diff options
author | Daiki Ueno <dueno@redhat.com> | 2018-07-18 15:56:17 +0200 |
---|---|---|
committer | Daiki Ueno <dueno@redhat.com> | 2018-08-06 13:33:46 +0200 |
commit | b965ec1169f8ad0561b2b67f779d1c7e943edec6 (patch) | |
tree | fba004469286fb96d1da7cf9dd07a68a257a55a1 /tests | |
parent | 12f121313e7b1614192db3dcc185a57b216a3dc4 (diff) | |
download | gnutls-b965ec1169f8ad0561b2b67f779d1c7e943edec6.tar.gz |
tests: tls-fuzzer: enable tests relying on header fragmentation
Those tests were previously disabled because splitting of handshake
messages in a very short (< 4 bytes) fragments is not implemented.
Signed-off-by: Daiki Ueno <dueno@redhat.com>
Diffstat (limited to 'tests')
-rw-r--r-- | tests/suite/tls-fuzzer/gnutls-nocert-tls13.json | 7 | ||||
-rw-r--r-- | tests/suite/tls-fuzzer/gnutls-nocert.json | 22 |
2 files changed, 10 insertions, 19 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json b/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json index db351652bb..4b01fe4531 100644 --- a/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json +++ b/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json @@ -43,12 +43,9 @@ {"name" : "test-tls13-version-negotiation.py", "arguments": ["-p", "@PORT@"]}, {"name" : "test-tls13-zero-length-data.py", - "comment" : "in these tests tlsfuzzer splits ClientHello into the first 2 bytes and the remainder, which gnutls doesn't support", + "comment" : "gnutls sends NST before receiving client Finished, that is not expected in the disabled test", "arguments": ["-p", "@PORT@", - "-e", "zero-length app data interleaved in handshake", - "-e", "zero-len app data with large padding during handshake", - "-e", "zero-len app data with large padding interleaved in handshake", - "-e", "zero-len app data with padding interleaved in handshake"]}, + "-e", "zero-len app data with large padding during handshake"]}, {"name" : "test-tls13-finished.py", "commoent" : "the disabled tests timeout very often due to slow tls-fuzzer implementation", "arguments": ["-p", "@PORT@", "-n", "5", diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json index c69ecfaf7e..d99c17414b 100644 --- a/tests/suite/tls-fuzzer/gnutls-nocert.json +++ b/tests/suite/tls-fuzzer/gnutls-nocert.json @@ -17,20 +17,14 @@ "ciphers even 8199", "ciphers odd 8090", "ext padding, 16130 bytes", - "ext padding, 65367 bytes"]}, - {"name" : "test-large-hello.py", - "arguments" : - ["multiple extensions 9212", - "multiple extensions 1", - "multiple extensions 16353"]}, - {"name" : "test-large-hello.py", - "comment" : "These tests rely on fragmenting the first bytes of the handshake header. Gnutls is limited on that, and doesn't accept handshake header fragmentation.", - "arguments" : - ["sanity check - fragmented", - "fragmented, padding ext 0 bytes", - "fragmented, padding ext 65354 bytes", - "fragmented, padding ext 16213 bytes"], - "exp_pass" : false}, + "ext padding, 65367 bytes", + "multiple extensions 9212", + "multiple extensions 1", + "multiple extensions 16353", + "sanity check - fragmented", + "fragmented, padding ext 0 bytes", + "fragmented, padding ext 65354 bytes", + "fragmented, padding ext 16213 bytes"]}, {"name" : "test-ecdsa-sig-flexibility.py"}, {"name" : "test-ocsp-stapling.py", "arguments" : ["--no-status"] }, |