]> git.ipfire.org Git - thirdparty/openssl.git/blob - test/ssl-tests/14-curves.cnf
fae96d9ac77f487b5fc29b0bef4a5a3d54291806
[thirdparty/openssl.git] / test / ssl-tests / 14-curves.cnf
1 # Generated with generate_ssl_tests.pl
2
3 num_tests = 61
4
5 test-0 = 0-curve-prime256v1
6 test-1 = 1-curve-secp384r1
7 test-2 = 2-curve-secp521r1
8 test-3 = 3-curve-X25519
9 test-4 = 4-curve-X448
10 test-5 = 5-curve-brainpoolP256r1tls13
11 test-6 = 6-curve-brainpoolP384r1tls13
12 test-7 = 7-curve-brainpoolP512r1tls13
13 test-8 = 8-curve-sect233k1
14 test-9 = 9-curve-sect233r1
15 test-10 = 10-curve-sect283k1
16 test-11 = 11-curve-sect283r1
17 test-12 = 12-curve-sect409k1
18 test-13 = 13-curve-sect409r1
19 test-14 = 14-curve-sect571k1
20 test-15 = 15-curve-sect571r1
21 test-16 = 16-curve-secp224r1
22 test-17 = 17-curve-sect163k1
23 test-18 = 18-curve-sect163r2
24 test-19 = 19-curve-prime192v1
25 test-20 = 20-curve-sect163r1
26 test-21 = 21-curve-sect193r1
27 test-22 = 22-curve-sect193r2
28 test-23 = 23-curve-sect239k1
29 test-24 = 24-curve-secp160k1
30 test-25 = 25-curve-secp160r1
31 test-26 = 26-curve-secp160r2
32 test-27 = 27-curve-secp192k1
33 test-28 = 28-curve-secp224k1
34 test-29 = 29-curve-secp256k1
35 test-30 = 30-curve-brainpoolP256r1
36 test-31 = 31-curve-brainpoolP384r1
37 test-32 = 32-curve-brainpoolP512r1
38 test-33 = 33-curve-sect233k1-tls13
39 test-34 = 34-curve-sect233r1-tls13
40 test-35 = 35-curve-sect283k1-tls13
41 test-36 = 36-curve-sect283r1-tls13
42 test-37 = 37-curve-sect409k1-tls13
43 test-38 = 38-curve-sect409r1-tls13
44 test-39 = 39-curve-sect571k1-tls13
45 test-40 = 40-curve-sect571r1-tls13
46 test-41 = 41-curve-secp224r1-tls13
47 test-42 = 42-curve-sect163k1-tls13
48 test-43 = 43-curve-sect163r2-tls13
49 test-44 = 44-curve-prime192v1-tls13
50 test-45 = 45-curve-sect163r1-tls13
51 test-46 = 46-curve-sect193r1-tls13
52 test-47 = 47-curve-sect193r2-tls13
53 test-48 = 48-curve-sect239k1-tls13
54 test-49 = 49-curve-secp160k1-tls13
55 test-50 = 50-curve-secp160r1-tls13
56 test-51 = 51-curve-secp160r2-tls13
57 test-52 = 52-curve-secp192k1-tls13
58 test-53 = 53-curve-secp224k1-tls13
59 test-54 = 54-curve-secp256k1-tls13
60 test-55 = 55-curve-brainpoolP256r1-tls13
61 test-56 = 56-curve-brainpoolP384r1-tls13
62 test-57 = 57-curve-brainpoolP512r1-tls13
63 test-58 = 58-curve-brainpoolP256r1tls13-tls13-in-tls12
64 test-59 = 59-curve-brainpoolP384r1tls13-tls13-in-tls12
65 test-60 = 60-curve-brainpoolP512r1tls13-tls13-in-tls12
66 # ===========================================================
67
68 [0-curve-prime256v1]
69 ssl_conf = 0-curve-prime256v1-ssl
70
71 [0-curve-prime256v1-ssl]
72 server = 0-curve-prime256v1-server
73 client = 0-curve-prime256v1-client
74
75 [0-curve-prime256v1-server]
76 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
77 CipherString = DEFAULT@SECLEVEL=1
78 Curves = prime256v1
79 MaxProtocol = TLSv1.3
80 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
81
82 [0-curve-prime256v1-client]
83 CipherString = ECDHE@SECLEVEL=1
84 Curves = prime256v1
85 MaxProtocol = TLSv1.3
86 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
87 VerifyMode = Peer
88
89 [test-0]
90 ExpectedProtocol = TLSv1.3
91 ExpectedResult = Success
92 ExpectedTmpKeyType = prime256v1
93
94
95 # ===========================================================
96
97 [1-curve-secp384r1]
98 ssl_conf = 1-curve-secp384r1-ssl
99
100 [1-curve-secp384r1-ssl]
101 server = 1-curve-secp384r1-server
102 client = 1-curve-secp384r1-client
103
104 [1-curve-secp384r1-server]
105 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
106 CipherString = DEFAULT@SECLEVEL=1
107 Curves = secp384r1
108 MaxProtocol = TLSv1.3
109 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
110
111 [1-curve-secp384r1-client]
112 CipherString = ECDHE@SECLEVEL=1
113 Curves = secp384r1
114 MaxProtocol = TLSv1.3
115 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
116 VerifyMode = Peer
117
118 [test-1]
119 ExpectedProtocol = TLSv1.3
120 ExpectedResult = Success
121 ExpectedTmpKeyType = secp384r1
122
123
124 # ===========================================================
125
126 [2-curve-secp521r1]
127 ssl_conf = 2-curve-secp521r1-ssl
128
129 [2-curve-secp521r1-ssl]
130 server = 2-curve-secp521r1-server
131 client = 2-curve-secp521r1-client
132
133 [2-curve-secp521r1-server]
134 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
135 CipherString = DEFAULT@SECLEVEL=1
136 Curves = secp521r1
137 MaxProtocol = TLSv1.3
138 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
139
140 [2-curve-secp521r1-client]
141 CipherString = ECDHE@SECLEVEL=1
142 Curves = secp521r1
143 MaxProtocol = TLSv1.3
144 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
145 VerifyMode = Peer
146
147 [test-2]
148 ExpectedProtocol = TLSv1.3
149 ExpectedResult = Success
150 ExpectedTmpKeyType = secp521r1
151
152
153 # ===========================================================
154
155 [3-curve-X25519]
156 ssl_conf = 3-curve-X25519-ssl
157
158 [3-curve-X25519-ssl]
159 server = 3-curve-X25519-server
160 client = 3-curve-X25519-client
161
162 [3-curve-X25519-server]
163 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
164 CipherString = DEFAULT@SECLEVEL=1
165 Curves = X25519
166 MaxProtocol = TLSv1.3
167 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
168
169 [3-curve-X25519-client]
170 CipherString = ECDHE@SECLEVEL=1
171 Curves = X25519
172 MaxProtocol = TLSv1.3
173 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
174 VerifyMode = Peer
175
176 [test-3]
177 ExpectedProtocol = TLSv1.3
178 ExpectedResult = Success
179 ExpectedTmpKeyType = X25519
180
181
182 # ===========================================================
183
184 [4-curve-X448]
185 ssl_conf = 4-curve-X448-ssl
186
187 [4-curve-X448-ssl]
188 server = 4-curve-X448-server
189 client = 4-curve-X448-client
190
191 [4-curve-X448-server]
192 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
193 CipherString = DEFAULT@SECLEVEL=1
194 Curves = X448
195 MaxProtocol = TLSv1.3
196 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
197
198 [4-curve-X448-client]
199 CipherString = ECDHE@SECLEVEL=1
200 Curves = X448
201 MaxProtocol = TLSv1.3
202 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
203 VerifyMode = Peer
204
205 [test-4]
206 ExpectedProtocol = TLSv1.3
207 ExpectedResult = Success
208 ExpectedTmpKeyType = X448
209
210
211 # ===========================================================
212
213 [5-curve-brainpoolP256r1tls13]
214 ssl_conf = 5-curve-brainpoolP256r1tls13-ssl
215
216 [5-curve-brainpoolP256r1tls13-ssl]
217 server = 5-curve-brainpoolP256r1tls13-server
