|
1 | 1 | {
|
2 | 2 | "DisabledTests": {
|
| 3 | + "*-Async": "We don't support boringssl concept of async", |
| 4 | + |
| 5 | + "TLS-ECH-Client-Reject-NoClientCertificate-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 6 | + "TLS-ECH-Client-Reject-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 7 | + "TLS-ECH-Client-TLS12-RejectRetryConfigs": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 8 | + "TLS-ECH-Client-Rejected-OverrideName-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 9 | + "TLS-ECH-Client-Reject-TLS12-NoFalseStart": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 10 | + "TLS-ECH-Client-TLS12SessionTicket": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 11 | + "TLS-ECH-Client-TLS12SessionID": "We won't attempt to negotiate 1.2 if ECH is enabled", |
| 12 | + |
| 13 | + "TLS-ECH-Client-Reject-ResumeInnerSession-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled (we could possibly test this if we had the ability to indicate not to send ECH on resumption?)", |
| 14 | + |
| 15 | + "TLS-ECH-Client-Reject-EarlyDataRejected": "We don't support switiching out ECH configs with this level of granularity", |
| 16 | + |
| 17 | + "TLS-ECH-Client-NoNPN": "We don't support NPN", |
| 18 | + |
| 19 | + "TLS-ECH-Client-ChannelID": "We don't support sending channel ID", |
| 20 | + "TLS-ECH-Client-Reject-NoChannelID-TLS13": "We don't support sending channel ID", |
| 21 | + "TLS-ECH-Client-Reject-NoChannelID-TLS12": "We don't support sending channel ID", |
| 22 | + |
| 23 | + "TLS-ECH-Client-GREASE-IgnoreHRRExtension": "We don't support ECH GREASE because we don't fallback to plaintext", |
| 24 | + "TLS-ECH-Client-NoSupportedConfigs-GREASE": "We don't support ECH GREASE because we don't fallback to plaintext", |
| 25 | + "TLS-ECH-Client-GREASEExtensions": "We don't support ECH GREASE because we don't fallback to plaintext", |
| 26 | + "TLS-ECH-Client-GREASE-NoOverrideName": "We don't support ECH GREASE because we don't fallback to plaintext", |
| 27 | + |
| 28 | + "TLS-ECH-Client-UnsolicitedInnerServerNameAck": "We don't allow sending empty SNI without skipping certificate verification, TODO: could add special flag to bogo to indicate 'empty sni'", |
| 29 | + |
| 30 | + "TLS-ECH-Client-NoSupportedConfigs": "We don't support fallback to cleartext when there are no valid ECH configs", |
| 31 | + "TLS-ECH-Client-SkipInvalidPublicName": "We don't support fallback to cleartext when there are no valid ECH configs", |
| 32 | + |
| 33 | + "TLS-ECH-Client-Reject-RandomHRRExtension": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 34 | + "TLS-ECH-Client-Reject-UnsupportedRetryConfigs": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 35 | + "TLS-ECH-Client-Reject-NoRetryConfigs": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 36 | + "TLS-ECH-Client-Reject": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 37 | + "TLS-ECH-Client-Reject-HelloRetryRequest": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 38 | + "TLS-ECH-Client-Reject-NoClientCertificate-TLS13": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 39 | + "TLS-ECH-Client-Reject-OverrideName-TLS13": "TODO: bogo test cases have mismatching public certificates and public names in ECH configs. Can be removed once bogo fixed", |
| 40 | + |
| 41 | + "*ECH-Server*": "no ECH server support", |
| 42 | + "SendV2ClientHello*": "We don't support SSLv2", |
3 | 43 | "*QUIC*": "No QUIC support",
|
4 | 44 | "Compliance-fips*": "No FIPS",
|
5 | 45 | "*DTLS*": "No DTLS",
|
|
16 | 56 | "GarbageCertificate*": "TODO ask davidben, alertDecode vs alertBadCertificate",
|
17 | 57 | "SendBogusAlertType": "sending wrong alert type",
|
18 | 58 | "EchoTLS13CompatibilitySessionID": "TODO reject compat session ID",
|
19 |
| - "*ECH-Server*": "no ECH server support", |
20 |
| - "TLS-ECH-Client-UnsolictedHRRExtension": "TODO", |
21 | 59 | "*Client-P-224*": "no P-224 support",
|
22 | 60 | "*Server-P-224*": "no P-224 support",
|
23 | 61 | "CurveID-Resume*": "unexposed curveID is not stored in the ticket yet",
|
|
180 | 218 | "DuplicateCertCompressionExt-TLS13": "TODO: first pass, this should be fixed",
|
181 | 219 | "Client-RejectJDK11DowngradeRandom": "TODO: first pass, this should be fixed",
|
182 | 220 | "CheckClientCertificateTypes": "TODO: first pass, this should be fixed",
|
183 |
| - "CheckECDSACurve-TLS12": "TODO: first pass, this should be fixed" |
| 221 | + "CheckECDSACurve-TLS12": "TODO: first pass, this should be fixed", |
| 222 | + "ALPNClient-RejectUnknown-TLS-TLS1": "TODO: first pass, this should be fixed", |
| 223 | + "ALPNClient-RejectUnknown-TLS-TLS11": "TODO: first pass, this should be fixed", |
| 224 | + "ALPNClient-RejectUnknown-TLS-TLS12": "TODO: first pass, this should be fixed", |
| 225 | + "ALPNClient-RejectUnknown-TLS-TLS13": "TODO: first pass, this should be fixed", |
| 226 | + "ClientHelloPadding": "TODO: first pass, this should be fixed", |
| 227 | + "TLS13-ExpectTicketEarlyDataSupport": "TODO: first pass, this should be fixed", |
| 228 | + "TLS13-EarlyData-TooMuchData-Client-TLS-Sync": "TODO: first pass, this should be fixed", |
| 229 | + "TLS13-EarlyData-TooMuchData-Client-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed", |
| 230 | + "TLS13-EarlyData-TooMuchData-Client-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed", |
| 231 | + "WrongMessageType-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed", |
| 232 | + "TrailingMessageData-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed", |
| 233 | + "SendHelloRetryRequest-2-TLS13": "TODO: first pass, this should be fixed", |
| 234 | + "EarlyData-SkipEndOfEarlyData-TLS13": "TODO: first pass, this should be fixed", |
| 235 | + "EarlyData-Server-BadFinished-TLS13": "TODO: first pass, this should be fixed", |
| 236 | + "EarlyData-UnexpectedHandshake-Server-TLS13": "TODO: first pass, this should be fixed", |
| 237 | + "EarlyData-CipherMismatch-Client-TLS13": "TODO: first pass, this should be fixed", |
| 238 | + "Resume-Server-UnofferedCipher-TLS13": "TODO: first pass, this should be fixed" |
184 | 239 | }
|
185 | 240 | }
|
0 commit comments