summaryrefslogtreecommitdiff
path: root/gtests/nss_bogo_shim/config.json
diff options
context:
space:
mode:
authorLeander Schwarz <lschwarz@mozilla.com>2023-01-16 17:56:43 +0000
committerLeander Schwarz <lschwarz@mozilla.com>2023-01-16 17:56:43 +0000
commit11bdd24bb405af450ad1007064eb70db02b3317d (patch)
tree3966d9cfd360110a370be7d7ce4a9f02fe64121c /gtests/nss_bogo_shim/config.json
parenta9974d3eb4d2bd0241f8c24d2d8fcc2282d69af9 (diff)
downloadnss-hg-11bdd24bb405af450ad1007064eb70db02b3317d.tar.gz
Bug 1771100 - Added ECH 0Rtt support to BoGo shim. r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D154209
Diffstat (limited to 'gtests/nss_bogo_shim/config.json')
-rw-r--r--gtests/nss_bogo_shim/config.json7
1 files changed, 7 insertions, 0 deletions
diff --git a/gtests/nss_bogo_shim/config.json b/gtests/nss_bogo_shim/config.json
index a3ccecfec..52d477ad1 100644
--- a/gtests/nss_bogo_shim/config.json
+++ b/gtests/nss_bogo_shim/config.json
@@ -19,6 +19,7 @@
"Http*":"Test sends http string to socket before handshake. his data is interpreted as a record header and leads to different IO errors in NSS.",
"V2ClientHello*":"Prefix data before V2 ClientHello leads to IO errors in NSS.",
"Server-JDK11-NoWorkaround-3":"Unexpected Bogo crash.",
+ "Resume-Server-UnofferedCipher-TLS13":"Bogo rejects resumption if client offers previously not used ciphersuites with equal hash algorithm (no 0Rtt).",
"*Ed25519*":"Add Ed25519 support (Bug 1325335)",
"*NoSSL3*":"Test passes but only because of handshake failure, NSS only rejects SSL3 immediately in TLS1.3 clients/servers.",
@@ -45,6 +46,8 @@
"*ECH*NoSupportedConfigs*":"NSS throws error if unsupported but well formed retry configs could not be set on client, Bogo just does not offer ECH.",
"*ECH*RandomHRR*":"NSS sends real ECH in CH2 after receiving HRR rejcting ECH formally, Bogo expects instant ech_required alert. Bug 1779357",
"*ECH*UnsolicitedInnerServerNameAck":"NSS always sends SNI in CHInner, Bogo tests if the client detects an unsolicited SNI in SH if CHInner did not include it. Bug 1781224",
+ "CorruptTicket-TLS-TLS12":"NSS sends an alert on reception of a corrupted session ticket instead of falling back to full handshake. Bug 1783812",
+ "HelloRetryRequest-NonResumableCipher-TLS13":"TODO",
"####################":"####################",
"### TLS1/11 failures due to unsupported signature algorithms":"",
@@ -71,6 +74,10 @@
"LooseInitialRecordVersion-TLS11":"",
"*Certificate-TLS1":"",
"*Certificate-TLS11":"",
+ "CorruptTicket*TLS1":"",
+ "CorruptTicket*TLS11":"",
+ "Resume-Server*TLS1-*":"",
+ "Resume-Server*TLS11-*":"",
"BadRSAClientKeyExchange-*":"This is a TLS11 only test.",
"RSAKeyUsage-Server-WantSignature-GotSignature-TLS1":"Only Server side of TLS 1 fails",
"RSAKeyUsage-Server-WantSignature-GotSignature-TLS11":"Only Server side of TLS 11 fails",