|
|
@ -1114,8 +1114,8 @@ run_test() {
|
|
|
|
run_test_psa() {
|
|
|
|
run_test_psa() {
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSA-supported ciphersuite: $1" \
|
|
|
|
run_test "PSA-supported ciphersuite: $1" \
|
|
|
|
"$P_SRV debug_level=3 force_version=tls1_2" \
|
|
|
|
"$P_SRV debug_level=3 force_version=tls12" \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls1_2 force_ciphersuite=$1" \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls12 force_ciphersuite=$1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Successfully setup PSA-based decryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based decryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based encryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based encryption cipher context" \
|
|
|
@ -1137,8 +1137,8 @@ run_test_psa() {
|
|
|
|
run_test_psa_force_curve() {
|
|
|
|
run_test_psa_force_curve() {
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSA - ECDH with $1" \
|
|
|
|
run_test "PSA - ECDH with $1" \
|
|
|
|
"$P_SRV debug_level=4 force_version=tls1_2" \
|
|
|
|
"$P_SRV debug_level=4 force_version=tls12" \
|
|
|
|
"$P_CLI debug_level=4 force_version=tls1_2 force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 curves=$1" \
|
|
|
|
"$P_CLI debug_level=4 force_version=tls12 force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 curves=$1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Successfully setup PSA-based decryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based decryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based encryption cipher context" \
|
|
|
|
-c "Successfully setup PSA-based encryption cipher context" \
|
|
|
@ -1170,8 +1170,8 @@ run_test_memory_after_hanshake_with_mfl()
|
|
|
|
MEMORY_USAGE_LIMIT="$(( ( MEMORY_USAGE_LIMIT * 110 ) / 100 ))"
|
|
|
|
MEMORY_USAGE_LIMIT="$(( ( MEMORY_USAGE_LIMIT * 110 ) / 100 ))"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Handshake memory usage (MFL $1)" \
|
|
|
|
run_test "Handshake memory usage (MFL $1)" \
|
|
|
|
"$P_SRV debug_level=3 auth_mode=required force_version=tls1_2" \
|
|
|
|
"$P_SRV debug_level=3 auth_mode=required force_version=tls12" \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls1_2 \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls12 \
|
|
|
|
crt_file=data_files/server5.crt key_file=data_files/server5.key \
|
|
|
|
crt_file=data_files/server5.crt key_file=data_files/server5.key \
|
|
|
|
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CCM max_frag_len=$1" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CCM max_frag_len=$1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -1189,8 +1189,8 @@ run_tests_memory_after_hanshake()
|
|
|
|
# first test with default MFU is to get reference memory usage
|
|
|
|
# first test with default MFU is to get reference memory usage
|
|
|
|
MEMORY_USAGE_MFL_16K=0
|
|
|
|
MEMORY_USAGE_MFL_16K=0
|
|
|
|
run_test "Handshake memory usage initial (MFL 16384 - default)" \
|
|
|
|
run_test "Handshake memory usage initial (MFL 16384 - default)" \
|
|
|
|
"$P_SRV debug_level=3 auth_mode=required force_version=tls1_2" \
|
|
|
|
"$P_SRV debug_level=3 auth_mode=required force_version=tls12" \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls1_2 \
|
|
|
|
"$P_CLI debug_level=3 force_version=tls12 \
|
|
|
|
crt_file=data_files/server5.crt key_file=data_files/server5.key \
|
|
|
|
crt_file=data_files/server5.crt key_file=data_files/server5.key \
|
|
|
|
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CCM" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CCM" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -2849,7 +2849,7 @@ run_test "Fallback SCSV: not in list" \
|
|
|
|
run_test "CBC Record splitting: TLS 1.2, no splitting" \
|
|
|
|
run_test "CBC Record splitting: TLS 1.2, no splitting" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
|
|
|
request_size=123 force_version=tls1_2" \
|
|
|
|
request_size=123 force_version=tls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 123 bytes read" \
|
|
|
|
-s "Read from client: 123 bytes read" \
|
|
|
|
-S "Read from client: 1 bytes read" \
|
|
|
|
-S "Read from client: 1 bytes read" \
|
|
|
@ -4774,7 +4774,7 @@ run_test "Certificate hash: client TLS 1.2 -> SHA-2" \
|
|
|
|
key_file=data_files/server5.key \
|
|
|
|
key_file=data_files/server5.key \
|
|
|
|
crt_file2=data_files/server5-sha1.crt \
|
|
|
|
crt_file2=data_files/server5-sha1.crt \
|
|
|
|
key_file2=data_files/server5.key" \
|
|
|
|
key_file2=data_files/server5.key" \
|
|
|
|
"$P_CLI force_version=tls1_2" \
|
|
|
|
"$P_CLI force_version=tls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "signed using.*ECDSA with SHA256" \
|
|
|
|
-c "signed using.*ECDSA with SHA256" \
|
|
|
|
-C "signed using.*ECDSA with SHA1"
|
|
|
|
-C "signed using.*ECDSA with SHA1"
|
|
|
@ -5321,14 +5321,14 @@ run_test "Version check: cli min 1.1, srv max 1.1 -> 1.1" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Version check: cli min 1.2, srv max 1.1 -> fail" \
|
|
|
|
