summaryrefslogtreecommitdiff
path: root/regress
diff options
context:
space:
mode:
authorTheo Buehler <tb@cvs.openbsd.org>2020-09-10 08:24:32 +0000
committerTheo Buehler <tb@cvs.openbsd.org>2020-09-10 08:24:32 +0000
commit02c0fab4a31375768bcb0c2c1555018bd7da73da (patch)
treef158b65264574e169d46bdd577b1bfd326ca215c /regress
parentc339757dcca7fcc694a0d3c681f6ddbb9da3ff22 (diff)
Enable test-tls13-large-number-of-extensions.py
Skip sending an empty ECPF extension for now: we don't accept it since according to RFC 4492 and 8422 it needs to advertise uncompressed point formats.
Diffstat (limited to 'regress')
-rw-r--r--regress/lib/libssl/tlsfuzzer/tlsfuzzer.py9
1 files changed, 7 insertions, 2 deletions
diff --git a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 64300e8151f..53629598ad3 100644
--- a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
-# $OpenBSD: tlsfuzzer.py,v 1.16 2020/08/17 08:19:20 tb Exp $
+# $OpenBSD: tlsfuzzer.py,v 1.17 2020/09/10 08:24:31 tb Exp $
#
# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
#
@@ -107,6 +107,12 @@ tls13_slow_tests = TestGroup("slow TLSv1.3 tests", [
"-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_AES_128_GCM_SHA256",
"-x", "max size payload (2**14) of Finished msg, with 16348 bytes of left padding, cipher TLS_CHACHA20_POLY1305_SHA256",
]),
+ # We don't accept an empty ECPF extension since it must advertise the
+ # uncompressed point format. Exclude this extension type from the test.
+ Test(
+ "test-tls13-large-number-of-extensions.py",
+ tls13_args = ["--exc", "11"],
+ ),
])
tls13_extra_cert_tests = TestGroup("TLSv1.3 certificate tests", [
@@ -163,7 +169,6 @@ tls13_slow_failing_tests = TestGroup("slow, failing TLSv1.3 tests", [
# The following two tests fail Test (skip empty extensions for the first one):
# 'empty unassigned extensions, ids in range from 2 to 4118'
# 'unassigned extensions with random payload, ids in range from 2 to 1046'
- Test("test-tls13-large-number-of-extensions.py"), # 2 fail: empty/random payload
# 6 tests fail: 'rsa_pkcs1_{md5,sha{1,224,256,384,512}} signature'
# We send server hello, but the test expects handshake_failure