]> git.ipfire.org Git - thirdparty/openssl.git/blame - test/ssl-tests/14-curves.cnf
Add a test for TLSv1.3 only client sending a correct key_share
[thirdparty/openssl.git] / test / ssl-tests / 14-curves.cnf
CommitLineData
b1b22b0b
KR
1# Generated with generate_ssl_tests.pl
2
7b141d49 3num_tests = 86
9ff5bd61
TM
4
5test-0 = 0-curve-prime256v1
6test-1 = 1-curve-secp384r1
7test-2 = 2-curve-secp521r1
8test-3 = 3-curve-X25519
9test-4 = 4-curve-X448
3f76339a
MC
10test-5 = 5-curve-brainpoolP256r1tls13
11test-6 = 6-curve-brainpoolP384r1tls13
12test-7 = 7-curve-brainpoolP512r1tls13
13test-8 = 8-curve-sect233k1
14test-9 = 9-curve-sect233r1
15test-10 = 10-curve-sect283k1
16test-11 = 11-curve-sect283r1
17test-12 = 12-curve-sect409k1
18test-13 = 13-curve-sect409r1
19test-14 = 14-curve-sect571k1
20test-15 = 15-curve-sect571r1
21test-16 = 16-curve-secp224r1
22test-17 = 17-curve-sect163k1
23test-18 = 18-curve-sect163r2
24test-19 = 19-curve-prime192v1
25test-20 = 20-curve-sect163r1
26test-21 = 21-curve-sect193r1
27test-22 = 22-curve-sect193r2
28test-23 = 23-curve-sect239k1
29test-24 = 24-curve-secp160k1
30test-25 = 25-curve-secp160r1
31test-26 = 26-curve-secp160r2
32test-27 = 27-curve-secp192k1
33test-28 = 28-curve-secp224k1
34test-29 = 29-curve-secp256k1
35test-30 = 30-curve-brainpoolP256r1
36test-31 = 31-curve-brainpoolP384r1
37test-32 = 32-curve-brainpoolP512r1
7b141d49
MC
38test-33 = 33-curve-sect233k1-tls12-in-tls13
39test-34 = 34-curve-sect233r1-tls12-in-tls13
40test-35 = 35-curve-sect283k1-tls12-in-tls13
41test-36 = 36-curve-sect283r1-tls12-in-tls13
42test-37 = 37-curve-sect409k1-tls12-in-tls13
43test-38 = 38-curve-sect409r1-tls12-in-tls13
44test-39 = 39-curve-sect571k1-tls12-in-tls13
45test-40 = 40-curve-sect571r1-tls12-in-tls13
46test-41 = 41-curve-secp224r1-tls12-in-tls13
47test-42 = 42-curve-sect163k1-tls12-in-tls13
48test-43 = 43-curve-sect163r2-tls12-in-tls13
49test-44 = 44-curve-prime192v1-tls12-in-tls13
50test-45 = 45-curve-sect163r1-tls12-in-tls13
51test-46 = 46-curve-sect193r1-tls12-in-tls13
52test-47 = 47-curve-sect193r2-tls12-in-tls13
53test-48 = 48-curve-sect239k1-tls12-in-tls13
54test-49 = 49-curve-secp160k1-tls12-in-tls13
55test-50 = 50-curve-secp160r1-tls12-in-tls13
56test-51 = 51-curve-secp160r2-tls12-in-tls13
57test-52 = 52-curve-secp192k1-tls12-in-tls13
58test-53 = 53-curve-secp224k1-tls12-in-tls13
59test-54 = 54-curve-secp256k1-tls12-in-tls13
60test-55 = 55-curve-brainpoolP256r1-tls12-in-tls13
61test-56 = 56-curve-brainpoolP384r1-tls12-in-tls13
62test-57 = 57-curve-brainpoolP512r1-tls12-in-tls13
63test-58 = 58-curve-sect233k1-tls13
64test-59 = 59-curve-sect233r1-tls13
65test-60 = 60-curve-sect283k1-tls13
66test-61 = 61-curve-sect283r1-tls13
67test-62 = 62-curve-sect409k1-tls13
68test-63 = 63-curve-sect409r1-tls13
69test-64 = 64-curve-sect571k1-tls13
70test-65 = 65-curve-sect571r1-tls13
71test-66 = 66-curve-secp224r1-tls13
72test-67 = 67-curve-sect163k1-tls13
73test-68 = 68-curve-sect163r2-tls13
74test-69 = 69-curve-prime192v1-tls13
75test-70 = 70-curve-sect163r1-tls13
76test-71 = 71-curve-sect193r1-tls13
77test-72 = 72-curve-sect193r2-tls13
78test-73 = 73-curve-sect239k1-tls13
79test-74 = 74-curve-secp160k1-tls13
80test-75 = 75-curve-secp160r1-tls13
81test-76 = 76-curve-secp160r2-tls13
82test-77 = 77-curve-secp192k1-tls13
83test-78 = 78-curve-secp224k1-tls13
84test-79 = 79-curve-secp256k1-tls13
85test-80 = 80-curve-brainpoolP256r1-tls13
86test-81 = 81-curve-brainpoolP384r1-tls13
87test-82 = 82-curve-brainpoolP512r1-tls13
88test-83 = 83-curve-brainpoolP256r1tls13-tls13-in-tls12
89test-84 = 84-curve-brainpoolP384r1tls13-tls13-in-tls12
90test-85 = 85-curve-brainpoolP512r1tls13-tls13-in-tls12
b1b22b0b
KR
91# ===========================================================
92
9ff5bd61
TM
93[0-curve-prime256v1]
94ssl_conf = 0-curve-prime256v1-ssl
b1b22b0b 95
9ff5bd61
TM
96[0-curve-prime256v1-ssl]
97server = 0-curve-prime256v1-server
98client = 0-curve-prime256v1-client
b1b22b0b 99
9ff5bd61 100[0-curve-prime256v1-server]
b1b22b0b 101Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 102CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
103Curves = prime256v1
104MaxProtocol = TLSv1.3
b1b22b0b
KR
105PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
106
9ff5bd61 107[0-curve-prime256v1-client]
61cab650 108CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
109Curves = prime256v1
110MaxProtocol = TLSv1.3
b1b22b0b
KR
111VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
112VerifyMode = Peer
113
114[test-0]
9ff5bd61 115ExpectedProtocol = TLSv1.3
b1b22b0b 116ExpectedResult = Success
9ff5bd61 117ExpectedTmpKeyType = prime256v1
b1b22b0b
KR
118
119
120# ===========================================================
121
9ff5bd61
TM
122[1-curve-secp384r1]
123ssl_conf = 1-curve-secp384r1-ssl
b1b22b0b 124
9ff5bd61
TM
125[1-curve-secp384r1-ssl]
126server = 1-curve-secp384r1-server
127client = 1-curve-secp384r1-client
b1b22b0b 128
9ff5bd61 129[1-curve-secp384r1-server]
b1b22b0b 130Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 131CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
132Curves = secp384r1
133MaxProtocol = TLSv1.3
b1b22b0b
KR
134PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
135
9ff5bd61 136[1-curve-secp384r1-client]
61cab650 137CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
138Curves = secp384r1
139MaxProtocol = TLSv1.3
b1b22b0b
KR
140VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
141VerifyMode = Peer
142
143[test-1]
9ff5bd61 144ExpectedProtocol = TLSv1.3
b1b22b0b 145ExpectedResult = Success
9ff5bd61 146ExpectedTmpKeyType = secp384r1
b1b22b0b
KR
147
148
149# ===========================================================
150
9ff5bd61
TM
151[2-curve-secp521r1]
152ssl_conf = 2-curve-secp521r1-ssl
b1b22b0b 153
9ff5bd61
TM
154[2-curve-secp521r1-ssl]
155server = 2-curve-secp521r1-server
156client = 2-curve-secp521r1-client
b1b22b0b 157
9ff5bd61 158[2-curve-secp521r1-server]
b1b22b0b 159Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 160CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
161Curves = secp521r1
162MaxProtocol = TLSv1.3
b1b22b0b
KR
163PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
164
9ff5bd61 165[2-curve-secp521r1-client]
61cab650 166CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
167Curves = secp521r1
168MaxProtocol = TLSv1.3
b1b22b0b
KR
169VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
170VerifyMode = Peer
171
172[test-2]
9ff5bd61 173ExpectedProtocol = TLSv1.3
b1b22b0b 174ExpectedResult = Success
9ff5bd61 175ExpectedTmpKeyType = secp521r1
b1b22b0b
KR
176
177
178# ===========================================================
179
9ff5bd61
TM
180[3-curve-X25519]
181ssl_conf = 3-curve-X25519-ssl
b1b22b0b 182
9ff5bd61
TM
183[3-curve-X25519-ssl]
184server = 3-curve-X25519-server
185client = 3-curve-X25519-client
b1b22b0b 186
9ff5bd61 187[3-curve-X25519-server]
b1b22b0b 188Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 189CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
190Curves = X25519
191MaxProtocol = TLSv1.3
b1b22b0b
KR
192PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
193
9ff5bd61 194[3-curve-X25519-client]
61cab650 195CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
196Curves = X25519
197MaxProtocol = TLSv1.3
b1b22b0b
KR
198VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
199VerifyMode = Peer
200
201[test-3]
9ff5bd61 202ExpectedProtocol = TLSv1.3
b1b22b0b 203ExpectedResult = Success
9ff5bd61 204ExpectedTmpKeyType = X25519
b1b22b0b
KR
205
206
207# ===========================================================
208
9ff5bd61
TM
209[4-curve-X448]
210ssl_conf = 4-curve-X448-ssl
b1b22b0b 211
9ff5bd61
TM
212[4-curve-X448-ssl]
213server = 4-curve-X448-server
214client = 4-curve-X448-client
b1b22b0b 215
9ff5bd61 216[4-curve-X448-server]
b1b22b0b 217Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 218CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
219Curves = X448
220MaxProtocol = TLSv1.3
b1b22b0b
KR
221PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
222
9ff5bd61 223[4-curve-X448-client]
61cab650 224CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
225Curves = X448
226MaxProtocol = TLSv1.3
b1b22b0b
KR
227VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
228VerifyMode = Peer
229
230[test-4]
9ff5bd61 231ExpectedProtocol = TLSv1.3
b1b22b0b 232ExpectedResult = Success
9ff5bd61 233ExpectedTmpKeyType = X448
b1b22b0b
KR
234
235
236# ===========================================================
237
3f76339a
MC
238[5-curve-brainpoolP256r1tls13]
239ssl_conf = 5-curve-brainpoolP256r1tls13-ssl
b1b22b0b 240
3f76339a
MC
241[5-curve-brainpoolP256r1tls13-ssl]
242server = 5-curve-brainpoolP256r1tls13-server
243client = 5-curve-brainpoolP256r1tls13-client
b1b22b0b 244
3f76339a
MC
245[5-curve-brainpoolP256r1tls13-server]
246Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
247CipherString = DEFAULT@SECLEVEL=1
248Curves = brainpoolP256r1tls13
249MaxProtocol = TLSv1.3
250PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
251
252[5-curve-brainpoolP256r1tls13-client]
253CipherString = ECDHE@SECLEVEL=1
254Curves = brainpoolP256r1tls13
255MaxProtocol = TLSv1.3
256VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
257VerifyMode = Peer
258
259[test-5]
260ExpectedProtocol = TLSv1.3
261ExpectedResult = Success
262ExpectedTmpKeyType = brainpoolP256r1tls13
263
264
265# ===========================================================
266
267[6-curve-brainpoolP384r1tls13]
268ssl_conf = 6-curve-brainpoolP384r1tls13-ssl
269
270[6-curve-brainpoolP384r1tls13-ssl]
271server = 6-curve-brainpoolP384r1tls13-server
272client = 6-curve-brainpoolP384r1tls13-client
273
274[6-curve-brainpoolP384r1tls13-server]
275Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
276CipherString = DEFAULT@SECLEVEL=1
277Curves = brainpoolP384r1tls13
278MaxProtocol = TLSv1.3
279PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
280
281[6-curve-brainpoolP384r1tls13-client]
282CipherString = ECDHE@SECLEVEL=1
283Curves = brainpoolP384r1tls13
284MaxProtocol = TLSv1.3
285VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
286VerifyMode = Peer
287
288[test-6]
289ExpectedProtocol = TLSv1.3
290ExpectedResult = Success
291ExpectedTmpKeyType = brainpoolP384r1tls13
292
293
294# ===========================================================
295
296[7-curve-brainpoolP512r1tls13]
297ssl_conf = 7-curve-brainpoolP512r1tls13-ssl
298
299[7-curve-brainpoolP512r1tls13-ssl]
300server = 7-curve-brainpoolP512r1tls13-server
301client = 7-curve-brainpoolP512r1tls13-client
302
303[7-curve-brainpoolP512r1tls13-server]
304Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
305CipherString = DEFAULT@SECLEVEL=1
306Curves = brainpoolP512r1tls13
307MaxProtocol = TLSv1.3
308PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
