blob: d57b72aaf8fc066cb1ac07604dcb336b94113795 [file] [edit]
{
"DisabledTests": {
"*-Async": "We don't support boringssl concept of async",
"TLS-ECH-Client-Reject-NoClientCertificate-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-Reject-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-TLS12-RejectRetryConfigs": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-Rejected-OverrideName-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-Reject-TLS12-NoFalseStart": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-TLS12SessionTicket": "We won't attempt to negotiate 1.2 if ECH is enabled",
"TLS-ECH-Client-TLS12SessionID": "We won't attempt to negotiate 1.2 if ECH is enabled, and we don't support session ID resumption",
"TLS-ECH-Client-Reject-ResumeInnerSession-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled (we could possibly test this if we had the ability to indicate not to send ECH on resumption?)",
"TLS-ECH-Client-Reject-EarlyDataRejected": "Go does not support early (0-RTT) data",
"TLS-ECH-Client-NoNPN": "We don't support NPN",
"TLS-ECH-Client-ChannelID": "We don't support sending channel ID",
"TLS-ECH-Client-Reject-NoChannelID-TLS13": "We don't support sending channel ID",
"TLS-ECH-Client-Reject-NoChannelID-TLS12": "We don't support sending channel ID",
"TLS-ECH-Client-GREASE-IgnoreHRRExtension": "We don't support ECH GREASE because we don't fallback to plaintext",
"TLS-ECH-Client-NoSupportedConfigs-GREASE": "We don't support ECH GREASE because we don't fallback to plaintext",
"TLS-ECH-Client-GREASEExtensions": "We don't support ECH GREASE because we don't fallback to plaintext",
"TLS-ECH-Client-GREASE-NoOverrideName": "We don't support ECH GREASE because we don't fallback to plaintext",
"TLS-ECH-Client-UnsolicitedInnerServerNameAck": "We don't allow sending empty SNI without skipping certificate verification, TODO: could add special flag to bogo to indicate 'empty sni'",
"TLS-ECH-Client-NoSupportedConfigs": "We don't support fallback to cleartext when there are no valid ECH configs",
"TLS-ECH-Client-SkipInvalidPublicName": "We don't support fallback to cleartext when there are no valid ECH configs",
"TLS-ECH-Server-EarlyData": "Go does not support early (0-RTT) data",
"TLS-ECH-Server-EarlyDataRejected": "Go does not support early (0-RTT) data",
"MLKEMKeyShareIncludedSecond": "BoGo wants us to order the key shares based on its preference, but we don't support that",
"MLKEMKeyShareIncludedThird": "BoGo wants us to order the key shares based on its preference, but we don't support that",
"PostQuantumNotEnabledByDefaultInClients": "We do enable it by default!",
"*-Kyber-TLS13": "We don't support Kyber, only ML-KEM (BoGo bug ignoring AllCurves?)",
"*-RSA_PKCS1_SHA256_LEGACY-TLS13": "We don't support the legacy PKCS#1 v1.5 codepoint for TLS 1.3",
"*-Verify-RSA_PKCS1_SHA256_LEGACY-TLS12": "Likewise, we don't know how to handle it in TLS 1.2, so we send the wrong alert",
"*-VerifyDefault-*": "Our signature algorithms are not configurable, so there is no difference between default and supported",
"Ed25519DefaultDisable-*": "We support Ed25519 by default",
"NoCommonSignatureAlgorithms-TLS12-Fallback": "We don't support the legacy RSA exchange (without tlsrsakex=1)",
"*_SHA1-TLS12": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1)",
"Agree-Digest-SHA1": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1)",
"ServerAuth-SHA1-Fallback*": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1), so we fail if there are no signature_algorithms",
"Agree-Digest-SHA256": "We select signature algorithms in peer preference order. We should consider changing this.",
"V2ClientHello-*": "We don't support SSLv2",
"SendV2ClientHello*": "We don't support SSLv2",
"*QUIC*": "No QUIC support",
"Compliance-fips*": "No FIPS",
"*DTLS*": "No DTLS",
"SendEmptyRecords*": "crypto/tls doesn't implement spam protections",
"SendWarningAlerts*": "crypto/tls doesn't implement spam protections",
