return serialNumber
+ def getTLSProvider(self):
+ return self.sendConsoleCommand("getBind(0):getEffectiveTLSProvider()").rstrip()
+
@unittest.skipIf('SKIP_DOH_TESTS' in os.environ, 'DNS over HTTPS tests are disabled')
class TestOCSPStaplingDOH(DNSDistOCSPStaplingTest):
"""
output = self.checkOCSPStaplingStatus('127.0.0.1', self._tlsServerPort, self._serverName, self._caCert)
self.assertIn('OCSP Response Status: successful (0x0)', output)
+ self.assertEquals(self.getTLSProvider(), "gnutls")
serialNumber = self.getOCSPSerial(output)
self.assertTrue(serialNumber)
"""
output = self.checkOCSPStaplingStatus('127.0.0.1', self._tlsServerPort, self._serverName, self._caCert)
self.assertIn('OCSP Response Status: successful (0x0)', output)
+ self.assertEquals(self.getTLSProvider(), "openssl")
serialNumber = self.getOCSPSerial(output)
self.assertTrue(serialNumber)
conn = self.openTLSConnection(self._tlsServerPort, self._serverName, self._caCert)
return conn.getpeercert()
+ def getTLSProvider(self):
+ return self.sendConsoleCommand("getBind(0):getEffectiveTLSProvider()").rstrip()
+
def testTLSSimple(self):
"""
TLS: Single query
"""
_config_params = ['_consoleKeyB64', '_consolePort', '_testServerPort', '_tlsServerPort', '_serverCert', '_serverKey']
+ def testProvider(self):
+ self.assertEquals(self.getTLSProvider(), "openssl")
+
class TestGnuTLS(DNSDistTest, TLSTests):
_consoleKey = DNSDistTest.generateConsoleKey()
"""
_config_params = ['_consoleKeyB64', '_consolePort', '_testServerPort', '_tlsServerPort', '_serverCert', '_serverKey']
+ def testProvider(self):
+ self.assertEquals(self.getTLSProvider(), "gnutls")
+
class TestDOTWithCache(DNSDistTest):
_serverKey = 'server.key'
_serverCert = 'server.chain'