309
310[7-curve-brainpoolP512r1tls13-client]
311CipherString = ECDHE@SECLEVEL=1
312Curves = brainpoolP512r1tls13
313MaxProtocol = TLSv1.3
314VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
315VerifyMode = Peer
316
317[test-7]
318ExpectedProtocol = TLSv1.3
319ExpectedResult = Success
320ExpectedTmpKeyType = brainpoolP512r1tls13
321
322
323# ===========================================================
324
325[8-curve-sect233k1]
326ssl_conf = 8-curve-sect233k1-ssl
327
328[8-curve-sect233k1-ssl]
329server = 8-curve-sect233k1-server
330client = 8-curve-sect233k1-client
331
332[8-curve-sect233k1-server]
b1b22b0b 333Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 334CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
335Curves = sect233k1
336MaxProtocol = TLSv1.3
b1b22b0b
KR
337PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
338
3f76339a 339[8-curve-sect233k1-client]
61cab650 340CipherString = ECDHE@SECLEVEL=1
9ff5bd61 341Curves = sect233k1
aafec89c 342MaxProtocol = TLSv1.2
b1b22b0b
KR
343VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
344VerifyMode = Peer
345
3f76339a 346[test-8]
9ff5bd61 347ExpectedProtocol = TLSv1.2
b1b22b0b 348ExpectedResult = Success
9ff5bd61 349ExpectedTmpKeyType = sect233k1
b1b22b0b
KR
350
351
352# ===========================================================
353
3f76339a
MC
354[9-curve-sect233r1]
355ssl_conf = 9-curve-sect233r1-ssl
b1b22b0b 356
3f76339a
MC
357[9-curve-sect233r1-ssl]
358server = 9-curve-sect233r1-server
359client = 9-curve-sect233r1-client
b1b22b0b 360
3f76339a 361[9-curve-sect233r1-server]
b1b22b0b 362Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 363CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
364Curves = sect233r1
365MaxProtocol = TLSv1.3
b1b22b0b
KR
366PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
367
3f76339a 368[9-curve-sect233r1-client]
61cab650 369CipherString = ECDHE@SECLEVEL=1
9ff5bd61 370Curves = sect233r1
aafec89c 371MaxProtocol = TLSv1.2
b1b22b0b
KR
372VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
373VerifyMode = Peer
374
3f76339a 375[test-9]
9ff5bd61 376ExpectedProtocol = TLSv1.2
b1b22b0b 377ExpectedResult = Success
9ff5bd61 378ExpectedTmpKeyType = sect233r1
b1b22b0b
KR
379
380
381# ===========================================================
382
3f76339a
MC
383[10-curve-sect283k1]
384ssl_conf = 10-curve-sect283k1-ssl
b1b22b0b 385
3f76339a
MC
386[10-curve-sect283k1-ssl]
387server = 10-curve-sect283k1-server
388client = 10-curve-sect283k1-client
b1b22b0b 389
3f76339a 390[10-curve-sect283k1-server]
b1b22b0b 391Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 392CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
393Curves = sect283k1
394MaxProtocol = TLSv1.3
b1b22b0b
KR
395PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
396
3f76339a 397[10-curve-sect283k1-client]
61cab650 398CipherString = ECDHE@SECLEVEL=1
9ff5bd61 399Curves = sect283k1
aafec89c 400MaxProtocol = TLSv1.2
b1b22b0b
KR
401VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
402VerifyMode = Peer
403
3f76339a 404[test-10]
9ff5bd61 405ExpectedProtocol = TLSv1.2
b1b22b0b 406ExpectedResult = Success
9ff5bd61 407ExpectedTmpKeyType = sect283k1
b1b22b0b
KR
408
409
410# ===========================================================
411
3f76339a
MC
412[11-curve-sect283r1]
413ssl_conf = 11-curve-sect283r1-ssl
b1b22b0b 414
3f76339a
MC
415[11-curve-sect283r1-ssl]
416server = 11-curve-sect283r1-server
417client = 11-curve-sect283r1-client
b1b22b0b 418
3f76339a 419[11-curve-sect283r1-server]
b1b22b0b 420Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 421CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
422Curves = sect283r1
423MaxProtocol = TLSv1.3
b1b22b0b
KR
424PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
425
3f76339a 426[11-curve-sect283r1-client]
61cab650 427CipherString = ECDHE@SECLEVEL=1
9ff5bd61 428Curves = sect283r1
aafec89c 429MaxProtocol = TLSv1.2
b1b22b0b
KR
430VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
431VerifyMode = Peer
432
3f76339a 433[test-11]
9ff5bd61 434ExpectedProtocol = TLSv1.2
b1b22b0b 435ExpectedResult = Success
9ff5bd61 436ExpectedTmpKeyType = sect283r1
b1b22b0b
KR
437
438
439# ===========================================================
440
3f76339a
MC
441[12-curve-sect409k1]
442ssl_conf = 12-curve-sect409k1-ssl
b1b22b0b 443
3f76339a
MC
444[12-curve-sect409k1-ssl]
445server = 12-curve-sect409k1-server
446client = 12-curve-sect409k1-client
b1b22b0b 447
3f76339a 448[12-curve-sect409k1-server]
b1b22b0b 449Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 450CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
451Curves = sect409k1
452MaxProtocol = TLSv1.3
b1b22b0b
KR
453PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
454
3f76339a 455[12-curve-sect409k1-client]
61cab650 456CipherString = ECDHE@SECLEVEL=1
9ff5bd61 457Curves = sect409k1
aafec89c 458MaxProtocol = TLSv1.2
b1b22b0b
KR
459VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
460VerifyMode = Peer
461
3f76339a 462[test-12]
9ff5bd61 463ExpectedProtocol = TLSv1.2
b1b22b0b 464ExpectedResult = Success
9ff5bd61 465ExpectedTmpKeyType = sect409k1
b1b22b0b
KR
466
467
468# ===========================================================
469
3f76339a
MC
470[13-curve-sect409r1]
471ssl_conf = 13-curve-sect409r1-ssl
b1b22b0b 472
3f76339a
MC
473[13-curve-sect409r1-ssl]
474server = 13-curve-sect409r1-server
475client = 13-curve-sect409r1-client
b1b22b0b 476
3f76339a 477[13-curve-sect409r1-server]
b1b22b0b 478Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 479CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
480Curves = sect409r1
481MaxProtocol = TLSv1.3
b1b22b0b
KR
482PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
483
3f76339a 484[13-curve-sect409r1-client]
61cab650 485CipherString = ECDHE@SECLEVEL=1
9ff5bd61 486Curves = sect409r1
aafec89c 487MaxProtocol = TLSv1.2
b1b22b0b
KR
488VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
489VerifyMode = Peer
490
3f76339a 491[test-13]
9ff5bd61 492ExpectedProtocol = TLSv1.2
b1b22b0b 493ExpectedResult = Success
9ff5bd61 494ExpectedTmpKeyType = sect409r1
b1b22b0b
KR
495
496
497# ===========================================================
498
3f76339a
MC
499[14-curve-sect571k1]
500ssl_conf = 14-curve-sect571k1-ssl
b1b22b0b 501
3f76339a
MC
502[14-curve-sect571k1-ssl]
503server = 14-curve-sect571k1-server
504client = 14-curve-sect571k1-client
b1b22b0b 505
3f76339a 506[14-curve-sect571k1-server]
b1b22b0b 507Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 508CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
509Curves = sect571k1
510MaxProtocol = TLSv1.3
b1b22b0b
KR
511PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
512
3f76339a 513[14-curve-sect571k1-client]
61cab650 514CipherString = ECDHE@SECLEVEL=1
9ff5bd61 515Curves = sect571k1
aafec89c 516MaxProtocol = TLSv1.2
b1b22b0b
KR
517VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
518VerifyMode = Peer
519
3f76339a 520[test-14]
9ff5bd61 521ExpectedProtocol = TLSv1.2
b1b22b0b 522ExpectedResult = Success
9ff5bd61 523ExpectedTmpKeyType = sect571k1
b1b22b0b
KR
524
525
526# ===========================================================
527
3f76339a
MC
528[15-curve-sect571r1]
529ssl_conf = 15-curve-sect571r1-ssl
b1b22b0b 530
3f76339a
MC
531[15-curve-sect571r1-ssl]
532server = 15-curve-sect571r1-server
533client = 15-curve-sect571r1-client
b1b22b0b 534
3f76339a 535[15-curve-sect571r1-server]
b1b22b0b 536Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 537CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
538Curves = sect571r1
539MaxProtocol = TLSv1.3
b1b22b0b
KR
540PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
541
3f76339a 542[15-curve-sect571r1-client]
61cab650 543CipherString = ECDHE@SECLEVEL=1
9ff5bd61 544Curves = sect571r1
aafec89c 545MaxProtocol = TLSv1.2
b1b22b0b
KR
546VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
547VerifyMode = Peer
548
3f76339a 549[test-15]
9ff5bd61 550ExpectedProtocol = TLSv1.2
b1b22b0b 551ExpectedResult = Success
9ff5bd61 552ExpectedTmpKeyType = sect571r1
b1b22b0b
KR
553
554
555# ===========================================================
556
3f76339a
MC
557[16-curve-secp224r1]
558ssl_conf = 16-curve-secp224r1-ssl
b1b22b0b 559
3f76339a
MC
560[16-curve-secp224r1-ssl]
561server = 16-curve-secp224r1-server
562client = 16-curve-secp224r1-client
b1b22b0b 563
3f76339a 564[16-curve-secp224r1-server]
b1b22b0b 565Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 566CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
567Curves = secp224r1
568MaxProtocol = TLSv1.3
b1b22b0b
KR
569PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
570
3f76339a 571[16-curve-secp224r1-client]
61cab650 572CipherString = ECDHE@SECLEVEL=1
9ff5bd61 573Curves = secp224r1
aafec89c 574MaxProtocol = TLSv1.2
b1b22b0b
KR
575VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
576VerifyMode = Peer
577
3f76339a 578[test-16]
9ff5bd61 579ExpectedProtocol = TLSv1.2
b1b22b0b 580ExpectedResult = Success
9ff5bd61 581ExpectedTmpKeyType = secp224r1
b1b22b0b
KR
582
583
584# ===========================================================
585
3f76339a
MC
586[17-curve-sect163k1]
587ssl_conf = 17-curve-sect163k1-ssl
b1b22b0b 588
3f76339a
MC
589[17-curve-sect163k1-ssl]
590server = 17-curve-sect163k1-server
591client = 17-curve-sect163k1-client
b1b22b0b 592
3f76339a 593[17-curve-sect163k1-server]
b1b22b0b 594Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 595CipherString = DEFAULT@SECLEVEL=1
341c3e7f 596Curves = sect163k1
9ff5bd61 597MaxProtocol = TLSv1.3
b1b22b0b
KR
598PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
599
3f76339a 600[17-curve-sect163k1-client]
61cab650 601CipherString = ECDHE@SECLEVEL=1
341c3e7f 602Curves = sect163k1
aafec89c 603MaxProtocol = TLSv1.2
b1b22b0b
KR
604VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
605VerifyMode = Peer
606
3f76339a 607[test-17]
9ff5bd61 608ExpectedProtocol = TLSv1.2
b1b22b0b 609ExpectedResult = Success
341c3e7f 610ExpectedTmpKeyType = sect163k1
b1b22b0b
KR
611
612
613# ===========================================================
614
3f76339a
MC
615[18-curve-sect163r2]
616ssl_conf = 18-curve-sect163r2-ssl
b1b22b0b 617
3f76339a
MC
618[18-curve-sect163r2-ssl]
619server = 18-curve-sect163r2-server
620client = 18-curve-sect163r2-client
b1b22b0b 621
3f76339a 622[18-curve-sect163r2-server]
b1b22b0b 623Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 624CipherString = DEFAULT@SECLEVEL=1
341c3e7f 625Curves = sect163r2
9ff5bd61 626MaxProtocol = TLSv1.3
b1b22b0b
KR
627PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
628
3f76339a 629[18-curve-sect163r2-client]
61cab650 630CipherString = ECDHE@SECLEVEL=1
341c3e7f 631Curves = sect163r2
aafec89c 632MaxProtocol = TLSv1.2
b1b22b0b
KR
633VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
