diff options
author | tb <> | 2021-03-27 18:11:53 +0000 |
---|---|---|
committer | tb <> | 2021-03-27 18:11:53 +0000 |
commit | 339f42ec05d6bdb3a1b68cb621c612c72a5e571f (patch) | |
tree | a7aaabaa4656d3ee12fd0e4d0651207989d2eefe | |
parent | c181c81fb01592ad1d49ebf7afa9676c41a32aaf (diff) | |
download | openbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.tar.gz openbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.tar.bz2 openbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.zip |
Enable test-sig-algs-renegotiation-resumption.py.
This test covers various scenarios with renegotiation and session
resumption. In particular it crashes the OpenSSL 1.1.1j server due
to the sigalg NULL deref fixed this week. We need --sig-algs-drop-ok
since we do not currently implement signature_algorithms_cert.
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 11 |
1 files changed, 6 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 9c2f28f293..0a1c6f9459 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.25 2021/03/26 22:35:17 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.26 2021/03/27 18:11:53 tb Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -376,6 +376,11 @@ tls12_tests = TestGroup("TLSv1.2 tests", [ | |||
376 | tls13_args = ["--server-max-protocol", "TLSv1.3"], | 376 | tls13_args = ["--server-max-protocol", "TLSv1.3"], |
377 | ), | 377 | ), |
378 | Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), | 378 | Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), |
379 | |||
380 | # Without --sig-algs-drop-ok, two tests fail since we do not currently | ||
381 | # implement the signature_algorithms_cert extension (although we MUST). | ||
382 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), | ||
383 | |||
379 | Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols), | 384 | Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols), |
380 | ]) | 385 | ]) |
381 | 386 | ||
@@ -526,10 +531,6 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [ | |||
526 | # 'rsa_pss_pss_sha512 only' | 531 | # 'rsa_pss_pss_sha512 only' |
527 | Test("test-sig-algs.py"), | 532 | Test("test-sig-algs.py"), |
528 | 533 | ||
529 | # Without --sig-algs-drop-ok, two tests fail since we do not currently | ||
530 | # implement the signature_algorithms_cert extension (although we MUST). | ||
531 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), | ||
532 | |||
533 | # 13 failures: | 534 | # 13 failures: |
534 | # 'duplicated n non-rsa schemes' for n in 202 2342 8119 23741 32744 | 535 | # 'duplicated n non-rsa schemes' for n in 202 2342 8119 23741 32744 |
535 | # 'empty list of signature methods' | 536 | # 'empty list of signature methods' |