diff options
Diffstat (limited to 'gtests/nss_bogo_shim/config.json')
-rw-r--r-- | gtests/nss_bogo_shim/config.json | 138 |
1 files changed, 69 insertions, 69 deletions
diff --git a/gtests/nss_bogo_shim/config.json b/gtests/nss_bogo_shim/config.json index 5c7a2e348..8d5955166 100644 --- a/gtests/nss_bogo_shim/config.json +++ b/gtests/nss_bogo_shim/config.json @@ -1,77 +1,77 @@ { "DisabledTests": { - "### These tests break whenever we rev versions, so just leave them here for easy uncommenting":"", - "*TLS13Draft*":"NSS supports RFC 8446 only.", - "IgnoreClientVersionOrder":"Uses draft23", + "####################":"####################", + "### Failures due to Bogo/NSS specifics":"", + "####################":"####################", + + "SendEmptyRecords":"Bogo allows only 32 empty records to be sent before other TLS messages.", + "SendUserCanceledAlerts-TooMany-TLS13":"Bogo allows only 5 user canceled alerts to be sent.", + "SendWarningAlerts-TooMany":"Bogo allows only 5 warning alerts to be sent.", + "TooManyKeyUpdates":"Bogo allows only 32 KeyUpdate messages to be sent.", + "UnsolicitedServerNameAck-TLS*":"Boring wants us to fail with an unexpected_extension alert, we simply ignore ssl_server_name_xtn.", "DuplicateCertCompressionExt*":"BoGo expects that an alert is sent if more than one compression algorithm is sent.", - "ServerBogusVersion":"Check that SH.legacy_version=TLS12 when the server picks TLS 1.3 (Bug 1443761)", - "DummyPQPadding-Server*":"Boring is testing a dummy PQ padding extension", - "VerifyPreferences-Enforced":"NSS sends alerts in response to errors in protected handshake messages in the clear", - "Draft-Downgrade-Server":"Boring implements a draft downgrade sentinel used for measurements.", - "FilterExtraAlgorithms":"NSS doesn't allow sending unsupported signature algorithms", - "SendBogusAlertType":"Unexpected TLS alerts should abort connections (Bug 1438263)", - "VerifyPreferences-Ed25519":"Add Ed25519 support (Bug 1325335)", - "Ed25519DefaultDisable*":"Add Ed25519 support (Bug 1325335)", - "ServerCipherFilter*":"Add Ed25519 support (Bug 1325335)", - "GarbageCertificate*":"Send bad_certificate alert when certificate parsing fails (Bug 1441565)", - "SupportedVersionSelection-TLS12":"Should maybe reject TLS 1.2 in SH.supported_versions (Bug 1438266)", - "Resume-Server-BinderWrongLength":"Alert disagreement (Bug 1317633)", - "Resume-Server-NoPSKBinder":"Alert disagreement (Bug 1317633)", - "CheckRecordVersion-TLS*":"Bug 1317634", - "GarbageInitialRecordVersion-TLS*":"NSS doesn't strictly check the ClientHello record version", - "GREASE-Server-TLS13":"BoringSSL GREASEs without a flag, but we ignore it", - "TLS13-ExpectNoSessionTicketOnBadKEMode-Server":"Bug in NSS. Don't send ticket when not permitted by KE modes (Bug 1317635)", - "*KeyUpdate*":"KeyUpdate Unimplemented", - "ClientAuth-NoFallback-TLS13":"Disagreement about alerts. Bug 1294975", - "SendWarningAlerts-TLS13":"NSS needs to trigger on warning alerts", - "NoSupportedCurves":"This tests a non-spec behavior for TLS 1.2 and expects the wrong alert for TLS 1.3", - "SendEmptyRecords":"Tests a non-spec behavior in BoGo where it chokes on too many empty records", - "LargePlaintext":"NSS needs to check for over-long records. Bug 1294978", - "TLS13-RC4-MD5-server":"This fails properly but returns an unexpected error. Not a bug but needs cleanup", - "*SSL3*":"NSS disables SSLv3", - "*SSLv3*":"NSS disables