run_test "Version check: cli min 1.2, srv max 1.1 -> fail" \
|
|
|
|
"$P_SRV max_version=tls1_1" \
|
|
|
|
"$P_SRV max_version=tls1_1" \
|
|
|
|
"$P_CLI min_version=tls1_2" \
|
|
|
|
"$P_CLI min_version=tls12" \
|
|
|
|
1 \
|
|
|
|
1 \
|
|
|
|
-s "mbedtls_ssl_handshake returned" \
|
|
|
|
-s "mbedtls_ssl_handshake returned" \
|
|
|
|
-c "mbedtls_ssl_handshake returned" \
|
|
|
|
-c "mbedtls_ssl_handshake returned" \
|
|
|
|
-c "SSL - Handshake protocol not within min/max boundaries"
|
|
|
|
-c "SSL - Handshake protocol not within min/max boundaries"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Version check: srv min 1.2, cli max 1.1 -> fail" \
|
|
|
|
run_test "Version check: srv min 1.2, cli max 1.1 -> fail" \
|
|
|
|
"$P_SRV min_version=tls1_2" \
|
|
|
|
"$P_SRV min_version=tls12" \
|
|
|
|
"$P_CLI max_version=tls1_1" \
|
|
|
|
"$P_CLI max_version=tls1_1" \
|
|
|
|
1 \
|
|
|
|
1 \
|
|
|
|
-s "mbedtls_ssl_handshake returned" \
|
|
|
|
-s "mbedtls_ssl_handshake returned" \
|
|
|
@ -5807,7 +5807,7 @@ run_test "PSK callback: psk, no callback" \
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback" \
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
@ -5821,7 +5821,7 @@ run_test "PSK callback: opaque psk on client, no callback" \
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, SHA-384" \
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, SHA-384" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
@ -5835,7 +5835,7 @@ run_test "PSK callback: opaque psk on client, no callback, SHA-384" \
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, EMS" \
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, EMS" \
|
|
|
|
"$P_SRV extended_ms=1 debug_level=3 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_SRV extended_ms=1 debug_level=3 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_CLI extended_ms=1 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=1 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
@ -5849,7 +5849,7 @@ run_test "PSK callback: opaque psk on client, no callback, EMS" \
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, SHA-384, EMS" \
|
|
|
|
run_test "PSK callback: opaque psk on client, no callback, SHA-384, EMS" \
|
|
|
|
"$P_SRV extended_ms=1 debug_level=3 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_SRV extended_ms=1 debug_level=3 psk=abc123 psk_identity=foo" \
|
|
|
|
"$P_CLI extended_ms=1 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI extended_ms=1 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
psk_identity=foo psk=abc123 psk_opaque=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
|
-c "skip PMS generation for opaque PSK"\
|
|
|
@ -5862,8 +5862,8 @@ run_test "PSK callback: opaque psk on client, no callback, SHA-384, EMS" \
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=foo psk=abc123" \
|
|
|
|
psk_identity=foo psk=abc123" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -5876,8 +5876,8 @@ run_test "PSK callback: raw psk on client, static opaque on server, no callba
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, SHA-384" \
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, SHA-384" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=1 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=foo psk=abc123" \
|
|
|
|
psk_identity=foo psk=abc123" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -5890,9 +5890,9 @@ run_test "PSK callback: raw psk on client, static opaque on server, no callba
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, EMS" \
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, EMS" \
|
|
|
|
"$P_SRV debug_level=3 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls1_2 \
|
|
|
|
"$P_SRV debug_level=3 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA extended_ms=1" \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA extended_ms=1" \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=foo psk=abc123 extended_ms=1" \
|
|
|
|
psk_identity=foo psk=abc123 extended_ms=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
@ -5905,9 +5905,9 @@ run_test "PSK callback: raw psk on client, static opaque on server, no callba
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, EMS, SHA384" \
|
|
|
|
run_test "PSK callback: raw psk on client, static opaque on server, no callback, EMS, SHA384" \
|
|
|
|
"$P_SRV debug_level=3 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls1_2 \
|
|
|
|
"$P_SRV debug_level=3 psk=abc123 psk_identity=foo psk_opaque=1 min_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 extended_ms=1" \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 extended_ms=1" \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=foo psk=abc123 extended_ms=1" \
|
|
|
|
psk_identity=foo psk=abc123 extended_ms=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
@ -5920,8 +5920,8 @@ run_test "PSK callback: raw psk on client, static opaque on server, no callba
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -5934,8 +5934,8 @@ run_test "PSK callback: raw psk on client, no static PSK on server, opaque PS
