quic_record, quicapi, and quicfaults tests do not support fuzzing builds

Reviewed-by: Hugo Landau <hlandau@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22472)
This commit is contained in:
Tomas Mraz 2023-10-23 14:26:32 +02:00 committed by Matt Caswell
parent bde5411049
commit fac61ea461
4 changed files with 10 additions and 0 deletions

View File

@ -23,6 +23,7 @@ jobs:
config: enable-fuzz-afl no-module,
install: afl++-clang,
cc: afl-clang-fast
tests: -
}, {
name: libFuzzer,
config: enable-fuzz-libfuzzer enable-asan enable-ubsan,

View File

@ -14,6 +14,9 @@ setup("test_quic_record");
plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
if disabled('quic');
plan skip_all => "These tests are not supported in a fuzz build"
if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
plan tests => 1;
ok(run(test(["quic_record_test"])));

View File

@ -22,6 +22,9 @@ my $no_fips = disabled('fips') || ($ENV{NO_FIPS} // 0);
plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
if disabled('quic');
plan skip_all => "These tests are not supported in a fuzz build"
if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
plan tests =>
($no_fips ? 0 : 1) # quicapitest with fips
+ 1; # quicapitest with default provider

View File

@ -20,6 +20,9 @@ use lib bldtop_dir('.');
plan skip_all => "QUIC protocol is not supported by this OpenSSL build"
if disabled('quic');
plan skip_all => "These tests are not supported in a fuzz build"
if config('options') =~ /-DFUZZING_BUILD_MODE_UNSAFE_FOR_PRODUCTION|enable-fuzz-afl/;
plan tests => 2;
ok(run(test(["quicfaultstest", srctop_dir("test", "certs")])),