diff options
author | tb <> | 2021-04-13 16:16:06 +0000 |
---|---|---|
committer | tb <> | 2021-04-13 16:16:06 +0000 |
commit | 7f6713ddb38478403f8d8ae9ce0ee731b41ae393 (patch) | |
tree | cd5c6f0dbdad26f0254ce54dbeaad4a271e0c51d /src/regress/lib/libssl | |
parent | 89e5b0a2328a9bc2641ade0737c0acc7655f1739 (diff) | |
download | openbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.tar.gz openbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.tar.bz2 openbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.zip |
enable test-tlsfuzzer-invalid-compression-methods.py
Diffstat (limited to 'src/regress/lib/libssl')
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 15 |
1 files changed, 10 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 608163b936..5db361c1f7 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.32 2021/04/13 15:59:14 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.33 2021/04/13 16:16:06 tb Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -377,6 +377,15 @@ tls12_tests = TestGroup("TLSv1.2 tests", [ | |||
377 | ), | 377 | ), |
378 | Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), | 378 | Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), |
379 | 379 | ||
380 | Test("test-invalid-compression-methods.py", [ | ||
381 | "-x", "invalid compression methods", | ||
382 | "-X", 'Expected alert description "illegal_parameter" ' | ||
383 | 'does not match received "decode_error"', | ||
384 | "-x", "only deflate compression method", | ||
385 | "-X", 'Expected alert description "illegal_parameter" ' | ||
386 | 'does not match received "decode_error"', | ||
387 | ]), | ||
388 | |||
380 | # Without --sig-algs-drop-ok, two tests fail since we do not currently | 389 | # Without --sig-algs-drop-ok, two tests fail since we do not currently |
381 | # implement the signature_algorithms_cert extension (although we MUST). | 390 | # implement the signature_algorithms_cert extension (although we MUST). |
382 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), | 391 | Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), |
@@ -452,10 +461,6 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [ | |||
452 | # Lots of failures. abrupt closure | 461 | # Lots of failures. abrupt closure |
453 | Test("test-invalid-client-hello.py"), | 462 | Test("test-invalid-client-hello.py"), |
454 | 463 | ||
455 | # Test expects illegal_parameter, we send decode_error in ssl_srvr.c:1016 | ||
456 | # Need to check that this is correct. | ||
457 | Test("test-invalid-compression-methods.py"), | ||
458 | |||
459 | # abrupt closure | 464 | # abrupt closure |
460 | # 'encrypted premaster set to all zero (n)' n in 256 384 512 | 465 | # 'encrypted premaster set to all zero (n)' n in 256 384 512 |
461 | Test("test-invalid-rsa-key-exchange-messages.py"), | 466 | Test("test-invalid-rsa-key-exchange-messages.py"), |