robsd-exec: timeout 3600s + . /usr/local/libexec/robsd/util-regress.sh + config_load + << "EOF" + _err=0 + _env=REGRESS_FAIL_EARLY=no + config_value regress-lib/libssl/tlsfuzzer-env + 2> /dev/null + _env=REGRESS_FAIL_EARLY=no GOCACHE=/tmp + _make=make -C /home/src/regress/lib/libssl/tlsfuzzer REGRESS_FAIL_EARLY=no GOCACHE=/tmp + config_value regress-lib/libssl/tlsfuzzer-targets + regress_root lib/libssl/tlsfuzzer + export SUDO + unpriv -c staff build exec make -C /home/src/regress/lib/libssl/tlsfuzzer REGRESS_FAIL_EARLY=no GOCACHE=/tmp regress ==== regress-tlsfuzzer ==== openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt -subj /CN=localhost -nodes -batch Generating a 2048 bit RSA private key ... .............................................................. writing new private key to 'localhost.key' ----- python3 /home/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py -s Running TLSv1.3 tests ... test-tls13-ccs.py OK test-tls13-conversation.py OK test-tls13-count-tickets.py OK test-tls13-empty-alert.py OK test-tls13-finished.py OK test-tls13-finished-plaintext.py OK test-tls13-hrr.py OK test-tls13-keyshare-omitted.py OK test-tls13-legacy-version.py OK test-tls13-nociphers.py OK test-tls13-record-padding.py OK test-tls13-shuffled-extentions.py OK test-tls13-zero-content-type.py OK test-tls13-zero-length-data.py OK test-tls13-connection-abort.py OK Running slow TLSv1.3 tests ... test-tls13-dhe-shared-secret-padding.py OK test-tls13-invalid-ciphers.py OK test-tls13-serverhello-random.py OK test-tls13-record-layer-limits.py OK test-tls13-large-number-of-extensions.py OK Running TLSv1.2 tests ... test-aes-gcm-nonces.py OK test-connection-abort.py OK test-conversation.py OK test-cve-2016-2107.py OK test-cve-2016-6309.py OK test-dhe-rsa-key-exchange.py OK test-early-application-data.py OK test-empty-extensions.py OK test-extensions.py OK test-fuzzed-MAC.py OK test-fuzzed-ciphertext.py OK test-fuzzed-finished.py OK test-fuzzed-padding.py OK test-fuzzed-plaintext.py OK test-hello-request-by-client.py OK test-invalid-cipher-suites.py OK test-invalid-content-type.py OK test-invalid-session-id.py OK test-invalid-version.py OK test-large-number-of-extensions.py OK test-lucky13.py OK test-message-skipping.py OK test-no-heartbeat.py OK test-record-layer-fragmentation.py OK test-sslv2-connection.py OK test-truncating-of-finished.py OK test-truncating-of-kRSA-client-key-exchange.py OK test-unsupported-curve-fallback.py OK test-version-numbers.py OK test-zero-length-data.py OK test-atypical-padding.py OK test-ccs.py OK test-dhe-rsa-key-exchange-signatures.py OK test-dhe-rsa-key-exchange-with-bad-messages.py OK test-dhe-key-share-random.py OK test-export-ciphers-rejected.py OK test-downgrade-protection.py OK test-fallback-scsv.py OK test-invalid-compression-methods.py OK test-renegotiation-changed-clienthello.py OK test-sessionID-resumption.py OK test-sig-algs-renegotiation-resumption.py OK test-serverhello-random.py OK test-chacha20.py OK Running slow TLSv1.2 tests ... test-cve-2016-7054.py OK test-dhe-no-shared-secret-padding.py OK test-ecdhe-padded-shared-secret.py OK test-ecdhe-rsa-key-share-random.py OK test-large-hello.py OK