diff options
author | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2020-01-26 12:37:38 +0000 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@gnutls.org> | 2020-01-26 12:37:38 +0000 |
commit | 92052ce87c8bce74aa622cbd68778e29b8450545 (patch) | |
tree | 815149721ce119cb9566760ddd667473eaba95bc /tests/suite/tls-fuzzer/gnutls-nocert.json | |
parent | a963369e626b7fac7e86b9577570a065b885e053 (diff) | |
parent | 989bc92439b7ed4e83309071738fc8ffd56718df (diff) | |
download | gnutls-92052ce87c8bce74aa622cbd68778e29b8450545.tar.gz |
Merge branch 'tmp-update-tlsfuzzer' into 'master'
tlsfuzzer: updated to latest upstream
Closes #907
See merge request gnutls/gnutls!1179
Diffstat (limited to 'tests/suite/tls-fuzzer/gnutls-nocert.json')
-rw-r--r-- | tests/suite/tls-fuzzer/gnutls-nocert.json | 31 |
1 files changed, 21 insertions, 10 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json index bef461789f..2a6f47d68d 100644 --- a/tests/suite/tls-fuzzer/gnutls-nocert.json +++ b/tests/suite/tls-fuzzer/gnutls-nocert.json @@ -2,9 +2,13 @@ {"server_command": ["@SERVER@", "--http", "--x509keyfile", "tests/serverX509Key.pem", "--x509certfile", "tests/serverX509Cert.pem", - "--x509keyfile", "../../../certs/ecc256.pem", - "--x509certfile", "../../../certs/cert-ecc256.pem", - "--debug=3", + "--x509keyfile", "tests/serverECKey.pem", + "--x509certfile", "tests/serverECCert.pem", + "--x509keyfile", "tests/serverP384ECKey.pem", + "--x509certfile", "tests/serverP384ECCert.pem", + "--x509keyfile", "tests/serverP521ECKey.pem", + "--x509certfile", "tests/serverP521ECCert.pem", + "--debug=6", "--noticket", "--httpdata=../http.dat", "--priority=@PRIORITY@", @@ -13,7 +17,8 @@ "server_port": @PORT@, "tests" : [ {"name" : "test-fuzzed-plaintext.py", - "arguments" : ["-p", "@PORT@"] }, + "arguments" : ["-p", "@PORT@", + "-n", "4"] }, {"name" : "test-large-hello.py", "arguments" : [ "-p", "@PORT@", @@ -31,7 +36,9 @@ "fragmented, padding ext 65354 bytes", "fragmented, padding ext 16213 bytes"]}, {"name" : "test-ecdsa-sig-flexibility.py", - "arguments" : ["-p", "@PORT@"] }, + "comment" : "we do not support SHA224", + "arguments" : ["-p", "@PORT@", + "-e", "connect with sha224+ecdsa only"] }, {"name" : "test-encrypt-then-mac.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-ocsp-stapling.py", @@ -64,11 +71,13 @@ "arguments" : ["-p", "@PORT@"] }, {"name" : "test-aes-gcm-nonces.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-aesccm.py", + "arguments" : ["-p", "@PORT@"] }, {"name" : "test-atypical-padding.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-bleichenbacher-workaround.py", "arguments" : ["-p", "@PORT@", - "-n", "20"] + "-n", "5"] }, {"name" : "test-clienthello-md5.py", "arguments" : ["-p", "@PORT@"] }, @@ -79,6 +88,8 @@ "-e", "100: IE 6 on XP"]}, {"name" : "test-conversation.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-no-heartbeat.py", + "arguments" : ["-p", "@PORT@"] }, {"name" : "test-client-hello-max-size.py", "comment" : "FIXME: we fail with: Handshake buffer length is 131400 (max: 131072)", "arguments" : ["-p", "@PORT@", @@ -101,7 +112,7 @@ "arguments" : ["-p", "@PORT@", "-e", "Protocol (3, 0)", "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", - "-n", "6", + "-n", "5", "-z"]}, {"name" : "test-dhe-rsa-key-exchange.py", "arguments" : ["-p", "@PORT@"] }, @@ -124,7 +135,7 @@ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", "-e", "Protocol (3, 0)", "-z", - "-n", "6"]}, + "-n", "5"]}, {"name" : "test-ecdhe-rsa-key-exchange.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-ecdhe-rsa-key-exchange-with-bad-messages.py", @@ -135,7 +146,7 @@ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", "-e", "Protocol (3, 0)", "-z", - "-n", "6"]}, + "-n", "5"]}, {"name" : "test-empty-extensions.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-export-ciphers-rejected.py", @@ -264,7 +275,7 @@ "-e", "duplicated 2342 non-rsa schemes", "-e", "duplicated 8119 non-rsa schemes", "-e", "duplicated 23741 non-rsa schemes", - "-e", "duplicated 32748 non-rsa schemes", + "-e", "duplicated 32744 non-rsa schemes", "-e", "tolerance max (32764) number of methods"] }, {"name" : "test-sslv2-connection.py", |