diff options
Diffstat (limited to 'tests/suite/tls-fuzzer/gnutls-nocert.json')
-rw-r--r-- | tests/suite/tls-fuzzer/gnutls-nocert.json | 43 |
1 files changed, 42 insertions, 1 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json index 6ddb6ebbe0..6e2a2ea47c 100644 --- a/tests/suite/tls-fuzzer/gnutls-nocert.json +++ b/tests/suite/tls-fuzzer/gnutls-nocert.json @@ -96,6 +96,21 @@ "-e", "Check if DHE preferred"]}, {"name" : "test-cve-2016-2107.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-dhe-key-share-random.py", + "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0", + "arguments" : ["-p", "@PORT@", + "-e", "Protocol (3, 1)", + "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 0)", + "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello"]}, + {"name" : "test-dhe-no-shared-secret-padding.py", + "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0", + "arguments" : ["-p", "@PORT@", + "-e", "Protocol (3, 1)", + "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 0)", + "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", + "-n", "4"]}, {"name" : "test-dhe-rsa-key-exchange.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-dhe-rsa-key-exchange-signatures.py", @@ -111,10 +126,24 @@ "arguments" : ["-p", "@PORT@"] }, {"name" : "test-early-application-data.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-ecdhe-padded-shared-secret.py", + "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448", + "arguments" : ["-p", "@PORT@", + "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 2) with x448 group", + "-n", "4"]}, {"name" : "test-ecdhe-rsa-key-exchange.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-ecdhe-rsa-key-exchange-with-bad-messages.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-ecdhe-rsa-key-share-random.py", + "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448", + "arguments" : ["-p", "@PORT@", + "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 2) with x448 group", + "-n", "4"]}, {"name" : "test-empty-extensions.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-export-ciphers-rejected.py", @@ -203,11 +232,23 @@ "-e", "medium, maximum fragmentation: 1 fragment - 1024B extension"]}, {"name" : "test-sessionID-resumption.py", "arguments" : ["-p", "@PORT@"] }, + {"name" : "test-serverhello-random.py", + "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448", + "arguments" : ["-p", "@PORT@", + "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello", + "-e", "Protocol (3, 2) with x448 group", + "-n", "4"]}, {"name" : "test-sig-algs.py", "arguments" : ["-p", "@PORT@"] }, {"name" : "test-signature-algorithms.py", - "comment" : "gnutls doesn't tolerate that much", + "comment" : "gnutls doesn't handle well duplicated sign algorithms; this is not an issue in practice", "arguments" : ["-p", "@PORT@", + "-e", "duplicated 202 non-rsa schemes", + "-e", "duplicated 2342 non-rsa schemes", + "-e", "duplicated 8119 non-rsa schemes", + "-e", "duplicated 23741 non-rsa schemes", + "-e", "duplicated 32748 non-rsa schemes", "-e", "tolerance max (32764) number of methods"] }, {"name" : "test-sslv2-connection.py", |