSSL::Test::Utils;
-use OpenSSL::Test qw/:DEFAULT srctop_file srctop_dir bldtop_dir bldtop_file/;
+use OpenSSL::Test qw/:DEFAULT srctop_file srctop_dir bldtop_dir bldtop_file result_dir result_file/;
use File::Temp qw(tempfile);
BEGIN {
setup("test_sslapi");
}
-use lib srctop_dir('Configurations');
-use lib bldtop_dir('.');
-
my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
my $fipsmodcfg_filename = "fipsmodule.cnf";
my $fipsmodcfg = bldtop_file("test", $fipsmodcfg_filename);
# A modified copy of "fipsmodule.cnf"
my $fipsmodcfgnew_filename = "fipsmodule_mod.cnf";
-my $fipsmodcfgnew = bldtop_file("test", $fipsmodcfgnew_filename);
+my $fipsmodcfgnew = result_file($fipsmodcfgnew_filename);
# A modified copy of "fips-and-base.cnf"
-my $provconfnew = bldtop_file("test", "temp.cnf");
+my $provconfnew = result_file("fips-and-base-temp.cnf");
plan skip_all => "No TLS/SSL protocols are supported by this OpenSSL build"
if alldisabled(grep { $_ ne "ssl3" } available_protocols("tls"));
skip "Skipping FIPS tests", 2
if $no_fips;
+ # NOTE that because by default we setup fips provider in pedantic mode,
+ # with >= 3.1.0 this just runs test_no_ems() to check that the connection
+ # fails if ems is not used and the fips check is enabled.
ok(run(test(["sslapitest", srctop_dir("test", "certs"),
srctop_file("test", "recipes", "90-test_sslapi_data",
"passwd.txt"), $tmpfilename, "fips",
"recipes",
"90-test_sslapi_data",
"dhparams.pem")])),
- "running sslapitest");
+ "running sslapitest with default fips config");
run(test(["fips_version_test", "-config", $provconf, ">=3.1.0"]),
capture => 1, statusvar => \my $exit);
# Read in a text $infile and replace the regular expression in $srch with the
# value in $repl and output to a new file $outfile.
sub replace_line_file_internal {
-
+
my ($infile, $srch, $repl, $outfile) = @_;
my $msg;
close $fh;
return 1;
}
-
+
# Read in the text input file $infile
# and replace a single Key = Value line with a new value in $value.
# OR remove the Key = Value line if the passed in $value is empty.
}
return replace_line_file_internal($infile, $srch, $rep, $outfile);
}
-
+
# Read in the text $input file
# and search for the $key and replace with $newkey
# and then output a new file $outfile.
$srch, $rep, $outfile);
}
- # In order to enable the tls1-prf-ems-check=1 in a fips config file
+ # The default fipsmodule.cnf in tests is set with -pedantic.
+ # In order to enable the tls1-prf-ems-check=0 in a fips config file
# copy the existing fipsmodule.cnf and modify it.
# Then copy fips-and-base.cfg to make a file that includes the changed file
- # NOTE that this just runs test_no_ems() to check that the connection
- # fails if ems is not used and the fips check is enabled.
+ $ENV{OPENSSL_CONF_INCLUDE} = result_dir();
ok(replace_kv_file($fipsmodcfg,
- 'tls1-prf-ems-check', '1',
+ 'tls1-prf-ems-check', '0',
$fipsmodcfgnew)
&& replace_line_file($provconf,
$fipsmodcfg_filename, $fipsmodcfgnew_filename,
"recipes",
"90-test_sslapi_data",
"dhparams.pem")])),
- "running sslapitest");
-
- unlink $fipsmodcfgnew;
- unlink $provconfnew;
+ "running sslapitest with modified fips config");
}
ok(run(test(["ssl_handshake_rtt_test"])),"running ssl_handshake_rtt_test");