|
|
|
@ -1707,8 +1707,8 @@ run_test_psa_force_curve() {
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
set_maybe_calc_verify none
|
|
|
|
|
run_test "PSA - ECDH with $1" \
|
|
|
|
|
"$P_SRV debug_level=4 force_version=tls12 curves=$1" \
|
|
|
|
|
"$P_CLI debug_level=4 force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 curves=$1" \
|
|
|
|
|
"$P_SRV debug_level=4 force_version=tls12 groups=$1" \
|
|
|
|
|
"$P_CLI debug_level=4 force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 groups=$1" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "$maybe_calc_verify" \
|
|
|
|
|
-c "calc PSA finished" \
|
|
|
|
@ -5396,7 +5396,7 @@ run_test "Authentication: server goodcert, client required, no trusted CA" \
|
|
|
|
|
run_test "Authentication: server ECDH p256v1, client required, p256v1 unsupported" \
|
|
|
|
|
"$P_SRV debug_level=1 key_file=data_files/server5.key \
|
|
|
|
|
crt_file=data_files/server5.ku-ka.crt" \
|
|
|
|
|
"$P_CLI force_version=tls12 debug_level=3 auth_mode=required curves=secp521r1" \
|
|
|
|
|
"$P_CLI force_version=tls12 debug_level=3 auth_mode=required groups=secp521r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "bad certificate (EC key curve)"\
|
|
|
|
|
-c "! Certificate verification flags"\
|
|
|
|
@ -5405,7 +5405,7 @@ run_test "Authentication: server ECDH p256v1, client required, p256v1 unsuppo
|
|
|
|
|
run_test "Authentication: server ECDH p256v1, client optional, p256v1 unsupported" \
|
|
|
|
|
"$P_SRV debug_level=1 key_file=data_files/server5.key \
|
|
|
|
|
crt_file=data_files/server5.ku-ka.crt" \
|
|
|
|
|
"$P_CLI force_version=tls12 debug_level=3 auth_mode=optional curves=secp521r1" \
|
|
|
|
|
"$P_CLI force_version=tls12 debug_level=3 auth_mode=optional groups=secp521r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "bad certificate (EC key curve)"\
|
|
|
|
|
-c "! Certificate verification flags"\
|
|
|
|
@ -5783,7 +5783,7 @@ requires_config_enabled MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
|
|
|
|
|
run_test "Authentication, CA callback: server ECDH p256v1, client required, p256v1 unsupported" \
|
|
|
|
|
"$P_SRV debug_level=1 key_file=data_files/server5.key \
|
|
|
|
|
crt_file=data_files/server5.ku-ka.crt" \
|
|
|
|
|
"$P_CLI force_version=tls12 ca_callback=1 debug_level=3 auth_mode=required curves=secp521r1" \
|
|
|
|
|
"$P_CLI force_version=tls12 ca_callback=1 debug_level=3 auth_mode=required groups=secp521r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "use CA callback for X.509 CRT verification" \
|
|
|
|
|
-c "bad certificate (EC key curve)" \
|
|
|
|
@ -5794,7 +5794,7 @@ requires_config_enabled MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK
|
|
|
|
|
run_test "Authentication, CA callback: server ECDH p256v1, client optional, p256v1 unsupported" \
|
|
|
|
|
"$P_SRV debug_level=1 key_file=data_files/server5.key \
|
|
|
|
|
crt_file=data_files/server5.ku-ka.crt" \
|
|
|
|
|
"$P_CLI force_version=tls12 ca_callback=1 debug_level=3 auth_mode=optional curves=secp521r1" \
|
|
|
|
|
"$P_CLI force_version=tls12 ca_callback=1 debug_level=3 auth_mode=optional groups=secp521r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "use CA callback for X.509 CRT verification" \
|
|
|
|
|
-c "bad certificate (EC key curve)"\
|
|
|
|
@ -8430,7 +8430,7 @@ run_test "Large server packet TLS 1.3 AEAD shorter tag" \
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
run_test "EC restart: TLS, default" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1" \
|
|
|
|
@ -8443,7 +8443,7 @@ run_test "EC restart: TLS, default" \
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
run_test "EC restart: TLS, max_ops=0" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1 ec_max_ops=0" \
|
|
|
|
@ -8456,7 +8456,7 @@ run_test "EC restart: TLS, max_ops=0" \
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
run_test "EC restart: TLS, max_ops=65535" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1 ec_max_ops=65535" \
|
|
|
|
@ -8471,7 +8471,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_disabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000 (no USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1 ec_max_ops=1000" \
|
|
|
|
@ -8487,7 +8487,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000 (USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1 ec_max_ops=1000" \
|
|
|
|
@ -8502,7 +8502,7 @@ run_test "EC restart: TLS, max_ops=1000 (USE_PSA)" \