634VerifyMode = Peer
635
3f76339a 636[test-18]
9ff5bd61 637ExpectedProtocol = TLSv1.2
b1b22b0b 638ExpectedResult = Success
341c3e7f 639ExpectedTmpKeyType = sect163r2
b1b22b0b
KR
640
641
642# ===========================================================
643
3f76339a
MC
644[19-curve-prime192v1]
645ssl_conf = 19-curve-prime192v1-ssl
b1b22b0b 646
3f76339a
MC
647[19-curve-prime192v1-ssl]
648server = 19-curve-prime192v1-server
649client = 19-curve-prime192v1-client
b1b22b0b 650
3f76339a 651[19-curve-prime192v1-server]
b1b22b0b 652Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 653CipherString = DEFAULT@SECLEVEL=1
341c3e7f 654Curves = prime192v1
9ff5bd61 655MaxProtocol = TLSv1.3
b1b22b0b
KR
656PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
657
3f76339a 658[19-curve-prime192v1-client]
61cab650 659CipherString = ECDHE@SECLEVEL=1
341c3e7f 660Curves = prime192v1
aafec89c 661MaxProtocol = TLSv1.2
b1b22b0b
KR
662VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
663VerifyMode = Peer
664
3f76339a 665[test-19]
9ff5bd61 666ExpectedProtocol = TLSv1.2
b1b22b0b 667ExpectedResult = Success
341c3e7f 668ExpectedTmpKeyType = prime192v1
b1b22b0b
KR
669
670
671# ===========================================================
672
3f76339a
MC
673[20-curve-sect163r1]
674ssl_conf = 20-curve-sect163r1-ssl
b1b22b0b 675
3f76339a
MC
676[20-curve-sect163r1-ssl]
677server = 20-curve-sect163r1-server
678client = 20-curve-sect163r1-client
b1b22b0b 679
3f76339a 680[20-curve-sect163r1-server]
b1b22b0b 681Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 682CipherString = DEFAULT@SECLEVEL=1
682bc861 683Curves = sect163r1
9ff5bd61 684MaxProtocol = TLSv1.3
b1b22b0b
KR
685PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
686
3f76339a 687[20-curve-sect163r1-client]
61cab650 688CipherString = ECDHE@SECLEVEL=1
682bc861 689Curves = sect163r1
aafec89c 690MaxProtocol = TLSv1.2
b1b22b0b
KR
691VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
692VerifyMode = Peer
693
3f76339a 694[test-20]
9ff5bd61 695ExpectedProtocol = TLSv1.2
b1b22b0b 696ExpectedResult = Success
682bc861 697ExpectedTmpKeyType = sect163r1
b1b22b0b
KR
698
699
700# ===========================================================
701
3f76339a
MC
702[21-curve-sect193r1]
703ssl_conf = 21-curve-sect193r1-ssl
b1b22b0b 704
3f76339a
MC
705[21-curve-sect193r1-ssl]
706server = 21-curve-sect193r1-server
707client = 21-curve-sect193r1-client
b1b22b0b 708
3f76339a 709[21-curve-sect193r1-server]
b1b22b0b 710Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 711CipherString = DEFAULT@SECLEVEL=1
682bc861 712Curves = sect193r1
9ff5bd61 713MaxProtocol = TLSv1.3
b1b22b0b
KR
714PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
715
3f76339a 716[21-curve-sect193r1-client]
61cab650 717CipherString = ECDHE@SECLEVEL=1
682bc861 718Curves = sect193r1
aafec89c 719MaxProtocol = TLSv1.2
b1b22b0b
KR
720VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
721VerifyMode = Peer
722
3f76339a 723[test-21]
9ff5bd61 724ExpectedProtocol = TLSv1.2
b1b22b0b 725ExpectedResult = Success
682bc861 726ExpectedTmpKeyType = sect193r1
b1b22b0b
KR
727
728
729# ===========================================================
730
3f76339a
MC
731[22-curve-sect193r2]
732ssl_conf = 22-curve-sect193r2-ssl
b1b22b0b 733
3f76339a
MC
734[22-curve-sect193r2-ssl]
735server = 22-curve-sect193r2-server
736client = 22-curve-sect193r2-client
b1b22b0b 737
3f76339a 738[22-curve-sect193r2-server]
b1b22b0b 739Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 740CipherString = DEFAULT@SECLEVEL=1
682bc861 741Curves = sect193r2
9ff5bd61 742MaxProtocol = TLSv1.3
b1b22b0b
KR
743PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
744
3f76339a 745[22-curve-sect193r2-client]
61cab650 746CipherString = ECDHE@SECLEVEL=1
682bc861 747Curves = sect193r2
aafec89c 748MaxProtocol = TLSv1.2
b1b22b0b
KR
749VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
750VerifyMode = Peer
751
3f76339a 752[test-22]
9ff5bd61 753ExpectedProtocol = TLSv1.2
b1b22b0b 754ExpectedResult = Success
682bc861 755ExpectedTmpKeyType = sect193r2
b1b22b0b
KR
756
757
758# ===========================================================
759
3f76339a
MC
760[23-curve-sect239k1]
761ssl_conf = 23-curve-sect239k1-ssl
b1b22b0b 762
3f76339a
MC
763[23-curve-sect239k1-ssl]
764server = 23-curve-sect239k1-server
765client = 23-curve-sect239k1-client
b1b22b0b 766
3f76339a 767[23-curve-sect239k1-server]
b1b22b0b 768Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 769CipherString = DEFAULT@SECLEVEL=1
682bc861 770Curves = sect239k1
9ff5bd61 771MaxProtocol = TLSv1.3
b1b22b0b
KR
772PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
773
3f76339a 774[23-curve-sect239k1-client]
61cab650 775CipherString = ECDHE@SECLEVEL=1
682bc861 776Curves = sect239k1
aafec89c 777MaxProtocol = TLSv1.2
b1b22b0b
KR
778VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
779VerifyMode = Peer
780
3f76339a 781[test-23]
9ff5bd61 782ExpectedProtocol = TLSv1.2
b1b22b0b 783ExpectedResult = Success
682bc861 784ExpectedTmpKeyType = sect239k1
b1b22b0b
KR
785
786
787# ===========================================================
788
3f76339a
MC
789[24-curve-secp160k1]
790ssl_conf = 24-curve-secp160k1-ssl
b1b22b0b 791
3f76339a
MC
792[24-curve-secp160k1-ssl]
793server = 24-curve-secp160k1-server
794client = 24-curve-secp160k1-client
b1b22b0b 795
3f76339a 796[24-curve-secp160k1-server]
b1b22b0b 797Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 798CipherString = DEFAULT@SECLEVEL=1
682bc861 799Curves = secp160k1
9ff5bd61 800MaxProtocol = TLSv1.3
b1b22b0b
KR
801PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
802
3f76339a 803[24-curve-secp160k1-client]
61cab650 804CipherString = ECDHE@SECLEVEL=1
682bc861 805Curves = secp160k1
aafec89c 806MaxProtocol = TLSv1.2
b1b22b0b
KR
807VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
808VerifyMode = Peer
809
3f76339a 810[test-24]
9ff5bd61 811ExpectedProtocol = TLSv1.2
b1b22b0b 812ExpectedResult = Success
682bc861 813ExpectedTmpKeyType = secp160k1
b1b22b0b
KR
814
815
816# ===========================================================
817
3f76339a
MC
818[25-curve-secp160r1]
819ssl_conf = 25-curve-secp160r1-ssl
b1b22b0b 820
3f76339a
MC
821[25-curve-secp160r1-ssl]
822server = 25-curve-secp160r1-server
823client = 25-curve-secp160r1-client
b1b22b0b 824
3f76339a 825[25-curve-secp160r1-server]
b1b22b0b 826Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 827CipherString = DEFAULT@SECLEVEL=1
682bc861 828Curves = secp160r1
9ff5bd61 829MaxProtocol = TLSv1.3
b1b22b0b
KR
830PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
831
3f76339a 832[25-curve-secp160r1-client]
61cab650 833CipherString = ECDHE@SECLEVEL=1
682bc861 834Curves = secp160r1
aafec89c 835MaxProtocol = TLSv1.2
b1b22b0b
KR
836VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
837VerifyMode = Peer
838
3f76339a 839[test-25]
9ff5bd61 840ExpectedProtocol = TLSv1.2
b1b22b0b 841ExpectedResult = Success
682bc861 842ExpectedTmpKeyType = secp160r1
b1b22b0b
KR
843
844
845# ===========================================================
846
3f76339a
MC
847[26-curve-secp160r2]
848ssl_conf = 26-curve-secp160r2-ssl
b1b22b0b 849
3f76339a
MC
850[26-curve-secp160r2-ssl]
851server = 26-curve-secp160r2-server
852client = 26-curve-secp160r2-client
b1b22b0b 853
3f76339a 854[26-curve-secp160r2-server]
b1b22b0b 855Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 856CipherString = DEFAULT@SECLEVEL=1
682bc861 857Curves = secp160r2
9ff5bd61 858MaxProtocol = TLSv1.3
b1b22b0b
KR
859PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
860
3f76339a 861[26-curve-secp160r2-client]
61cab650 862CipherString = ECDHE@SECLEVEL=1
682bc861 863Curves = secp160r2
aafec89c 864MaxProtocol = TLSv1.2
b1b22b0b
KR
865VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
866VerifyMode = Peer
867
3f76339a 868[test-26]
9ff5bd61 869ExpectedProtocol = TLSv1.2
b1b22b0b 870ExpectedResult = Success
682bc861 871ExpectedTmpKeyType = secp160r2
b1b22b0b
KR
872
873
874# ===========================================================
875
3f76339a
MC
876[27-curve-secp192k1]
877ssl_conf = 27-curve-secp192k1-ssl
b1b22b0b 878
3f76339a
MC
879[27-curve-secp192k1-ssl]
880server = 27-curve-secp192k1-server
881client = 27-curve-secp192k1-client
b1b22b0b 882
3f76339a 883[27-curve-secp192k1-server]
b1b22b0b 884Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 885CipherString = DEFAULT@SECLEVEL=1
682bc861 886Curves = secp192k1
9ff5bd61 887MaxProtocol = TLSv1.3
b1b22b0b
KR
888PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
889
3f76339a 890[27-curve-secp192k1-client]
61cab650 891CipherString = ECDHE@SECLEVEL=1
682bc861 892Curves = secp192k1
aafec89c 893MaxProtocol = TLSv1.2
b1b22b0b
KR
894VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
895VerifyMode = Peer
896
3f76339a 897[test-27]
9ff5bd61 898ExpectedProtocol = TLSv1.2
b1b22b0b 899ExpectedResult = Success
682bc861 900ExpectedTmpKeyType = secp192k1
b1b22b0b
KR
901
902
903# ===========================================================
904
3f76339a
MC
905[28-curve-secp224k1]
906ssl_conf = 28-curve-secp224k1-ssl
b1b22b0b 907
3f76339a
MC
908[28-curve-secp224k1-ssl]
909server = 28-curve-secp224k1-server
910client = 28-curve-secp224k1-client
b1b22b0b 911
3f76339a 912[28-curve-secp224k1-server]
b1b22b0b 913Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 914CipherString = DEFAULT@SECLEVEL=1
682bc861 915Curves = secp224k1
9ff5bd61 916MaxProtocol = TLSv1.3
b1b22b0b
KR
917PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
918
3f76339a 919[28-curve-secp224k1-client]
61cab650 920CipherString = ECDHE@SECLEVEL=1
682bc861 921Curves = secp224k1
aafec89c 922MaxProtocol = TLSv1.2
b1b22b0b
KR
923VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
924VerifyMode = Peer
925
3f76339a 926[test-28]
9ff5bd61 927ExpectedProtocol = TLSv1.2
b1b22b0b 928ExpectedResult = Success
682bc861 929ExpectedTmpKeyType = secp224k1
b1b22b0b
KR
930
931
932# ===========================================================
933
3f76339a
MC
934[29-curve-secp256k1]
935ssl_conf = 29-curve-secp256k1-ssl
b1b22b0b 936
3f76339a
MC
937[29-curve-secp256k1-ssl]
938server = 29-curve-secp256k1-server
939client = 29-curve-secp256k1-client
b1b22b0b 940
3f76339a 941[29-curve-secp256k1-server]
b1b22b0b 942Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 943CipherString = DEFAULT@SECLEVEL=1
682bc861 944Curves = secp256k1
9ff5bd61 945MaxProtocol = TLSv1.3
b1b22b0b
KR
946PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
947
3f76339a 948[29-curve-secp256k1-client]
61cab650 949CipherString = ECDHE@SECLEVEL=1
682bc861 950Curves = secp256k1
aafec89c 951MaxProtocol = TLSv1.2
b1b22b0b
KR
952VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
953VerifyMode = Peer
954
3f76339a 955[test-29]
