summaryrefslogtreecommitdiff
path: root/src/regress/lib
diff options
context:
space:
mode:
authortb <>2020-09-25 19:50:45 +0000
committertb <>2020-09-25 19:50:45 +0000
commit733583e427fa89cfe555a41fbbcdd252be0f0b5a (patch)
treedd207d1109c2d83f11f46d41338ed2f602c290a0 /src/regress/lib
parenta35331fd6c9cc3b123c89d14d89a3d19fac05568 (diff)
downloadopenbsd-733583e427fa89cfe555a41fbbcdd252be0f0b5a.tar.gz
openbsd-733583e427fa89cfe555a41fbbcdd252be0f0b5a.tar.bz2
openbsd-733583e427fa89cfe555a41fbbcdd252be0f0b5a.zip
move test-tls13-finished.py from slow tests to normal tests.
Diffstat (limited to 'src/regress/lib')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py53
1 files changed, 26 insertions, 27 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 4e8f2c60a3..374c800241 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.19 2020/09/25 08:38:25 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.20 2020/09/25 19:50:45 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -68,30 +68,6 @@ tls13_unsupported_ciphers = [
68 "-e", "TLS 1.3 with x448", 68 "-e", "TLS 1.3 with x448",
69] 69]
70 70
71tls13_tests = TestGroup("TLSv1.3 tests", [
72 Test("test-tls13-ccs.py"),
73 Test("test-tls13-conversation.py"),
74 Test("test-tls13-count-tickets.py"),
75 Test("test-tls13-empty-alert.py"),
76 Test("test-tls13-finished-plaintext.py"),
77 Test("test-tls13-hrr.py"),
78 Test("test-tls13-keyshare-omitted.py"),
79 Test("test-tls13-legacy-version.py"),
80 Test("test-tls13-nociphers.py"),
81 Test("test-tls13-record-padding.py"),
82 Test("test-tls13-shuffled-extentions.py"),
83 Test("test-tls13-zero-content-type.py"),
84
85 # The skipped tests fail due to a bug in BIO_gets() which masks the retry
86 # signalled from an SSL_read() failure. Testing with httpd(8) shows we're
87 # handling these corner cases correctly since tls13_record_layer.c -r1.47.
88 Test("test-tls13-zero-length-data.py", [
89 "-e", "zero-length app data",
90 "-e", "zero-length app data with large padding",
91 "-e", "zero-length app data with padding",
92 ]),
93])
94
95# test-tls13-finished.py has 70 failing tests that expect a "decode_error" 71# test-tls13-finished.py has 70 failing tests that expect a "decode_error"
96# instead of the "decrypt_error" sent by tls13_server_finished_recv(). 72# instead of the "decrypt_error" sent by tls13_server_finished_recv().
97# Both alerts appear to be reasonable in this context, so work around this 73# Both alerts appear to be reasonable in this context, so work around this
@@ -183,6 +159,31 @@ def generate_test_tls13_finished_args():
183 args += ["-x", truncation_fmt % truncation, "-X", assertion] 159 args += ["-x", truncation_fmt % truncation, "-X", assertion]
184 return args 160 return args
185 161
162tls13_tests = TestGroup("TLSv1.3 tests", [
163 Test("test-tls13-ccs.py"),
164 Test("test-tls13-conversation.py"),
165 Test("test-tls13-count-tickets.py"),
166 Test("test-tls13-empty-alert.py"),
167 Test("test-tls13-finished.py", generate_test_tls13_finished_args()),
168 Test("test-tls13-finished-plaintext.py"),
169 Test("test-tls13-hrr.py"),
170 Test("test-tls13-keyshare-omitted.py"),
171 Test("test-tls13-legacy-version.py"),
172 Test("test-tls13-nociphers.py"),
173 Test("test-tls13-record-padding.py"),
174 Test("test-tls13-shuffled-extentions.py"),
175 Test("test-tls13-zero-content-type.py"),
176
177 # The skipped tests fail due to a bug in BIO_gets() which masks the retry
178 # signalled from an SSL_read() failure. Testing with httpd(8) shows we're
179 # handling these corner cases correctly since tls13_record_layer.c -r1.47.
180 Test("test-tls13-zero-length-data.py", [
181 "-e", "zero-length app data",
182 "-e", "zero-length app data with large padding",
183 "-e", "zero-length app data with padding",
184 ]),
185])
186
186# Tests that take a lot of time (> ~30s on an x280) 187# Tests that take a lot of time (> ~30s on an x280)
187tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ 188tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [
188 # XXX: Investigate the occasional message 189 # XXX: Investigate the occasional message
@@ -192,8 +193,6 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [
192 Test("test-tls13-invalid-ciphers.py"), 193 Test("test-tls13-invalid-ciphers.py"),
193 Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), 194 Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers),
194 195
195 Test("test-tls13-finished.py", generate_test_tls13_finished_args()),
196
197 # Mark two tests cases as xfail for now. The tests expect an arguably 196 # Mark two tests cases as xfail for now. The tests expect an arguably
198 # correct decode_error while we send a decrypt_error (like fizz/boring). 197 # correct decode_error while we send a decrypt_error (like fizz/boring).
199 Test("test-tls13-record-layer-limits.py", [ 198 Test("test-tls13-record-layer-limits.py", [