summaryrefslogtreecommitdiff
path: root/tests/suite/tls-fuzzer/gnutls-nocert.json
diff options
context:
space:
mode:
Diffstat (limited to 'tests/suite/tls-fuzzer/gnutls-nocert.json')
-rw-r--r--tests/suite/tls-fuzzer/gnutls-nocert.json43
1 files changed, 42 insertions, 1 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json
index 6ddb6ebbe0..6e2a2ea47c 100644
--- a/tests/suite/tls-fuzzer/gnutls-nocert.json
+++ b/tests/suite/tls-fuzzer/gnutls-nocert.json
@@ -96,6 +96,21 @@
"-e", "Check if DHE preferred"]},
{"name" : "test-cve-2016-2107.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-dhe-key-share-random.py",
+ "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "Protocol (3, 1)",
+ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 0)",
+ "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello"]},
+ {"name" : "test-dhe-no-shared-secret-padding.py",
+ "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "Protocol (3, 1)",
+ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 0)",
+ "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
+ "-n", "4"]},
{"name" : "test-dhe-rsa-key-exchange.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-dhe-rsa-key-exchange-signatures.py",
@@ -111,10 +126,24 @@
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-early-application-data.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-ecdhe-padded-shared-secret.py",
+ "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 2) with x448 group",
+ "-n", "4"]},
{"name" : "test-ecdhe-rsa-key-exchange.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-ecdhe-rsa-key-exchange-with-bad-messages.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-ecdhe-rsa-key-share-random.py",
+ "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 2) with x448 group",
+ "-n", "4"]},
{"name" : "test-empty-extensions.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-export-ciphers-rejected.py",
@@ -203,11 +232,23 @@
"-e", "medium, maximum fragmentation: 1 fragment - 1024B extension"]},
{"name" : "test-sessionID-resumption.py",
"arguments" : ["-p", "@PORT@"] },
+ {"name" : "test-serverhello-random.py",
+ "comment": "This test assumes that record splitting is performed under SSLv3 and TLS1.0; we don't support x448",
+ "arguments" : ["-p", "@PORT@",
+ "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
+ "-e", "Protocol (3, 2) with x448 group",
+ "-n", "4"]},
{"name" : "test-sig-algs.py",
"arguments" : ["-p", "@PORT@"] },
{"name" : "test-signature-algorithms.py",
- "comment" : "gnutls doesn't tolerate that much",
+ "comment" : "gnutls doesn't handle well duplicated sign algorithms; this is not an issue in practice",
"arguments" : ["-p", "@PORT@",
+ "-e", "duplicated 202 non-rsa schemes",
+ "-e", "duplicated 2342 non-rsa schemes",
+ "-e", "duplicated 8119 non-rsa schemes",
+ "-e", "duplicated 23741 non-rsa schemes",
+ "-e", "duplicated 32748 non-rsa schemes",
"-e", "tolerance max (32764) number of methods"]
},
{"name" : "test-sslv2-connection.py",