boringssl/ssl
David Benjamin 8a1a5daa49 Send the fake session ID in the test suite.
NSS only enables compatibility mode on the server if the client
requested it by way of the session ID. This is slightly off as a client
has no way not to request it when offering a TLS 1.2 session, but it is
in the spec.

So our tests are usable for other stacks, send a fake session ID in the
runner by default. The existing EmptySessionID-TLS13* test asserts that
BoringSSL behaves as we expect it to on empty session IDs too. The
intent is that NSS will disable that test but can otherwise leave the
rest enabled.

Change-Id: I370bf90aba1805c2f6970ceee0d29ecf199f437d
Reviewed-on: https://boringssl-review.googlesource.com/26504
Reviewed-by: Steven Valdez <svaldez@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2018-03-19 21:06:05 +00:00
..
test Send the fake session ID in the test suite. 2018-03-19 21:06:05 +00:00
bio_ssl.cc
CMakeLists.txt Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
custom_extensions.cc
d1_both.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
d1_lib.cc Give DTLS1_STATE a destructor. 2017-10-25 03:23:26 +00:00
d1_pkt.cc
d1_srtp.cc
dtls_method.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
dtls_record.cc Give DTLS1_STATE a destructor. 2017-10-25 03:23:26 +00:00
handoff.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
handshake_client.cc Remove remnants of the HRR message. 2018-03-13 21:10:03 +00:00
handshake_server.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
handshake.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
internal.h Record whether dummy PQ padding was used. 2018-02-28 23:38:53 +00:00
s3_both.cc Revert "Pack encrypted handshake messages together." 2017-10-27 14:36:37 +00:00
s3_lib.cc Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
s3_pkt.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
span_test.cc
ssl_aead_ctx.cc Remove deprecated TLS 1.3 variants. 2017-12-18 21:20:32 +00:00
ssl_asn1.cc Expose ssl_session_serialize to libssl. 2018-01-26 22:31:47 +00:00
ssl_buffer.cc
ssl_cert.cc Adding support for draft 21 as a TLS 1.3 variant. 2017-11-01 21:32:36 +00:00
ssl_cipher.cc Add |SSL_COMP_get[0_name|_id]|. 2018-03-15 17:34:33 +00:00
ssl_file.cc
ssl_key_share.cc Reject compressed ECDH coordinates in TLS. 2018-02-15 01:42:54 +00:00
ssl_lib.cc Don't test |initial_handshake_complete| for dummy PQ padding status. 2018-03-07 20:27:11 +00:00
ssl_privkey.cc Push an error if custom private keys fail. 2018-02-01 21:43:42 +00:00
ssl_session.cc
ssl_stat.cc Remove trailing whitespace from ssl/. 2018-02-26 22:05:13 +00:00
ssl_test.cc Remove SSLv3_method and friends. 2018-02-15 15:29:18 +00:00
ssl_transcript.cc Adding support for draft 21 as a TLS 1.3 variant. 2017-11-01 21:32:36 +00:00
ssl_versions.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
ssl_x509.cc Map NOT_YET_VALID errors to |certificate_expired|. 2018-01-05 23:40:40 +00:00
t1_enc.cc Add initial, experimental support for split handshakes. 2018-01-31 22:24:17 +00:00
t1_lib.cc Record whether dummy PQ padding was used. 2018-02-28 23:38:53 +00:00
tls13_both.cc Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
tls13_client.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls13_enc.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls13_server.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00
tls_method.cc Remove SSLv3_method and friends. 2018-02-15 15:29:18 +00:00
tls_record.cc Remove draft22 and experiment2. 2018-01-31 18:07:53 +00:00