218 client = 5-curve-brainpoolP256r1tls13-client
219
220 [5-curve-brainpoolP256r1tls13-server]
221 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
222 CipherString = DEFAULT@SECLEVEL=1
223 Curves = brainpoolP256r1tls13
224 MaxProtocol = TLSv1.3
225 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
226
227 [5-curve-brainpoolP256r1tls13-client]
228 CipherString = ECDHE@SECLEVEL=1
229 Curves = brainpoolP256r1tls13
230 MaxProtocol = TLSv1.3
231 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
232 VerifyMode = Peer
233
234 [test-5]
235 ExpectedProtocol = TLSv1.3
236 ExpectedResult = Success
237 ExpectedTmpKeyType = brainpoolP256r1tls13
238
239
240 # ===========================================================
241
242 [6-curve-brainpoolP384r1tls13]
243 ssl_conf = 6-curve-brainpoolP384r1tls13-ssl
244
245 [6-curve-brainpoolP384r1tls13-ssl]
246 server = 6-curve-brainpoolP384r1tls13-server
247 client = 6-curve-brainpoolP384r1tls13-client
248
249 [6-curve-brainpoolP384r1tls13-server]
250 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
251 CipherString = DEFAULT@SECLEVEL=1
252 Curves = brainpoolP384r1tls13
253 MaxProtocol = TLSv1.3
254 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
255
256 [6-curve-brainpoolP384r1tls13-client]
257 CipherString = ECDHE@SECLEVEL=1
258 Curves = brainpoolP384r1tls13
259 MaxProtocol = TLSv1.3
260 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
261 VerifyMode = Peer
262
263 [test-6]
264 ExpectedProtocol = TLSv1.3
265 ExpectedResult = Success
266 ExpectedTmpKeyType = brainpoolP384r1tls13
267
268
269 # ===========================================================
270
271 [7-curve-brainpoolP512r1tls13]
272 ssl_conf = 7-curve-brainpoolP512r1tls13-ssl
273
274 [7-curve-brainpoolP512r1tls13-ssl]
275 server = 7-curve-brainpoolP512r1tls13-server
276 client = 7-curve-brainpoolP512r1tls13-client
277
278 [7-curve-brainpoolP512r1tls13-server]
279 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
280 CipherString = DEFAULT@SECLEVEL=1
281 Curves = brainpoolP512r1tls13
282 MaxProtocol = TLSv1.3
283 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
284
285 [7-curve-brainpoolP512r1tls13-client]
286 CipherString = ECDHE@SECLEVEL=1
287 Curves = brainpoolP512r1tls13
288 MaxProtocol = TLSv1.3
289 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
290 VerifyMode = Peer
291
292 [test-7]
293 ExpectedProtocol = TLSv1.3
294 ExpectedResult = Success
295 ExpectedTmpKeyType = brainpoolP512r1tls13
296
297
298 # ===========================================================
299
300 [8-curve-sect233k1]
301 ssl_conf = 8-curve-sect233k1-ssl
302
303 [8-curve-sect233k1-ssl]
304 server = 8-curve-sect233k1-server
305 client = 8-curve-sect233k1-client
306
307 [8-curve-sect233k1-server]
308 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
309 CipherString = DEFAULT@SECLEVEL=1
310 Curves = sect233k1
311 MaxProtocol = TLSv1.3
312 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
313
314 [8-curve-sect233k1-client]
315 CipherString = ECDHE@SECLEVEL=1
316 Curves = sect233k1
317 MaxProtocol = TLSv1.2
318 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
319 VerifyMode = Peer
320
321 [test-8]
322 ExpectedProtocol = TLSv1.2
323 ExpectedResult = Success
324 ExpectedTmpKeyType = sect233k1
325
326
327 # ===========================================================
328
329 [9-curve-sect233r1]
330 ssl_conf = 9-curve-sect233r1-ssl
331
332 [9-curve-sect233r1-ssl]
333 server = 9-curve-sect233r1-server
334 client = 9-curve-sect233r1-client
335
336 [9-curve-sect233r1-server]
337 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
338 CipherString = DEFAULT@SECLEVEL=1
339 Curves = sect233r1
340 MaxProtocol = TLSv1.3
341 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
342
343 [9-curve-sect233r1-client]
344 CipherString = ECDHE@SECLEVEL=1
345 Curves = sect233r1
346 MaxProtocol = TLSv1.2
347 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
348 VerifyMode = Peer
349
350 [test-9]
351 ExpectedProtocol = TLSv1.2
352 ExpectedResult = Success
353 ExpectedTmpKeyType = sect233r1
354
355
356 # ===========================================================
357
358 [10-curve-sect283k1]
359 ssl_conf = 10-curve-sect283k1-ssl
360
361 [10-curve-sect283k1-ssl]
362 server = 10-curve-sect283k1-server
363 client = 10-curve-sect283k1-client
364
365 [10-curve-sect283k1-server]
366 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
367 CipherString = DEFAULT@SECLEVEL=1
368 Curves = sect283k1
369 MaxProtocol = TLSv1.3
370 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
371
372 [10-curve-sect283k1-client]
373 CipherString = ECDHE@SECLEVEL=1
374 Curves = sect283k1
375 MaxProtocol = TLSv1.2
376 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
377 VerifyMode = Peer
378
379 [test-10]
380 ExpectedProtocol = TLSv1.2
381 ExpectedResult = Success
382 ExpectedTmpKeyType = sect283k1
383
384
385 # ===========================================================
386
387 [11-curve-sect283r1]
388 ssl_conf = 11-curve-sect283r1-ssl
389
390 [11-curve-sect283r1-ssl]
391 server = 11-curve-sect283r1-server
392 client = 11-curve-sect283r1-client
393
394 [11-curve-sect283r1-server]
395 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
396 CipherString = DEFAULT@SECLEVEL=1
397 Curves = sect283r1
398 MaxProtocol = TLSv1.3
399 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
400
401 [11-curve-sect283r1-client]
402 CipherString = ECDHE@SECLEVEL=1
403 Curves = sect283r1
404 MaxProtocol = TLSv1.2
405 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
406 VerifyMode = Peer
407
408 [test-11]
409 ExpectedProtocol = TLSv1.2
410 ExpectedResult = Success
411 ExpectedTmpKeyType = sect283r1
412
413
414 # ===========================================================
415
416 [12-curve-sect409k1]
417 ssl_conf = 12-curve-sect409k1-ssl
418
419 [12-curve-sect409k1-ssl]
420 server = 12-curve-sect409k1-server
421 client = 12-curve-sect409k1-client
422
423 [12-curve-sect409k1-server]
424 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
425 CipherString = DEFAULT@SECLEVEL=1
426 Curves = sect409k1
427 MaxProtocol = TLSv1.3
428 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
429
430 [12-curve-sect409k1-client]
431 CipherString = ECDHE@SECLEVEL=1
432 Curves = sect409k1
433 MaxProtocol = TLSv1.2
434 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
435 VerifyMode = Peer
436
437 [test-12]
438 ExpectedProtocol = TLSv1.2
439 ExpectedResult = Success
440 ExpectedTmpKeyType = sect409k1
441
442
443 # ===========================================================
444
445 [13-curve-sect409r1]
