Add the two length tests. Can't currently run them because we need an
authortb <tb@openbsd.org>
Sat, 14 May 2022 17:58:11 +0000 (17:58 +0000)
committertb <tb@openbsd.org>
Sat, 14 May 2022 17:58:11 +0000 (17:58 +0000)
echo server.

regress/lib/libssl/tlsfuzzer/tlsfuzzer.py

index 83822a3..0fe647a 100644 (file)
@@ -1,4 +1,4 @@
-#   $OpenBSD: tlsfuzzer.py,v 1.44 2022/04/21 18:01:09 tb Exp $
+#   $OpenBSD: tlsfuzzer.py,v 1.45 2022/05/14 17:58:11 tb Exp $
 #
 # Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
 #
@@ -298,6 +298,9 @@ tls13_unsupported_tests = TestGroup("TLSv1.3 tests for unsupported features", [
     # need server to react to HTTP GET for /keyupdate
     Test("test-tls13-keyupdate-from-server.py"),
 
+    # needs an echo server
+    Test("test-tls13-lengths.py"),
+
     # Weird test: tests servers that don't support 1.3
     Test("test-tls13-non-support.py"),
 
@@ -557,6 +560,8 @@ tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [
     Test("test-record-size-limit.py"),
     # expects the server to send the heartbeat extension
     Test("test-heartbeat.py"),
+    # needs an echo server
+    Test("test-lengths.py"),
 ])
 
 # These tests take a ton of time to fail against an 1.3 server,