diff options
| author | tb <> | 2020-09-25 19:50:45 +0000 |
|---|---|---|
| committer | tb <> | 2020-09-25 19:50:45 +0000 |
| commit | 7eb95eb34cc5ab06b70e7dad39df3ed47d31f1ae (patch) | |
| tree | dd207d1109c2d83f11f46d41338ed2f602c290a0 /src | |
| parent | 33b8c9d48b4113d7a8f7d647bbf752c75a0a83e3 (diff) | |
| download | openbsd-7eb95eb34cc5ab06b70e7dad39df3ed47d31f1ae.tar.gz openbsd-7eb95eb34cc5ab06b70e7dad39df3ed47d31f1ae.tar.bz2 openbsd-7eb95eb34cc5ab06b70e7dad39df3ed47d31f1ae.zip | |
move test-tls13-finished.py from slow tests to normal tests.
Diffstat (limited to 'src')
| -rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 53 |
1 files changed, 26 insertions, 27 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 4e8f2c60a3..374c800241 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | # $OpenBSD: tlsfuzzer.py,v 1.19 2020/09/25 08:38:25 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.20 2020/09/25 19:50:45 tb Exp $ |
| 2 | # | 2 | # |
| 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
| 4 | # | 4 | # |
| @@ -68,30 +68,6 @@ tls13_unsupported_ciphers = [ | |||
| 68 | "-e", "TLS 1.3 with x448", | 68 | "-e", "TLS 1.3 with x448", |
| 69 | ] | 69 | ] |
| 70 | 70 | ||
| 71 | tls13_tests = TestGroup("TLSv1.3 tests", [ | ||
| 72 | Test("test-tls13-ccs.py"), | ||
| 73 | Test("test-tls13-conversation.py"), | ||
| 74 | Test("test-tls13-count-tickets.py"), | ||
| 75 | Test("test-tls13-empty-alert.py"), | ||
| 76 | Test("test-tls13-finished-plaintext.py"), | ||
| 77 | Test("test-tls13-hrr.py"), | ||
| 78 | Test("test-tls13-keyshare-omitted.py"), | ||
| 79 | Test("test-tls13-legacy-version.py"), | ||
| 80 | Test("test-tls13-nociphers.py"), | ||
| 81 | Test("test-tls13-record-padding.py"), | ||
| 82 | Test("test-tls13-shuffled-extentions.py"), | ||
| 83 | Test("test-tls13-zero-content-type.py"), | ||
| 84 | |||
| 85 | # The skipped tests fail due to a bug in BIO_gets() which masks the retry | ||
| 86 | # signalled from an SSL_read() failure. Testing with httpd(8) shows we're | ||
| 87 | # handling these corner cases correctly since tls13_record_layer.c -r1.47. | ||
| 88 | Test("test-tls13-zero-length-data.py", [ | ||
| 89 | "-e", "zero-length app data", | ||
| 90 | "-e", "zero-length app data with large padding", | ||
| 91 | "-e", "zero-length app data with padding", | ||
| 92 | ]), | ||
| 93 | ]) | ||
| 94 | |||
| 95 | # test-tls13-finished.py has 70 failing tests that expect a "decode_error" | 71 | # test-tls13-finished.py has 70 failing tests that expect a "decode_error" |
| 96 | # instead of the "decrypt_error" sent by tls13_server_finished_recv(). | 72 | # instead of the "decrypt_error" sent by tls13_server_finished_recv(). |
| 97 | # Both alerts appear to be reasonable in this context, so work around this | 73 | # Both alerts appear to be reasonable in this context, so work around this |
| @@ -183,6 +159,31 @@ def generate_test_tls13_finished_args(): | |||
| 183 | args += ["-x", truncation_fmt % truncation, "-X", assertion] | 159 | args += ["-x", truncation_fmt % truncation, "-X", assertion] |
| 184 | return args | 160 | return args |
| 185 | 161 | ||
| 162 | tls13_tests = TestGroup("TLSv1.3 tests", [ | ||
| 163 | Test("test-tls13-ccs.py"), | ||
| 164 | Test("test-tls13-conversation.py"), | ||
| 165 | Test("test-tls13-count-tickets.py"), | ||
| 166 | Test("test-tls13-empty-alert.py"), | ||
| 167 | Test("test-tls13-finished.py", generate_test_tls13_finished_args()), | ||
| 168 | Test("test-tls13-finished-plaintext.py"), | ||
| 169 | Test("test-tls13-hrr.py"), | ||
| 170 | Test("test-tls13-keyshare-omitted.py"), | ||
| 171 | Test("test-tls13-legacy-version.py"), | ||
| 172 | Test("test-tls13-nociphers.py"), | ||
| 173 | Test("test-tls13-record-padding.py"), | ||
| 174 | Test("test-tls13-shuffled-extentions.py"), | ||
| 175 | Test("test-tls13-zero-content-type.py"), | ||
| 176 | |||
| 177 | # The skipped tests fail due to a bug in BIO_gets() which masks the retry | ||
| 178 | # signalled from an SSL_read() failure. Testing with httpd(8) shows we're | ||
| 179 | # handling these corner cases correctly since tls13_record_layer.c -r1.47. | ||
| 180 | Test("test-tls13-zero-length-data.py", [ | ||
| 181 | "-e", "zero-length app data", | ||
| 182 | "-e", "zero-length app data with large padding", | ||
| 183 | "-e", "zero-length app data with padding", | ||
| 184 | ]), | ||
| 185 | ]) | ||
| 186 | |||
| 186 | # Tests that take a lot of time (> ~30s on an x280) | 187 | # Tests that take a lot of time (> ~30s on an x280) |
| 187 | tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | 188 | tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ |
| 188 | # XXX: Investigate the occasional message | 189 | # XXX: Investigate the occasional message |
| @@ -192,8 +193,6 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | |||
| 192 | Test("test-tls13-invalid-ciphers.py"), | 193 | Test("test-tls13-invalid-ciphers.py"), |
| 193 | Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), | 194 | Test("test-tls13-serverhello-random.py", tls13_unsupported_ciphers), |
| 194 | 195 | ||
| 195 | Test("test-tls13-finished.py", generate_test_tls13_finished_args()), | ||
| 196 | |||
| 197 | # Mark two tests cases as xfail for now. The tests expect an arguably | 196 | # Mark two tests cases as xfail for now. The tests expect an arguably |
| 198 | # correct decode_error while we send a decrypt_error (like fizz/boring). | 197 | # correct decode_error while we send a decrypt_error (like fizz/boring). |
| 199 | Test("test-tls13-record-layer-limits.py", [ | 198 | Test("test-tls13-record-layer-limits.py", [ |