"SendUserCanceledAlerts-TooMany-TLS13": "crypto/tls doesn't implement spam protections",
"TooManyKeyUpdates": "crypto/tls doesn't implement spam protections (TODO: I think?)",
"KyberNotEnabledByDefaultInClients": "crypto/tls intentionally enables it",
"JustConfiguringKyberWorks": "we always send a X25519 key share with Kyber",
"KyberKeyShareIncludedSecond": "we always send the Kyber key share first",
"KyberKeyShareIncludedThird": "we always send the Kyber key share first",
"GREASE-Server-TLS13": "We don't send GREASE extensions",
"SendBogusAlertType": "sending wrong alert type",
"*Client-P-224*": "no P-224 support",
"*Server-P-224*": "no P-224 support",
"CurveID-Resume*": "unexposed curveID is not stored in the ticket yet",
"BadRSAClientKeyExchange-4": "crypto/tls doesn't check the version number in the premaster secret - see processClientKeyExchange comment",
"BadRSAClientKeyExchange-5": "crypto/tls doesn't check the version number in the premaster secret - see processClientKeyExchange comment",
"SupportTicketsWithSessionID": "We don't support session ID resumption",
"ResumeTLS12SessionID-TLS13": "We don't support session ID resumption",
"TrustAnchors-*": "We don't support draft-beck-tls-trust-anchor-ids",
"PAKE-Extension-*": "We don't support PAKE",
"*TicketFlags": "We don't support draft-ietf-tls-tlsflags",
"BothMLKEMAndKyber-MLKEM1024": "We don't support ML-KEM 1024 KEX",
"CurveTest-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Invalid-MLKEMEncapKeyNotReduced-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Invalid-PadKeyShare-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Invalid-PadKeyShare-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Invalid-TruncateKeyShare-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Invalid-TruncateKeyShare-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"CurveTest-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
"JustConfiguringMLKEMWorks-MLKEM1024": "We don't support ML-KEM 1024 KEX",
"NotJustMLKEMKeyShare-MLKEM1024": "We don't support ML-KEM 1024 KEX",
"TwoMLKEMs": "We don't support ML-KEM 1024 KEX",
"MLKEMKeyShareIncludedSecond-MLKEM1024": "We don't support ML-KEM 1024 KEX",
"MLKEMKeyShareIncludedSecond-X25519MLKEM768": "We don't support ML-KEM 1024 KEX",
"MLKEMKeyShareIncludedThird-MLKEM1024": "We don't support ML-KEM 1024 KEX",
"MLKEMKeyShareIncludedThird-X25519MLKEM768": "We don't return key shares in client preference order",
"ECDSAKeyUsage-*": "We don't enforce ECDSA KU",
"RSAKeyUsage-*": "We don't enforce RSA KU",
"CheckLeafCurve": "TODO: first pass, this should be fixed",
"KeyUpdate-RequestACK": "TODO: first pass, this should be fixed",
"SupportedVersionSelection-TLS12": "TODO: first pass, this should be fixed",
"UnsolicitedServerNameAck-TLS-TLS1": "TODO: first pass, this should be fixed",
"TicketSessionIDLength-33-TLS-TLS1": "TODO: first pass, this should be fixed",
"UnsolicitedServerNameAck-TLS-TLS11": "TODO: first pass, this should be fixed",
"TicketSessionIDLength-33-TLS-TLS11": "TODO: first pass, this should be fixed",
"UnsolicitedServerNameAck-TLS-TLS12": "TODO: first pass, this should be fixed",
"TicketSessionIDLength-33-TLS-TLS12": "TODO: first pass, this should be fixed",
"UnsolicitedServerNameAck-TLS-TLS13": "TODO: first pass, this should be fixed",
"RenegotiationInfo-Forbidden-TLS13": "TODO: first pass, this should be fixed",
"EMS-Forbidden-TLS13": "TODO: first pass, this should be fixed",
"SendUnsolicitedOCSPOnCertificate-TLS13": "TODO: first pass, this should be fixed",
"SendUnsolicitedSCTOnCertificate-TLS13": "TODO: first pass, this should be fixed",
"SendUnknownExtensionOnCertificate-TLS13": "TODO: first pass, this should be fixed",
"Resume-Server-NoTickets-TLS1-TLS1-TLS": "TODO: first pass, this should be fixed",
"Resume-Server-NoTickets-TLS11-TLS11-TLS": "TODO: first pass, this should be fixed",
"Resume-Server-NoTickets-TLS12-TLS12-TLS": "TODO: first pass, this should be fixed",
"Resume-Server-NoPSKBinder": "TODO: first pass, this should be fixed",
