Update suppressions for fuzzer mode.

Change-Id: I07c4b67206440d169b314f24e1b3c1c697dda24f
Reviewed-on: https://boringssl-review.googlesource.com/12204
Reviewed-by: David Benjamin <davidben@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
This commit is contained in:
David Benjamin 2016-11-14 08:40:35 -05:00 committed by CQ bot account: commit-bot@chromium.org
parent ffb1107c91
commit dfb4138197

View File

@ -1,14 +1,14 @@
{ {
"DisabledTests": { "DisabledTests": {
"BadCBCPadding*": "Fuzzer mode has no CBC padding.", "BadCBCPadding*": "Fuzzer mode has no CBC padding.",
"BadECDSA-*": "Fuzzer mode ignores invalid signatures.",
"*-InvalidSignature-*": "Fuzzer mode ignores invalid signatures.",
"BadFinished-*": "Fuzzer mode ignores Finished checks.", "BadFinished-*": "Fuzzer mode ignores Finished checks.",
"FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.", "FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.",
"TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.", "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
"DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.", "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
"TLSFatalBadPackets": "Fuzzer mode has no bad packets.", "TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
"*-BadRecord": "Fuzzer mode has no bad packets.",
"BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.", "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
"CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.", "CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.",
@ -19,10 +19,20 @@
"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error", "UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error",
"WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error", "WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error",
"BadECDSA-*": "Fuzzer mode always accepts a signature.",
"*-InvalidSignature-*": "Fuzzer mode always accepts a signature.",
"*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.", "*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.",
"*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.", "*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.",
"Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.", "Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.",
"ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.", "ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.",
"InvalidChannelIDSignature-*": "Fuzzer mode always accepts a signature." "InvalidChannelIDSignature-*": "Fuzzer mode always accepts a signature.",
"Resume-Server-DeclineBadCipher*": "Fuzzer mode does not encrypt tickets.",
"Resume-Server-DeclineCrossVersion*": "Fuzzer mode does not encrypt tickets.",
"TicketCallback-SingleCall-*": "Fuzzer mode does not encrypt tickets.",
"CorruptTicket-*": "Fuzzer mode does not encrypt tickets.",
"ShimTicketRewritable": "Fuzzer mode does not encrypt tickets.",
"Resume-Server-*Binder*": "Fuzzer mode does not check binders."
} }
} }