SSLv3", - "*AES256*":"Inconsistent support for AES256", - "*AES128-SHA256*":"No support for Suite B ciphers", - "DuplicateExtension*":"NSS sends unexpected_extension alert", - "WeakDH":"NSS supports 768-bit DH", - "SillyDH":"NSS supports 4097-bit DH", - "SendWarningAlerts":"This appears to be Boring-specific", - "TLS12-AES128-GCM-client":"Bug 1292895", - "*TLS12-AES128-GCM-LargeRecord*":"Bug 1292895", - "Renegotiate-Client-Forbidden-1":"Bug 1292898", - "Renegotiate-Server-Forbidden":"NSS doesn't disable renegotiation by default", - "Renegotiate-Client-NoIgnore":"NSS doesn't disable renegotiation by default", - "StrayHelloRequest*":"NSS doesn't disable renegotiation by default", - "NoSupportedCurves-TLS13":"wanted SSL_ERROR_NO_CYPHER_OVERLAP, got missing extension error", - "FragmentedClientVersion":"received a malformed Client Hello handshake message", - "WrongMessageType-TLS13-EncryptedExtensions":"Boring expects CCS (Bugs 1481209, 1304603)", - "TrailingMessageData-TLS13-EncryptedExtensions":"Boring expects CCS (Bugs 1481209, 1304603)", - "UnofferedExtension-Client-TLS13":"Boring expects CCS (Bugs 1481209, 1304603)", - "UnknownExtension-Client-TLS13":"Boring expects CCS (Bugs 1481209, 1304603)", - "WrongMessageType-TLS13-CertificateRequest":"Boring expects CCS (Bugs 1481209, 1304603)", - "WrongMessageType-TLS13-ServerCertificateVerify":"Boring expects CCS (Bugs 1481209, 1304603)", - "WrongMessageType-TLS13-ServerCertificate":"Boring expects CCS (Bugs 1481209, 1304603)", - "WrongMessageType-TLS13-ServerFinished":"Boring expects CCS (Bugs 1481209, 1304603)", - "TrailingMessageData-*": "Bug 1304575", - "DuplicateKeyShares":"Bug 1304578", - "Resume-Server-TLS13-TLS13":"Bug 1314351", - "SkipEarlyData-Interleaved":"Bug 1336916", - "ECDSAKeyUsage-TLS1*":"Bug 1338194", - "PointFormat-Client-MissingUncompressed":"We ignore ec_point_formats extensions sent by servers.", - "SkipEarlyData-SecondClientHelloEarlyData":"Boring doesn't reject early_data in the 2nd CH but fails later with bad_record_mac.", - "SkipEarlyData-*TooMuchData":"Bug 1339373", - "UnsolicitedServerNameAck-TLS1*":"Boring wants us to fail with an unexpected_extension alert, we simply ignore ssl_server_name_xtn.", - "RequireAnyClientCertificate-TLS1*":"Bug 1339387", + "*Auth-SHA1-Fallback*":"Boring wants us to fall back to SHA-1 if supported_signature_algorithms in CR is empty.", + "NoSupportedCurves":"This tests a non-spec behavior for TLS 1.2", + "SkipEarlyData-*TooMuchData*":"Test of internal BoGo features (see Bug 1339373).", + "Client-RejectJDK11DowngradeRandom":"This random is not specified in RFC8446.", + "Renegotiate-Server-Forbidden":"TLS 1.2 test, renegotiation is allowed in NSS.", + "EmptySessionID-TLS13":"This test also asserts BoringSSL always sending CCS messages for compatibility mode.", + "Http*":"Test sends http string to socket before handshake. his data is interpreted as a record header and leads to different IO errors in NSS.", + "V2ClientHello*":"Prefix data before V2 ClientHello leads to IO errors in NSS.", + "Server-JDK11-NoWorkaround-3":"Unexpected Bogo crash.", + + "*Ed25519*":"Add Ed25519 support (Bug 1325335)", + "*NoSSL3*":"Test passes but only because of handshake failure, NSS only rejects SSL3 immediately in TLS1.3 clients/servers.", + "GREASE-Server-TLS13":"NSS only supports ECH grease.", "SendExtensionOnClientCertificate-TLS13":"Bug 1339392", - "ALPNClient-Mismatch-TLS13":"NSS sends alerts in