446 ssl_conf = 13-curve-sect409r1-ssl
447
448 [13-curve-sect409r1-ssl]
449 server = 13-curve-sect409r1-server
450 client = 13-curve-sect409r1-client
451
452 [13-curve-sect409r1-server]
453 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
454 CipherString = DEFAULT@SECLEVEL=1
455 Curves = sect409r1
456 MaxProtocol = TLSv1.3
457 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
458
459 [13-curve-sect409r1-client]
460 CipherString = ECDHE@SECLEVEL=1
461 Curves = sect409r1
462 MaxProtocol = TLSv1.2
463 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
464 VerifyMode = Peer
465
466 [test-13]
467 ExpectedProtocol = TLSv1.2
468 ExpectedResult = Success
469 ExpectedTmpKeyType = sect409r1
470
471
472 # ===========================================================
473
474 [14-curve-sect571k1]
475 ssl_conf = 14-curve-sect571k1-ssl
476
477 [14-curve-sect571k1-ssl]
478 server = 14-curve-sect571k1-server
479 client = 14-curve-sect571k1-client
480
481 [14-curve-sect571k1-server]
482 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
483 CipherString = DEFAULT@SECLEVEL=1
484 Curves = sect571k1
485 MaxProtocol = TLSv1.3
486 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
487
488 [14-curve-sect571k1-client]
489 CipherString = ECDHE@SECLEVEL=1
490 Curves = sect571k1
491 MaxProtocol = TLSv1.2
492 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
493 VerifyMode = Peer
494
495 [test-14]
496 ExpectedProtocol = TLSv1.2
497 ExpectedResult = Success
498 ExpectedTmpKeyType = sect571k1
499
500
501 # ===========================================================
502
503 [15-curve-sect571r1]
504 ssl_conf = 15-curve-sect571r1-ssl
505
506 [15-curve-sect571r1-ssl]
507 server = 15-curve-sect571r1-server
508 client = 15-curve-sect571r1-client
509
510 [15-curve-sect571r1-server]
511 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
512 CipherString = DEFAULT@SECLEVEL=1
513 Curves = sect571r1
514 MaxProtocol = TLSv1.3
515 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
516
517 [15-curve-sect571r1-client]
518 CipherString = ECDHE@SECLEVEL=1
519 Curves = sect571r1
520 MaxProtocol = TLSv1.2
521 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
522 VerifyMode = Peer
523
524 [test-15]
525 ExpectedProtocol = TLSv1.2
526 ExpectedResult = Success
527 ExpectedTmpKeyType = sect571r1
528
529
530 # ===========================================================
531
532 [16-curve-secp224r1]
533 ssl_conf = 16-curve-secp224r1-ssl
534
535 [16-curve-secp224r1-ssl]
536 server = 16-curve-secp224r1-server
537 client = 16-curve-secp224r1-client
538
539 [16-curve-secp224r1-server]
540 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
541 CipherString = DEFAULT@SECLEVEL=1
542 Curves = secp224r1
543 MaxProtocol = TLSv1.3
544 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
545
546 [16-curve-secp224r1-client]
547 CipherString = ECDHE@SECLEVEL=1
548 Curves = secp224r1
549 MaxProtocol = TLSv1.2
550 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
551 VerifyMode = Peer
552
553 [test-16]
554 ExpectedProtocol = TLSv1.2
555 ExpectedResult = Success
556 ExpectedTmpKeyType = secp224r1
557
558
559 # ===========================================================
560
561 [17-curve-sect163k1]
562 ssl_conf = 17-curve-sect163k1-ssl
563
564 [17-curve-sect163k1-ssl]
565 server = 17-curve-sect163k1-server
566 client = 17-curve-sect163k1-client
567
568 [17-curve-sect163k1-server]
569 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
570 CipherString = DEFAULT@SECLEVEL=1
571 Curves = sect163k1
572 MaxProtocol = TLSv1.3
573 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
574
575 [17-curve-sect163k1-client]
576 CipherString = ECDHE@SECLEVEL=1
577 Curves = sect163k1
578 MaxProtocol = TLSv1.2
579 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
580 VerifyMode = Peer
581
582 [test-17]
583 ExpectedProtocol = TLSv1.2
584 ExpectedResult = Success
585 ExpectedTmpKeyType = sect163k1
586
587
588 # ===========================================================
589
590 [18-curve-sect163r2]
591 ssl_conf = 18-curve-sect163r2-ssl
592
593 [18-curve-sect163r2-ssl]
594 server = 18-curve-sect163r2-server
595 client = 18-curve-sect163r2-client
596
597 [18-curve-sect163r2-server]
598 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
599 CipherString = DEFAULT@SECLEVEL=1
600 Curves = sect163r2
601 MaxProtocol = TLSv1.3
602 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
603
604 [18-curve-sect163r2-client]
605 CipherString = ECDHE@SECLEVEL=1
606 Curves = sect163r2
607 MaxProtocol = TLSv1.2
608 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
609 VerifyMode = Peer
610
611 [test-18]
612 ExpectedProtocol = TLSv1.2
613 ExpectedResult = Success
614 ExpectedTmpKeyType = sect163r2
615
616
617 # ===========================================================
618
619 [19-curve-prime192v1]
620 ssl_conf = 19-curve-prime192v1-ssl
621
622 [19-curve-prime192v1-ssl]
623 server = 19-curve-prime192v1-server
624 client = 19-curve-prime192v1-client
625
626 [19-curve-prime192v1-server]
627 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
628 CipherString = DEFAULT@SECLEVEL=1
629 Curves = prime192v1
630 MaxProtocol = TLSv1.3
631 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
632
633 [19-curve-prime192v1-client]
634 CipherString = ECDHE@SECLEVEL=1
635 Curves = prime192v1
636 MaxProtocol = TLSv1.2
637 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
638 VerifyMode = Peer
639
640 [test-19]
641 ExpectedProtocol = TLSv1.2
642 ExpectedResult = Success
643 ExpectedTmpKeyType = prime192v1
644
645
646 # ===========================================================
647
648 [20-curve-sect163r1]
649 ssl_conf = 20-curve-sect163r1-ssl
650
651 [20-curve-sect163r1-ssl]
652 server = 20-curve-sect163r1-server
653 client = 20-curve-sect163r1-client
654
655 [20-curve-sect163r1-server]
656 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
657 CipherString = DEFAULT@SECLEVEL=1
658 Curves = sect163r1
659 MaxProtocol = TLSv1.3
660 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
661
662 [20-curve-sect163r1-client]
663 CipherString = ECDHE@SECLEVEL=1
664 Curves = sect163r1
665 MaxProtocol = TLSv1.2
666 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
667 VerifyMode = Peer
668
669 [test-20]
670 ExpectedProtocol = TLSv1.2
671 ExpectedResult = Success
672 ExpectedTmpKeyType = sect163r1
673
674
675 # ===========================================================
676
677 [21-curve-sect193r1]
678 ssl_conf = 21-curve-sect193r1-ssl
679
680 [21-curve-sect193r1-ssl]
681 server = 21-curve-sect193r1-server
682 client = 21-curve-sect193r1-client
