From 5432fe73add346ccb3be68bb90e2bf7b691c36ff Mon Sep 17 00:00:00 2001 From: tb <> Date: Wed, 7 Oct 2020 13:31:00 +0000 Subject: add arguments to skip a bunch of x448 tests --- src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 21 ++++++++++++++++++--- 1 file changed, 18 insertions(+), 3 deletions(-) (limited to 'src') diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 374c800241..041f348ca2 100644 --- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py @@ -1,4 +1,4 @@ -# $OpenBSD: tlsfuzzer.py,v 1.20 2020/09/25 19:50:45 tb Exp $ +# $OpenBSD: tlsfuzzer.py,v 1.21 2020/10/07 13:31:00 tb Exp $ # # Copyright (c) 2020 Theo Buehler <tb@openbsd.org> # @@ -224,8 +224,23 @@ tls13_failing_tests = TestGroup("failing TLSv1.3 tests", [ # With X25519, we accept weak peer public keys and fail when we actually # compute the keyshare. Other tests seem to indicate that we could be # stricter about what keyshares we accept. - Test("test-tls13-crfg-curves.py"), - Test("test-tls13-ecdhe-curves.py"), + Test("test-tls13-crfg-curves.py", [ + '-e', 'all zero x448 key share', + '-e', 'empty x448 key share', + '-e', 'sanity x448 with compression ansiX962_compressed_char2', + '-e', 'sanity x448 with compression ansiX962_compressed_prime', + '-e', 'sanity x448 with compression uncompressed', + '-e', 'too big x448 key share', + '-e', 'too small x448 key share', + '-e', 'x448 key share of "1"', + ]), + Test("test-tls13-ecdhe-curves.py", [ + '-e', 'sanity - x448', + '-e', 'x448 - key share from other curve', + '-e', 'x448 - point at infinity', + '-e', 'x448 - right 0-padded key_share', + '-e', 'x448 - right-truncated key_share', + ]), # https://github.com/openssl/openssl/issues/8369 Test("test-tls13-obsolete-curves.py"), -- cgit v1.2.3-55-g6feb