9ff5bd61 956ExpectedProtocol = TLSv1.2
b1b22b0b 957ExpectedResult = Success
682bc861 958ExpectedTmpKeyType = secp256k1
b1b22b0b
KR
959
960
961# ===========================================================
962
3f76339a
MC
963[30-curve-brainpoolP256r1]
964ssl_conf = 30-curve-brainpoolP256r1-ssl
b1b22b0b 965
3f76339a
MC
966[30-curve-brainpoolP256r1-ssl]
967server = 30-curve-brainpoolP256r1-server
968client = 30-curve-brainpoolP256r1-client
b1b22b0b 969
3f76339a 970[30-curve-brainpoolP256r1-server]
b1b22b0b 971Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 972CipherString = DEFAULT@SECLEVEL=1
682bc861 973Curves = brainpoolP256r1
9ff5bd61 974MaxProtocol = TLSv1.3
b1b22b0b
KR
975PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
976
3f76339a 977[30-curve-brainpoolP256r1-client]
61cab650 978CipherString = ECDHE@SECLEVEL=1
682bc861 979Curves = brainpoolP256r1
aafec89c 980MaxProtocol = TLSv1.2
b1b22b0b
KR
981VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
982VerifyMode = Peer
983
3f76339a 984[test-30]
9ff5bd61 985ExpectedProtocol = TLSv1.2
b1b22b0b 986ExpectedResult = Success
682bc861 987ExpectedTmpKeyType = brainpoolP256r1
b1b22b0b
KR
988
989
990# ===========================================================
991
3f76339a
MC
992[31-curve-brainpoolP384r1]
993ssl_conf = 31-curve-brainpoolP384r1-ssl
b1b22b0b 994
3f76339a
MC
995[31-curve-brainpoolP384r1-ssl]
996server = 31-curve-brainpoolP384r1-server
997client = 31-curve-brainpoolP384r1-client
b1b22b0b 998
3f76339a 999[31-curve-brainpoolP384r1-server]
b1b22b0b 1000Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1001CipherString = DEFAULT@SECLEVEL=1
682bc861 1002Curves = brainpoolP384r1
9ff5bd61 1003MaxProtocol = TLSv1.3
b1b22b0b
KR
1004PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1005
3f76339a 1006[31-curve-brainpoolP384r1-client]
61cab650 1007CipherString = ECDHE@SECLEVEL=1
682bc861 1008Curves = brainpoolP384r1
aafec89c 1009MaxProtocol = TLSv1.2
b1b22b0b
KR
1010VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1011VerifyMode = Peer
1012
3f76339a 1013[test-31]
9ff5bd61 1014ExpectedProtocol = TLSv1.2
b1b22b0b 1015ExpectedResult = Success
682bc861 1016ExpectedTmpKeyType = brainpoolP384r1
b1b22b0b
KR
1017
1018
fe93b010
MC
1019# ===========================================================
1020
3f76339a
MC
1021[32-curve-brainpoolP512r1]
1022ssl_conf = 32-curve-brainpoolP512r1-ssl
fe93b010 1023
3f76339a
MC
1024[32-curve-brainpoolP512r1-ssl]
1025server = 32-curve-brainpoolP512r1-server
1026client = 32-curve-brainpoolP512r1-client
fe93b010 1027
3f76339a 1028[32-curve-brainpoolP512r1-server]
fe93b010 1029Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1030CipherString = DEFAULT@SECLEVEL=1
682bc861 1031Curves = brainpoolP512r1
9ff5bd61 1032MaxProtocol = TLSv1.3
fe93b010
MC
1033PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1034
3f76339a 1035[32-curve-brainpoolP512r1-client]
61cab650 1036CipherString = ECDHE@SECLEVEL=1
682bc861 1037Curves = brainpoolP512r1
fe93b010
MC
1038MaxProtocol = TLSv1.2
1039VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1040VerifyMode = Peer
1041
3f76339a 1042[test-32]
9ff5bd61 1043ExpectedProtocol = TLSv1.2
fe93b010 1044ExpectedResult = Success
682bc861 1045ExpectedTmpKeyType = brainpoolP512r1
fe93b010
MC
1046
1047
9ff5bd61
TM
1048# ===========================================================
1049
7b141d49
MC
1050[33-curve-sect233k1-tls12-in-tls13]
1051ssl_conf = 33-curve-sect233k1-tls12-in-tls13-ssl
9ff5bd61 1052
7b141d49
MC
1053[33-curve-sect233k1-tls12-in-tls13-ssl]
1054server = 33-curve-sect233k1-tls12-in-tls13-server
1055client = 33-curve-sect233k1-tls12-in-tls13-client
9ff5bd61 1056
7b141d49
MC
1057[33-curve-sect233k1-tls12-in-tls13-server]
1058Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1059CipherString = DEFAULT@SECLEVEL=1
1060Curves = sect233k1:P-256
1061MaxProtocol = TLSv1.3
1062PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1063
1064[33-curve-sect233k1-tls12-in-tls13-client]
1065CipherString = ECDHE@SECLEVEL=1
1066Curves = sect233k1:P-256
1067MaxProtocol = TLSv1.3
1068MinProtocol = TLSv1.3
1069VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1070VerifyMode = Peer
1071
1072[test-33]
1073ExpectedProtocol = TLSv1.3
1074ExpectedResult = Success
1075ExpectedTmpKeyType = P-256
1076
1077
1078# ===========================================================
1079
1080[34-curve-sect233r1-tls12-in-tls13]
1081ssl_conf = 34-curve-sect233r1-tls12-in-tls13-ssl
1082
1083[34-curve-sect233r1-tls12-in-tls13-ssl]
1084server = 34-curve-sect233r1-tls12-in-tls13-server
1085client = 34-curve-sect233r1-tls12-in-tls13-client
1086
1087[34-curve-sect233r1-tls12-in-tls13-server]
1088Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1089CipherString = DEFAULT@SECLEVEL=1
1090Curves = sect233r1:P-256
1091MaxProtocol = TLSv1.3
1092PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1093
1094[34-curve-sect233r1-tls12-in-tls13-client]
1095CipherString = ECDHE@SECLEVEL=1
1096Curves = sect233r1:P-256
1097MaxProtocol = TLSv1.3
1098MinProtocol = TLSv1.3
1099VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1100VerifyMode = Peer
1101
1102[test-34]
1103ExpectedProtocol = TLSv1.3
1104ExpectedResult = Success
1105ExpectedTmpKeyType = P-256
1106
1107
1108# ===========================================================
1109
1110[35-curve-sect283k1-tls12-in-tls13]
1111ssl_conf = 35-curve-sect283k1-tls12-in-tls13-ssl
1112
1113[35-curve-sect283k1-tls12-in-tls13-ssl]
1114server = 35-curve-sect283k1-tls12-in-tls13-server
1115client = 35-curve-sect283k1-tls12-in-tls13-client
1116
1117[35-curve-sect283k1-tls12-in-tls13-server]
1118Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1119CipherString = DEFAULT@SECLEVEL=1
1120Curves = sect283k1:P-256
1121MaxProtocol = TLSv1.3
1122PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1123
1124[35-curve-sect283k1-tls12-in-tls13-client]
1125CipherString = ECDHE@SECLEVEL=1
1126Curves = sect283k1:P-256
1127MaxProtocol = TLSv1.3
1128MinProtocol = TLSv1.3
1129VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1130VerifyMode = Peer
1131
1132[test-35]
1133ExpectedProtocol = TLSv1.3
1134ExpectedResult = Success
1135ExpectedTmpKeyType = P-256
1136
1137
1138# ===========================================================
1139
1140[36-curve-sect283r1-tls12-in-tls13]
1141ssl_conf = 36-curve-sect283r1-tls12-in-tls13-ssl
1142
1143[36-curve-sect283r1-tls12-in-tls13-ssl]
1144server = 36-curve-sect283r1-tls12-in-tls13-server
1145client = 36-curve-sect283r1-tls12-in-tls13-client
1146
1147[36-curve-sect283r1-tls12-in-tls13-server]
1148Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1149CipherString = DEFAULT@SECLEVEL=1
1150Curves = sect283r1:P-256
1151MaxProtocol = TLSv1.3
1152PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1153
1154[36-curve-sect283r1-tls12-in-tls13-client]
1155CipherString = ECDHE@SECLEVEL=1
1156Curves = sect283r1:P-256
1157MaxProtocol = TLSv1.3
1158MinProtocol = TLSv1.3
1159VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1160VerifyMode = Peer
1161
1162[test-36]
1163ExpectedProtocol = TLSv1.3
1164ExpectedResult = Success
1165ExpectedTmpKeyType = P-256
1166
1167
1168# ===========================================================
1169
1170[37-curve-sect409k1-tls12-in-tls13]
1171ssl_conf = 37-curve-sect409k1-tls12-in-tls13-ssl
1172
1173[37-curve-sect409k1-tls12-in-tls13-ssl]
1174server = 37-curve-sect409k1-tls12-in-tls13-server
1175client = 37-curve-sect409k1-tls12-in-tls13-client
1176
1177[37-curve-sect409k1-tls12-in-tls13-server]
1178Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1179CipherString = DEFAULT@SECLEVEL=1
1180Curves = sect409k1:P-256
1181MaxProtocol = TLSv1.3
1182PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1183
1184[37-curve-sect409k1-tls12-in-tls13-client]
1185CipherString = ECDHE@SECLEVEL=1
1186Curves = sect409k1:P-256
1187MaxProtocol = TLSv1.3
1188MinProtocol = TLSv1.3
1189VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1190VerifyMode = Peer
1191
1192[test-37]
1193ExpectedProtocol = TLSv1.3
1194ExpectedResult = Success
1195ExpectedTmpKeyType = P-256
1196
1197
1198# ===========================================================
1199
1200[38-curve-sect409r1-tls12-in-tls13]
1201ssl_conf = 38-curve-sect409r1-tls12-in-tls13-ssl
1202
1203[38-curve-sect409r1-tls12-in-tls13-ssl]
1204server = 38-curve-sect409r1-tls12-in-tls13-server
1205client = 38-curve-sect409r1-tls12-in-tls13-client
1206
1207[38-curve-sect409r1-tls12-in-tls13-server]
1208Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1209CipherString = DEFAULT@SECLEVEL=1
1210Curves = sect409r1:P-256
1211MaxProtocol = TLSv1.3
1212PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1213
1214[38-curve-sect409r1-tls12-in-tls13-client]
1215CipherString = ECDHE@SECLEVEL=1
1216Curves = sect409r1:P-256
1217MaxProtocol = TLSv1.3
1218MinProtocol = TLSv1.3
1219VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1220VerifyMode = Peer
1221
1222[test-38]
1223ExpectedProtocol = TLSv1.3
1224ExpectedResult = Success
1225ExpectedTmpKeyType = P-256
1226
1227
1228# ===========================================================
1229
1230[39-curve-sect571k1-tls12-in-tls13]
1231ssl_conf = 39-curve-sect571k1-tls12-in-tls13-ssl
1232
1233[39-curve-sect571k1-tls12-in-tls13-ssl]
1234server = 39-curve-sect571k1-tls12-in-tls13-server
1235client = 39-curve-sect571k1-tls12-in-tls13-client
1236
1237[39-curve-sect571k1-tls12-in-tls13-server]
1238Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1239CipherString = DEFAULT@SECLEVEL=1
1240Curves = sect571k1:P-256
1241MaxProtocol = TLSv1.3
1242PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1243
1244[39-curve-sect571k1-tls12-in-tls13-client]
1245CipherString = ECDHE@SECLEVEL=1
1246Curves = sect571k1:P-256
1247MaxProtocol = TLSv1.3
1248MinProtocol = TLSv1.3
1249VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1250VerifyMode = Peer
1251
1252[test-39]
1253ExpectedProtocol = TLSv1.3
1254ExpectedResult = Success
1255ExpectedTmpKeyType = P-256
1256
1257
1258# ===========================================================
1259
1260[40-curve-sect571r1-tls12-in-tls13]
1261ssl_conf = 40-curve-sect571r1-tls12-in-tls13-ssl
1262
1263[40-curve-sect571r1-tls12-in-tls13-ssl]
1264server = 40-curve-sect571r1-tls12-in-tls13-server
1265client = 40-curve-sect571r1-tls12-in-tls13-client
1266
1267[40-curve-sect571r1-tls12-in-tls13-server]
1268Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1269CipherString = DEFAULT@SECLEVEL=1
1270Curves = sect571r1:P-256
1271MaxProtocol = TLSv1.3
1272PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1273
1274[40-curve-sect571r1-tls12-in-tls13-client]
1275CipherString = ECDHE@SECLEVEL=1
1276Curves = sect571r1:P-256
1277MaxProtocol = TLSv1.3
1278MinProtocol = TLSv1.3
1279VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1280VerifyMode = Peer
