diff options
author | tb <> | 2020-06-03 04:47:03 +0000 |
---|---|---|
committer | tb <> | 2020-06-03 04:47:03 +0000 |
commit | c34de2c3490495ca1d9afcbc43593161c810b669 (patch) | |
tree | a1ca75870eae03f0fadde7e6570f04c743744a2a | |
parent | e97e7b9a596e73ceee6e6d7c13056424eabeafdd (diff) | |
download | openbsd-c34de2c3490495ca1d9afcbc43593161c810b669.tar.gz openbsd-c34de2c3490495ca1d9afcbc43593161c810b669.tar.bz2 openbsd-c34de2c3490495ca1d9afcbc43593161c810b669.zip |
Enable the record layer limits test and mark two finished test cases as
xfail for now. Arguably, the expected decode_error is more appropriate
than the decrypt_error that we send at the moment.
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 13 |
1 files changed, 8 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index ef037aec9a..c1e89bd43b 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.5 2020/06/01 10:46:45 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.6 2020/06/03 04:47:03 tb Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -98,6 +98,13 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | |||
98 | 98 | ||
99 | Test("test-tls13-invalid-ciphers.py"), | 99 | Test("test-tls13-invalid-ciphers.py"), |
100 | Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), | 100 | Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), |
101 | |||
102 | # Mark two tests cases as xfail for now. The tests expect an arguably | ||
103 | # correct decode_error while we send a decrypt_error (like fizz/boring). | ||
104 | Test("test-tls13-record-layer-limits.py", [ | ||
105 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", | ||
106 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", | ||
107 | ]), | ||
101 | ]) | 108 | ]) |
102 | 109 | ||
103 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ | 110 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ |
@@ -137,10 +144,6 @@ tls13_failing_tests = TestGroup("failing TLSv1.3 tests", [ | |||
137 | ]) | 144 | ]) |
138 | 145 | ||
139 | tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ | 146 | tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ |
140 | # After adding record overflow alert, 14 tests fail because | ||
141 | # they expect ExpectNewSessionTicket(). | ||
142 | Test("test-tls13-record-layer-limits.py" ), | ||
143 | |||
144 | # Other test failures bugs in keyshare/tlsext negotiation? | 147 | # Other test failures bugs in keyshare/tlsext negotiation? |
145 | Test("test-tls13-shuffled-extentions.py"), # should reject 2nd CH | 148 | Test("test-tls13-shuffled-extentions.py"), # should reject 2nd CH |
146 | Test("test-tls13-unrecognised-groups.py"), # unexpected closure | 149 | Test("test-tls13-unrecognised-groups.py"), # unexpected closure |