boringssl/ssl/test/runner
David Benjamin 76c2efc0e9 Forbid a server from negotiating both ALPN and NPN.
If the two extensions select different next protocols (quite possible since one
is server-selected and the other is client-selected), things will break. This
matches the behavior of NSS (Firefox) and Go.

Change-Id: Ie1da97bf062b91a370c85c12bc61423220a22f36
Reviewed-on: https://boringssl-review.googlesource.com/5780
Reviewed-by: Adam Langley <agl@google.com>
2015-09-01 20:46:42 +00:00
..
alert.go
cert.pem
chacha20_poly1305_test.go
chacha20_poly1305.go
channel_id_key.pem
cipher_suites.go Remove Go implementation of non-standard ECDHE_PSK_WITH_AES_128_GCM_SHA256. 2015-08-24 23:35:43 +00:00
common.go Forbid a server from negotiating both ALPN and NPN. 2015-09-01 20:46:42 +00:00
conn.go Fix buffer size computation. 2015-09-01 20:18:21 +00:00
dtls.go Add more aggressive DTLS replay tests. 2015-08-05 21:10:48 +00:00
ecdsa_cert.pem
ecdsa_key.pem
handshake_client.go Add tests for bad CertificateVerify signatures. 2015-07-31 22:32:17 +00:00
handshake_messages.go Forbid a server from negotiating both ALPN and NPN. 2015-09-01 20:46:42 +00:00
handshake_server.go Forbid a server from negotiating both ALPN and NPN. 2015-09-01 20:46:42 +00:00
key_agreement.go Set minimum DH group size to 1024 bits. 2015-05-20 18:35:31 +00:00
key.pem
packet_adapter.go runner: fix a couple of nits from govet. 2015-04-17 21:45:50 +00:00
poly1305.go
prf.go
recordingconn.go
runner.go Forbid a server from negotiating both ALPN and NPN. 2015-09-01 20:46:42 +00:00
test_output.go
ticket.go
tls.go