summaryrefslogtreecommitdiff
path: root/cpputil
diff options
context:
space:
mode:
authorEKR <ekr@rtfm.com>2018-01-09 20:51:12 -0800
committerEKR <ekr@rtfm.com>2018-01-09 20:51:12 -0800
commit024ed21d3c880f4e3a26f4859be164c3f4d9e817 (patch)
tree8608c57609d8aaf2e06b54d210730c71dd5a00b0 /cpputil
parent3698160484e0f9ca21bcf4b028787349a67dd8a6 (diff)
downloadnss-hg-024ed21d3c880f4e3a26f4859be164c3f4d9e817.tar.gz
Bug 1429475: Tests for delayed failure and be more aggressive about making failures persistent. r=mt, wtc
Summary: - Make any call to ssl3_GatherCompleteHandshake (which transitively means any read from the wire) return PR_IO_ERROR if an alert has been sent. - Patch up a few of the tests to handle this new behavior properly. These tests actually were a bit harder to follow so they should also be a bit clearer. - Add a new set of tests for certificate authentication failure. Reviewers: mt Differential Revision: https://phabricator.services.mozilla.com/D365
Diffstat (limited to 'cpputil')
-rw-r--r--cpputil/tls_parser.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/cpputil/tls_parser.h b/cpputil/tls_parser.h
index a5f5771d5..436c11e76 100644
--- a/cpputil/tls_parser.h
+++ b/cpputil/tls_parser.h
@@ -47,6 +47,7 @@ const uint8_t kTlsAlertUnexpectedMessage = 10;
const uint8_t kTlsAlertBadRecordMac = 20;
const uint8_t kTlsAlertRecordOverflow = 22;
const uint8_t kTlsAlertHandshakeFailure = 40;
+const uint8_t kTlsAlertBadCertificate = 42;
const uint8_t kTlsAlertIllegalParameter = 47;
const uint8_t kTlsAlertDecodeError = 50;
const uint8_t kTlsAlertDecryptError = 51;