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, badsign" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required \
|
|
|
|
|
crt_file=data_files/server5-badsign.crt \
|
|
|
|
|
key_file=data_files/server5.key" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
@ -8522,7 +8522,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_disabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, auth_mode=optional badsign (no USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required \
|
|
|
|
|
crt_file=data_files/server5-badsign.crt \
|
|
|
|
|
key_file=data_files/server5.key" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
@ -8543,7 +8543,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, auth_mode=optional badsign (USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required \
|
|
|
|
|
crt_file=data_files/server5-badsign.crt \
|
|
|
|
|
key_file=data_files/server5.key" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
@ -8563,7 +8563,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_disabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, auth_mode=none badsign (no USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required \
|
|
|
|
|
crt_file=data_files/server5-badsign.crt \
|
|
|
|
|
key_file=data_files/server5.key" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
@ -8584,7 +8584,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, auth_mode=none badsign (USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required \
|
|
|
|
|
crt_file=data_files/server5-badsign.crt \
|
|
|
|
|
key_file=data_files/server5.key" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
@ -8604,7 +8604,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_disabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: DTLS, max_ops=1000 (no USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required dtls=1" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required dtls=1" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
dtls=1 debug_level=1 ec_max_ops=1000" \
|
|
|
|
@ -8620,7 +8620,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: DTLS, max_ops=1000 (USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required dtls=1" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required dtls=1" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
dtls=1 debug_level=1 ec_max_ops=1000" \
|
|
|
|
@ -8635,7 +8635,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_disabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000 no client auth (no USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1" \
|
|
|
|
|
"$P_SRV groups=secp256r1" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
debug_level=1 ec_max_ops=1000" \
|
|
|
|
|
0 \
|
|
|
|
@ -8651,7 +8651,7 @@ requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000 no client auth (USE_PSA)" \
|
|
|
|
|
"$P_SRV curves=secp256r1" \
|
|
|
|
|
"$P_SRV groups=secp256r1" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
debug_level=1 ec_max_ops=1000" \
|
|
|
|
|
0 \
|
|
|
|
@ -8667,7 +8667,7 @@ run_test "EC restart: TLS, max_ops=1000 no client auth (USE_PSA)" \
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_RESTARTABLE
|
|
|
|
|
requires_config_enabled MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
|
run_test "EC restart: TLS, max_ops=1000, ECDHE-RSA" \
|
|
|
|
|
"$P_SRV curves=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_SRV groups=secp256r1 auth_mode=required" \
|
|
|
|
|
"$P_CLI force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 \
|
|
|
|
|
key_file=data_files/server5.key crt_file=data_files/server5.crt \
|
|
|
|
|
debug_level=1 ec_max_ops=1000" \
|
|
|
|
@ -12322,8 +12322,8 @@ requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
requires_config_enabled PSA_WANT_ALG_ECDH
|
|
|
|
|
run_test "TLS 1.3: server: HRR check - mbedtls" \
|
|
|
|
|
"$P_SRV debug_level=4 curves=secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_SRV debug_level=4 groups=secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "tls13 server state: MBEDTLS_SSL_CLIENT_HELLO" \
|
|
|
|
|
-s "tls13 server state: MBEDTLS_SSL_SERVER_HELLO" \
|
|
|
|
@ -12587,8 +12587,8 @@ requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->m HRR both peers do not support middlebox compatibility" \
|
|
|
|
|
"$P_SRV debug_level=4 curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_SRV debug_level=4 groups=secp384r1 tickets=0" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
@ -12603,8 +12603,8 @@ requires_config_enabled PSA_WANT_ALG_ECDH
|
|
|
|
|
