summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2021-03-27 18:11:53 +0000
committertb <>2021-03-27 18:11:53 +0000
commit339f42ec05d6bdb3a1b68cb621c612c72a5e571f (patch)
treea7aaabaa4656d3ee12fd0e4d0651207989d2eefe /src
parentc181c81fb01592ad1d49ebf7afa9676c41a32aaf (diff)
downloadopenbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.tar.gz
openbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.tar.bz2
openbsd-339f42ec05d6bdb3a1b68cb621c612c72a5e571f.zip
Enable test-sig-algs-renegotiation-resumption.py.
This test covers various scenarios with renegotiation and session resumption. In particular it crashes the OpenSSL 1.1.1j server due to the sigalg NULL deref fixed this week. We need --sig-algs-drop-ok since we do not currently implement signature_algorithms_cert.
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py11
1 files changed, 6 insertions, 5 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 9c2f28f293..0a1c6f9459 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.25 2021/03/26 22:35:17 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.26 2021/03/27 18:11:53 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -376,6 +376,11 @@ tls12_tests = TestGroup("TLSv1.2 tests", [
376 tls13_args = ["--server-max-protocol", "TLSv1.3"], 376 tls13_args = ["--server-max-protocol", "TLSv1.3"],
377 ), 377 ),
378 Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), 378 Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ),
379
380 # Without --sig-algs-drop-ok, two tests fail since we do not currently
381 # implement the signature_algorithms_cert extension (although we MUST).
382 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]),
383
379 Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols), 384 Test("test-serverhello-random.py", args = tls12_exclude_legacy_protocols),
380]) 385])
381 386
@@ -526,10 +531,6 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
526 # 'rsa_pss_pss_sha512 only' 531 # 'rsa_pss_pss_sha512 only'
527 Test("test-sig-algs.py"), 532 Test("test-sig-algs.py"),
528 533
529 # Without --sig-algs-drop-ok, two tests fail since we do not currently
530 # implement the signature_algorithms_cert extension (although we MUST).
531 Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]),
532
533 # 13 failures: 534 # 13 failures:
534 # 'duplicated n non-rsa schemes' for n in 202 2342 8119 23741 32744 535 # 'duplicated n non-rsa schemes' for n in 202 2342 8119 23741 32744
535 # 'empty list of signature methods' 536 # 'empty list of signature methods'