683
684 [21-curve-sect193r1-server]
685 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
686 CipherString = DEFAULT@SECLEVEL=1
687 Curves = sect193r1
688 MaxProtocol = TLSv1.3
689 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
690
691 [21-curve-sect193r1-client]
692 CipherString = ECDHE@SECLEVEL=1
693 Curves = sect193r1
694 MaxProtocol = TLSv1.2
695 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
696 VerifyMode = Peer
697
698 [test-21]
699 ExpectedProtocol = TLSv1.2
700 ExpectedResult = Success
701 ExpectedTmpKeyType = sect193r1
702
703
704 # ===========================================================
705
706 [22-curve-sect193r2]
707 ssl_conf = 22-curve-sect193r2-ssl
708
709 [22-curve-sect193r2-ssl]
710 server = 22-curve-sect193r2-server
711 client = 22-curve-sect193r2-client
712
713 [22-curve-sect193r2-server]
714 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
715 CipherString = DEFAULT@SECLEVEL=1
716 Curves = sect193r2
717 MaxProtocol = TLSv1.3
718 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
719
720 [22-curve-sect193r2-client]
721 CipherString = ECDHE@SECLEVEL=1
722 Curves = sect193r2
723 MaxProtocol = TLSv1.2
724 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
725 VerifyMode = Peer
726
727 [test-22]
728 ExpectedProtocol = TLSv1.2
729 ExpectedResult = Success
730 ExpectedTmpKeyType = sect193r2
731
732
733 # ===========================================================
734
735 [23-curve-sect239k1]
736 ssl_conf = 23-curve-sect239k1-ssl
737
738 [23-curve-sect239k1-ssl]
739 server = 23-curve-sect239k1-server
740 client = 23-curve-sect239k1-client
741
742 [23-curve-sect239k1-server]
743 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
744 CipherString = DEFAULT@SECLEVEL=1
745 Curves = sect239k1
746 MaxProtocol = TLSv1.3
747 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
748
749 [23-curve-sect239k1-client]
750 CipherString = ECDHE@SECLEVEL=1
751 Curves = sect239k1
752 MaxProtocol = TLSv1.2
753 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
754 VerifyMode = Peer
755
756 [test-23]
757 ExpectedProtocol = TLSv1.2
758 ExpectedResult = Success
759 ExpectedTmpKeyType = sect239k1
760
761
762 # ===========================================================
763
764 [24-curve-secp160k1]
765 ssl_conf = 24-curve-secp160k1-ssl
766
767 [24-curve-secp160k1-ssl]
768 server = 24-curve-secp160k1-server
769 client = 24-curve-secp160k1-client
770
771 [24-curve-secp160k1-server]
772 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
773 CipherString = DEFAULT@SECLEVEL=1
774 Curves = secp160k1
775 MaxProtocol = TLSv1.3
776 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
777
778 [24-curve-secp160k1-client]
779 CipherString = ECDHE@SECLEVEL=1
780 Curves = secp160k1
781 MaxProtocol = TLSv1.2
782 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
783 VerifyMode = Peer
784
785 [test-24]
786 ExpectedProtocol = TLSv1.2
787 ExpectedResult = Success
788 ExpectedTmpKeyType = secp160k1
789
790
791 # ===========================================================
792
793 [25-curve-secp160r1]
794 ssl_conf = 25-curve-secp160r1-ssl
795
796 [25-curve-secp160r1-ssl]
797 server = 25-curve-secp160r1-server
798 client = 25-curve-secp160r1-client
799
800 [25-curve-secp160r1-server]
801 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
802 CipherString = DEFAULT@SECLEVEL=1
803 Curves = secp160r1
804 MaxProtocol = TLSv1.3
805 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
806
807 [25-curve-secp160r1-client]
808 CipherString = ECDHE@SECLEVEL=1
809 Curves = secp160r1
810 MaxProtocol = TLSv1.2
811 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
812 VerifyMode = Peer
813
814 [test-25]
815 ExpectedProtocol = TLSv1.2
816 ExpectedResult = Success
817 ExpectedTmpKeyType = secp160r1
818
819
820 # ===========================================================
821
822 [26-curve-secp160r2]
823 ssl_conf = 26-curve-secp160r2-ssl
824
825 [26-curve-secp160r2-ssl]
826 server = 26-curve-secp160r2-server
827 client = 26-curve-secp160r2-client
828
829 [26-curve-secp160r2-server]
830 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
831 CipherString = DEFAULT@SECLEVEL=1
832 Curves = secp160r2
833 MaxProtocol = TLSv1.3
834 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
835
836 [26-curve-secp160r2-client]
837 CipherString = ECDHE@SECLEVEL=1
838 Curves = secp160r2
839 MaxProtocol = TLSv1.2
840 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
841 VerifyMode = Peer
842
843 [test-26]
844 ExpectedProtocol = TLSv1.2
845 ExpectedResult = Success
846 ExpectedTmpKeyType = secp160r2
847
848
849 # ===========================================================
850
851 [27-curve-secp192k1]
852 ssl_conf = 27-curve-secp192k1-ssl
853
854 [27-curve-secp192k1-ssl]
855 server = 27-curve-secp192k1-server
856 client = 27-curve-secp192k1-client
857
858 [27-curve-secp192k1-server]
859 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
860 CipherString = DEFAULT@SECLEVEL=1
861 Curves = secp192k1
862 MaxProtocol = TLSv1.3
863 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
864
865 [27-curve-secp192k1-client]
866 CipherString = ECDHE@SECLEVEL=1
867 Curves = secp192k1
868 MaxProtocol = TLSv1.2
869 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
870 VerifyMode = Peer
871
872 [test-27]
873 ExpectedProtocol = TLSv1.2
874 ExpectedResult = Success
875 ExpectedTmpKeyType = secp192k1
876
877
878 # ===========================================================
879
880 [28-curve-secp224k1]
881 ssl_conf = 28-curve-secp224k1-ssl
882
883 [28-curve-secp224k1-ssl]
884 server = 28-curve-secp224k1-server
885 client = 28-curve-secp224k1-client
886
887 [28-curve-secp224k1-server]
888 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
889 CipherString = DEFAULT@SECLEVEL=1
890 Curves = secp224k1
891 MaxProtocol = TLSv1.3
892 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
893
894 [28-curve-secp224k1-client]
895 CipherString = ECDHE@SECLEVEL=1
896 Curves = secp224k1
897 MaxProtocol = TLSv1.2
898 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
899 VerifyMode = Peer
900
901 [test-28]
902 ExpectedProtocol = TLSv1.2
903 ExpectedResult = Success
904 ExpectedTmpKeyType = secp224k1
905
906
907 # ===========================================================
908
909 [29-curve-secp256k1]
910 ssl_conf = 29-curve-secp256k1-ssl
911
912 [29-curve-secp256k1-ssl]
913 server = 29-curve-secp256k1-server
914 client = 29-curve-secp256k1-client
915
916 [29-curve-secp256k1-server]
917 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
918 CipherString = DEFAULT@SECLEVEL=1
919 Curves = secp256k1
