diff options
author | tb <> | 2021-04-14 14:54:30 +0000 |
---|---|---|
committer | tb <> | 2021-04-14 14:54:30 +0000 |
commit | 3652e08016409ee47870a1baf96ae02743c66c60 (patch) | |
tree | 85a231ff6c01e98827a196e5532b63b0b048c879 /src | |
parent | 0ea7a3e61641c0ca8a2ac7530f66cf546331e5d6 (diff) | |
download | openbsd-3652e08016409ee47870a1baf96ae02743c66c60.tar.gz openbsd-3652e08016409ee47870a1baf96ae02743c66c60.tar.bz2 openbsd-3652e08016409ee47870a1baf96ae02743c66c60.zip |
revert previous. some of the keyupdate tests still fail occasionally
Diffstat (limited to 'src')
-rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 13 |
1 files changed, 11 insertions, 2 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 733f2a7175..6f3bd9d8bf 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
@@ -1,4 +1,4 @@ | |||
1 | # $OpenBSD: tlsfuzzer.py,v 1.37 2021/04/14 14:29:16 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.38 2021/04/14 14:54:30 tb Exp $ |
2 | # | 2 | # |
3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
4 | # | 4 | # |
@@ -172,7 +172,6 @@ tls13_tests = TestGroup("TLSv1.3 tests", [ | |||
172 | Test("test-tls13-finished-plaintext.py"), | 172 | Test("test-tls13-finished-plaintext.py"), |
173 | Test("test-tls13-hrr.py"), | 173 | Test("test-tls13-hrr.py"), |
174 | Test("test-tls13-keyshare-omitted.py"), | 174 | Test("test-tls13-keyshare-omitted.py"), |
175 | Test("test-tls13-keyupdate.py"), | ||
176 | Test("test-tls13-legacy-version.py"), | 175 | Test("test-tls13-legacy-version.py"), |
177 | Test("test-tls13-nociphers.py"), | 176 | Test("test-tls13-nociphers.py"), |
178 | Test("test-tls13-record-padding.py"), | 177 | Test("test-tls13-record-padding.py"), |
@@ -202,7 +201,9 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | |||
202 | # correct decode_error while we send a decrypt_error (like fizz/boring). | 201 | # correct decode_error while we send a decrypt_error (like fizz/boring). |
203 | Test("test-tls13-record-layer-limits.py", [ | 202 | Test("test-tls13-record-layer-limits.py", [ |
204 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", | 203 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", |
204 | "-X", substitute_alert("decode_error", "decrypt_error"), | ||
205 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", | 205 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", |
206 | "-X", substitute_alert("decode_error", "decrypt_error"), | ||
206 | ]), | 207 | ]), |
207 | # We don't accept an empty ECPF extension since it must advertise the | 208 | # We don't accept an empty ECPF extension since it must advertise the |
208 | # uncompressed point format. Exclude this extension type from the test. | 209 | # uncompressed point format. Exclude this extension type from the test. |
@@ -268,6 +269,14 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ | |||
268 | # Other test failures bugs in keyshare/tlsext negotiation? | 269 | # Other test failures bugs in keyshare/tlsext negotiation? |
269 | Test("test-tls13-unrecognised-groups.py"), # unexpected closure | 270 | Test("test-tls13-unrecognised-groups.py"), # unexpected closure |
270 | 271 | ||
272 | # 5 occasional failures: | ||
273 | # 'app data split, conversation with KeyUpdate msg' | ||
274 | # 'fragmented keyupdate msg' | ||
275 | # 'multiple KeyUpdate messages' | ||
276 | # 'post-handshake KeyUpdate msg with update_not_request' | ||
277 | # 'post-handshake KeyUpdate msg with update_request' | ||
278 | Test("test-tls13-keyupdate.py"), | ||
279 | |||
271 | Test("test-tls13-symetric-ciphers.py"), # unexpected message from peer | 280 | Test("test-tls13-symetric-ciphers.py"), # unexpected message from peer |
272 | 281 | ||
273 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' | 282 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' |