From 2218185d8dd7873a1f0c8b5a21ea97ce9a81b966 Mon Sep 17 00:00:00 2001 From: tb Date: Sat, 14 May 2022 17:58:11 +0000 Subject: [PATCH] Add the two length tests. Can't currently run them because we need an echo server. --- regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 83822a3be3f..0fe647abb6e 100644 --- a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py @@ -1,4 +1,4 @@ -# $OpenBSD: tlsfuzzer.py,v 1.44 2022/04/21 18:01:09 tb Exp $ +# $OpenBSD: tlsfuzzer.py,v 1.45 2022/05/14 17:58:11 tb Exp $ # # Copyright (c) 2020 Theo Buehler # @@ -298,6 +298,9 @@ tls13_unsupported_tests = TestGroup("TLSv1.3 tests for unsupported features", [ # need server to react to HTTP GET for /keyupdate Test("test-tls13-keyupdate-from-server.py"), + # needs an echo server + Test("test-tls13-lengths.py"), + # Weird test: tests servers that don't support 1.3 Test("test-tls13-non-support.py"), @@ -557,6 +560,8 @@ tls12_unsupported_tests = TestGroup("TLSv1.2 for unsupported features", [ Test("test-record-size-limit.py"), # expects the server to send the heartbeat extension Test("test-heartbeat.py"), + # needs an echo server + Test("test-lengths.py"), ]) # These tests take a ton of time to fail against an 1.3 server, -- 2.20.1