summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
diff options
context:
space:
mode:
authortb <>2023-08-14 18:10:42 +0000
committertb <>2023-08-14 18:10:42 +0000
commit1d181f118138e03afe36d8ded01da6ab913d9783 (patch)
tree6eebeace070187fd6bac58497eaf24d61de4fdd8 /src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
parentf47a6529d17755df780e5f3522475d392ab49d05 (diff)
downloadopenbsd-1d181f118138e03afe36d8ded01da6ab913d9783.tar.gz
openbsd-1d181f118138e03afe36d8ded01da6ab913d9783.tar.bz2
openbsd-1d181f118138e03afe36d8ded01da6ab913d9783.zip
Prepare tlsfuzzer.py for ports update
Diffstat (limited to 'src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py16
1 files changed, 13 insertions, 3 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index a31c8fae03..4b29dded41 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.51 2023/08/03 20:13:12 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.52 2023/08/14 18:10:42 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -370,7 +370,6 @@ tls12_tests = TestGroup("TLSv1.2 tests", [
370 Test("test-message-skipping.py"), 370 Test("test-message-skipping.py"),
371 Test("test-no-heartbeat.py"), 371 Test("test-no-heartbeat.py"),
372 Test("test-record-layer-fragmentation.py"), 372 Test("test-record-layer-fragmentation.py"),
373 Test("test-sessionID-resumption.py"),
374 Test("test-sslv2-connection.py"), 373 Test("test-sslv2-connection.py"),
375 Test("test-truncating-of-finished.py"), 374 Test("test-truncating-of-finished.py"),
376 Test("test-truncating-of-kRSA-client-key-exchange.py"), 375 Test("test-truncating-of-kRSA-client-key-exchange.py"),
@@ -388,7 +387,7 @@ tls12_tests = TestGroup("TLSv1.2 tests", [
388 Test( 387 Test(
389 "test-ccs.py", [ 388 "test-ccs.py", [
390 "-x", "two bytes long CCS", 389 "-x", "two bytes long CCS",
391 "-X", "does not match received \"decode_error\"", 390 "-X", substitute_alert("unexpected_message", "decode_error"),
392 ] 391 ]
393 ), 392 ),
394 Test( 393 Test(
@@ -439,6 +438,11 @@ tls12_tests = TestGroup("TLSv1.2 tests", [
439 "-e", "drop extended_master_secret in renegotiation", 438 "-e", "drop extended_master_secret in renegotiation",
440 ]), 439 ]),
441 440
441 Test("test-sessionID-resumption.py", [
442 "-x", "Client Hello too long session ID",
443 "-X", substitute_alert("decode_error", "illegal_parameter"),
444 ]),
445
442 # Without --sig-algs-drop-ok, two tests fail since we do not currently 446 # Without --sig-algs-drop-ok, two tests fail since we do not currently
443 # implement the signature_algorithms_cert extension (although we MUST). 447 # implement the signature_algorithms_cert extension (although we MUST).
444 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), 448 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]),
@@ -558,6 +562,12 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
558 # 'resumption with cipher from old CH but not selected by server' 562 # 'resumption with cipher from old CH but not selected by server'
559 Test("test-resumption-with-wrong-ciphers.py"), 563 Test("test-resumption-with-wrong-ciphers.py"),
560 564
565 # 'session resumption with empty session_id'
566 # 'session resumption with random session_id'
567 # 'session resumption with renegotiation'
568 # AssertionError: Server did not send extension(s): session_ticket
569 Test("test-session-ticket-resumption.py"),
570
561 # 5 failures: 571 # 5 failures:
562 # 'empty sigalgs' 572 # 'empty sigalgs'
563 # 'only undefined sigalgs' 573 # 'only undefined sigalgs'