From 45f9dc0e8d1d8f01528af64ddb3868b00bf7c3d0 Mon Sep 17 00:00:00 2001 From: Neil Horman Date: Mon, 24 Feb 2025 08:14:36 -0500 Subject: [PATCH] Add record overflow test to tlsfuzzer external tests MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Add this to our regression test suite for tlsfuzzer, since it recently caught an error Reviewed-by: Tomas Mraz Reviewed-by: Saša Nedvědický (Merged from https://github.com/openssl/openssl/pull/26781) (cherry picked from commit 83dbfde6aaf7a384cfc7bab6608943a56ac4ebed) --- test/recipes/95-test_external_tlsfuzzer_data/cert.json.in | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/test/recipes/95-test_external_tlsfuzzer_data/cert.json.in b/test/recipes/95-test_external_tlsfuzzer_data/cert.json.in index 1bc20799d9b..b82301e23b6 100644 --- a/test/recipes/95-test_external_tlsfuzzer_data/cert.json.in +++ b/test/recipes/95-test_external_tlsfuzzer_data/cert.json.in @@ -31,7 +31,11 @@ "arguments" : ["-p", "@PORT@"]}, {"name" : "test-conversation.py", "arguments" : ["-p", "@PORT@", - "-d"]} + "-d"]}, + {"name" : "test-invalid-client-hello-w-record-overflow.py", + "arguments" : ["-n", "0", "-C", + "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "-d", + "--ems", "session ID len fuzz to 5 w/ext"]} ] } -- 2.47.3