boringssl/ssl/test/runner
David Benjamin e8f3d666cc Be strict about expecting a server Certificate message.
Introduce a ssl_cipher_has_server_public_key to save the repeated
NULL/PSK/RSA_PSK[*] check. Don't allow skipping to ServerKeyExchange when
expecting Certificate; the messages expected are determined by the cipher
suite. The ssl3_get_server_public_key call is already guarded.

As the previous test demonstrates, this is safe because of the
ssl3_check_cert_and_algorithm call, but avoid the looseness in the parsing
there.

[*] NB: we don't implement RSA_PSK, and OpenSSL has never implemented it.

Change-Id: I0571e6bcbeb8eb883f77878bdc98d1aa3a287cf3
Reviewed-on: https://boringssl-review.googlesource.com/1156
Reviewed-by: Adam Langley <agl@google.com>
2014-07-14 20:50:30 +00:00
..
alert.go Inital import. 2014-06-20 13:17:32 -07:00
cert.pem Inital import. 2014-06-20 13:17:32 -07:00
cipher_suites.go Implement TLS_FALLBACK_SCSV support for the client. 2014-06-23 12:03:11 -07:00
common.go Add UnauthenticatedECDH bug test. 2014-07-14 20:50:09 +00:00
conn.go Fix test of first of 255 CBC padding bytes. 2014-06-20 13:17:37 -07:00
ecdsa_cert.pem Inital import. 2014-06-20 13:17:32 -07:00
ecdsa_key.pem Inital import. 2014-06-20 13:17:32 -07:00
handshake_client.go Add a test for certificate types parsing. 2014-07-09 21:03:54 +00:00
handshake_messages.go Check duplicate extensions before processing. 2014-07-08 22:17:59 +00:00
handshake_server.go Add UnauthenticatedECDH bug test. 2014-07-14 20:50:09 +00:00
key_agreement.go Add UnauthenticatedECDH bug test. 2014-07-14 20:50:09 +00:00
key.pem Inital import. 2014-06-20 13:17:32 -07:00
prf.go Inital import. 2014-06-20 13:17:32 -07:00
runner.go Be strict about expecting a server Certificate message. 2014-07-14 20:50:30 +00:00
ticket.go Inital import. 2014-06-20 13:17:32 -07:00
tls.go Inital import. 2014-06-20 13:17:32 -07:00