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, SHA-384" \
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, SHA-384" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384" \
|
|
|
|
"$P_SRV extended_ms=0 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -5948,9 +5948,9 @@ run_test "PSK callback: raw psk on client, no static PSK on server, opaque PS
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, EMS" \
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, EMS" \
|
|
|
|
"$P_SRV debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 \
|
|
|
|
"$P_SRV debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA extended_ms=1" \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA extended_ms=1" \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=abc psk=dead extended_ms=1" \
|
|
|
|
psk_identity=abc psk=dead extended_ms=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
@ -5963,9 +5963,9 @@ run_test "PSK callback: raw psk on client, no static PSK on server, opaque PS
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, EMS, SHA384" \
|
|
|
|
run_test "PSK callback: raw psk on client, no static PSK on server, opaque PSK from callback, EMS, SHA384" \
|
|
|
|
"$P_SRV debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 \
|
|
|
|
"$P_SRV debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 extended_ms=1" \
|
|
|
|
force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 extended_ms=1" \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
"$P_CLI debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-256-CBC-SHA384 \
|
|
|
|
psk_identity=abc psk=dead extended_ms=1" \
|
|
|
|
psk_identity=abc psk=dead extended_ms=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
|
-c "session hash for extended master secret"\
|
|
|
@ -5978,8 +5978,8 @@ run_test "PSK callback: raw psk on client, no static PSK on server, opaque PS
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static raw PSK on server, opaque PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static raw PSK on server, opaque PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -5992,8 +5992,8 @@ run_test "PSK callback: raw psk on client, mismatching static raw PSK on serv
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static opaque PSK on server, opaque PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static opaque PSK on server, opaque PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef psk_list_opaque=1 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -6006,8 +6006,8 @@ run_test "PSK callback: raw psk on client, mismatching static opaque PSK on s
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static opaque PSK on server, raw PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, mismatching static opaque PSK on server, raw PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=foo psk=abc123 debug_level=3 psk_list=abc,dead,def,beef min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -6019,8 +6019,8 @@ run_test "PSK callback: raw psk on client, mismatching static opaque PSK on s
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, id-matching but wrong raw PSK on server, opaque PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, id-matching but wrong raw PSK on server, opaque PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=def psk=abc123 debug_level=3 psk_list=abc,dead,def,beef min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=def psk=abc123 debug_level=3 psk_list=abc,dead,def,beef min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
|
-C "skip PMS generation for opaque PSK"\
|
|
|
@ -6032,8 +6032,8 @@ run_test "PSK callback: raw psk on client, id-matching but wrong raw PSK on s
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
|
|
|
run_test "PSK callback: raw psk on client, matching opaque PSK on server, wrong opaque PSK from callback" \
|
|
|
|
run_test "PSK callback: raw psk on client, matching opaque PSK on server, wrong opaque PSK from callback" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=def psk=beef debug_level=3 psk_list=abc,dead,def,abc123 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_SRV extended_ms=0 psk_opaque=1 psk_identity=def psk=beef debug_level=3 psk_list=abc,dead,def,abc123 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA" \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls1_2 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
"$P_CLI extended_ms=0 debug_level=3 min_version=tls12 force_ciphersuite=TLS-PSK-WITH-AES-128-CBC-SHA \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
psk_identity=def psk=beef" \
|
|
|
|
1 \
|
|
|
|
1 \
|
|
|
|
-s "SSL - Verification of the message MAC failed"
|
|
|
|
-s "SSL - Verification of the message MAC failed"
|
|
|
@ -6220,7 +6220,7 @@ requires_config_enabled MBEDTLS_CAMELLIA_C
|
|
|
|
requires_config_enabled MBEDTLS_AES_C
|
|
|
|
requires_config_enabled MBEDTLS_AES_C
|
|
|
|
run_test "Per-version suites: TLS 1.2" \
|
|
|
|
run_test "Per-version suites: TLS 1.2" \
