From bf9e1e83d2e56755afd6e9007d5202d39fe11160 Mon Sep 17 00:00:00 2001 From: tb <> Date: Sun, 24 May 2020 10:35:57 +0000 Subject: The version detection doesn't work on bluhm's test machine, causing the test to fail. Neuter it for now and just assume we do TLSv1.3. I have been intending to purge this version detection hack once I'm sure we can leave the 1.3 server enabled but I'll leave it here for now. --- src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 963115217c..df965467d6 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py @@ -1,4 +1,4 @@ -# $OpenBSD: tlsfuzzer.py,v 1.2 2020/05/21 19:08:32 tb Exp $ +# $OpenBSD: tlsfuzzer.py,v 1.3 2020/05/24 10:35:57 tb Exp $ # # Copyright (c) 2020 Theo Buehler # @@ -150,7 +150,7 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [ # 'post-handshake KeyUpdate msg with update_not_request' # 'post-handshake KeyUpdate msg with update_request' Test("test-tls13-keyupdate.py"), - + Test("test-tls13-symetric-ciphers.py"), # unexpected message from peer # 70 fail and 644 pass. For some reason the tests expect a decode_error @@ -583,7 +583,7 @@ class TlsServer: ) # Check whether the server talks TLSv1.3 - self.has_tls1_3 = subprocess.run( + self.has_tls1_3 = True or subprocess.run( [ "nc", "-c", -- cgit v1.2.3-55-g6feb