"Resume-Server-PSKBinderFirstExtension": "TODO: first pass, this should be fixed",
"Resume-Server-PSKBinderFirstExtension-SecondBinder": "TODO: first pass, this should be fixed",
"Resume-Server-NoPSKBinder-SecondBinder": "TODO: first pass, this should be fixed",
"Resume-Server-OmitPSKsOnSecondClientHello": "TODO: first pass, this should be fixed",
"Renegotiate-Server-Forbidden": "TODO: first pass, this should be fixed",
"Renegotiate-Client-Forbidden-1": "TODO: first pass, this should be fixed",
"UnknownExtension-Client": "TODO: first pass, this should be fixed",
"UnknownUnencryptedExtension-Client-TLS13": "TODO: first pass, this should be fixed",
"UnofferedExtension-Client-TLS13": "TODO: first pass, this should be fixed",
"UnknownExtension-Client-TLS13": "TODO: first pass, this should be fixed",
"SendClientVersion-RSA": "TODO: first pass, this should be fixed",
"NoCommonCurves": "TODO: first pass, this should be fixed",
"PointFormat-EncryptedExtensions-TLS13": "TODO: first pass, this should be fixed",
"TLS13-SendNoKEMModesWithPSK-Server": "TODO: first pass, this should be fixed",
"TLS13-DuplicateTicketEarlyDataSupport": "TODO: first pass, this should be fixed",
"Basic-Client-NoTicket-TLS-Sync": "TODO: first pass, this should be fixed",
"Basic-Server-RSA-TLS-Sync": "TODO: first pass, this should be fixed",
"Basic-Client-NoTicket-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
"Basic-Server-RSA-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
"Basic-Client-NoTicket-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
"Basic-Server-RSA-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
"PartialSecondClientHelloAfterFirst": "TODO: first pass, this should be fixed",
"PartialServerHelloWithHelloRetryRequest": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Server-TLS1": "TODO: first pass, this should be fixed",
"PartialClientKeyExchangeWithClientHello": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Server-TLS1": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Client-TLS11": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Client-TLS1": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Client-TLS11": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Client-TLS12": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Client-TLS13": "TODO: first pass, this should be fixed",
"PartialNewSessionTicketWithServerHelloDone": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Server-TLS11": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Server-TLS12": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Server-TLS11": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Client-TLS12": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Server-TLS12": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Client-TLS13": "TODO: first pass, this should be fixed",
"TrailingDataWithFinished-Resume-Client-TLS1": "TODO: first pass, this should be fixed",
"TrailingMessageData-ClientHello-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ServerHello-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ServerCertificate-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ServerHelloDone-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ServerKeyExchange-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-CertificateRequest-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-CertificateVerify-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ServerFinished-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ClientKeyExchange-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-ClientHello-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ClientFinished-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-NewSessionTicket-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-ClientCertificate-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-CertificateRequest-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-ServerCertificateVerify-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-EncryptedExtensions-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-ClientCertificate-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-ClientCertificateVerify-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-ServerCertificate-TLS": "TODO: first pass, this should be fixed",