920 MaxProtocol = TLSv1.3
921 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
922
923 [29-curve-secp256k1-client]
924 CipherString = ECDHE@SECLEVEL=1
925 Curves = secp256k1
926 MaxProtocol = TLSv1.2
927 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
928 VerifyMode = Peer
929
930 [test-29]
931 ExpectedProtocol = TLSv1.2
932 ExpectedResult = Success
933 ExpectedTmpKeyType = secp256k1
934
935
936 # ===========================================================
937
938 [30-curve-brainpoolP256r1]
939 ssl_conf = 30-curve-brainpoolP256r1-ssl
940
941 [30-curve-brainpoolP256r1-ssl]
942 server = 30-curve-brainpoolP256r1-server
943 client = 30-curve-brainpoolP256r1-client
944
945 [30-curve-brainpoolP256r1-server]
946 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
947 CipherString = DEFAULT@SECLEVEL=1
948 Curves = brainpoolP256r1
949 MaxProtocol = TLSv1.3
950 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
951
952 [30-curve-brainpoolP256r1-client]
953 CipherString = ECDHE@SECLEVEL=1
954 Curves = brainpoolP256r1
955 MaxProtocol = TLSv1.2
956 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
957 VerifyMode = Peer
958
959 [test-30]
960 ExpectedProtocol = TLSv1.2
961 ExpectedResult = Success
962 ExpectedTmpKeyType = brainpoolP256r1
963
964
965 # ===========================================================
966
967 [31-curve-brainpoolP384r1]
968 ssl_conf = 31-curve-brainpoolP384r1-ssl
969
970 [31-curve-brainpoolP384r1-ssl]
971 server = 31-curve-brainpoolP384r1-server
972 client = 31-curve-brainpoolP384r1-client
973
974 [31-curve-brainpoolP384r1-server]
975 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
976 CipherString = DEFAULT@SECLEVEL=1
977 Curves = brainpoolP384r1
978 MaxProtocol = TLSv1.3
979 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
980
981 [31-curve-brainpoolP384r1-client]
982 CipherString = ECDHE@SECLEVEL=1
983 Curves = brainpoolP384r1
984 MaxProtocol = TLSv1.2
985 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
986 VerifyMode = Peer
987
988 [test-31]
989 ExpectedProtocol = TLSv1.2
990 ExpectedResult = Success
991 ExpectedTmpKeyType = brainpoolP384r1
992
993
994 # ===========================================================
995
996 [32-curve-brainpoolP512r1]
997 ssl_conf = 32-curve-brainpoolP512r1-ssl
998
999 [32-curve-brainpoolP512r1-ssl]
1000 server = 32-curve-brainpoolP512r1-server
1001 client = 32-curve-brainpoolP512r1-client
1002
1003 [32-curve-brainpoolP512r1-server]
1004 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1005 CipherString = DEFAULT@SECLEVEL=1
1006 Curves = brainpoolP512r1
1007 MaxProtocol = TLSv1.3
1008 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1009
1010 [32-curve-brainpoolP512r1-client]
1011 CipherString = ECDHE@SECLEVEL=1
1012 Curves = brainpoolP512r1
1013 MaxProtocol = TLSv1.2
1014 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1015 VerifyMode = Peer
1016
1017 [test-32]
1018 ExpectedProtocol = TLSv1.2
1019 ExpectedResult = Success
1020 ExpectedTmpKeyType = brainpoolP512r1
1021
1022
1023 # ===========================================================
1024
1025 [33-curve-sect233k1-tls13]
1026 ssl_conf = 33-curve-sect233k1-tls13-ssl
1027
1028 [33-curve-sect233k1-tls13-ssl]
1029 server = 33-curve-sect233k1-tls13-server
1030 client = 33-curve-sect233k1-tls13-client
1031
1032 [33-curve-sect233k1-tls13-server]
1033 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1034 CipherString = DEFAULT@SECLEVEL=1
1035 Curves = sect233k1
1036 MaxProtocol = TLSv1.3
1037 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1038
1039 [33-curve-sect233k1-tls13-client]
1040 CipherString = ECDHE@SECLEVEL=1
1041 Curves = sect233k1
1042 MinProtocol = TLSv1.3
1043 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1044 VerifyMode = Peer
1045
1046 [test-33]
1047 ExpectedResult = ClientFail
1048
1049
1050 # ===========================================================
1051
1052 [34-curve-sect233r1-tls13]
1053 ssl_conf = 34-curve-sect233r1-tls13-ssl
1054
1055 [34-curve-sect233r1-tls13-ssl]
1056 server = 34-curve-sect233r1-tls13-server
1057 client = 34-curve-sect233r1-tls13-client
1058
1059 [34-curve-sect233r1-tls13-server]
1060 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1061 CipherString = DEFAULT@SECLEVEL=1
1062 Curves = sect233r1
1063 MaxProtocol = TLSv1.3
1064 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1065
1066 [34-curve-sect233r1-tls13-client]
1067 CipherString = ECDHE@SECLEVEL=1
1068 Curves = sect233r1
1069 MinProtocol = TLSv1.3
1070 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1071 VerifyMode = Peer
1072
1073 [test-34]
1074 ExpectedResult = ClientFail
1075
1076
1077 # ===========================================================
1078
1079 [35-curve-sect283k1-tls13]
1080 ssl_conf = 35-curve-sect283k1-tls13-ssl
1081
1082 [35-curve-sect283k1-tls13-ssl]
1083 server = 35-curve-sect283k1-tls13-server
1084 client = 35-curve-sect283k1-tls13-client
1085
1086 [35-curve-sect283k1-tls13-server]
1087 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1088 CipherString = DEFAULT@SECLEVEL=1
1089 Curves = sect283k1
1090 MaxProtocol = TLSv1.3
1091 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1092
1093 [35-curve-sect283k1-tls13-client]
1094 CipherString = ECDHE@SECLEVEL=1
1095 Curves = sect283k1
1096 MinProtocol = TLSv1.3
1097 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1098 VerifyMode = Peer
1099
1100 [test-35]
1101 ExpectedResult = ClientFail
1102
1103
1104 # ===========================================================
1105
1106 [36-curve-sect283r1-tls13]
1107 ssl_conf = 36-curve-sect283r1-tls13-ssl
1108
1109 [36-curve-sect283r1-tls13-ssl]
1110 server = 36-curve-sect283r1-tls13-server
1111 client = 36-curve-sect283r1-tls13-client
1112
1113 [36-curve-sect283r1-tls13-server]
1114 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1115 CipherString = DEFAULT@SECLEVEL=1
1116 Curves = sect283r1
1117 MaxProtocol = TLSv1.3
1118 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1119
1120 [36-curve-sect283r1-tls13-client]
1121 CipherString = ECDHE@SECLEVEL=1
1122 Curves = sect283r1
1123 MinProtocol = TLSv1.3
1124 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1125 VerifyMode = Peer
1126
1127 [test-36]
1128 ExpectedResult = ClientFail
1129
1130
1131 # ===========================================================
1132
1133 [37-curve-sect409k1-tls13]
1134 ssl_conf = 37-curve-sect409k1-tls13-ssl
1135
1136 [37-curve-sect409k1-tls13-ssl]
1137 server = 37-curve-sect409k1-tls13-server
1138 client = 37-curve-sect409k1-tls13-client
1139
1140 [37-curve-sect409k1-tls13-server]
