diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-26 10:44:41 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2017-05-29 08:41:21 +0200 |
commit | 34c4b401d062a83da56c897508a6777032539ec4 (patch) | |
tree | 02f933eedc39f6c18c8b1e26c4c190f099cf7fda | |
parent | d04adcd66de15aabc679bf3db08f923a54abf5b8 (diff) | |
download | gnutls-34c4b401d062a83da56c897508a6777032539ec4.tar.gz |
tls-fuzzer: ignore the incomplete RSA-PSS tests
These tests fail because tls-fuzzer currently does not properly implement
RSA-PSS.
Signed-off-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
-rw-r--r-- | tests/suite/tls-fuzzer/gnutls-nocert.json | 5 |
1 files changed, 4 insertions, 1 deletions
diff --git a/tests/suite/tls-fuzzer/gnutls-nocert.json b/tests/suite/tls-fuzzer/gnutls-nocert.json index 242e909cc6..4fc88d1837 100644 --- a/tests/suite/tls-fuzzer/gnutls-nocert.json +++ b/tests/suite/tls-fuzzer/gnutls-nocert.json @@ -70,7 +70,10 @@ "-e", "small, maximum fragmentation: 1 fragment - 20B extension", "-e", "medium, maximum fragmentation: 1 fragment - 1024B extension"]}, {"name" : "test-sessionID-resumption.py"}, - {"name" : "test-sig-algs.py"}, + {"name" : "test-sig-algs.py", + "comment" : "FIXME: these fail, but most likely due to tls-fuzzer issue", + "arguments" : ["-e", "RSA-PSS only - fails in verify if server selects PSS", + "-e", "with RSA-PSS - fails in verify if server selects PSS"]}, {"name" : "test-signature-algorithms.py", "comment" : "gnutls doesn't tolerate that much", "arguments" : ["-e", "tolerance max (32764) number of methods"] |