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->m HRR both with middlebox compat support" \
|
|
|
|
|
"$P_SRV debug_level=4 curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_SRV debug_level=4 groups=secp384r1 tickets=0" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
@ -12619,7 +12619,7 @@ requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->O HRR both peers do not support middlebox compatibility" \
|
|
|
|
|
"$O_NEXT_SRV -msg -tls1_3 -groups P-384 -no_middlebox -num_tickets 0 -no_cache" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
|
-c "received HelloRetryRequest message" \
|
|
|
|
@ -12633,7 +12633,7 @@ requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->O HRR server with middlebox compat support, not client" \
|
|
|
|
|
"$O_NEXT_SRV -msg -tls1_3 -groups P-384 -num_tickets 0 -no_cache" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "received HelloRetryRequest message" \
|
|
|
|
|
-c "ChangeCipherSpec invalid in TLS 1.3 without compatibility mode"
|
|
|
|
@ -12645,7 +12645,7 @@ requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->O HRR both with middlebox compat support" \
|
|
|
|
|
"$O_NEXT_SRV -msg -tls1_3 -groups P-384 -num_tickets 0 -no_resume_ephemeral -no_cache" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
|
-c "Ignore ChangeCipherSpec in TLS 1.3 compatibility mode"
|
|
|
|
@ -12659,7 +12659,7 @@ requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->G HRR both peers do not support middlebox compatibility" \
|
|
|
|
|
"$G_NEXT_SRV --priority=NORMAL:-GROUP-ALL:+GROUP-SECP384R1:-VERS-ALL:+VERS-TLS1.3:%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE --disable-client-cert" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
|
-c "received HelloRetryRequest message" \
|
|
|
|
@ -12674,7 +12674,7 @@ requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->G HRR server with middlebox compat support, not client" \
|
|
|
|
|
"$G_NEXT_SRV --priority=NORMAL:-GROUP-ALL:+GROUP-SECP384R1:-VERS-ALL:+VERS-TLS1.3:%NO_TICKETS --disable-client-cert" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
1 \
|
|
|
|
|
-c "received HelloRetryRequest message" \
|
|
|
|
|
-c "ChangeCipherSpec invalid in TLS 1.3 without compatibility mode"
|
|
|
|
@ -12688,7 +12688,7 @@ requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 m->G HRR both with middlebox compat support" \
|
|
|
|
|
"$G_NEXT_SRV --priority=NORMAL:-GROUP-ALL:+GROUP-SECP384R1:-VERS-ALL:+VERS-TLS1.3:+CIPHER-ALL:%NO_TICKETS --disable-client-cert" \
|
|
|
|
|
"$P_CLI debug_level=4 curves=secp256r1,secp384r1" \
|
|
|
|
|
"$P_CLI debug_level=4 groups=secp256r1,secp384r1" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
|
-c "Ignore ChangeCipherSpec in TLS 1.3 compatibility mode"
|
|
|
|
@ -12699,7 +12699,7 @@ requires_config_enabled MBEDTLS_DEBUG_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 O->m HRR both peers do not support middlebox compatibility" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$O_NEXT_CLI -msg -debug -groups P-256:P-384 -no_middlebox" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -12712,7 +12712,7 @@ requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 O->m HRR server with middlebox compat support, not client" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$O_NEXT_CLI -msg -debug -groups P-256:P-384 -no_middlebox" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -12724,7 +12724,7 @@ requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 O->m HRR both with middlebox compat support" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$O_NEXT_CLI -msg -debug -groups P-256:P-384" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -12739,7 +12739,7 @@ requires_config_enabled MBEDTLS_DEBUG_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 G->m HRR both peers do not support middlebox compatibility" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI localhost --priority=NORMAL:-GROUP-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE -V" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -12755,7 +12755,7 @@ requires_config_enabled PSA_WANT_ALG_ECDH
|
|
|
|
|
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 G->m HRR server with middlebox compat support, not client" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI localhost --debug=10 --priority=NORMAL:-GROUP-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE -V" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -12772,7 +12772,7 @@ requires_config_enabled PSA_WANT_ALG_ECDH
|
|