|
|
|
|
"$P_SRV version_suites=TLS-RSA-WITH-CAMELLIA-128-CBC-SHA,TLS-RSA-WITH-AES-256-CBC-SHA,TLS-RSA-WITH-AES-128-CBC-SHA,TLS-RSA-WITH-AES-128-GCM-SHA256" \
|
|
|
|
"$P_SRV version_suites=TLS-RSA-WITH-CAMELLIA-128-CBC-SHA,TLS-RSA-WITH-AES-256-CBC-SHA,TLS-RSA-WITH-AES-128-CBC-SHA,TLS-RSA-WITH-AES-128-GCM-SHA256" \
|
|
|
|
"$P_CLI force_version=tls1_2" \
|
|
|
|
"$P_CLI force_version=tls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Ciphersuite is TLS-RSA-WITH-AES-128-GCM-SHA256"
|
|
|
|
-c "Ciphersuite is TLS-RSA-WITH-AES-128-GCM-SHA256"
|
|
|
|
|
|
|
|
|
|
|
@ -6387,21 +6387,21 @@ run_test "Small client packet TLS 1.1 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher" \
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
@ -6409,7 +6409,7 @@ run_test "Small client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
@ -6417,21 +6417,21 @@ run_test "Small client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Small client packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher" \
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
@ -6439,7 +6439,7 @@ run_test "Small client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
@ -6447,21 +6447,21 @@ run_test "Small client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Small client packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 AEAD" \
|
|
|
|
run_test "Small client packet TLS 1.2 AEAD" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small client packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
run_test "Small client packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=1 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
|
-s "Read from client: 1 bytes read"
|
|
|
@ -6504,7 +6504,7 @@ run_test "Small client packet DTLS 1.0, without EtM, truncated MAC" \
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
run_test "Small client packet DTLS 1.2" \
|
|
|
|
run_test "Small client packet DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls1_2" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls12" \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6512,7 +6512,7 @@ run_test "Small client packet DTLS 1.2" \
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
run_test "Small client packet DTLS 1.2, without EtM" \
|
|
|
|
run_test "Small client packet DTLS 1.2, without EtM" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls1_2 etm=0" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls12 etm=0" \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6521,7 +6521,7 @@ run_test "Small client packet DTLS 1.2, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet DTLS 1.2, truncated hmac" \
|
|
|
|
run_test "Small client packet DTLS 1.2, truncated hmac" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls12 trunc_hmac=1" \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6530,7 +6530,7 @@ run_test "Small client packet DTLS 1.2, truncated hmac" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small client packet DTLS 1.2, without EtM, truncated MAC" \
|
|
|
|
run_test "Small client packet DTLS 1.2, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1 etm=0" \
|
|
|
|
"$P_SRV dtls=1 force_version=dtls12 trunc_hmac=1 etm=0" \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
"$P_CLI dtls=1 request_size=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6676,21 +6676,21 @@ run_test "Small server packet TLS 1.1 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher" \
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
@ -6698,7 +6698,7 @@ run_test "Small server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
"$P_SRV response_size=1 trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=1 trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
@ -6706,21 +6706,21 @@ run_test "Small server packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Small server packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV response_size=1 trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=1 trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher" \
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
@ -6728,7 +6728,7 @@ run_test "Small server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
@ -6736,21 +6736,21 @@ run_test "Small server packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Small server packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=1 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 AEAD" \
|
|
|
|
run_test "Small server packet TLS 1.2 AEAD" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Small server packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
run_test "Small server packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_SRV response_size=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
|
-c "Read from server: 1 bytes read"
|
|
|
@ -6793,7 +6793,7 @@ run_test "Small server packet DTLS 1.0, without EtM, truncated MAC" \
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
run_test "Small server packet DTLS 1.2" \
|
|
|
|