1281
1282[test-40]
1283ExpectedProtocol = TLSv1.3
1284ExpectedResult = Success
1285ExpectedTmpKeyType = P-256
1286
1287
1288# ===========================================================
1289
1290[41-curve-secp224r1-tls12-in-tls13]
1291ssl_conf = 41-curve-secp224r1-tls12-in-tls13-ssl
1292
1293[41-curve-secp224r1-tls12-in-tls13-ssl]
1294server = 41-curve-secp224r1-tls12-in-tls13-server
1295client = 41-curve-secp224r1-tls12-in-tls13-client
1296
1297[41-curve-secp224r1-tls12-in-tls13-server]
1298Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1299CipherString = DEFAULT@SECLEVEL=1
1300Curves = secp224r1:P-256
1301MaxProtocol = TLSv1.3
1302PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1303
1304[41-curve-secp224r1-tls12-in-tls13-client]
1305CipherString = ECDHE@SECLEVEL=1
1306Curves = secp224r1:P-256
1307MaxProtocol = TLSv1.3
1308MinProtocol = TLSv1.3
1309VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1310VerifyMode = Peer
1311
1312[test-41]
1313ExpectedProtocol = TLSv1.3
1314ExpectedResult = Success
1315ExpectedTmpKeyType = P-256
1316
1317
1318# ===========================================================
1319
1320[42-curve-sect163k1-tls12-in-tls13]
1321ssl_conf = 42-curve-sect163k1-tls12-in-tls13-ssl
1322
1323[42-curve-sect163k1-tls12-in-tls13-ssl]
1324server = 42-curve-sect163k1-tls12-in-tls13-server
1325client = 42-curve-sect163k1-tls12-in-tls13-client
1326
1327[42-curve-sect163k1-tls12-in-tls13-server]
1328Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1329CipherString = DEFAULT@SECLEVEL=1
1330Curves = sect163k1:P-256
1331MaxProtocol = TLSv1.3
1332PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1333
1334[42-curve-sect163k1-tls12-in-tls13-client]
1335CipherString = ECDHE@SECLEVEL=1
1336Curves = sect163k1:P-256
1337MaxProtocol = TLSv1.3
1338MinProtocol = TLSv1.3
1339VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1340VerifyMode = Peer
1341
1342[test-42]
1343ExpectedProtocol = TLSv1.3
1344ExpectedResult = Success
1345ExpectedTmpKeyType = P-256
1346
1347
1348# ===========================================================
1349
1350[43-curve-sect163r2-tls12-in-tls13]
1351ssl_conf = 43-curve-sect163r2-tls12-in-tls13-ssl
1352
1353[43-curve-sect163r2-tls12-in-tls13-ssl]
1354server = 43-curve-sect163r2-tls12-in-tls13-server
1355client = 43-curve-sect163r2-tls12-in-tls13-client
1356
1357[43-curve-sect163r2-tls12-in-tls13-server]
1358Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1359CipherString = DEFAULT@SECLEVEL=1
1360Curves = sect163r2:P-256
1361MaxProtocol = TLSv1.3
1362PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1363
1364[43-curve-sect163r2-tls12-in-tls13-client]
1365CipherString = ECDHE@SECLEVEL=1
1366Curves = sect163r2:P-256
1367MaxProtocol = TLSv1.3
1368MinProtocol = TLSv1.3
1369VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1370VerifyMode = Peer
1371
1372[test-43]
1373ExpectedProtocol = TLSv1.3
1374ExpectedResult = Success
1375ExpectedTmpKeyType = P-256
1376
1377
1378# ===========================================================
1379
1380[44-curve-prime192v1-tls12-in-tls13]
1381ssl_conf = 44-curve-prime192v1-tls12-in-tls13-ssl
1382
1383[44-curve-prime192v1-tls12-in-tls13-ssl]
1384server = 44-curve-prime192v1-tls12-in-tls13-server
1385client = 44-curve-prime192v1-tls12-in-tls13-client
1386
1387[44-curve-prime192v1-tls12-in-tls13-server]
1388Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1389CipherString = DEFAULT@SECLEVEL=1
1390Curves = prime192v1:P-256
1391MaxProtocol = TLSv1.3
1392PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1393
1394[44-curve-prime192v1-tls12-in-tls13-client]
1395CipherString = ECDHE@SECLEVEL=1
1396Curves = prime192v1:P-256
1397MaxProtocol = TLSv1.3
1398MinProtocol = TLSv1.3
1399VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1400VerifyMode = Peer
1401
1402[test-44]
1403ExpectedProtocol = TLSv1.3
1404ExpectedResult = Success
1405ExpectedTmpKeyType = P-256
1406
1407
1408# ===========================================================
1409
1410[45-curve-sect163r1-tls12-in-tls13]
1411ssl_conf = 45-curve-sect163r1-tls12-in-tls13-ssl
1412
1413[45-curve-sect163r1-tls12-in-tls13-ssl]
1414server = 45-curve-sect163r1-tls12-in-tls13-server
1415client = 45-curve-sect163r1-tls12-in-tls13-client
1416
1417[45-curve-sect163r1-tls12-in-tls13-server]
1418Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1419CipherString = DEFAULT@SECLEVEL=1
1420Curves = sect163r1:P-256
1421MaxProtocol = TLSv1.3
1422PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1423
1424[45-curve-sect163r1-tls12-in-tls13-client]
1425CipherString = ECDHE@SECLEVEL=1
1426Curves = sect163r1:P-256
1427MaxProtocol = TLSv1.3
1428MinProtocol = TLSv1.3
1429VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1430VerifyMode = Peer
1431
1432[test-45]
1433ExpectedProtocol = TLSv1.3
1434ExpectedResult = Success
1435ExpectedTmpKeyType = P-256
1436
1437
1438# ===========================================================
1439
1440[46-curve-sect193r1-tls12-in-tls13]
1441ssl_conf = 46-curve-sect193r1-tls12-in-tls13-ssl
1442
1443[46-curve-sect193r1-tls12-in-tls13-ssl]
1444server = 46-curve-sect193r1-tls12-in-tls13-server
1445client = 46-curve-sect193r1-tls12-in-tls13-client
1446
1447[46-curve-sect193r1-tls12-in-tls13-server]
1448Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1449CipherString = DEFAULT@SECLEVEL=1
1450Curves = sect193r1:P-256
1451MaxProtocol = TLSv1.3
1452PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1453
1454[46-curve-sect193r1-tls12-in-tls13-client]
1455CipherString = ECDHE@SECLEVEL=1
1456Curves = sect193r1:P-256
1457MaxProtocol = TLSv1.3
1458MinProtocol = TLSv1.3
1459VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1460VerifyMode = Peer
1461
1462[test-46]
1463ExpectedProtocol = TLSv1.3
1464ExpectedResult = Success
1465ExpectedTmpKeyType = P-256
1466
1467
1468# ===========================================================
1469
1470[47-curve-sect193r2-tls12-in-tls13]
1471ssl_conf = 47-curve-sect193r2-tls12-in-tls13-ssl
1472
1473[47-curve-sect193r2-tls12-in-tls13-ssl]
1474server = 47-curve-sect193r2-tls12-in-tls13-server
1475client = 47-curve-sect193r2-tls12-in-tls13-client
1476
1477[47-curve-sect193r2-tls12-in-tls13-server]
1478Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1479CipherString = DEFAULT@SECLEVEL=1
1480Curves = sect193r2:P-256
1481MaxProtocol = TLSv1.3
1482PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1483
1484[47-curve-sect193r2-tls12-in-tls13-client]
1485CipherString = ECDHE@SECLEVEL=1
1486Curves = sect193r2:P-256
1487MaxProtocol = TLSv1.3
1488MinProtocol = TLSv1.3
1489VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1490VerifyMode = Peer
1491
1492[test-47]
1493ExpectedProtocol = TLSv1.3
1494ExpectedResult = Success
1495ExpectedTmpKeyType = P-256
1496
1497
1498# ===========================================================
1499
1500[48-curve-sect239k1-tls12-in-tls13]
1501ssl_conf = 48-curve-sect239k1-tls12-in-tls13-ssl
1502
1503[48-curve-sect239k1-tls12-in-tls13-ssl]
1504server = 48-curve-sect239k1-tls12-in-tls13-server
1505client = 48-curve-sect239k1-tls12-in-tls13-client
1506
1507[48-curve-sect239k1-tls12-in-tls13-server]
1508Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1509CipherString = DEFAULT@SECLEVEL=1
1510Curves = sect239k1:P-256
1511MaxProtocol = TLSv1.3
1512PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1513
1514[48-curve-sect239k1-tls12-in-tls13-client]
1515CipherString = ECDHE@SECLEVEL=1
1516Curves = sect239k1:P-256
1517MaxProtocol = TLSv1.3
1518MinProtocol = TLSv1.3
1519VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1520VerifyMode = Peer
1521
1522[test-48]
1523ExpectedProtocol = TLSv1.3
1524ExpectedResult = Success
1525ExpectedTmpKeyType = P-256
1526
1527
1528# ===========================================================
1529
1530[49-curve-secp160k1-tls12-in-tls13]
1531ssl_conf = 49-curve-secp160k1-tls12-in-tls13-ssl
1532
1533[49-curve-secp160k1-tls12-in-tls13-ssl]
1534server = 49-curve-secp160k1-tls12-in-tls13-server
1535client = 49-curve-secp160k1-tls12-in-tls13-client
1536
1537[49-curve-secp160k1-tls12-in-tls13-server]
1538Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1539CipherString = DEFAULT@SECLEVEL=1
1540Curves = secp160k1:P-256
1541MaxProtocol = TLSv1.3
1542PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1543
1544[49-curve-secp160k1-tls12-in-tls13-client]
1545CipherString = ECDHE@SECLEVEL=1
1546Curves = secp160k1:P-256
1547MaxProtocol = TLSv1.3
1548MinProtocol = TLSv1.3
1549VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1550VerifyMode = Peer
1551
1552[test-49]
1553ExpectedProtocol = TLSv1.3
1554ExpectedResult = Success
1555ExpectedTmpKeyType = P-256
1556
1557
1558# ===========================================================
1559
1560[50-curve-secp160r1-tls12-in-tls13]
1561ssl_conf = 50-curve-secp160r1-tls12-in-tls13-ssl
1562
1563[50-curve-secp160r1-tls12-in-tls13-ssl]
1564server = 50-curve-secp160r1-tls12-in-tls13-server
1565client = 50-curve-secp160r1-tls12-in-tls13-client
1566
1567[50-curve-secp160r1-tls12-in-tls13-server]
1568Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1569CipherString = DEFAULT@SECLEVEL=1
1570Curves = secp160r1:P-256
1571MaxProtocol = TLSv1.3
1572PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1573
1574[50-curve-secp160r1-tls12-in-tls13-client]
1575CipherString = ECDHE@SECLEVEL=1
1576Curves = secp160r1:P-256
1577MaxProtocol = TLSv1.3
1578MinProtocol = TLSv1.3
1579VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1580VerifyMode = Peer
1581
1582[test-50]
1583ExpectedProtocol = TLSv1.3
1584ExpectedResult = Success
1585ExpectedTmpKeyType = P-256
1586
1587
1588# ===========================================================
1589
1590[51-curve-secp160r2-tls12-in-tls13]
1591ssl_conf = 51-curve-secp160r2-tls12-in-tls13-ssl
1592
1593[51-curve-secp160r2-tls12-in-tls13-ssl]
1594server = 51-curve-secp160r2-tls12-in-tls13-server
1595client = 51-curve-secp160r2-tls12-in-tls13-client
1596
1597[51-curve-secp160r2-tls12-in-tls13-server]
1598Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1599CipherString = DEFAULT@SECLEVEL=1
1600Curves = secp160r2:P-256
1601MaxProtocol = TLSv1.3
1602PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1603
1604[51-curve-secp160r2-tls12-in-tls13-client]
1605CipherString = ECDHE@SECLEVEL=1
1606Curves = secp160r2:P-256
1607MaxProtocol = TLSv1.3
1608MinProtocol = TLSv1.3
1609VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1610VerifyMode = Peer
1611
1612[test-51]
1613ExpectedProtocol = TLSv1.3
1614ExpectedResult = Success
1615ExpectedTmpKeyType = P-256
1616
1617
1618# ===========================================================
1619
1620[52-curve-secp192k1-tls12-in-tls13]
1621ssl_conf = 52-curve-secp192k1-tls12-in-tls13-ssl
