diff options
author | EKR <ekr@rtfm.com> | 2018-01-09 20:51:12 -0800 |
---|---|---|
committer | EKR <ekr@rtfm.com> | 2018-01-09 20:51:12 -0800 |
commit | 024ed21d3c880f4e3a26f4859be164c3f4d9e817 (patch) | |
tree | 8608c57609d8aaf2e06b54d210730c71dd5a00b0 /cpputil | |
parent | 3698160484e0f9ca21bcf4b028787349a67dd8a6 (diff) | |
download | nss-hg-024ed21d3c880f4e3a26f4859be164c3f4d9e817.tar.gz |
Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc
Summary:
- Make any call to ssl3_GatherCompleteHandshake (which transitively
means any read from the wire) return PR_IO_ERROR if an alert has
been sent.
- Patch up a few of the tests to handle this new behavior properly.
These tests actually were a bit harder to follow so they should
also be a bit clearer.
- Add a new set of tests for certificate authentication failure.
Reviewers: mt
Differential Revision: https://phabricator.services.mozilla.com/D365
Diffstat (limited to 'cpputil')
-rw-r--r-- | cpputil/tls_parser.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/cpputil/tls_parser.h b/cpputil/tls_parser.h index a5f5771d5..436c11e76 100644 --- a/cpputil/tls_parser.h +++ b/cpputil/tls_parser.h @@ -47,6 +47,7 @@ const uint8_t kTlsAlertUnexpectedMessage = 10; const uint8_t kTlsAlertBadRecordMac = 20; const uint8_t kTlsAlertRecordOverflow = 22; const uint8_t kTlsAlertHandshakeFailure = 40; +const uint8_t kTlsAlertBadCertificate = 42; const uint8_t kTlsAlertIllegalParameter = 47; const uint8_t kTlsAlertDecodeError = 50; const uint8_t kTlsAlertDecryptError = 51; |