@@ -237,8 +237,11 @@ def get_ca_pem_file(signature_file):
237
237
unsupported_cases = ("xpath-transform" , "xslt-transform" , "xpointer" ,
238
238
"x509-data-issuer-serial" , "x509-data-ski" , "x509-data-subject-name" ,
239
239
"x509data" , "signature-x509-ski" , "signature-x509-is" )
240
- todo_cases = ("signature-big" , "enveloping-dsa-x509chain" ,
241
- "enveloping-sha512-hmac-sha512" , "enveloping-sha512-rsa-sha512" )
240
+ bad_interop_cases = ("signature-big" , "enveloping-dsa-x509chain" ,
241
+ "enveloping-sha512-hmac-sha512" , "enveloping-sha512-rsa-sha512" ,
242
+ "enveloping-rsa-x509chain" , "enveloping-sha1-rsa-sha1" ,
243
+ "enveloping-sha224-rsa-sha224" , "enveloping-sha256-rsa-sha256" ,
244
+ "enveloping-sha384-rsa-sha384" )
242
245
if signature_file .endswith ("expired-cert.xml" ) or signature_file .endswith ("wsfederation_metadata.xml" ):
243
246
with self .assertRaisesRegexp (InvalidCertificate , "certificate has expired" ):
244
247
raise
@@ -271,8 +274,8 @@ def get_ca_pem_file(signature_file):
271
274
self .assertIsInstance (e , InvalidInput )
272
275
elif any (x in signature_file for x in unsupported_cases ) or "EntitiesForbidden" in str (e ):
273
276
print ("Unsupported test case:" , type (e ), e )
274
- elif any (x in signature_file for x in todo_cases ) or "Unable to resolve reference" in str (e ):
275
- print ("IGNORED test case:" , type (e ), e )
277
+ elif any (x in signature_file for x in bad_interop_cases ) or "Unable to resolve reference" in str (e ):
278
+ print ("Bad interop test case:" , type (e ), e )
276
279
elif "certificate has expired" in str (e ) and ("signature-dsa" in signature_file or "signature-rsa" in signature_file ):
277
280
print ("IGNORED:" , type (e ), e )
278
281
else :
0 commit comments