Update suppressions for fuzzer mode.
Change-Id: I07c4b67206440d169b314f24e1b3c1c697dda24f Reviewed-on: https://boringssl-review.googlesource.com/12204 Reviewed-by: David Benjamin <davidben@google.com> Commit-Queue: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
parent
ffb1107c91
commit
dfb4138197
@ -1,14 +1,14 @@
|
|||||||
{
|
{
|
||||||
"DisabledTests": {
|
"DisabledTests": {
|
||||||
"BadCBCPadding*": "Fuzzer mode has no CBC padding.",
|
"BadCBCPadding*": "Fuzzer mode has no CBC padding.",
|
||||||
"BadECDSA-*": "Fuzzer mode ignores invalid signatures.",
|
|
||||||
"*-InvalidSignature-*": "Fuzzer mode ignores invalid signatures.",
|
|
||||||
"BadFinished-*": "Fuzzer mode ignores Finished checks.",
|
"BadFinished-*": "Fuzzer mode ignores Finished checks.",
|
||||||
"FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.",
|
"FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.",
|
||||||
"TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
|
"TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
|
||||||
|
|
||||||
"DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
|
"DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
|
||||||
"TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
|
"TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
|
||||||
|
"*-BadRecord": "Fuzzer mode has no bad packets.",
|
||||||
|
|
||||||
"BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
|
"BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
|
||||||
"CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.",
|
"CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.",
|
||||||
@ -19,10 +19,20 @@
|
|||||||
"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error",
|
"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error",
|
||||||
"WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error",
|
"WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error",
|
||||||
|
|
||||||
|
"BadECDSA-*": "Fuzzer mode always accepts a signature.",
|
||||||
|
"*-InvalidSignature-*": "Fuzzer mode always accepts a signature.",
|
||||||
"*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.",
|
"*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.",
|
||||||
"*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.",
|
"*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.",
|
||||||
"Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.",
|
"Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.",
|
||||||
"ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.",
|
"ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.",
|
||||||
"InvalidChannelIDSignature-*": "Fuzzer mode always accepts a signature."
|
"InvalidChannelIDSignature-*": "Fuzzer mode always accepts a signature.",
|
||||||
|
|
||||||
|
"Resume-Server-DeclineBadCipher*": "Fuzzer mode does not encrypt tickets.",
|
||||||
|
"Resume-Server-DeclineCrossVersion*": "Fuzzer mode does not encrypt tickets.",
|
||||||
|
"TicketCallback-SingleCall-*": "Fuzzer mode does not encrypt tickets.",
|
||||||
|
"CorruptTicket-*": "Fuzzer mode does not encrypt tickets.",
|
||||||
|
"ShimTicketRewritable": "Fuzzer mode does not encrypt tickets.",
|
||||||
|
|
||||||
|
"Resume-Server-*Binder*": "Fuzzer mode does not check binders."
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user