From 3df9e801023b548b3e63d696c2a7ce5518e6f96c Mon Sep 17 00:00:00 2001 From: tb Date: Tue, 13 Apr 2021 16:16:06 +0000 Subject: [PATCH] enable test-tlsfuzzer-invalid-compression-methods.py --- regress/lib/libssl/tlsfuzzer/tlsfuzzer.py | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py index 608163b9365..5db361c1f7a 100644 --- a/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py +++ b/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py @@ -1,4 +1,4 @@ -# $OpenBSD: tlsfuzzer.py,v 1.32 2021/04/13 15:59:14 tb Exp $ +# $OpenBSD: tlsfuzzer.py,v 1.33 2021/04/13 16:16:06 tb Exp $ # # Copyright (c) 2020 Theo Buehler # @@ -377,6 +377,15 @@ tls12_tests = TestGroup("TLSv1.2 tests", [ ), Test("test-fallback-scsv.py", tls13_args = ["--tls-1.3"] ), + Test("test-invalid-compression-methods.py", [ + "-x", "invalid compression methods", + "-X", 'Expected alert description "illegal_parameter" ' + 'does not match received "decode_error"', + "-x", "only deflate compression method", + "-X", 'Expected alert description "illegal_parameter" ' + 'does not match received "decode_error"', + ]), + # Without --sig-algs-drop-ok, two tests fail since we do not currently # implement the signature_algorithms_cert extension (although we MUST). Test("test-sig-algs-renegotiation-resumption.py", ["--sig-algs-drop-ok"]), @@ -452,10 +461,6 @@ tls12_failing_tests = TestGroup("failing TLSv1.2 tests", [ # Lots of failures. abrupt closure Test("test-invalid-client-hello.py"), - # Test expects illegal_parameter, we send decode_error in ssl_srvr.c:1016 - # Need to check that this is correct. - Test("test-invalid-compression-methods.py"), - # abrupt closure # 'encrypted premaster set to all zero (n)' n in 256 384 512 Test("test-invalid-rsa-key-exchange-messages.py"), -- 2.20.1