summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2021-04-13 15:45:22 +0000
committertb <>2021-04-13 15:45:22 +0000
commit4d23239f46cb2a8019cfac97d41e9ab70e754765 (patch)
treea14e93d1193c35e950b3e48bbd374ff632c35839 /src
parent90679197a57c4291df56aea88bc62e226f593acd (diff)
downloadopenbsd-4d23239f46cb2a8019cfac97d41e9ab70e754765.tar.gz
openbsd-4d23239f46cb2a8019cfac97d41e9ab70e754765.tar.bz2
openbsd-4d23239f46cb2a8019cfac97d41e9ab70e754765.zip
move a few tests to the unsupported group and fix two comments
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py30
1 files changed, 15 insertions, 15 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 2764a5b114..a4df827d04 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.29 2021/04/13 15:35:20 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.30 2021/04/13 15:45:22 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -419,27 +419,16 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
419 Test("test-clienthello-md5.py"), 419 Test("test-clienthello-md5.py"),
420 420
421 # Tests expect an illegal_parameter or a decode_error alert. Should be 421 # Tests expect an illegal_parameter or a decode_error alert. Should be
422 * added to ssl3_get_client_key_exchange on kex function failure. 422 # added to ssl3_get_client_key_exchange on kex function failure.
423 Test("test-ecdhe-rsa-key-exchange-with-bad-messages.py"), 423 Test("test-ecdhe-rsa-key-exchange-with-bad-messages.py"),
424 424
425 # We send a handshake_failure while the test expects to succeed 425 # We send a handshake_failure due to no shared ciphers while the
426 # test expects to succeed.
426 Test("test-ecdhe-rsa-key-exchange.py"), 427 Test("test-ecdhe-rsa-key-exchange.py"),
427 428
428 # unsupported?
429 Test("test-extended-master-secret-extension-with-client-cert.py"),
430
431 # no shared cipher 429 # no shared cipher
432 Test("test-ecdsa-sig-flexibility.py"), 430 Test("test-ecdsa-sig-flexibility.py"),
433 431
434 # unsupported
435 Test("test-encrypt-then-mac-renegotiation.py"),
436 Test("test-encrypt-then-mac.py"),
437 Test("test-extended-master-secret-extension.py"),
438 Test("test-ffdhe-expected-params.py"),
439 Test("test-ffdhe-negotiation.py"),
440 # unsupported. Expects the server to send the heartbeat extension
441 Test("test-heartbeat.py"),
442
443 # 29 succeed, 263 fail: 432 # 29 succeed, 263 fail:
444 # 'n extensions', 'n extensions last empty' n in 4086, 4096, 8192, 16383 433 # 'n extensions', 'n extensions last empty' n in 4086, 4096, 8192, 16383
445 # 'fuzz ext length to n' n in [0..255] with the exception of 41... 434 # 'fuzz ext length to n' n in [0..255] with the exception of 41...
@@ -553,6 +542,17 @@ tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [
553 Test("test-SSLv3-padding.py"), 542 Test("test-SSLv3-padding.py"),
554 # we don't do RSA key exchanges 543 # we don't do RSA key exchanges
555 Test("test-bleichenbacher-timing.py"), 544 Test("test-bleichenbacher-timing.py"),
545 # no encrypt-then-mac
546 Test("test-encrypt-then-mac-renegotiation.py"),
547 Test("test-encrypt-then-mac.py"),
548 # no EME support
549 Test("test-extended-master-secret-extension-with-client-cert.py"),
550 Test("test-extended-master-secret-extension.py"),
551 # no ffdhe
552 Test("test-ffdhe-expected-params.py"),
553 Test("test-ffdhe-negotiation.py"),
554 # expects the server to send the heartbeat extension
555 Test("test-heartbeat.py"),
556]) 556])
557 557
558# These tests take a ton of time to fail against an 1.3 server, 558# These tests take a ton of time to fail against an 1.3 server,