summaryrefslogtreecommitdiff
path: root/tests/suite/tls-fuzzer/gnutls-nocert-tls13.json
blob: 4b01fe4531c1d4a97cfe53deadc7acd55d9f98ec (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
[
    {"server_command": ["@SERVER@", "--http",
                 "--x509keyfile", "tests/serverX509Key.pem",
                 "--x509certfile", "tests/serverX509Cert.pem",
                 "--x509keyfile", "tests/serverRSAPSSKey.pem",
                 "--x509certfile", "tests/serverRSAPSSCert.pem",
                 "--x509keyfile", "../../../certs/ecc256.pem",
                 "--x509certfile", "../../../certs/cert-ecc256.pem",
                 "--debug=3",
                 "--priority=@PRIORITY@",
                 "--disable-client-cert", "--port=@PORT@"],
     "server_hostname": "localhost",
     "server_port": @PORT@,
     "tests" : [
	 {"name" : "test-tls13-legacy-version.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-empty-alert.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-hrr.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-nociphers.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-pkcs-signature.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-rsa-signatures.py",
	  "arguments": ["-p", "@PORT@", "-b"]},
	 {"name" : "test-tls13-rsapss-signatures.py",
	  "arguments": ["-p", "@PORT@", "-b"]},
	 {"name" : "test-tls13-conversation.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-empty-alert.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-legacy-version.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-nociphers.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-pkcs-signature.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-record-padding.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-signature-algorithms.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-version-negotiation.py",
	  "arguments": ["-p", "@PORT@"]},
	 {"name" : "test-tls13-zero-length-data.py",
	  "comment" : "gnutls sends NST before receiving client Finished, that is not expected in the disabled test",
	  "arguments": ["-p", "@PORT@",
			"-e", "zero-len app data with large padding during handshake"]},
	 {"name" : "test-tls13-finished.py",
	  "commoent" : "the disabled tests timeout very often due to slow tls-fuzzer implementation",
	  "arguments": ["-p", "@PORT@", "-n", "5",
			"-e", "padding - cipher TLS_AES_128_GCM_SHA256, pad_byte 0, pad_left 0, pad_right 16777183",
			"-e", "padding - cipher TLS_AES_256_GCM_SHA384, pad_byte 0, pad_left 0, pad_right 16777167"]},
	 {"name" : "test-tls13-count-tickets.py",
	  "arguments": ["-p", "@PORT@", "-t", "1"]},
	 {"name" : "test-tls13-0rtt-garbage.py",
	  "arguments": ["-p", "@PORT@"]}
     ]
    }
]