mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-15 23:42:41 +00:00
Remove ignore list entries that don't apply in 3.6
In 3.6, compared with the state of development that this work was based on, we're doing more testing with TLS12_PRF and TLS12_PSK_TO_MS disabled, thanks to some configurations with MBEDTLS_PSA_CRYPTO_CONFIG disabled. Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
8f886456f9
commit
ccd1440c48
@ -146,9 +146,6 @@ class CoverageTask(outcome_analysis.CoverageTask):
|
||||
# We don't test with HMAC disabled.
|
||||
# https://github.com/Mbed-TLS/mbedtls/issues/9591
|
||||
'Config: !PSA_WANT_ALG_HMAC',
|
||||
# We don't test with HMAC disabled.
|
||||
# https://github.com/Mbed-TLS/mbedtls/issues/9591
|
||||
'Config: !PSA_WANT_ALG_TLS12_PRF',
|
||||
# The DERIVE key type is always enabled.
|
||||
'Config: !PSA_WANT_KEY_TYPE_DERIVE',
|
||||
# More granularity of key pair type enablement macros
|
||||
@ -266,14 +263,6 @@ class CoverageTask(outcome_analysis.CoverageTask):
|
||||
# enable it in depends.py where we remove hashes.
|
||||
# https://github.com/Mbed-TLS/mbedtls/issues/9576
|
||||
re.compile(r'PSA key_derivation PBKDF2_HMAC\(\w+\): !(?!PBKDF2_HMAC\Z).*'),
|
||||
# We never test with TLS12_PRF or TLS12_PSK_TO_MS disabled
|
||||
# but certain other things enabled.
|
||||
# https://github.com/Mbed-TLS/mbedtls/issues/9577
|
||||
re.compile(r'PSA key_derivation TLS12_PRF\(\w+\): !TLS12_PRF'),
|
||||
re.compile(r'PSA key_derivation TLS12_PSK_TO_MS'
|
||||
r'\((?!SHA_256|SHA_384|SHA_512)\w+\): !TLS12_PSK_TO_MS'),
|
||||
'PSA key_derivation KEY_AGREEMENT(ECDH,TLS12_PRF(SHA_256)): !TLS12_PRF',
|
||||
'PSA key_derivation KEY_AGREEMENT(ECDH,TLS12_PRF(SHA_384)): !TLS12_PRF',
|
||||
|
||||
# We never test with the HMAC algorithm enabled but the HMAC
|
||||
# key type disabled. Those dependencies don't really make sense.
|
||||
|
Loading…
x
Reference in New Issue
Block a user