| { |
| "DisabledTests": { |
| "BadCBCPadding*": "Fuzzer mode has no CBC padding.", |
| "BadECDSA-*": "Fuzzer mode ignores invalid signatures.", |
| "*-InvalidSignature-*": "Fuzzer mode ignores invalid signatures.", |
| "BadFinished-*": "Fuzzer mode ignores Finished checks.", |
| "FalseStart-BadFinished": "Fuzzer mode ignores Finished checks.", |
| "TrailingMessageData-*Finished*": "Fuzzer mode ignores Finished checks.", |
| |
| "DTLSIgnoreBadPackets*": "Fuzzer mode has no bad packets.", |
| "TLSFatalBadPackets": "Fuzzer mode has no bad packets.", |
| |
| "BadRSAClientKeyExchange*": "Fuzzer mode does not notice a bad premaster secret.", |
| "CECPQ1-*-BadNewhopePart": "Fuzzer mode does not notice a bad premaster secret.", |
| "CECPQ1-*-BadX25519Part": "Fuzzer mode does not notice a bad premaster secret.", |
| |
| "TrailingMessageData-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error", |
| "WrongMessageType-TLS13-ServerHello": "Fuzzer mode will not read the peer's alert as a MAC error", |
| |
| "*Auth-Verify-RSA-PKCS1-*-TLS13": "Fuzzer mode always accepts a signature.", |
| "*Auth-Verify-ECDSA-SHA1-TLS13": "Fuzzer mode always accepts a signature.", |
| "Verify-*Auth-SignatureType*": "Fuzzer mode always accepts a signature.", |
| "ECDSACurveMismatch-Verify-TLS13": "Fuzzer mode always accepts a signature.", |
| "InvalidChannelIDSignature": "Fuzzer mode always accepts a signature." |
| } |
| } |