-# $OpenBSD: tlsfuzzer.py,v 1.51 2023/08/03 20:13:12 tb Exp $
+# $OpenBSD: tlsfuzzer.py,v 1.52 2023/08/14 18:10:42 tb Exp $
#
# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
#
Test("test-message-skipping.py"),
Test("test-no-heartbeat.py"),
Test("test-record-layer-fragmentation.py"),
- Test("test-sessionID-resumption.py"),
Test("test-sslv2-connection.py"),
Test("test-truncating-of-finished.py"),
Test("test-truncating-of-kRSA-client-key-exchange.py"),
Test(
"test-ccs.py", [
"-x", "two bytes long CCS",
- "-X", "does not match received \"decode_error\"",
+ "-X", substitute_alert("unexpected_message", "decode_error"),
]
),
Test(
"-e", "drop extended_master_secret in renegotiation",
]),
+ Test("test-sessionID-resumption.py", [
+ "-x", "Client Hello too long session ID",
+ "-X", substitute_alert("decode_error", "illegal_parameter"),
+ ]),
+
# Without --sig-algs-drop-ok, two tests fail since we do not currently
# implement the signature_algorithms_cert extension (although we MUST).
Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]),
# 'resumption with cipher from old CH but not selected by server'
Test("test-resumption-with-wrong-ciphers.py"),
+ # 'session resumption with empty session_id'
+ # 'session resumption with random session_id'
+ # 'session resumption with renegotiation'
+ # AssertionError: Server did not send extension(s): session_ticket
+ Test("test-session-ticket-resumption.py"),
+
# 5 failures:
# 'empty sigalgs'
# 'only undefined sigalgs'