ab6306bcb6
Some new tests needed to be suppressed. Change-Id: I4474d752c338a18440efb213e0795ae81ad754fb Reviewed-on: https://boringssl-review.googlesource.com/11583 Reviewed-by: Steven Valdez <svaldez@google.com> Reviewed-by: David Benjamin <davidben@google.com>
29 lines
1.6 KiB
JSON
29 lines
1.6 KiB
JSON
{
|
|
"DisabledTests": {
|
|
"BadCBCPadding*": "Fuzzer mode has no CBC padding.",
|
|
"BadECDSA-*": "Fuzzer mode ignores invalid signatures.",
|
|
"*-InvalidSignature-*": "Fuzzer mode ignores invalid signatures.",
|
|
"BadFinished-*": "Fuzzer mode ignores Finished checks.",
|
|
"FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.",
|
|
"TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.",
|
|
|
|
"DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.",
|
|
"TLSFatalBadPackets": "Fuzzer mode has no bad packets.",
|
|
|
|
"BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.",
|
|
"CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.",
|
|
"CECPQ1-*-BadX25519Part": "Fuzzer mode does not notice a bad premaster secret.",
|
|
|
|
"TrailingMessageData-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error",
|
|
"UnexpectedUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error",
|
|
"UnknownUnencryptedExtension-Client-TLS13": "Fuzzer mode will not read the peer's alert as a MAC error",
|
|
"WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error",
|
|
|
|
"*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.",
|
|
"*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.",
|
|
"Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.",
|
|
"ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.",
|
|
"InvalidChannelIDSignature": "Fuzzer mode always accepts a signature."
|
|
}
|
|
}
|