1622
1623[52-curve-secp192k1-tls12-in-tls13-ssl]
1624server = 52-curve-secp192k1-tls12-in-tls13-server
1625client = 52-curve-secp192k1-tls12-in-tls13-client
1626
1627[52-curve-secp192k1-tls12-in-tls13-server]
1628Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1629CipherString = DEFAULT@SECLEVEL=1
1630Curves = secp192k1:P-256
1631MaxProtocol = TLSv1.3
1632PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1633
1634[52-curve-secp192k1-tls12-in-tls13-client]
1635CipherString = ECDHE@SECLEVEL=1
1636Curves = secp192k1:P-256
1637MaxProtocol = TLSv1.3
1638MinProtocol = TLSv1.3
1639VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1640VerifyMode = Peer
1641
1642[test-52]
1643ExpectedProtocol = TLSv1.3
1644ExpectedResult = Success
1645ExpectedTmpKeyType = P-256
1646
1647
1648# ===========================================================
1649
1650[53-curve-secp224k1-tls12-in-tls13]
1651ssl_conf = 53-curve-secp224k1-tls12-in-tls13-ssl
1652
1653[53-curve-secp224k1-tls12-in-tls13-ssl]
1654server = 53-curve-secp224k1-tls12-in-tls13-server
1655client = 53-curve-secp224k1-tls12-in-tls13-client
1656
1657[53-curve-secp224k1-tls12-in-tls13-server]
1658Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1659CipherString = DEFAULT@SECLEVEL=1
1660Curves = secp224k1:P-256
1661MaxProtocol = TLSv1.3
1662PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1663
1664[53-curve-secp224k1-tls12-in-tls13-client]
1665CipherString = ECDHE@SECLEVEL=1
1666Curves = secp224k1:P-256
1667MaxProtocol = TLSv1.3
1668MinProtocol = TLSv1.3
1669VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1670VerifyMode = Peer
1671
1672[test-53]
1673ExpectedProtocol = TLSv1.3
1674ExpectedResult = Success
1675ExpectedTmpKeyType = P-256
1676
1677
1678# ===========================================================
1679
1680[54-curve-secp256k1-tls12-in-tls13]
1681ssl_conf = 54-curve-secp256k1-tls12-in-tls13-ssl
1682
1683[54-curve-secp256k1-tls12-in-tls13-ssl]
1684server = 54-curve-secp256k1-tls12-in-tls13-server
1685client = 54-curve-secp256k1-tls12-in-tls13-client
1686
1687[54-curve-secp256k1-tls12-in-tls13-server]
1688Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1689CipherString = DEFAULT@SECLEVEL=1
1690Curves = secp256k1:P-256
1691MaxProtocol = TLSv1.3
1692PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1693
1694[54-curve-secp256k1-tls12-in-tls13-client]
1695CipherString = ECDHE@SECLEVEL=1
1696Curves = secp256k1:P-256
1697MaxProtocol = TLSv1.3
1698MinProtocol = TLSv1.3
1699VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1700VerifyMode = Peer
1701
1702[test-54]
1703ExpectedProtocol = TLSv1.3
1704ExpectedResult = Success
1705ExpectedTmpKeyType = P-256
1706
1707
1708# ===========================================================
1709
1710[55-curve-brainpoolP256r1-tls12-in-tls13]
1711ssl_conf = 55-curve-brainpoolP256r1-tls12-in-tls13-ssl
1712
1713[55-curve-brainpoolP256r1-tls12-in-tls13-ssl]
1714server = 55-curve-brainpoolP256r1-tls12-in-tls13-server
1715client = 55-curve-brainpoolP256r1-tls12-in-tls13-client
1716
1717[55-curve-brainpoolP256r1-tls12-in-tls13-server]
1718Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1719CipherString = DEFAULT@SECLEVEL=1
1720Curves = brainpoolP256r1:P-256
1721MaxProtocol = TLSv1.3
1722PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1723
1724[55-curve-brainpoolP256r1-tls12-in-tls13-client]
1725CipherString = ECDHE@SECLEVEL=1
1726Curves = brainpoolP256r1:P-256
1727MaxProtocol = TLSv1.3
1728MinProtocol = TLSv1.3
1729VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1730VerifyMode = Peer
1731
1732[test-55]
1733ExpectedProtocol = TLSv1.3
1734ExpectedResult = Success
1735ExpectedTmpKeyType = P-256
1736
1737
1738# ===========================================================
1739
1740[56-curve-brainpoolP384r1-tls12-in-tls13]
1741ssl_conf = 56-curve-brainpoolP384r1-tls12-in-tls13-ssl
1742
1743[56-curve-brainpoolP384r1-tls12-in-tls13-ssl]
1744server = 56-curve-brainpoolP384r1-tls12-in-tls13-server
1745client = 56-curve-brainpoolP384r1-tls12-in-tls13-client
1746
1747[56-curve-brainpoolP384r1-tls12-in-tls13-server]
1748Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1749CipherString = DEFAULT@SECLEVEL=1
1750Curves = brainpoolP384r1:P-256
1751MaxProtocol = TLSv1.3
1752PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1753
1754[56-curve-brainpoolP384r1-tls12-in-tls13-client]
1755CipherString = ECDHE@SECLEVEL=1
1756Curves = brainpoolP384r1:P-256
1757MaxProtocol = TLSv1.3
1758MinProtocol = TLSv1.3
1759VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1760VerifyMode = Peer
1761
1762[test-56]
1763ExpectedProtocol = TLSv1.3
1764ExpectedResult = Success
1765ExpectedTmpKeyType = P-256
1766
1767
1768# ===========================================================
1769
1770[57-curve-brainpoolP512r1-tls12-in-tls13]
1771ssl_conf = 57-curve-brainpoolP512r1-tls12-in-tls13-ssl
1772
1773[57-curve-brainpoolP512r1-tls12-in-tls13-ssl]
1774server = 57-curve-brainpoolP512r1-tls12-in-tls13-server
1775client = 57-curve-brainpoolP512r1-tls12-in-tls13-client
1776
1777[57-curve-brainpoolP512r1-tls12-in-tls13-server]
1778Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1779CipherString = DEFAULT@SECLEVEL=1
1780Curves = brainpoolP512r1:P-256
1781MaxProtocol = TLSv1.3
1782PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1783
1784[57-curve-brainpoolP512r1-tls12-in-tls13-client]
1785CipherString = ECDHE@SECLEVEL=1
1786Curves = brainpoolP512r1:P-256
1787MaxProtocol = TLSv1.3
1788MinProtocol = TLSv1.3
1789VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1790VerifyMode = Peer
1791
1792[test-57]
1793ExpectedProtocol = TLSv1.3
1794ExpectedResult = Success
1795ExpectedTmpKeyType = P-256
1796
1797
1798# ===========================================================
1799
1800[58-curve-sect233k1-tls13]
1801ssl_conf = 58-curve-sect233k1-tls13-ssl
1802
1803[58-curve-sect233k1-tls13-ssl]
1804server = 58-curve-sect233k1-tls13-server
1805client = 58-curve-sect233k1-tls13-client
1806
1807[58-curve-sect233k1-tls13-server]
9ff5bd61 1808Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1809CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1810Curves = sect233k1
1811MaxProtocol = TLSv1.3
1812PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1813
7b141d49 1814[58-curve-sect233k1-tls13-client]
61cab650 1815CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1816Curves = sect233k1
1817MinProtocol = TLSv1.3
1818VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1819VerifyMode = Peer
1820
7b141d49 1821[test-58]
9ff5bd61
TM
1822ExpectedResult = ClientFail
1823
1824
1825# ===========================================================
1826
7b141d49
MC
1827[59-curve-sect233r1-tls13]
1828ssl_conf = 59-curve-sect233r1-tls13-ssl
9ff5bd61 1829
7b141d49
MC
1830[59-curve-sect233r1-tls13-ssl]
1831server = 59-curve-sect233r1-tls13-server
1832client = 59-curve-sect233r1-tls13-client
9ff5bd61 1833
7b141d49 1834[59-curve-sect233r1-tls13-server]
9ff5bd61 1835Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1836CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1837Curves = sect233r1
1838MaxProtocol = TLSv1.3
1839PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1840
7b141d49 1841[59-curve-sect233r1-tls13-client]
61cab650 1842CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1843Curves = sect233r1
1844MinProtocol = TLSv1.3
1845VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1846VerifyMode = Peer
1847
7b141d49 1848[test-59]
9ff5bd61
TM
1849ExpectedResult = ClientFail
1850
1851
1852# ===========================================================
1853
7b141d49
MC
1854[60-curve-sect283k1-tls13]
1855ssl_conf = 60-curve-sect283k1-tls13-ssl
9ff5bd61 1856
7b141d49
MC
1857[60-curve-sect283k1-tls13-ssl]
1858server = 60-curve-sect283k1-tls13-server
1859client = 60-curve-sect283k1-tls13-client
9ff5bd61 1860
7b141d49 1861[60-curve-sect283k1-tls13-server]
9ff5bd61 1862Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1863CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1864Curves = sect283k1
1865MaxProtocol = TLSv1.3
1866PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1867
7b141d49 1868[60-curve-sect283k1-tls13-client]
61cab650 1869CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1870Curves = sect283k1
1871MinProtocol = TLSv1.3
1872VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1873VerifyMode = Peer
1874
7b141d49 1875[test-60]
9ff5bd61
TM
1876ExpectedResult = ClientFail
1877
1878
1879# ===========================================================
1880
7b141d49
MC
1881[61-curve-sect283r1-tls13]
1882ssl_conf = 61-curve-sect283r1-tls13-ssl
9ff5bd61 1883
7b141d49
MC
1884[61-curve-sect283r1-tls13-ssl]
1885server = 61-curve-sect283r1-tls13-server
1886client = 61-curve-sect283r1-tls13-client
9ff5bd61 1887
7b141d49 1888[61-curve-sect283r1-tls13-server]
9ff5bd61 1889Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1890CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1891Curves = sect283r1
1892MaxProtocol = TLSv1.3
1893PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1894
7b141d49 1895[61-curve-sect283r1-tls13-client]
61cab650 1896CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1897Curves = sect283r1
1898MinProtocol = TLSv1.3
1899VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1900VerifyMode = Peer
1901
7b141d49 1902[test-61]
9ff5bd61
TM
1903ExpectedResult = ClientFail
1904
1905
1906# ===========================================================
1907
7b141d49
MC
1908[62-curve-sect409k1-tls13]
1909ssl_conf = 62-curve-sect409k1-tls13-ssl
9ff5bd61 1910
7b141d49
MC
1911[62-curve-sect409k1-tls13-ssl]
1912server = 62-curve-sect409k1-tls13-server
1913client = 62-curve-sect409k1-tls13-client
9ff5bd61 1914
7b141d49 1915[62-curve-sect409k1-tls13-server]
9ff5bd61 1916Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1917CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1918Curves = sect409k1
1919MaxProtocol = TLSv1.3
1920PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1921
7b141d49 1922[62-curve-sect409k1-tls13-client]
61cab650 1923CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1924Curves = sect409k1
1925MinProtocol = TLSv1.3
1926VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1927VerifyMode = Peer
1928
7b141d49 1929[test-62]
9ff5bd61
TM
1930ExpectedResult = ClientFail
1931
1932
1933# ===========================================================
1934
7b141d49
MC
1935[63-curve-sect409r1-tls13]
1936ssl_conf = 63-curve-sect409r1-tls13-ssl
9ff5bd61 1937
7b141d49
MC
1938[63-curve-sect409r1-tls13-ssl]
1939server = 63-curve-sect409r1-tls13-server
1940client = 63-curve-sect409r1-tls13-client
9ff5bd61 1941
7b141d49 1942[63-curve-sect409r1-tls13-server]
9ff5bd61 1943Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1944CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1945Curves = sect409r1
