summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorDaiki Ueno <dueno@redhat.com>2018-07-18 15:56:17 +0200
committerDaiki Ueno <dueno@redhat.com>2018-08-06 13:33:46 +0200
commitb965ec1169f8ad0561b2b67f779d1c7e943edec6 (patch)
treefba004469286fb96d1da7cf9dd07a68a257a55a1 /tests
parent12f121313e7b1614192db3dcc185a57b216a3dc4 (diff)
downloadgnutls-b965ec1169f8ad0561b2b67f779d1c7e943edec6.tar.gz
tests: tls-fuzzer: enable tests relying on header fragmentation
Those tests were previously disabled because splitting of handshake messages in a very short (< 4 bytes) fragments is not implemented. Signed-off-by: Daiki Ueno <dueno@redhat.com>
Diffstat (limited to 'tests')
-rw-r--r--tests/suite/tls-fuzzer/gnutls-nocert-tls13.json7
-rw-r--r--tests/suite/tls-fuzzer/gnutls-nocert.json22
2 files changed, 10 insertions, 19 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json b/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json
index db351652bb..4b01fe4531 100644
--- a/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json
+++ b/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json
@@ -43,12 +43,9 @@
{"name" : "test-tls13-version-negotiation.py",
"arguments": ["-p", "@PORT@"]},
{"name" : "test-tls13-zero-length-data.py",
- "comment" : "in these tests tlsfuzzer splits ClientHello into the first 2 bytes and the remainder, which gnutls doesn't support",
+ "comment" : "gnutls sends NST before receiving client Finished, that is not expected in the disabled test",
"arguments": ["-p", "@PORT@",
- "-e", "zero-length app data interleaved in handshake",
- "-e", "zero-len app data with large padding during handshake",
- "-e", "zero-len app data with large padding interleaved in handshake",
- "-e", "zero-len app data with padding interleaved in handshake"]},
+ "-e", "zero-len app data with large padding during handshake"]},
{"name" : "test-tls13-finished.py",
"commoent" : "the disabled tests timeout very often due to slow tls-fuzzer implementation",
"arguments": ["-p", "@PORT@", "-n", "5",
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json
index c69ecfaf7e..d99c17414b 100644
--- a/tests/suite/tls-fuzzer/gnutls-nocert.json
+++ b/tests/suite/tls-fuzzer/gnutls-nocert.json
@@ -17,20 +17,14 @@
"ciphers even 8199",
"ciphers odd 8090",
"ext padding, 16130 bytes",
- "ext padding, 65367 bytes"]},
- {"name" : "test-large-hello.py",
- "arguments" :
- ["multiple extensions 9212",
- "multiple extensions 1",
- "multiple extensions 16353"]},
- {"name" : "test-large-hello.py",
- "comment" : "These tests rely on fragmenting the first bytes of the handshake header. Gnutls is limited on that, and doesn't accept handshake header fragmentation.",
- "arguments" :
- ["sanity check - fragmented",
- "fragmented, padding ext 0 bytes",
- "fragmented, padding ext 65354 bytes",
- "fragmented, padding ext 16213 bytes"],
- "exp_pass" : false},
+ "ext padding, 65367 bytes",
+ "multiple extensions 9212",
+ "multiple extensions 1",
+ "multiple extensions 16353",
+ "sanity check - fragmented",
+ "fragmented, padding ext 0 bytes",
+ "fragmented, padding ext 65354 bytes",
+ "fragmented, padding ext 16213 bytes"]},
{"name" : "test-ecdsa-sig-flexibility.py"},
{"name" : "test-ocsp-stapling.py",
"arguments" : ["--no-status"] },