1141 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1142 CipherString = DEFAULT@SECLEVEL=1
1143 Curves = sect409k1
1144 MaxProtocol = TLSv1.3
1145 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1146
1147 [37-curve-sect409k1-tls13-client]
1148 CipherString = ECDHE@SECLEVEL=1
1149 Curves = sect409k1
1150 MinProtocol = TLSv1.3
1151 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1152 VerifyMode = Peer
1153
1154 [test-37]
1155 ExpectedResult = ClientFail
1156
1157
1158 # ===========================================================
1159
1160 [38-curve-sect409r1-tls13]
1161 ssl_conf = 38-curve-sect409r1-tls13-ssl
1162
1163 [38-curve-sect409r1-tls13-ssl]
1164 server = 38-curve-sect409r1-tls13-server
1165 client = 38-curve-sect409r1-tls13-client
1166
1167 [38-curve-sect409r1-tls13-server]
1168 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1169 CipherString = DEFAULT@SECLEVEL=1
1170 Curves = sect409r1
1171 MaxProtocol = TLSv1.3
1172 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1173
1174 [38-curve-sect409r1-tls13-client]
1175 CipherString = ECDHE@SECLEVEL=1
1176 Curves = sect409r1
1177 MinProtocol = TLSv1.3
1178 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1179 VerifyMode = Peer
1180
1181 [test-38]
1182 ExpectedResult = ClientFail
1183
1184
1185 # ===========================================================
1186
1187 [39-curve-sect571k1-tls13]
1188 ssl_conf = 39-curve-sect571k1-tls13-ssl
1189
1190 [39-curve-sect571k1-tls13-ssl]
1191 server = 39-curve-sect571k1-tls13-server
1192 client = 39-curve-sect571k1-tls13-client
1193
1194 [39-curve-sect571k1-tls13-server]
1195 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1196 CipherString = DEFAULT@SECLEVEL=1
1197 Curves = sect571k1
1198 MaxProtocol = TLSv1.3
1199 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1200
1201 [39-curve-sect571k1-tls13-client]
1202 CipherString = ECDHE@SECLEVEL=1
1203 Curves = sect571k1
1204 MinProtocol = TLSv1.3
1205 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1206 VerifyMode = Peer
1207
1208 [test-39]
1209 ExpectedResult = ClientFail
1210
1211
1212 # ===========================================================
1213
1214 [40-curve-sect571r1-tls13]
1215 ssl_conf = 40-curve-sect571r1-tls13-ssl
1216
1217 [40-curve-sect571r1-tls13-ssl]
1218 server = 40-curve-sect571r1-tls13-server
1219 client = 40-curve-sect571r1-tls13-client
1220
1221 [40-curve-sect571r1-tls13-server]
1222 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1223 CipherString = DEFAULT@SECLEVEL=1
1224 Curves = sect571r1
1225 MaxProtocol = TLSv1.3
1226 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1227
1228 [40-curve-sect571r1-tls13-client]
1229 CipherString = ECDHE@SECLEVEL=1
1230 Curves = sect571r1
1231 MinProtocol = TLSv1.3
1232 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1233 VerifyMode = Peer
1234
1235 [test-40]
1236 ExpectedResult = ClientFail
1237
1238
1239 # ===========================================================
1240
1241 [41-curve-secp224r1-tls13]
1242 ssl_conf = 41-curve-secp224r1-tls13-ssl
1243
1244 [41-curve-secp224r1-tls13-ssl]
1245 server = 41-curve-secp224r1-tls13-server
1246 client = 41-curve-secp224r1-tls13-client
1247
1248 [41-curve-secp224r1-tls13-server]
1249 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1250 CipherString = DEFAULT@SECLEVEL=1
1251 Curves = secp224r1
1252 MaxProtocol = TLSv1.3
1253 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1254
1255 [41-curve-secp224r1-tls13-client]
1256 CipherString = ECDHE@SECLEVEL=1
1257 Curves = secp224r1
1258 MinProtocol = TLSv1.3
1259 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1260 VerifyMode = Peer
1261
1262 [test-41]
1263 ExpectedResult = ClientFail
1264
1265
1266 # ===========================================================
1267
1268 [42-curve-sect163k1-tls13]
1269 ssl_conf = 42-curve-sect163k1-tls13-ssl
1270
1271 [42-curve-sect163k1-tls13-ssl]
1272 server = 42-curve-sect163k1-tls13-server
1273 client = 42-curve-sect163k1-tls13-client
1274
1275 [42-curve-sect163k1-tls13-server]
1276 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1277 CipherString = DEFAULT@SECLEVEL=1
1278 Curves = sect163k1
1279 MaxProtocol = TLSv1.3
1280 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1281
1282 [42-curve-sect163k1-tls13-client]
1283 CipherString = ECDHE@SECLEVEL=1
1284 Curves = sect163k1
1285 MinProtocol = TLSv1.3
1286 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1287 VerifyMode = Peer
1288
1289 [test-42]
1290 ExpectedResult = ClientFail
1291
1292
1293 # ===========================================================
1294
1295 [43-curve-sect163r2-tls13]
1296 ssl_conf = 43-curve-sect163r2-tls13-ssl
1297
1298 [43-curve-sect163r2-tls13-ssl]
1299 server = 43-curve-sect163r2-tls13-server
1300 client = 43-curve-sect163r2-tls13-client
1301
1302 [43-curve-sect163r2-tls13-server]
1303 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1304 CipherString = DEFAULT@SECLEVEL=1
1305 Curves = sect163r2
1306 MaxProtocol = TLSv1.3
1307 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1308
1309 [43-curve-sect163r2-tls13-client]
1310 CipherString = ECDHE@SECLEVEL=1
1311 Curves = sect163r2
1312 MinProtocol = TLSv1.3
1313 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1314 VerifyMode = Peer
1315
1316 [test-43]
1317 ExpectedResult = ClientFail
1318
1319
1320 # ===========================================================
1321
1322 [44-curve-prime192v1-tls13]
1323 ssl_conf = 44-curve-prime192v1-tls13-ssl
1324
1325 [44-curve-prime192v1-tls13-ssl]
1326 server = 44-curve-prime192v1-tls13-server
1327 client = 44-curve-prime192v1-tls13-client
1328
1329 [44-curve-prime192v1-tls13-server]
1330 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1331 CipherString = DEFAULT@SECLEVEL=1
1332 Curves = prime192v1
1333 MaxProtocol = TLSv1.3
1334 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1335
1336 [44-curve-prime192v1-tls13-client]
1337 CipherString = ECDHE@SECLEVEL=1
1338 Curves = prime192v1
1339 MinProtocol = TLSv1.3
1340 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1341 VerifyMode = Peer
1342
1343 [test-44]
1344 ExpectedResult = ClientFail
1345
1346
1347 # ===========================================================
1348
1349 [45-curve-sect163r1-tls13]
1350 ssl_conf = 45-curve-sect163r1-tls13-ssl
1351
1352 [45-curve-sect163r1-tls13-ssl]
1353 server = 45-curve-sect163r1-tls13-server
1354 client = 45-curve-sect163r1-tls13-client
1355
1356 [45-curve-sect163r1-tls13-server]
1357 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1358 CipherString = DEFAULT@SECLEVEL=1
1359 Curves = sect163r1
