diff options
| author | tb <> | 2020-09-10 08:24:31 +0000 |
|---|---|---|
| committer | tb <> | 2020-09-10 08:24:31 +0000 |
| commit | d6b7185a731bccfe67d85d5222a70e9be37752a6 (patch) | |
| tree | b3e0aa6cf6eddd94df89dfac0e12eb1b04734ad0 /src | |
| parent | d0f1d7eeb783a137afecbb1236f2e01605777cdc (diff) | |
| download | openbsd-d6b7185a731bccfe67d85d5222a70e9be37752a6.tar.gz openbsd-d6b7185a731bccfe67d85d5222a70e9be37752a6.tar.bz2 openbsd-d6b7185a731bccfe67d85d5222a70e9be37752a6.zip | |
Enable test-tls13-large-number-of-extensions.py
Skip sending an empty ECPF extension for now: we don't accept it since
according to RFC 4492 and 8422 it needs to advertise uncompressed point
formats.
Diffstat (limited to 'src')
| -rw-r--r-- | src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 9 |
1 files changed, 7 insertions, 2 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 64300e8151..53629598ad 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | # $OpenBSD: tlsfuzzer.py,v 1.16 2020/08/17 08:19:20 tb Exp $ | 1 | # $OpenBSD: tlsfuzzer.py,v 1.17 2020/09/10 08:24:31 tb Exp $ |
| 2 | # | 2 | # |
| 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> | 3 | # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> |
| 4 | # | 4 | # |
| @@ -107,6 +107,12 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [ | |||
| 107 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", | 107 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256", |
| 108 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", | 108 | "-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256", |
| 109 | ]), | 109 | ]), |
| 110 | # We don't accept an empty ECPF extension since it must advertise the | ||
| 111 | # uncompressed point format. Exclude this extension type from the test. | ||
| 112 | Test( | ||
| 113 | "test-tls13-large-number-of-extensions.py", | ||
| 114 | tls13_args = ["--exc", "11"], | ||
| 115 | ), | ||
| 110 | ]) | 116 | ]) |
| 111 | 117 | ||
| 112 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ | 118 | tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [ |
| @@ -163,7 +169,6 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ | |||
| 163 | # The following two tests fail Test (skip empty extensions for the first one): | 169 | # The following two tests fail Test (skip empty extensions for the first one): |
| 164 | # 'empty unassigned extensions, ids in range from 2 to 4118' | 170 | # 'empty unassigned extensions, ids in range from 2 to 4118' |
| 165 | # 'unassigned extensions with random payload, ids in range from 2 to 1046' | 171 | # 'unassigned extensions with random payload, ids in range from 2 to 1046' |
| 166 | Test("test-tls13-large-number-of-extensions.py"), # 2 fail: empty/random payload | ||
| 167 | 172 | ||
| 168 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' | 173 | # 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature' |
| 169 | # We send server hello, but the test expects handshake_failure | 174 | # We send server hello, but the test expects handshake_failure |
