summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py8
1 files changed, 7 insertions, 1 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index f81bf558f4..76444a6988 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.7 2020/06/06 01:40:08 beck Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.8 2020/06/10 22:14:37 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -290,6 +290,10 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
290 # many tests fail due to unexpected server_name extension 290 # many tests fail due to unexpected server_name extension
291 Test("test-bleichenbacher-workaround.py"), 291 Test("test-bleichenbacher-workaround.py"),
292 292
293 # timeout:
294 # 'padding of length 255 (256 with the length byte), error at position 0'
295 Test("test-lucky13.py"),
296
293 # need client key and cert plus extra server setup 297 # need client key and cert plus extra server setup
294 Test("test-certificate-malformed.py"), 298 Test("test-certificate-malformed.py"),
295 Test("test-certificate-request.py"), 299 Test("test-certificate-request.py"),
@@ -441,6 +445,8 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
441tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [ 445tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [
442 # protocol_version 446 # protocol_version
443 Test("test-SSLv3-padding.py"), 447 Test("test-SSLv3-padding.py"),
448 # we don't do RSA key exchanges
449 Test("test-bleichenbacher-timing.py"),
444]) 450])
445 451
446# These tests take a ton of time to fail against an 1.3 server, 452# These tests take a ton of time to fail against an 1.3 server,