1360 MaxProtocol = TLSv1.3
1361 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1362
1363 [45-curve-sect163r1-tls13-client]
1364 CipherString = ECDHE@SECLEVEL=1
1365 Curves = sect163r1
1366 MinProtocol = TLSv1.3
1367 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1368 VerifyMode = Peer
1369
1370 [test-45]
1371 ExpectedResult = ClientFail
1372
1373
1374 # ===========================================================
1375
1376 [46-curve-sect193r1-tls13]
1377 ssl_conf = 46-curve-sect193r1-tls13-ssl
1378
1379 [46-curve-sect193r1-tls13-ssl]
1380 server = 46-curve-sect193r1-tls13-server
1381 client = 46-curve-sect193r1-tls13-client
1382
1383 [46-curve-sect193r1-tls13-server]
1384 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1385 CipherString = DEFAULT@SECLEVEL=1
1386 Curves = sect193r1
1387 MaxProtocol = TLSv1.3
1388 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1389
1390 [46-curve-sect193r1-tls13-client]
1391 CipherString = ECDHE@SECLEVEL=1
1392 Curves = sect193r1
1393 MinProtocol = TLSv1.3
1394 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1395 VerifyMode = Peer
1396
1397 [test-46]
1398 ExpectedResult = ClientFail
1399
1400
1401 # ===========================================================
1402
1403 [47-curve-sect193r2-tls13]
1404 ssl_conf = 47-curve-sect193r2-tls13-ssl
1405
1406 [47-curve-sect193r2-tls13-ssl]
1407 server = 47-curve-sect193r2-tls13-server
1408 client = 47-curve-sect193r2-tls13-client
1409
1410 [47-curve-sect193r2-tls13-server]
1411 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1412 CipherString = DEFAULT@SECLEVEL=1
1413 Curves = sect193r2
1414 MaxProtocol = TLSv1.3
1415 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1416
1417 [47-curve-sect193r2-tls13-client]
1418 CipherString = ECDHE@SECLEVEL=1
1419 Curves = sect193r2
1420 MinProtocol = TLSv1.3
1421 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1422 VerifyMode = Peer
1423
1424 [test-47]
1425 ExpectedResult = ClientFail
1426
1427
1428 # ===========================================================
1429
1430 [48-curve-sect239k1-tls13]
1431 ssl_conf = 48-curve-sect239k1-tls13-ssl
1432
1433 [48-curve-sect239k1-tls13-ssl]
1434 server = 48-curve-sect239k1-tls13-server
1435 client = 48-curve-sect239k1-tls13-client
1436
1437 [48-curve-sect239k1-tls13-server]
1438 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1439 CipherString = DEFAULT@SECLEVEL=1
1440 Curves = sect239k1
1441 MaxProtocol = TLSv1.3
1442 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1443
1444 [48-curve-sect239k1-tls13-client]
1445 CipherString = ECDHE@SECLEVEL=1
1446 Curves = sect239k1
1447 MinProtocol = TLSv1.3
1448 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1449 VerifyMode = Peer
1450
1451 [test-48]
1452 ExpectedResult = ClientFail
1453
1454
1455 # ===========================================================
1456
1457 [49-curve-secp160k1-tls13]
1458 ssl_conf = 49-curve-secp160k1-tls13-ssl
1459
1460 [49-curve-secp160k1-tls13-ssl]
1461 server = 49-curve-secp160k1-tls13-server
1462 client = 49-curve-secp160k1-tls13-client
1463
1464 [49-curve-secp160k1-tls13-server]
1465 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1466 CipherString = DEFAULT@SECLEVEL=1
1467 Curves = secp160k1
1468 MaxProtocol = TLSv1.3
1469 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1470
1471 [49-curve-secp160k1-tls13-client]
1472 CipherString = ECDHE@SECLEVEL=1
1473 Curves = secp160k1
1474 MinProtocol = TLSv1.3
1475 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1476 VerifyMode = Peer
1477
1478 [test-49]
1479 ExpectedResult = ClientFail
1480
1481
1482 # ===========================================================
1483
1484 [50-curve-secp160r1-tls13]
1485 ssl_conf = 50-curve-secp160r1-tls13-ssl
1486
1487 [50-curve-secp160r1-tls13-ssl]
1488 server = 50-curve-secp160r1-tls13-server
1489 client = 50-curve-secp160r1-tls13-client
1490
1491 [50-curve-secp160r1-tls13-server]
1492 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1493 CipherString = DEFAULT@SECLEVEL=1
1494 Curves = secp160r1
1495 MaxProtocol = TLSv1.3
1496 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1497
1498 [50-curve-secp160r1-tls13-client]
1499 CipherString = ECDHE@SECLEVEL=1
1500 Curves = secp160r1
1501 MinProtocol = TLSv1.3
1502 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1503 VerifyMode = Peer
1504
1505 [test-50]
1506 ExpectedResult = ClientFail
1507
1508
1509 # ===========================================================
1510
1511 [51-curve-secp160r2-tls13]
1512 ssl_conf = 51-curve-secp160r2-tls13-ssl
1513
1514 [51-curve-secp160r2-tls13-ssl]
1515 server = 51-curve-secp160r2-tls13-server
1516 client = 51-curve-secp160r2-tls13-client
1517
1518 [51-curve-secp160r2-tls13-server]
1519 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1520 CipherString = DEFAULT@SECLEVEL=1
1521 Curves = secp160r2
1522 MaxProtocol = TLSv1.3
1523 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1524
1525 [51-curve-secp160r2-tls13-client]
1526 CipherString = ECDHE@SECLEVEL=1
1527 Curves = secp160r2
1528 MinProtocol = TLSv1.3
1529 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1530 VerifyMode = Peer
1531
1532 [test-51]
1533 ExpectedResult = ClientFail
1534
1535
1536 # ===========================================================
1537
1538 [52-curve-secp192k1-tls13]
1539 ssl_conf = 52-curve-secp192k1-tls13-ssl
1540
1541 [52-curve-secp192k1-tls13-ssl]
1542 server = 52-curve-secp192k1-tls13-server
1543 client = 52-curve-secp192k1-tls13-client
1544
1545 [52-curve-secp192k1-tls13-server]
1546 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1547 CipherString = DEFAULT@SECLEVEL=1
1548 Curves = secp192k1
1549 MaxProtocol = TLSv1.3
1550 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1551
1552 [52-curve-secp192k1-tls13-client]
1553 CipherString = ECDHE@SECLEVEL=1
1554 Curves = secp192k1
1555 MinProtocol = TLSv1.3
1556 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1557 VerifyMode = Peer
1558
1559 [test-52]
1560 ExpectedResult = ClientFail
1561
1562
1563 # ===========================================================
1564
1565 [53-curve-secp224k1-tls13]
1566 ssl_conf = 53-curve-secp224k1-tls13-ssl
1567
1568 [53-curve-secp224k1-tls13-ssl]
1569 server = 53-curve-secp224k1-tls13-server
1570 client = 53-curve-secp224k1-tls13-client
1571
1572 [53-curve-secp224k1-tls13-server]
1573 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1574 CipherString = DEFAULT@SECLEVEL=1
1575 Curves = secp224k1
1576 MaxProtocol = TLSv1.3
1577 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1578
1579 [53-curve-secp224k1-tls13-client]
