summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authortb <>2020-06-03 04:47:03 +0000
committertb <>2020-06-03 04:47:03 +0000
commitc34de2c3490495ca1d9afcbc43593161c810b669 (patch)
treea1ca75870eae03f0fadde7e6570f04c743744a2a
parente97e7b9a596e73ceee6e6d7c13056424eabeafdd (diff)
downloadopenbsd-c34de2c3490495ca1d9afcbc43593161c810b669.tar.gz
openbsd-c34de2c3490495ca1d9afcbc43593161c810b669.tar.bz2
openbsd-c34de2c3490495ca1d9afcbc43593161c810b669.zip
Enable the record layer limits test and mark two finished test cases as
xfail for now. Arguably, the expected decode_error is more appropriate than the decrypt_error that we send at the moment.
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py13
1 files changed, 8 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index ef037aec9a..c1e89bd43b 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.5 2020/06/01 10:46:45 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.6 2020/06/03 04:47:03 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -98,6 +98,13 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [
98 98
99 Test("test-tls13-invalid-ciphers.py"), 99 Test("test-tls13-invalid-ciphers.py"),
100 Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), 100 Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers),
101
102 # Mark two tests cases as xfail for now. The tests expect an arguably
103 # correct decode_error while we send a decrypt_error (like fizz/boring).
104 Test("test-tls13-record-layer-limits.py", [
105 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256",
106 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256",
107 ]),
101]) 108])
102 109
103tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ 110tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [
@@ -137,10 +144,6 @@ tls13_failing_tests = TestGroup("failing TLSv1.3 tests", [
137]) 144])
138 145
139tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ 146tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [
140 # After adding record overflow alert, 14 tests fail because
141 # they expect ExpectNewSessionTicket().
142 Test("test-tls13-record-layer-limits.py" ),
143
144 # Other test failures bugs in keyshare/tlsext negotiation? 147 # Other test failures bugs in keyshare/tlsext negotiation?
145 Test("test-tls13-shuffled-extentions.py"), # should reject 2nd CH 148 Test("test-tls13-shuffled-extentions.py"), # should reject 2nd CH
146 Test("test-tls13-unrecognised-groups.py"), # unexpected closure 149 Test("test-tls13-unrecognised-groups.py"), # unexpected closure