]> git.ipfire.org Git - thirdparty/openssl.git/commitdiff
quic_record, quicapi, and quicfaults tests do not support fuzzing builds
authorTomas Mraz <tomas@openssl.org>
Mon, 23 Oct 2023 12:26:32 +0000 (14:26 +0200)
committerMatt Caswell <matt@openssl.org>
Mon, 23 Oct 2023 12:45:09 +0000 (13:45 +0100)
Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22472)

.github/workflows/fuzz-checker.yml
test/recipes/70-test_quic_record.t
test/recipes/75-test_quicapi.t
test/recipes/90-test_quicfaults.t

index 766a4a1326ecb29d4964eaccb0d44c3c3f0ea648..f476b525cff9fdc573137f237d670b092592ac31 100644 (file)
@@ -23,6 +23,7 @@ jobs:
             config: enable-fuzz-afl no-module,
             install: afl++-clang,
             cc: afl-clang-fast
+            tests: -
           }, {
             name: libFuzzer,
             config: enable-fuzz-libfuzzer enable-asan enable-ubsan,
index 3fd782000c34a0c056c200398e4c8ce2d2d6e6c7..52acaa8aed624c03c00716fb46b9ce2a1e702d71 100644 (file)
@@ -14,6 +14,9 @@ setup("test_quic_record");
 plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
     if disabled('quic');
 
+plan skip_all => "These tests are not supported in a fuzz build"
+    if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
+
 plan tests => 1;
 
 ok(run(test(["quic_record_test"])));
index bd411f221c8d68d882f6336745f23e9519d9bc6e..e1ce5eabb291b9abf51a472f0efd715c4b38b0d4 100644 (file)
@@ -22,6 +22,9 @@ my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
 plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
     if disabled('quic');
 
+plan skip_all => "These tests are not supported in a fuzz build"
+    if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
+
 plan tests =>
     ($no_fips ? 0 : 1)          # quicapitest with fips
     + 1;                        # quicapitest with default provider
index 7fa039a37060445523b07dd016520dc5aa07a407..710fdad86924dfd6f33f7b87763b43a55c75b587 100644 (file)
@@ -20,6 +20,9 @@ use lib bldtop_dir('.');
 plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
     if disabled('quic');
 
+plan skip_all => "These tests are not supported in a fuzz build"
+    if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
+
 plan tests => 2;
 
 ok(run(test(["quicfaultstest", srctop_dir("test", "certs")])),