1946MaxProtocol = TLSv1.3
1947PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1948
7b141d49 1949[63-curve-sect409r1-tls13-client]
61cab650 1950CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1951Curves = sect409r1
1952MinProtocol = TLSv1.3
1953VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1954VerifyMode = Peer
1955
7b141d49 1956[test-63]
9ff5bd61
TM
1957ExpectedResult = ClientFail
1958
1959
1960# ===========================================================
1961
7b141d49
MC
1962[64-curve-sect571k1-tls13]
1963ssl_conf = 64-curve-sect571k1-tls13-ssl
9ff5bd61 1964
7b141d49
MC
1965[64-curve-sect571k1-tls13-ssl]
1966server = 64-curve-sect571k1-tls13-server
1967client = 64-curve-sect571k1-tls13-client
9ff5bd61 1968
7b141d49 1969[64-curve-sect571k1-tls13-server]
9ff5bd61 1970Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1971CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1972Curves = sect571k1
1973MaxProtocol = TLSv1.3
1974PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1975
7b141d49 1976[64-curve-sect571k1-tls13-client]
61cab650 1977CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
1978Curves = sect571k1
1979MinProtocol = TLSv1.3
1980VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1981VerifyMode = Peer
1982
7b141d49 1983[test-64]
9ff5bd61
TM
1984ExpectedResult = ClientFail
1985
1986
1987# ===========================================================
1988
7b141d49
MC
1989[65-curve-sect571r1-tls13]
1990ssl_conf = 65-curve-sect571r1-tls13-ssl
9ff5bd61 1991
7b141d49
MC
1992[65-curve-sect571r1-tls13-ssl]
1993server = 65-curve-sect571r1-tls13-server
1994client = 65-curve-sect571r1-tls13-client
9ff5bd61 1995
7b141d49 1996[65-curve-sect571r1-tls13-server]
9ff5bd61 1997Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 1998CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
1999Curves = sect571r1
2000MaxProtocol = TLSv1.3
2001PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2002
7b141d49 2003[65-curve-sect571r1-tls13-client]
61cab650 2004CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2005Curves = sect571r1
2006MinProtocol = TLSv1.3
2007VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2008VerifyMode = Peer
2009
7b141d49 2010[test-65]
9ff5bd61
TM
2011ExpectedResult = ClientFail
2012
2013
2014# ===========================================================
2015
7b141d49
MC
2016[66-curve-secp224r1-tls13]
2017ssl_conf = 66-curve-secp224r1-tls13-ssl
9ff5bd61 2018
7b141d49
MC
2019[66-curve-secp224r1-tls13-ssl]
2020server = 66-curve-secp224r1-tls13-server
2021client = 66-curve-secp224r1-tls13-client
9ff5bd61 2022
7b141d49 2023[66-curve-secp224r1-tls13-server]
9ff5bd61 2024Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2025CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2026Curves = secp224r1
2027MaxProtocol = TLSv1.3
2028PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2029
7b141d49 2030[66-curve-secp224r1-tls13-client]
61cab650 2031CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2032Curves = secp224r1
2033MinProtocol = TLSv1.3
2034VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2035VerifyMode = Peer
2036
7b141d49 2037[test-66]
9ff5bd61
TM
2038ExpectedResult = ClientFail
2039
2040
2041# ===========================================================
2042
7b141d49
MC
2043[67-curve-sect163k1-tls13]
2044ssl_conf = 67-curve-sect163k1-tls13-ssl
9ff5bd61 2045
7b141d49
MC
2046[67-curve-sect163k1-tls13-ssl]
2047server = 67-curve-sect163k1-tls13-server
2048client = 67-curve-sect163k1-tls13-client
9ff5bd61 2049
7b141d49 2050[67-curve-sect163k1-tls13-server]
9ff5bd61 2051Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2052CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2053Curves = sect163k1
2054MaxProtocol = TLSv1.3
2055PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2056
7b141d49 2057[67-curve-sect163k1-tls13-client]
61cab650 2058CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2059Curves = sect163k1
2060MinProtocol = TLSv1.3
2061VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2062VerifyMode = Peer
2063
7b141d49 2064[test-67]
9ff5bd61
TM
2065ExpectedResult = ClientFail
2066
2067
2068# ===========================================================
2069
7b141d49
MC
2070[68-curve-sect163r2-tls13]
2071ssl_conf = 68-curve-sect163r2-tls13-ssl
9ff5bd61 2072
7b141d49
MC
2073[68-curve-sect163r2-tls13-ssl]
2074server = 68-curve-sect163r2-tls13-server
2075client = 68-curve-sect163r2-tls13-client
9ff5bd61 2076
7b141d49 2077[68-curve-sect163r2-tls13-server]
9ff5bd61 2078Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2079CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2080Curves = sect163r2
2081MaxProtocol = TLSv1.3
2082PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2083
7b141d49 2084[68-curve-sect163r2-tls13-client]
61cab650 2085CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2086Curves = sect163r2
2087MinProtocol = TLSv1.3
2088VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2089VerifyMode = Peer
2090
7b141d49 2091[test-68]
9ff5bd61
TM
2092ExpectedResult = ClientFail
2093
2094
2095# ===========================================================
2096
7b141d49
MC
2097[69-curve-prime192v1-tls13]
2098ssl_conf = 69-curve-prime192v1-tls13-ssl
9ff5bd61 2099
7b141d49
MC
2100[69-curve-prime192v1-tls13-ssl]
2101server = 69-curve-prime192v1-tls13-server
2102client = 69-curve-prime192v1-tls13-client
9ff5bd61 2103
7b141d49 2104[69-curve-prime192v1-tls13-server]
9ff5bd61 2105Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2106CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2107Curves = prime192v1
2108MaxProtocol = TLSv1.3
2109PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2110
7b141d49 2111[69-curve-prime192v1-tls13-client]
61cab650 2112CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2113Curves = prime192v1
2114MinProtocol = TLSv1.3
2115VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2116VerifyMode = Peer
2117
7b141d49 2118[test-69]
9ff5bd61
TM
2119ExpectedResult = ClientFail
2120
2121
2122# ===========================================================
2123
7b141d49
MC
2124[70-curve-sect163r1-tls13]
2125ssl_conf = 70-curve-sect163r1-tls13-ssl
9ff5bd61 2126
7b141d49
MC
2127[70-curve-sect163r1-tls13-ssl]
2128server = 70-curve-sect163r1-tls13-server
2129client = 70-curve-sect163r1-tls13-client
9ff5bd61 2130
7b141d49 2131[70-curve-sect163r1-tls13-server]
9ff5bd61 2132Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2133CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2134Curves = sect163r1
2135MaxProtocol = TLSv1.3
2136PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2137
7b141d49 2138[70-curve-sect163r1-tls13-client]
61cab650 2139CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2140Curves = sect163r1
2141MinProtocol = TLSv1.3
2142VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2143VerifyMode = Peer
2144
7b141d49 2145[test-70]
9ff5bd61
TM
2146ExpectedResult = ClientFail
2147
2148
2149# ===========================================================
2150
7b141d49
MC
2151[71-curve-sect193r1-tls13]
2152ssl_conf = 71-curve-sect193r1-tls13-ssl
9ff5bd61 2153
7b141d49
MC
2154[71-curve-sect193r1-tls13-ssl]
2155server = 71-curve-sect193r1-tls13-server
2156client = 71-curve-sect193r1-tls13-client
9ff5bd61 2157
7b141d49 2158[71-curve-sect193r1-tls13-server]
9ff5bd61 2159Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2160CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2161Curves = sect193r1
2162MaxProtocol = TLSv1.3
2163PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2164
7b141d49 2165[71-curve-sect193r1-tls13-client]
61cab650 2166CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2167Curves = sect193r1
2168MinProtocol = TLSv1.3
2169VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2170VerifyMode = Peer
2171
7b141d49 2172[test-71]
9ff5bd61
TM
2173ExpectedResult = ClientFail
2174
2175
2176# ===========================================================
2177
7b141d49
MC
2178[72-curve-sect193r2-tls13]
2179ssl_conf = 72-curve-sect193r2-tls13-ssl
9ff5bd61 2180
7b141d49
MC
2181[72-curve-sect193r2-tls13-ssl]
2182server = 72-curve-sect193r2-tls13-server
2183client = 72-curve-sect193r2-tls13-client
9ff5bd61 2184
7b141d49 2185[72-curve-sect193r2-tls13-server]
9ff5bd61 2186Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2187CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2188Curves = sect193r2
2189MaxProtocol = TLSv1.3
2190PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2191
7b141d49 2192[72-curve-sect193r2-tls13-client]
61cab650 2193CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2194Curves = sect193r2
2195MinProtocol = TLSv1.3
2196VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2197VerifyMode = Peer
2198
7b141d49 2199[test-72]
9ff5bd61
TM
2200ExpectedResult = ClientFail
2201
2202
2203# ===========================================================
2204
7b141d49
MC
2205[73-curve-sect239k1-tls13]
2206ssl_conf = 73-curve-sect239k1-tls13-ssl
9ff5bd61 2207
7b141d49
MC
2208[73-curve-sect239k1-tls13-ssl]
2209server = 73-curve-sect239k1-tls13-server
2210client = 73-curve-sect239k1-tls13-client
9ff5bd61 2211
7b141d49 2212[73-curve-sect239k1-tls13-server]
9ff5bd61 2213Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2214CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2215Curves = sect239k1
2216MaxProtocol = TLSv1.3
2217PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2218
7b141d49 2219[73-curve-sect239k1-tls13-client]
61cab650 2220CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2221Curves = sect239k1
2222MinProtocol = TLSv1.3
2223VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2224VerifyMode = Peer
2225
7b141d49 2226[test-73]
9ff5bd61
TM
2227ExpectedResult = ClientFail
2228
2229
2230# ===========================================================
2231
7b141d49
MC
2232[74-curve-secp160k1-tls13]
2233ssl_conf = 74-curve-secp160k1-tls13-ssl
9ff5bd61 2234
7b141d49
MC
2235[74-curve-secp160k1-tls13-ssl]
2236server = 74-curve-secp160k1-tls13-server
2237client = 74-curve-secp160k1-tls13-client
9ff5bd61 2238
7b141d49 2239[74-curve-secp160k1-tls13-server]
9ff5bd61 2240Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2241CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2242Curves = secp160k1
2243MaxProtocol = TLSv1.3
2244PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2245
7b141d49 2246[74-curve-secp160k1-tls13-client]
61cab650 2247CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2248Curves = secp160k1
2249MinProtocol = TLSv1.3
2250VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2251VerifyMode = Peer
2252
7b141d49 2253[test-74]
9ff5bd61
TM
2254ExpectedResult = ClientFail
2255
2256
2257# ===========================================================