|
|
|
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
|
|
|
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
|
|
|
run_test "TLS 1.3 G->m HRR both with middlebox compat support" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key curves=secp384r1 tickets=0" \
|
|
|
|
|
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key groups=secp384r1 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI localhost --debug=10 --priority=NORMAL:-GROUP-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE -V" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -13204,7 +13204,7 @@ requires_gnutls_tls1_3
|
|
|
|
|
requires_gnutls_next_no_ticket
|
|
|
|
|
requires_gnutls_next_disable_tls13_compat
|
|
|
|
|
run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe3072,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe3072 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe3072 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE3072:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -13226,7 +13226,7 @@ requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
|
|
|
|
requires_config_enabled PSA_WANT_ALG_FFDH
|
|
|
|
|
run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe3072,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE3072:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe3072" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe3072" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "HTTP/1.0 200 OK" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
@ -13246,7 +13246,7 @@ requires_gnutls_tls1_3
|
|
|
|
|
requires_gnutls_next_no_ticket
|
|
|
|
|
requires_gnutls_next_disable_tls13_compat
|
|
|
|
|
run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe4096,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe4096 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe4096 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE4096:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -13268,7 +13268,7 @@ requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
|
|
|
|
requires_config_enabled PSA_WANT_ALG_FFDH
|
|
|
|
|
run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe4096,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE4096:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe4096" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe4096" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "HTTP/1.0 200 OK" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
@ -13288,7 +13288,7 @@ requires_gnutls_tls1_3
|
|
|
|
|
requires_gnutls_next_no_ticket
|
|
|
|
|
requires_gnutls_next_disable_tls13_compat
|
|
|
|
|
run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe6144,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe6144 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe6144 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE6144:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -13309,7 +13309,7 @@ requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
|
|
|
|
|
requires_config_enabled PSA_WANT_ALG_FFDH
|
|
|
|
|
run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe6144,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE6144:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe6144" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe6144" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "HTTP/1.0 200 OK" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
@ -13330,7 +13330,7 @@ requires_gnutls_next_no_ticket
|
|
|
|
|
requires_gnutls_next_disable_tls13_compat
|
|
|
|
|
client_needs_more_time 4
|
|
|
|
|
run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe8192,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe8192 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe8192 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
|
|
|
|
|
"$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE8192:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
0 \
|
|
|
|
|
-s "Protocol is TLSv1.3" \
|
|
|
|
@ -13352,7 +13352,7 @@ requires_config_enabled PSA_WANT_ALG_FFDH
|
|
|
|
|
client_needs_more_time 4
|
|
|
|
|
run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe8192,rsa_pss_rsae_sha256" \
|
|
|
|
|
"$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE8192:+VERS-TLS1.3:%NO_TICKETS" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=ffdhe8192" \
|
|
|
|
|
"$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe8192" \
|
|
|
|
|
0 \
|
|
|
|
|
-c "HTTP/1.0 200 OK" \
|
|
|
|
|
-c "Protocol is TLSv1.3" \
|
|
|
|
|