run_test "Small server packet DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls1_2" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls12" \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6801,7 +6801,7 @@ run_test "Small server packet DTLS 1.2" \
|
|
|
|
|
|
|
|
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
run_test "Small server packet DTLS 1.2, without EtM" \
|
|
|
|
run_test "Small server packet DTLS 1.2, without EtM" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls1_2 etm=0" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls12 etm=0" \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6810,7 +6810,7 @@ run_test "Small server packet DTLS 1.2, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet DTLS 1.2, truncated hmac" \
|
|
|
|
run_test "Small server packet DTLS 1.2, truncated hmac" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls1_2 trunc_hmac=1" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls12 trunc_hmac=1" \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6819,7 +6819,7 @@ run_test "Small server packet DTLS 1.2, truncated hmac" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Small server packet DTLS 1.2, without EtM, truncated MAC" \
|
|
|
|
run_test "Small server packet DTLS 1.2, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls1_2 trunc_hmac=1 etm=0" \
|
|
|
|
"$P_SRV dtls=1 response_size=1 force_version=dtls12 trunc_hmac=1 etm=0" \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
"$P_CLI dtls=1 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -6989,7 +6989,7 @@ run_test "Large client packet TLS 1.1 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher" \
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -6997,14 +6997,14 @@ run_test "Large client packet TLS 1.2 BlockCipher" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 etm=0 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 etm=0 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7013,7 +7013,7 @@ run_test "Large client packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
@ -7021,7 +7021,7 @@ run_test "Large client packet TLS 1.2 BlockCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Large client packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_SRV trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7029,7 +7029,7 @@ run_test "Large client packet TLS 1.2 BlockCipher, without EtM, truncated MAC
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher" \
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7037,7 +7037,7 @@ run_test "Large client packet TLS 1.2 StreamCipher" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
@ -7045,7 +7045,7 @@ run_test "Large client packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
|
-s "Read from client: $MAX_CONTENT_LEN bytes read"
|
|
|
@ -7053,7 +7053,7 @@ run_test "Large client packet TLS 1.2 StreamCipher, truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Large client packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7061,7 +7061,7 @@ run_test "Large client packet TLS 1.2 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 AEAD" \
|
|
|
|
run_test "Large client packet TLS 1.2 AEAD" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7069,7 +7069,7 @@ run_test "Large client packet TLS 1.2 AEAD" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large client packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
run_test "Large client packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_SRV" \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
|
|
|
"$P_CLI request_size=16384 force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
|
-c "16384 bytes written in $(fragments_for_write 16384) fragments" \
|
|
|
@ -7236,14 +7236,14 @@ run_test "Large server packet TLS 1.1 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher" \
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 etm=0 \
|
|
|
|
"$P_CLI force_version=tls12 etm=0 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
@ -7251,7 +7251,7 @@ run_test "Large server packet TLS 1.2 BlockCipher, without EtM" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
force_ciphersuite=TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
@ -7259,7 +7259,7 @@ run_test "Large server packet TLS 1.2 BlockCipher larger MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher truncated MAC" \
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher truncated MAC" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
|
|
|
trunc_hmac=1" \
|
|
|
|
trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -7267,7 +7267,7 @@ run_test "Large server packet TLS 1.2 BlockCipher truncated MAC" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Large server packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV response_size=16384 trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=16384 trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
@ -7275,7 +7275,7 @@ run_test "Large server packet TLS 1.2 BlockCipher, without EtM, truncated MAC