2258
7b141d49
MC
2259[75-curve-secp160r1-tls13]
2260ssl_conf = 75-curve-secp160r1-tls13-ssl
9ff5bd61 2261
7b141d49
MC
2262[75-curve-secp160r1-tls13-ssl]
2263server = 75-curve-secp160r1-tls13-server
2264client = 75-curve-secp160r1-tls13-client
9ff5bd61 2265
7b141d49 2266[75-curve-secp160r1-tls13-server]
9ff5bd61 2267Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2268CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2269Curves = secp160r1
2270MaxProtocol = TLSv1.3
2271PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2272
7b141d49 2273[75-curve-secp160r1-tls13-client]
61cab650 2274CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2275Curves = secp160r1
2276MinProtocol = TLSv1.3
2277VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2278VerifyMode = Peer
2279
7b141d49 2280[test-75]
9ff5bd61
TM
2281ExpectedResult = ClientFail
2282
2283
2284# ===========================================================
2285
7b141d49
MC
2286[76-curve-secp160r2-tls13]
2287ssl_conf = 76-curve-secp160r2-tls13-ssl
9ff5bd61 2288
7b141d49
MC
2289[76-curve-secp160r2-tls13-ssl]
2290server = 76-curve-secp160r2-tls13-server
2291client = 76-curve-secp160r2-tls13-client
9ff5bd61 2292
7b141d49 2293[76-curve-secp160r2-tls13-server]
9ff5bd61 2294Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2295CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2296Curves = secp160r2
2297MaxProtocol = TLSv1.3
2298PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2299
7b141d49 2300[76-curve-secp160r2-tls13-client]
61cab650 2301CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2302Curves = secp160r2
2303MinProtocol = TLSv1.3
2304VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2305VerifyMode = Peer
2306
7b141d49 2307[test-76]
9ff5bd61
TM
2308ExpectedResult = ClientFail
2309
2310
2311# ===========================================================
2312
7b141d49
MC
2313[77-curve-secp192k1-tls13]
2314ssl_conf = 77-curve-secp192k1-tls13-ssl
9ff5bd61 2315
7b141d49
MC
2316[77-curve-secp192k1-tls13-ssl]
2317server = 77-curve-secp192k1-tls13-server
2318client = 77-curve-secp192k1-tls13-client
9ff5bd61 2319
7b141d49 2320[77-curve-secp192k1-tls13-server]
9ff5bd61 2321Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2322CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2323Curves = secp192k1
2324MaxProtocol = TLSv1.3
2325PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2326
7b141d49 2327[77-curve-secp192k1-tls13-client]
61cab650 2328CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2329Curves = secp192k1
2330MinProtocol = TLSv1.3
2331VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2332VerifyMode = Peer
2333
7b141d49 2334[test-77]
9ff5bd61
TM
2335ExpectedResult = ClientFail
2336
2337
2338# ===========================================================
2339
7b141d49
MC
2340[78-curve-secp224k1-tls13]
2341ssl_conf = 78-curve-secp224k1-tls13-ssl
9ff5bd61 2342
7b141d49
MC
2343[78-curve-secp224k1-tls13-ssl]
2344server = 78-curve-secp224k1-tls13-server
2345client = 78-curve-secp224k1-tls13-client
9ff5bd61 2346
7b141d49 2347[78-curve-secp224k1-tls13-server]
9ff5bd61 2348Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2349CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2350Curves = secp224k1
2351MaxProtocol = TLSv1.3
2352PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2353
7b141d49 2354[78-curve-secp224k1-tls13-client]
61cab650 2355CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2356Curves = secp224k1
2357MinProtocol = TLSv1.3
2358VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2359VerifyMode = Peer
2360
7b141d49 2361[test-78]
9ff5bd61
TM
2362ExpectedResult = ClientFail
2363
2364
2365# ===========================================================
2366
7b141d49
MC
2367[79-curve-secp256k1-tls13]
2368ssl_conf = 79-curve-secp256k1-tls13-ssl
9ff5bd61 2369
7b141d49
MC
2370[79-curve-secp256k1-tls13-ssl]
2371server = 79-curve-secp256k1-tls13-server
2372client = 79-curve-secp256k1-tls13-client
9ff5bd61 2373
7b141d49 2374[79-curve-secp256k1-tls13-server]
9ff5bd61 2375Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2376CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2377Curves = secp256k1
2378MaxProtocol = TLSv1.3
2379PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2380
7b141d49 2381[79-curve-secp256k1-tls13-client]
61cab650 2382CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2383Curves = secp256k1
2384MinProtocol = TLSv1.3
2385VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2386VerifyMode = Peer
2387
7b141d49 2388[test-79]
9ff5bd61
TM
2389ExpectedResult = ClientFail
2390
2391
2392# ===========================================================
2393
7b141d49
MC
2394[80-curve-brainpoolP256r1-tls13]
2395ssl_conf = 80-curve-brainpoolP256r1-tls13-ssl
9ff5bd61 2396
7b141d49
MC
2397[80-curve-brainpoolP256r1-tls13-ssl]
2398server = 80-curve-brainpoolP256r1-tls13-server
2399client = 80-curve-brainpoolP256r1-tls13-client
9ff5bd61 2400
7b141d49 2401[80-curve-brainpoolP256r1-tls13-server]
9ff5bd61 2402Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2403CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2404Curves = brainpoolP256r1
2405MaxProtocol = TLSv1.3
2406PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2407
7b141d49 2408[80-curve-brainpoolP256r1-tls13-client]
61cab650 2409CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2410Curves = brainpoolP256r1
2411MinProtocol = TLSv1.3
2412VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2413VerifyMode = Peer
2414
7b141d49 2415[test-80]
9ff5bd61
TM
2416ExpectedResult = ClientFail
2417
2418
2419# ===========================================================
2420
7b141d49
MC
2421[81-curve-brainpoolP384r1-tls13]
2422ssl_conf = 81-curve-brainpoolP384r1-tls13-ssl
9ff5bd61 2423
7b141d49
MC
2424[81-curve-brainpoolP384r1-tls13-ssl]
2425server = 81-curve-brainpoolP384r1-tls13-server
2426client = 81-curve-brainpoolP384r1-tls13-client
9ff5bd61 2427
7b141d49 2428[81-curve-brainpoolP384r1-tls13-server]
9ff5bd61 2429Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2430CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2431Curves = brainpoolP384r1
2432MaxProtocol = TLSv1.3
2433PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2434
7b141d49 2435[81-curve-brainpoolP384r1-tls13-client]
61cab650 2436CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2437Curves = brainpoolP384r1
2438MinProtocol = TLSv1.3
2439VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2440VerifyMode = Peer
2441
7b141d49 2442[test-81]
9ff5bd61
TM
2443ExpectedResult = ClientFail
2444
2445
2446# ===========================================================
2447
7b141d49
MC
2448[82-curve-brainpoolP512r1-tls13]
2449ssl_conf = 82-curve-brainpoolP512r1-tls13-ssl
9ff5bd61 2450
7b141d49
MC
2451[82-curve-brainpoolP512r1-tls13-ssl]
2452server = 82-curve-brainpoolP512r1-tls13-server
2453client = 82-curve-brainpoolP512r1-tls13-client
9ff5bd61 2454
7b141d49 2455[82-curve-brainpoolP512r1-tls13-server]
9ff5bd61 2456Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
61cab650 2457CipherString = DEFAULT@SECLEVEL=1
9ff5bd61
TM
2458Curves = brainpoolP512r1
2459MaxProtocol = TLSv1.3
2460PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2461
7b141d49 2462[82-curve-brainpoolP512r1-tls13-client]
61cab650 2463CipherString = ECDHE@SECLEVEL=1
9ff5bd61
TM
2464Curves = brainpoolP512r1
2465MinProtocol = TLSv1.3
2466VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2467VerifyMode = Peer
2468
7b141d49 2469[test-82]
9ff5bd61
TM
2470ExpectedResult = ClientFail
2471
2472
3f76339a
MC
2473# ===========================================================
2474
7b141d49
MC
2475[83-curve-brainpoolP256r1tls13-tls13-in-tls12]
2476ssl_conf = 83-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl
3f76339a 2477
7b141d49
MC
2478[83-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl]
2479server = 83-curve-brainpoolP256r1tls13-tls13-in-tls12-server
2480client = 83-curve-brainpoolP256r1tls13-tls13-in-tls12-client
3f76339a 2481
7b141d49 2482[83-curve-brainpoolP256r1tls13-tls13-in-tls12-server]
3f76339a
MC
2483Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
2484CipherString = DEFAULT@SECLEVEL=1
2485Curves = brainpoolP256r1tls13
2486MaxProtocol = TLSv1.3
2487PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2488
7b141d49 2489[83-curve-brainpoolP256r1tls13-tls13-in-tls12-client]
3f76339a
MC
2490CipherString = ECDHE@SECLEVEL=1
2491Curves = brainpoolP256r1tls13
2492MaxProtocol = TLSv1.2
2493VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2494VerifyMode = Peer
2495
7b141d49 2496[test-83]
3f76339a
MC
2497ExpectedResult = ServerFail
2498
2499
2500# ===========================================================
2501
7b141d49
MC
2502[84-curve-brainpoolP384r1tls13-tls13-in-tls12]
2503ssl_conf = 84-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl
3f76339a 2504
7b141d49
MC
2505[84-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl]
2506server = 84-curve-brainpoolP384r1tls13-tls13-in-tls12-server
2507client = 84-curve-brainpoolP384r1tls13-tls13-in-tls12-client
3f76339a 2508
7b141d49 2509[84-curve-brainpoolP384r1tls13-tls13-in-tls12-server]
3f76339a
MC
2510Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
2511CipherString = DEFAULT@SECLEVEL=1
2512Curves = brainpoolP384r1tls13
2513MaxProtocol = TLSv1.3
2514PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2515
7b141d49 2516[84-curve-brainpoolP384r1tls13-tls13-in-tls12-client]
3f76339a
MC
2517CipherString = ECDHE@SECLEVEL=1
2518Curves = brainpoolP384r1tls13
2519MaxProtocol = TLSv1.2
2520VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2521VerifyMode = Peer
2522
7b141d49 2523[test-84]
3f76339a
MC
2524ExpectedResult = ServerFail
2525
2526
2527# ===========================================================
2528
7b141d49
MC
2529[85-curve-brainpoolP512r1tls13-tls13-in-tls12]
2530ssl_conf = 85-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl
3f76339a 2531
7b141d49
MC
2532[85-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl]
2533server = 85-curve-brainpoolP512r1tls13-tls13-in-tls12-server
2534client = 85-curve-brainpoolP512r1tls13-tls13-in-tls12-client
3f76339a 2535
7b141d49 2536[85-curve-brainpoolP512r1tls13-tls13-in-tls12-server]
3f76339a
MC
2537Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
2538CipherString = DEFAULT@SECLEVEL=1
2539Curves = brainpoolP512r1tls13
2540MaxProtocol = TLSv1.3
2541PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
2542
7b141d49 2543[85-curve-brainpoolP512r1tls13-tls13-in-tls12-client]
3f76339a
MC
2544CipherString = ECDHE@SECLEVEL=1
2545Curves = brainpoolP512r1tls13
2546MaxProtocol = TLSv1.2
2547VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
2548VerifyMode = Peer
2549
7b141d49 2550[test-85]
3f76339a
MC
2551ExpectedResult = ServerFail
2552
2553