response to errors in protected handshake messages in the clear", - "P224-Server":"NSS doesn't support P-224", - "ClientAuth-SHA1-Fallback*":"Boring wants us to fall back to SHA-1 if supported_signature_algorithms in CR is empty." + "CheckRecordVersion-TLS1":"NSS doesn't check record version field. Bug 1317634", + "CheckRecordVersion-TLS11":"NSS doesn't check record version field. Bug 1317634", + "CheckRecordVersion-TLS12":"NSS doesn't check record version field. Bug 1317634", + "GarbageInitialRecordVersion-TLS*":"NSS doesn't strictly check the ClientHello record version.", + "DuplicateKeyShares*":"NSS doesn't check for duplicates. Bug 1304578", + "PointFormat-Client-MissingUncompressed":"NSS ignores ec_point_formats extensions sent by servers.", + "SkipEarlyData-Interleaved-TLS13":"NSS ignores invalid early data records by default since ssl_0rtt_ignore_trial is default. Bug 1336916", + "ECDSAKeyUsage*":"NSS only checks KeyUsage on server setup and with delegated credential verification. Bug 1338194", + "RSAKeyUsage-*-WantSignature-GotEncipherment-*":"NSS only checks KeyUsage on server setup and with delegated credential verification. See Bug 1338194", + "TLS13-ExpectNoSessionTicketOnBadKEMode-Server":"NSS Server side bug. Don't send ticket when not permitted by KE modes (Bug 1317635)", + "Resume-Server-OmitPSKsOnSecondClientHello":"NSS Server side bug. It does not detect ClientHello dropping of PSK extension (after HRR).", + "Renegotiate-Client-Forbidden-1":"By default NSS allows renegotiation with extension contrary to bogo.", + "TLS-ECH*":"NSS ECH is not enabled by default.", + "Server-TooLongSessionID*":"NSS does not check the length of the ClientHello sessionID.", + "TrailingData*":"NSS does only check for trailing data on possible key change handshake messages in TLS 1.3", + "Partial*":"See TrailingData* description.", + + "####################":"####################", + "### TLS1/11 failures due to unsupported signature algorithms":"", + "####################":"####################", + + "FallbackSCSV":"", + "TicketSessionIDLength*":"", + "NoExtendedMasterSecret-TLS1-Server":"", + "NoExtendedMasterSecret-TLS11-Server":"", + "TLS1-Server-ClientAuth*":"", + "TLS11-Server-ClientAuth*":"", + "Resume-Server-TLS1-TLS1-TLS":"", + "Resume-Server-TLS11-TLS11-TLS":"", + "Resume-Server-NoTickets-TLS1-TLS1-TLS":"", + "Resume-Server-NoTickets-TLS11-TLS11-TLS":"", + "VersionNegotiation-Server*-TLS1-TLS":"", + "VersionNegotiation-Server*-TLS11-TLS":"", + "MinimumVersion-Server*-TLS1-TLS1-TLS":"", + "MinimumVersion-Server*-TLS1-TLS11-TLS":"", + "MinimumVersion-Server*-TLS11-TLS11-TLS":"", + "GarbageCertificate-Server-TLS1":"", + "GarbageCertificate-Server-TLS11":"", + "LooseInitialRecordVersion-TLS1":"", + "LooseInitialRecordVersion-TLS11":"", + "*Certificate-TLS1":"", + "*Certificate-TLS11":"", + "BadRSAClientKeyExchange-*":"This is a TLS11 only test.", + "RSAKeyUsage-Server-WantSignature-GotSignature-TLS1":"Only Server side of TLS 1 fails", + "RSAKeyUsage-Server-WantSignature-GotSignature-TLS11":"Only Server side of TLS 11 fails", + + "":"" }, "ErrorMap" : { - ":HANDSHAKE_FAILURE_ON_CLIENT_HELLO:":"SSL_ERROR_NO_CYPHER_OVERLAP", - ":UNKNOWN_CIPHER_RETURNED:":"SSL_ERROR_NO_CYPHER_OVERLAP", - ":OLD_SESSION_CIPHER_NOT_RETURNED:":"SSL_ERROR_RX_MALFORMED_SERVER_HELLO", - ":NO_SHARED_CIPHER:":"SSL_ERROR_NO_CYPHER_OVERLAP", - ":DIGEST_CHECK_FAILED:":"SSL_ERROR_BAD_HANDSHAKE_HASH_VALUE" } } |