summaryrefslogtreecommitdiff
path: root/src/regress/lib/libssl
diff options
context:
space:
mode:
authortb <>2021-04-13 16:16:06 +0000
committertb <>2021-04-13 16:16:06 +0000
commit7f6713ddb38478403f8d8ae9ce0ee731b41ae393 (patch)
treecd5c6f0dbdad26f0254ce54dbeaad4a271e0c51d /src/regress/lib/libssl
parent89e5b0a2328a9bc2641ade0737c0acc7655f1739 (diff)
downloadopenbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.tar.gz
openbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.tar.bz2
openbsd-7f6713ddb38478403f8d8ae9ce0ee731b41ae393.zip
enable test-tlsfuzzer-invalid-compression-methods.py
Diffstat (limited to 'src/regress/lib/libssl')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py15
1 files changed, 10 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 608163b936..5db361c1f7 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.32 2021/04/13 15:59:14 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.33 2021/04/13 16:16:06 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -377,6 +377,15 @@ tls12_tests = TestGroup("TLSv1.2 tests", [
377 ), 377 ),
378 Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), 378 Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ),
379 379
380 Test("test-invalid-compression-methods.py", [
381 "-x", "invalid compression methods",
382 "-X", 'Expected alert description "illegal_parameter" '
383 'does not match received "decode_error"',
384 "-x", "only deflate compression method",
385 "-X", 'Expected alert description "illegal_parameter" '
386 'does not match received "decode_error"',
387 ]),
388
380 # Without --sig-algs-drop-ok, two tests fail since we do not currently 389 # Without --sig-algs-drop-ok, two tests fail since we do not currently
381 # implement the signature_algorithms_cert extension (although we MUST). 390 # implement the signature_algorithms_cert extension (although we MUST).
382 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), 391 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]),
@@ -452,10 +461,6 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
452 # Lots of failures. abrupt closure 461 # Lots of failures. abrupt closure
453 Test("test-invalid-client-hello.py"), 462 Test("test-invalid-client-hello.py"),
454 463
455 # Test expects illegal_parameter, we send decode_error in ssl_srvr.c:1016
456 # Need to check that this is correct.
457 Test("test-invalid-compression-methods.py"),
458
459 # abrupt closure 464 # abrupt closure
460 # 'encrypted premaster set to all zero (n)' n in 256 384 512 465 # 'encrypted premaster set to all zero (n)' n in 256 384 512
461 Test("test-invalid-rsa-key-exchange-messages.py"), 466 Test("test-invalid-rsa-key-exchange-messages.py"),