summaryrefslogtreecommitdiff
path: root/tests/suite/tls-fuzzer/gnutls-nocert.json
diff options
context:
space:
mode:
Diffstat (limited to 'tests/suite/tls-fuzzer/gnutls-nocert.json')
-rw-r--r--tests/suite/tls-fuzzer/gnutls-nocert.json31
1 files changed, 21 insertions, 10 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json
index bef461789f..2a6f47d68d 100644
--- a/tests/suite/tls-fuzzer/gnutls-nocert.json
+++ b/tests/suite/tls-fuzzer/gnutls-nocert.json
@@ -2,9 +2,13 @@
{"server_command": ["@SERVER@", "--http",
"--x509keyfile", "tests/serverX509Key.pem",
"--x509certfile", "tests/serverX509Cert.pem",
- "--x509keyfile", "../../../certs/ecc256.pem",
- "--x509certfile", "../../../certs/cert-ecc256.pem",
- "--debug=3",
+ "--x509keyfile", "tests/serverECKey.pem",
+ "--x509certfile", "tests/serverECCert.pem",
+ "--x509keyfile", "tests/serverP384ECKey.pem",
+ "--x509certfile", "tests/serverP384ECCert.pem",
+ "--x509keyfile", "tests/serverP521ECKey.pem",
+ "--x509certfile", "tests/serverP521ECCert.pem",
+ "--debug=6",
"--noticket",
"--httpdata=../http.dat",
"--priority=@PRIORITY@",
@@ -13,7 +17,8 @@
"server_port": @PORT@,
"tests" : [
{"name" : "test-fuzzed-plaintext.py",
- "arguments" : ["-p", "@PORT@"] },
+ "arguments" : ["-p", "@PORT@",
+ "-n", "4"] },
{"name" : "test-large-hello.py",
"arguments" : [
"-p", "@PORT@",
@@ -31,7 +36,9 @@
"fragmented, padding ext 65354 bytes",
"fragmented, padding ext 16213 bytes"]},
{"name" : "test-ecdsa-sig-flexibility.py",
- "arguments" : ["-p", "@PORT@"] },
+ "comment" : "we do not support SHA224",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "connect with sha224+ecdsa only"] },
{"name" : "test-encrypt-then-mac.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-ocsp-stapling.py",
@@ -64,11 +71,13 @@
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-aes-gcm-nonces.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-aesccm.py",
+ "arguments" : ["-p", "@PORT@"] },
{"name" : "test-atypical-padding.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-bleichenbacher-workaround.py",
"arguments" : ["-p", "@PORT@",
- "-n", "20"]
+ "-n", "5"]
},
{"name" : "test-clienthello-md5.py",
"arguments" : ["-p", "@PORT@"] },
@@ -79,6 +88,8 @@
"-e", "100: IE 6 on XP"]},
{"name" : "test-conversation.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-no-heartbeat.py",
+ "arguments" : ["-p", "@PORT@"] },
{"name" : "test-client-hello-max-size.py",
"comment" : "FIXME: we fail with: Handshake buffer length is 131400 (max: 131072)",
"arguments" : ["-p", "@PORT@",
@@ -101,7 +112,7 @@
"arguments" : ["-p", "@PORT@",
"-e", "Protocol (3, 0)",
"-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
- "-n", "6",
+ "-n", "5",
"-z"]},
{"name" : "test-dhe-rsa-key-exchange.py",
"arguments" : ["-p", "@PORT@"] },
@@ -124,7 +135,7 @@
"-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
"-e", "Protocol (3, 0)",
"-z",
- "-n", "6"]},
+ "-n", "5"]},
{"name" : "test-ecdhe-rsa-key-exchange.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-ecdhe-rsa-key-exchange-with-bad-messages.py",
@@ -135,7 +146,7 @@
"-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
"-e", "Protocol (3, 0)",
"-z",
- "-n", "6"]},
+ "-n", "5"]},
{"name" : "test-empty-extensions.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-export-ciphers-rejected.py",
@@ -264,7 +275,7 @@
"-e", "duplicated 2342 non-rsa schemes",
"-e", "duplicated 8119 non-rsa schemes",
"-e", "duplicated 23741 non-rsa schemes",
- "-e", "duplicated 32748 non-rsa schemes",
+ "-e", "duplicated 32744 non-rsa schemes",
"-e", "tolerance max (32764) number of methods"]
},
{"name" : "test-sslv2-connection.py",