1580 CipherString = ECDHE@SECLEVEL=1
1581 Curves = secp224k1
1582 MinProtocol = TLSv1.3
1583 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1584 VerifyMode = Peer
1585
1586 [test-53]
1587 ExpectedResult = ClientFail
1588
1589
1590 # ===========================================================
1591
1592 [54-curve-secp256k1-tls13]
1593 ssl_conf = 54-curve-secp256k1-tls13-ssl
1594
1595 [54-curve-secp256k1-tls13-ssl]
1596 server = 54-curve-secp256k1-tls13-server
1597 client = 54-curve-secp256k1-tls13-client
1598
1599 [54-curve-secp256k1-tls13-server]
1600 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1601 CipherString = DEFAULT@SECLEVEL=1
1602 Curves = secp256k1
1603 MaxProtocol = TLSv1.3
1604 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1605
1606 [54-curve-secp256k1-tls13-client]
1607 CipherString = ECDHE@SECLEVEL=1
1608 Curves = secp256k1
1609 MinProtocol = TLSv1.3
1610 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1611 VerifyMode = Peer
1612
1613 [test-54]
1614 ExpectedResult = ClientFail
1615
1616
1617 # ===========================================================
1618
1619 [55-curve-brainpoolP256r1-tls13]
1620 ssl_conf = 55-curve-brainpoolP256r1-tls13-ssl
1621
1622 [55-curve-brainpoolP256r1-tls13-ssl]
1623 server = 55-curve-brainpoolP256r1-tls13-server
1624 client = 55-curve-brainpoolP256r1-tls13-client
1625
1626 [55-curve-brainpoolP256r1-tls13-server]
1627 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1628 CipherString = DEFAULT@SECLEVEL=1
1629 Curves = brainpoolP256r1
1630 MaxProtocol = TLSv1.3
1631 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1632
1633 [55-curve-brainpoolP256r1-tls13-client]
1634 CipherString = ECDHE@SECLEVEL=1
1635 Curves = brainpoolP256r1
1636 MinProtocol = TLSv1.3
1637 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1638 VerifyMode = Peer
1639
1640 [test-55]
1641 ExpectedResult = ClientFail
1642
1643
1644 # ===========================================================
1645
1646 [56-curve-brainpoolP384r1-tls13]
1647 ssl_conf = 56-curve-brainpoolP384r1-tls13-ssl
1648
1649 [56-curve-brainpoolP384r1-tls13-ssl]
1650 server = 56-curve-brainpoolP384r1-tls13-server
1651 client = 56-curve-brainpoolP384r1-tls13-client
1652
1653 [56-curve-brainpoolP384r1-tls13-server]
1654 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1655 CipherString = DEFAULT@SECLEVEL=1
1656 Curves = brainpoolP384r1
1657 MaxProtocol = TLSv1.3
1658 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1659
1660 [56-curve-brainpoolP384r1-tls13-client]
1661 CipherString = ECDHE@SECLEVEL=1
1662 Curves = brainpoolP384r1
1663 MinProtocol = TLSv1.3
1664 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1665 VerifyMode = Peer
1666
1667 [test-56]
1668 ExpectedResult = ClientFail
1669
1670
1671 # ===========================================================
1672
1673 [57-curve-brainpoolP512r1-tls13]
1674 ssl_conf = 57-curve-brainpoolP512r1-tls13-ssl
1675
1676 [57-curve-brainpoolP512r1-tls13-ssl]
1677 server = 57-curve-brainpoolP512r1-tls13-server
1678 client = 57-curve-brainpoolP512r1-tls13-client
1679
1680 [57-curve-brainpoolP512r1-tls13-server]
1681 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1682 CipherString = DEFAULT@SECLEVEL=1
1683 Curves = brainpoolP512r1
1684 MaxProtocol = TLSv1.3
1685 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1686
1687 [57-curve-brainpoolP512r1-tls13-client]
1688 CipherString = ECDHE@SECLEVEL=1
1689 Curves = brainpoolP512r1
1690 MinProtocol = TLSv1.3
1691 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1692 VerifyMode = Peer
1693
1694 [test-57]
1695 ExpectedResult = ClientFail
1696
1697
1698 # ===========================================================
1699
1700 [58-curve-brainpoolP256r1tls13-tls13-in-tls12]
1701 ssl_conf = 58-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl
1702
1703 [58-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl]
1704 server = 58-curve-brainpoolP256r1tls13-tls13-in-tls12-server
1705 client = 58-curve-brainpoolP256r1tls13-tls13-in-tls12-client
1706
1707 [58-curve-brainpoolP256r1tls13-tls13-in-tls12-server]
1708 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1709 CipherString = DEFAULT@SECLEVEL=1
1710 Curves = brainpoolP256r1tls13
1711 MaxProtocol = TLSv1.3
1712 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1713
1714 [58-curve-brainpoolP256r1tls13-tls13-in-tls12-client]
1715 CipherString = ECDHE@SECLEVEL=1
1716 Curves = brainpoolP256r1tls13
1717 MaxProtocol = TLSv1.2
1718 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1719 VerifyMode = Peer
1720
1721 [test-58]
1722 ExpectedResult = ServerFail
1723
1724
1725 # ===========================================================
1726
1727 [59-curve-brainpoolP384r1tls13-tls13-in-tls12]
1728 ssl_conf = 59-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl
1729
1730 [59-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl]
1731 server = 59-curve-brainpoolP384r1tls13-tls13-in-tls12-server
1732 client = 59-curve-brainpoolP384r1tls13-tls13-in-tls12-client
1733
1734 [59-curve-brainpoolP384r1tls13-tls13-in-tls12-server]
1735 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1736 CipherString = DEFAULT@SECLEVEL=1
1737 Curves = brainpoolP384r1tls13
1738 MaxProtocol = TLSv1.3
1739 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1740
1741 [59-curve-brainpoolP384r1tls13-tls13-in-tls12-client]
1742 CipherString = ECDHE@SECLEVEL=1
1743 Curves = brainpoolP384r1tls13
1744 MaxProtocol = TLSv1.2
1745 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1746 VerifyMode = Peer
1747
1748 [test-59]
1749 ExpectedResult = ServerFail
1750
1751
1752 # ===========================================================
1753
1754 [60-curve-brainpoolP512r1tls13-tls13-in-tls12]
1755 ssl_conf = 60-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl
1756
1757 [60-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl]
1758 server = 60-curve-brainpoolP512r1tls13-tls13-in-tls12-server
1759 client = 60-curve-brainpoolP512r1tls13-tls13-in-tls12-client
1760
1761 [60-curve-brainpoolP512r1tls13-tls13-in-tls12-server]
1762 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1763 CipherString = DEFAULT@SECLEVEL=1
1764 Curves = brainpoolP512r1tls13
1765 MaxProtocol = TLSv1.3
1766 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1767
1768 [60-curve-brainpoolP512r1tls13-tls13-in-tls12-client]
1769 CipherString = ECDHE@SECLEVEL=1
1770 Curves = brainpoolP512r1tls13
1771 MaxProtocol = TLSv1.2
1772 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1773 VerifyMode = Peer
1774
1775 [test-60]
1776 ExpectedResult = ServerFail
1777
1778