diff options
author | Leander Schwarz <lschwarz@mozilla.com> | 2023-01-16 17:56:43 +0000 |
---|---|---|
committer | Leander Schwarz <lschwarz@mozilla.com> | 2023-01-16 17:56:43 +0000 |
commit | 11bdd24bb405af450ad1007064eb70db02b3317d (patch) | |
tree | 3966d9cfd360110a370be7d7ce4a9f02fe64121c /gtests/nss_bogo_shim/config.json | |
parent | a9974d3eb4d2bd0241f8c24d2d8fcc2282d69af9 (diff) | |
download | nss-hg-11bdd24bb405af450ad1007064eb70db02b3317d.tar.gz |
Bug 1771100 - Added ECH 0Rtt support to BoGo shim. r=djackson
Differential Revision: https://phabricator.services.mozilla.com/D154209
Diffstat (limited to 'gtests/nss_bogo_shim/config.json')
-rw-r--r-- | gtests/nss_bogo_shim/config.json | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/gtests/nss_bogo_shim/config.json b/gtests/nss_bogo_shim/config.json index a3ccecfec..52d477ad1 100644 --- a/gtests/nss_bogo_shim/config.json +++ b/gtests/nss_bogo_shim/config.json @@ -19,6 +19,7 @@ "Http*":"Test sends http string to socket before handshake. his data is interpreted as a record header and leads to different IO errors in NSS.", "V2ClientHello*":"Prefix data before V2 ClientHello leads to IO errors in NSS.", "Server-JDK11-NoWorkaround-3":"Unexpected Bogo crash.", + "Resume-Server-UnofferedCipher-TLS13":"Bogo rejects resumption if client offers previously not used ciphersuites with equal hash algorithm (no 0Rtt).", "*Ed25519*":"Add Ed25519 support (Bug 1325335)", "*NoSSL3*":"Test passes but only because of handshake failure, NSS only rejects SSL3 immediately in TLS1.3 clients/servers.", @@ -45,6 +46,8 @@ "*ECH*NoSupportedConfigs*":"NSS throws error if unsupported but well formed retry configs could not be set on client, Bogo just does not offer ECH.", "*ECH*RandomHRR*":"NSS sends real ECH in CH2 after receiving HRR rejcting ECH formally, Bogo expects instant ech_required alert. Bug 1779357", "*ECH*UnsolicitedInnerServerNameAck":"NSS always sends SNI in CHInner, Bogo tests if the client detects an unsolicited SNI in SH if CHInner did not include it. Bug 1781224", + "CorruptTicket-TLS-TLS12":"NSS sends an alert on reception of a corrupted session ticket instead of falling back to full handshake. Bug 1783812", + "HelloRetryRequest-NonResumableCipher-TLS13":"TODO", "####################":"####################", "### TLS1/11 failures due to unsupported signature algorithms":"", @@ -71,6 +74,10 @@ "LooseInitialRecordVersion-TLS11":"", "*Certificate-TLS1":"", "*Certificate-TLS11":"", + "CorruptTicket*TLS1":"", + "CorruptTicket*TLS11":"", + "Resume-Server*TLS1-*":"", + "Resume-Server*TLS11-*":"", "BadRSAClientKeyExchange-*":"This is a TLS11 only test.", "RSAKeyUsage-Server-WantSignature-GotSignature-TLS1":"Only Server side of TLS 1 fails", "RSAKeyUsage-Server-WantSignature-GotSignature-TLS11":"Only Server side of TLS 11 fails", |