summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2020-06-10 22:14:38 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2020-06-10 22:14:38 +0000
commit966e090892aa0bea26580f682af56b01950adbf7 (patch)
treefd9877932d32f201d6b10e1b8377dc7988197906
parenta0ccf81ea90f2d460899d096f6f86be3c8405fcd (diff)
Add lucky13 and bleichenbacher-timing tests
-rw-r--r--regress/lib/libssl/tlsfuzzer/tlsfuzzer.py8
1 files changed, 7 insertions, 1 deletions
diff --git a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index f81bf558f4c..76444a69888 100644
--- a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
-# $OpenBSD: tlsfuzzer.py,v 1.7 2020/06/06 01:40:08 beck Exp $
+# $OpenBSD: tlsfuzzer.py,v 1.8 2020/06/10 22:14:37 tb Exp $
#
# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
#
@@ -290,6 +290,10 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
# many tests fail due to unexpected server_name extension
Test("test-bleichenbacher-workaround.py"),
+ # timeout:
+ # 'padding of length 255 (256 with the length byte), error at position 0'
+ Test("test-lucky13.py"),
+
# need client key and cert plus extra server setup
Test("test-certificate-malformed.py"),
Test("test-certificate-request.py"),
@@ -441,6 +445,8 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [
tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [
# protocol_version
Test("test-SSLv3-padding.py"),
+ # we don't do RSA key exchanges
+ Test("test-bleichenbacher-timing.py"),
])
# These tests take a ton of time to fail against an 1.3 server,