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher" \
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
@ -7283,7 +7283,7 @@ run_test "Large server packet TLS 1.2 StreamCipher" \
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
@ -7292,7 +7292,7 @@ run_test "Large server packet TLS 1.2 StreamCipher, without EtM" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher truncated MAC" \
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher truncated MAC" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
|
|
|
trunc_hmac=1" \
|
|
|
|
trunc_hmac=1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
@ -7301,7 +7301,7 @@ run_test "Large server packet TLS 1.2 StreamCipher truncated MAC" \
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
run_test "Large server packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_SRV response_size=16384 arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
|
-s "16384 bytes written in 1 fragments" \
|
|
|
@ -7309,14 +7309,14 @@ run_test "Large server packet TLS 1.2 StreamCipher, without EtM, truncated MA
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 AEAD" \
|
|
|
|
run_test "Large server packet TLS 1.2 AEAD" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
|
|
|
|
|
|
|
|
run_test "Large server packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
run_test "Large server packet TLS 1.2 AEAD shorter tag" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_SRV response_size=16384" \
|
|
|
|
"$P_CLI force_version=tls1_2 \
|
|
|
|
"$P_CLI force_version=tls12 \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CCM-8" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
|
-c "Read from server: 16384 bytes read"
|
|
|
@ -8799,7 +8799,7 @@ run_test "DTLS fragmenting: gnutls server, DTLS 1.2" \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
mtu=512 force_version=dtls1_2" \
|
|
|
|
mtu=512 force_version=dtls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-C "error"
|
|
|
|
-C "error"
|
|
|
@ -8838,7 +8838,7 @@ run_test "DTLS fragmenting: gnutls client, DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
mtu=512 force_version=dtls1_2" \
|
|
|
|
mtu=512 force_version=dtls12" \
|
|
|
|
"$G_CLI -u --insecure 127.0.0.1" \
|
|
|
|
"$G_CLI -u --insecure 127.0.0.1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "fragmenting handshake message"
|
|
|
|
-s "fragmenting handshake message"
|
|
|
@ -8870,7 +8870,7 @@ run_test "DTLS fragmenting: openssl server, DTLS 1.2" \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
mtu=512 force_version=dtls1_2" \
|
|
|
|
mtu=512 force_version=dtls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-C "error"
|
|
|
|
-C "error"
|
|
|
@ -8899,7 +8899,7 @@ run_test "DTLS fragmenting: openssl client, DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
mtu=512 force_version=dtls1_2" \
|
|
|
|
mtu=512 force_version=dtls12" \
|
|
|
|
"$O_CLI -dtls1_2" \
|
|
|
|
"$O_CLI -dtls1_2" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "fragmenting handshake message"
|
|
|
|
-s "fragmenting handshake message"
|
|
|
@ -8935,7 +8935,7 @@ run_test "DTLS fragmenting: 3d, gnutls server, DTLS 1.2" \
|
|
|
|
"$P_CLI dgram_packing=0 dtls=1 debug_level=2 \
|
|
|
|
"$P_CLI dgram_packing=0 dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls1_2" \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-C "error"
|
|
|
|
-C "error"
|
|
|
@ -8970,7 +8970,7 @@ run_test "DTLS fragmenting: 3d, gnutls client, DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls1_2" \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls12" \
|
|
|
|
"$G_NEXT_CLI -u --insecure 127.0.0.1" \
|
|
|
|
"$G_NEXT_CLI -u --insecure 127.0.0.1" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "fragmenting handshake message"
|
|
|
|
-s "fragmenting handshake message"
|
|
|
@ -9010,7 +9010,7 @@ run_test "DTLS fragmenting: 3d, openssl server, DTLS 1.2" \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
"$P_CLI dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
crt_file=data_files/server8_int-ca2.crt \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
key_file=data_files/server8.key \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls1_2" \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls12" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-c "fragmenting handshake message" \
|
|
|
|
-C "error"
|
|
|
|
-C "error"
|
|
|
@ -9045,7 +9045,7 @@ run_test "DTLS fragmenting: 3d, openssl client, DTLS 1.2" \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
"$P_SRV dtls=1 debug_level=2 \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
crt_file=data_files/server7_int-ca.crt \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
key_file=data_files/server7.key \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls1_2" \
|
|
|
|
hs_timeout=250-60000 mtu=512 force_version=dtls12" \
|
|
|
|
"$O_CLI -dtls1_2" \
|
|
|
|
"$O_CLI -dtls1_2" \
|
|
|
|
0 \
|
|
|
|
0 \
|
|
|
|
-s "fragmenting handshake message"
|
|
|
|
-s "fragmenting handshake message"
|
|
|
|