"SkipEarlyData-TLS13": "TODO: first pass, this should be fixed",
"DuplicateKeyShares-TLS13": "TODO: first pass, this should be fixed",
"Server-TooLongSessionID-TLS13": "TODO: first pass, this should be fixed",
"Client-TooLongSessionID": "TODO: first pass, this should be fixed",
"Client-ShortSessionID": "TODO: first pass, this should be fixed",
"TLS12NoSessionID-TLS13": "TODO: first pass, this should be fixed",
"Server-TooLongSessionID-TLS12": "TODO: first pass, this should be fixed",
"EmptyEncryptedExtensions-TLS13": "TODO: first pass, this should be fixed",
"SkipEarlyData-SecondClientHelloEarlyData-TLS13": "TODO: first pass, this should be fixed",
"EncryptedExtensionsWithKeyShare-TLS13": "TODO: first pass, this should be fixed",
"HelloRetryRequest-DuplicateCurve-TLS13": "TODO: first pass, this should be fixed",
"HelloRetryRequest-DuplicateCookie-TLS13": "TODO: first pass, this should be fixed",
"HelloRetryRequest-Unknown-TLS13": "TODO: first pass, this should be fixed",
"SendPostHandshakeChangeCipherSpec-TLS13": "TODO: first pass, this should be fixed",
"EmptyExtensions-ClientHello-TLS1": "TODO: first pass, this should be fixed",
"OmitExtensions-ClientHello-TLS1": "TODO: first pass, this should be fixed",
"EmptyExtensions-ClientHello-TLS12": "TODO: first pass, this should be fixed",
"OmitExtensions-ClientHello-TLS12": "TODO: first pass, this should be fixed",
"EmptyExtensions-ClientHello-TLS11": "TODO: first pass, this should be fixed",
"OmitExtensions-ClientHello-TLS11": "TODO: first pass, this should be fixed",
"DuplicateCertCompressionExt-TLS12": "TODO: first pass, this should be fixed",
"DuplicateCertCompressionExt-TLS13": "TODO: first pass, this should be fixed",
"Client-RejectJDK11DowngradeRandom": "TODO: first pass, this should be fixed",
"CheckClientCertificateTypes": "TODO: first pass, this should be fixed",
"CheckECDSACurve-TLS12": "TODO: first pass, this should be fixed",
"ALPNClient-RejectUnknown-TLS-TLS1": "TODO: first pass, this should be fixed",
"ALPNClient-RejectUnknown-TLS-TLS11": "TODO: first pass, this should be fixed",
"ALPNClient-RejectUnknown-TLS-TLS12": "TODO: first pass, this should be fixed",
"ALPNClient-RejectUnknown-TLS-TLS13": "TODO: first pass, this should be fixed",
"ClientHelloPadding": "TODO: first pass, this should be fixed",
"TLS13-ExpectTicketEarlyDataSupport": "TODO: first pass, this should be fixed",
"TLS13-EarlyData-TooMuchData-Client-TLS-Sync": "TODO: first pass, this should be fixed",
"TLS13-EarlyData-TooMuchData-Client-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
"TLS13-EarlyData-TooMuchData-Client-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
"WrongMessageType-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed",
"TrailingMessageData-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed",
"SendHelloRetryRequest-2-TLS13": "TODO: first pass, this should be fixed",
"EarlyData-SkipEndOfEarlyData-TLS13": "TODO: first pass, this should be fixed",
"EarlyData-Server-BadFinished-TLS13": "TODO: first pass, this should be fixed",
"EarlyData-UnexpectedHandshake-Server-TLS13": "TODO: first pass, this should be fixed",
"EarlyData-CipherMismatch-Client-TLS13": "TODO: first pass, this should be fixed",
"Resume-Server-UnofferedCipher-TLS13": "TODO: first pass, this should be fixed",
"GarbageCertificate-Server-TLS13": "TODO: 2025/06 BoGo update, should be fixed",
"WrongMessageType-TLS13-ClientCertificate-TLS": "TODO: 2025/06 BoGo update, should be fixed",
"KeyUpdate-Requested": "TODO: 2025/06 BoGo update, should be fixed",
"AppDataBeforeTLS13KeyChange-*": "TODO: 2025/06 BoGo update, should be fixed"
},
"ErrorMap": {
":ECH_REJECTED:": ["tls: server rejected ECH"]
}
}