summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2021-04-14 14:54:30 +0000
committertb <>2021-04-14 14:54:30 +0000
commit3652e08016409ee47870a1baf96ae02743c66c60 (patch)
tree85a231ff6c01e98827a196e5532b63b0b048c879 /src
parent0ea7a3e61641c0ca8a2ac7530f66cf546331e5d6 (diff)
downloadopenbsd-3652e08016409ee47870a1baf96ae02743c66c60.tar.gz
openbsd-3652e08016409ee47870a1baf96ae02743c66c60.tar.bz2
openbsd-3652e08016409ee47870a1baf96ae02743c66c60.zip
revert previous. some of the keyupdate tests still fail occasionally
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py13
1 files changed, 11 insertions, 2 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 733f2a7175..6f3bd9d8bf 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.37 2021/04/14 14:29:16 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.38 2021/04/14 14:54:30 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -172,7 +172,6 @@ tls13_tests = TestGroup("TLSv1.3 tests", [
172 Test("test-tls13-finished-plaintext.py"), 172 Test("test-tls13-finished-plaintext.py"),
173 Test("test-tls13-hrr.py"), 173 Test("test-tls13-hrr.py"),
174 Test("test-tls13-keyshare-omitted.py"), 174 Test("test-tls13-keyshare-omitted.py"),
175 Test("test-tls13-keyupdate.py"),
176 Test("test-tls13-legacy-version.py"), 175 Test("test-tls13-legacy-version.py"),
177 Test("test-tls13-nociphers.py"), 176 Test("test-tls13-nociphers.py"),
178 Test("test-tls13-record-padding.py"), 177 Test("test-tls13-record-padding.py"),
@@ -202,7 +201,9 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [
202 # correct decode_error while we send a decrypt_error (like fizz/boring). 201 # correct decode_error while we send a decrypt_error (like fizz/boring).
203 Test("test-tls13-record-layer-limits.py", [ 202 Test("test-tls13-record-layer-limits.py", [
204 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", 203 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256",
204 "-X", substitute_alert("decode_error", "decrypt_error"),
205 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", 205 "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256",
206 "-X", substitute_alert("decode_error", "decrypt_error"),
206 ]), 207 ]),
207 # We don't accept an empty ECPF extension since it must advertise the 208 # We don't accept an empty ECPF extension since it must advertise the
208 # uncompressed point format. Exclude this extension type from the test. 209 # uncompressed point format. Exclude this extension type from the test.
@@ -268,6 +269,14 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [
268 # Other test failures bugs in keyshare/tlsext negotiation? 269 # Other test failures bugs in keyshare/tlsext negotiation?
269 Test("test-tls13-unrecognised-groups.py"), # unexpected closure 270 Test("test-tls13-unrecognised-groups.py"), # unexpected closure
270 271
272 # 5 occasional failures:
273 # 'app data split, conversation with KeyUpdate msg'
274 # 'fragmented keyupdate msg'
275 # 'multiple KeyUpdate messages'
276 # 'post-handshake KeyUpdate msg with update_not_request'
277 # 'post-handshake KeyUpdate msg with update_request'
278 Test("test-tls13-keyupdate.py"),
279
271 Test("test-tls13-symetric-ciphers.py"), # unexpected message from peer 280 Test("test-tls13-symetric-ciphers.py"), # unexpected message from peer
272 281
273 # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' 282 # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature'