]> git.ipfire.org Git - thirdparty/openssl.git/blame - test/ssl-tests/14-curves.cnf
Use .cnf for config files, not .conf
[thirdparty/openssl.git] / test / ssl-tests / 14-curves.cnf
CommitLineData
b1b22b0b
KR
1# Generated with generate_ssl_tests.pl
2
fe93b010 3num_tests = 30
b1b22b0b
KR
4
5test-0 = 0-curve-sect163k1
6test-1 = 1-curve-sect163r1
7test-2 = 2-curve-sect163r2
8test-3 = 3-curve-sect193r1
9test-4 = 4-curve-sect193r2
10test-5 = 5-curve-sect233k1
11test-6 = 6-curve-sect233r1
12test-7 = 7-curve-sect239k1
13test-8 = 8-curve-sect283k1
14test-9 = 9-curve-sect283r1
15test-10 = 10-curve-sect409k1
16test-11 = 11-curve-sect409r1
17test-12 = 12-curve-sect571k1
18test-13 = 13-curve-sect571r1
19test-14 = 14-curve-secp160k1
20test-15 = 15-curve-secp160r1
21test-16 = 16-curve-secp160r2
22test-17 = 17-curve-secp192k1
23test-18 = 18-curve-prime192v1
24test-19 = 19-curve-secp224k1
25test-20 = 20-curve-secp224r1
26test-21 = 21-curve-secp256k1
27test-22 = 22-curve-prime256v1
28test-23 = 23-curve-secp384r1
29test-24 = 24-curve-secp521r1
30test-25 = 25-curve-brainpoolP256r1
31test-26 = 26-curve-brainpoolP384r1
32test-27 = 27-curve-brainpoolP512r1
33test-28 = 28-curve-X25519
fe93b010 34test-29 = 29-curve-X448
b1b22b0b
KR
35# ===========================================================
36
37[0-curve-sect163k1]
38ssl_conf = 0-curve-sect163k1-ssl
39
40[0-curve-sect163k1-ssl]
41server = 0-curve-sect163k1-server
42client = 0-curve-sect163k1-client
43
44[0-curve-sect163k1-server]
45Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
46CipherString = DEFAULT
47Curves = sect163k1
582a17d6 48MaxProtocol = TLSv1.2
b1b22b0b
KR
49PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
50
51[0-curve-sect163k1-client]
52CipherString = ECDHE
53Curves = sect163k1
aafec89c 54MaxProtocol = TLSv1.2
b1b22b0b
KR
55VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
56VerifyMode = Peer
57
58[test-0]
59ExpectedResult = Success
9c4319bd 60ExpectedTmpKeyType = sect163k1
b1b22b0b
KR
61
62
63# ===========================================================
64
65[1-curve-sect163r1]
66ssl_conf = 1-curve-sect163r1-ssl
67
68[1-curve-sect163r1-ssl]
69server = 1-curve-sect163r1-server
70client = 1-curve-sect163r1-client
71
72[1-curve-sect163r1-server]
73Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
74CipherString = DEFAULT
75Curves = sect163r1
582a17d6 76MaxProtocol = TLSv1.2
b1b22b0b
KR
77PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
78
79[1-curve-sect163r1-client]
80CipherString = ECDHE
81Curves = sect163r1
aafec89c 82MaxProtocol = TLSv1.2
b1b22b0b
KR
83VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
84VerifyMode = Peer
85
86[test-1]
87ExpectedResult = Success
9c4319bd 88ExpectedTmpKeyType = sect163r1
b1b22b0b
KR
89
90
91# ===========================================================
92
93[2-curve-sect163r2]
94ssl_conf = 2-curve-sect163r2-ssl
95
96[2-curve-sect163r2-ssl]
97server = 2-curve-sect163r2-server
98client = 2-curve-sect163r2-client
99
100[2-curve-sect163r2-server]
101Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
102CipherString = DEFAULT
103Curves = sect163r2
582a17d6 104MaxProtocol = TLSv1.2
b1b22b0b
KR
105PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
106
107[2-curve-sect163r2-client]
108CipherString = ECDHE
109Curves = sect163r2
aafec89c 110MaxProtocol = TLSv1.2
b1b22b0b
KR
111VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
112VerifyMode = Peer
113
114[test-2]
115ExpectedResult = Success
9c4319bd 116ExpectedTmpKeyType = sect163r2
b1b22b0b
KR
117
118
119# ===========================================================
120
121[3-curve-sect193r1]
122ssl_conf = 3-curve-sect193r1-ssl
123
124[3-curve-sect193r1-ssl]
125server = 3-curve-sect193r1-server
126client = 3-curve-sect193r1-client
127
128[3-curve-sect193r1-server]
129Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
130CipherString = DEFAULT
131Curves = sect193r1
582a17d6 132MaxProtocol = TLSv1.2
b1b22b0b
KR
133PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
134
135[3-curve-sect193r1-client]
136CipherString = ECDHE
137Curves = sect193r1
aafec89c 138MaxProtocol = TLSv1.2
b1b22b0b
KR
139VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
140VerifyMode = Peer
141
142[test-3]
143ExpectedResult = Success
9c4319bd 144ExpectedTmpKeyType = sect193r1
b1b22b0b
KR
145
146
147# ===========================================================
148
149[4-curve-sect193r2]
150ssl_conf = 4-curve-sect193r2-ssl
151
152[4-curve-sect193r2-ssl]
153server = 4-curve-sect193r2-server
154client = 4-curve-sect193r2-client
155
156[4-curve-sect193r2-server]
157Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
158CipherString = DEFAULT
159Curves = sect193r2
582a17d6 160MaxProtocol = TLSv1.2
b1b22b0b
KR
161PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
162
163[4-curve-sect193r2-client]
164CipherString = ECDHE
165Curves = sect193r2
aafec89c 166MaxProtocol = TLSv1.2
b1b22b0b
KR
167VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
168VerifyMode = Peer
169
170[test-4]
171ExpectedResult = Success
9c4319bd 172ExpectedTmpKeyType = sect193r2
b1b22b0b
KR
173
174
175# ===========================================================
176
177[5-curve-sect233k1]
178ssl_conf = 5-curve-sect233k1-ssl
179
180[5-curve-sect233k1-ssl]
181server = 5-curve-sect233k1-server
182client = 5-curve-sect233k1-client
183
184[5-curve-sect233k1-server]
185Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
186CipherString = DEFAULT
187Curves = sect233k1
582a17d6 188MaxProtocol = TLSv1.2
b1b22b0b
KR
189PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
190
191[5-curve-sect233k1-client]
192CipherString = ECDHE
193Curves = sect233k1
aafec89c 194MaxProtocol = TLSv1.2
b1b22b0b
KR
195VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
196VerifyMode = Peer
197
198[test-5]
199ExpectedResult = Success
9c4319bd 200ExpectedTmpKeyType = sect233k1
b1b22b0b
KR
201
202
203# ===========================================================
204
205[6-curve-sect233r1]
206ssl_conf = 6-curve-sect233r1-ssl
207
208[6-curve-sect233r1-ssl]
209server = 6-curve-sect233r1-server
210client = 6-curve-sect233r1-client
211
212[6-curve-sect233r1-server]
213Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
214CipherString = DEFAULT
215Curves = sect233r1
582a17d6 216MaxProtocol = TLSv1.2
b1b22b0b
KR
217PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
218
219[6-curve-sect233r1-client]
220CipherString = ECDHE
221Curves = sect233r1
aafec89c 222MaxProtocol = TLSv1.2
b1b22b0b
KR
223VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
224VerifyMode = Peer
225
226[test-6]
227ExpectedResult = Success
9c4319bd 228ExpectedTmpKeyType = sect233r1
b1b22b0b
KR
229
230
231# ===========================================================
232
233[7-curve-sect239k1]
234ssl_conf = 7-curve-sect239k1-ssl
235
236[7-curve-sect239k1-ssl]
237server = 7-curve-sect239k1-server
238client = 7-curve-sect239k1-client
239
240[7-curve-sect239k1-server]
241Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
242CipherString = DEFAULT
243Curves = sect239k1
582a17d6 244MaxProtocol = TLSv1.2
b1b22b0b
KR
245PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
246
247[7-curve-sect239k1-client]
248CipherString = ECDHE
249Curves = sect239k1
aafec89c 250MaxProtocol = TLSv1.2
b1b22b0b
KR
251VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
252VerifyMode = Peer
253
254[test-7]
255ExpectedResult = Success
9c4319bd 256ExpectedTmpKeyType = sect239k1
b1b22b0b
KR
257
258
259# ===========================================================
260
261[8-curve-sect283k1]
262ssl_conf = 8-curve-sect283k1-ssl
263
264[8-curve-sect283k1-ssl]
265server = 8-curve-sect283k1-server
266client = 8-curve-sect283k1-client
267
268[8-curve-sect283k1-server]
269Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
270CipherString = DEFAULT
271Curves = sect283k1
582a17d6 272MaxProtocol = TLSv1.2
b1b22b0b
KR
273PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
274
275[8-curve-sect283k1-client]
276CipherString = ECDHE
277Curves = sect283k1
aafec89c 278MaxProtocol = TLSv1.2
b1b22b0b
KR
279VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
280VerifyMode = Peer
281
282[test-8]
283ExpectedResult = Success
9c4319bd 284ExpectedTmpKeyType = sect283k1
b1b22b0b
KR
285
286
287# ===========================================================
288
289[9-curve-sect283r1]
290ssl_conf = 9-curve-sect283r1-ssl
291
292[9-curve-sect283r1-ssl]
293server = 9-curve-sect283r1-server
294client = 9-curve-sect283r1-client
295
296[9-curve-sect283r1-server]
297Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
298CipherString = DEFAULT
299Curves = sect283r1
582a17d6 300MaxProtocol = TLSv1.2
b1b22b0b
KR
301PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
302
303[9-curve-sect283r1-client]
304CipherString = ECDHE
305Curves = sect283r1
aafec89c 306MaxProtocol = TLSv1.2
b1b22b0b
KR
307VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
308VerifyMode = Peer
309
310[test-9]
311ExpectedResult = Success
9c4319bd 312ExpectedTmpKeyType = sect283r1
b1b22b0b
KR
313
314
315# ===========================================================
316
317[10-curve-sect409k1]
318ssl_conf = 10-curve-sect409k1-ssl
319
320[10-curve-sect409k1-ssl]
321server = 10-curve-sect409k1-server
322client = 10-curve-sect409k1-client
323
324[10-curve-sect409k1-server]
325Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
326CipherString = DEFAULT
327Curves = sect409k1
582a17d6 328MaxProtocol = TLSv1.2
b1b22b0b
KR
329PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
330
331[10-curve-sect409k1-client]
332CipherString = ECDHE
333Curves = sect409k1
aafec89c 334MaxProtocol = TLSv1.2
b1b22b0b
KR
335VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
336VerifyMode = Peer
337
338[test-10]
339ExpectedResult = Success
9c4319bd 340ExpectedTmpKeyType = sect409k1
b1b22b0b
KR
341
342
343# ===========================================================
344
345[11-curve-sect409r1]
346ssl_conf = 11-curve-sect409r1-ssl
347
348[11-curve-sect409r1-ssl]
349server = 11-curve-sect409r1-server
350client = 11-curve-sect409r1-client
351
352[11-curve-sect409r1-server]
353Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
354CipherString = DEFAULT
355Curves = sect409r1
582a17d6 356MaxProtocol = TLSv1.2
b1b22b0b
KR
357PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
358
359[11-curve-sect409r1-client]
360CipherString = ECDHE
361Curves = sect409r1
aafec89c 362MaxProtocol = TLSv1.2
b1b22b0b
KR
363VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
364VerifyMode = Peer
365
366[test-11]
367ExpectedResult = Success
9c4319bd 368ExpectedTmpKeyType = sect409r1
b1b22b0b
KR
369
370
371# ===========================================================
372
373[12-curve-sect571k1]
374ssl_conf = 12-curve-sect571k1-ssl
375
376[12-curve-sect571k1-ssl]
377server = 12-curve-sect571k1-server
378client = 12-curve-sect571k1-client
379
380[12-curve-sect571k1-server]
381Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
382CipherString = DEFAULT
383Curves = sect571k1
582a17d6 384MaxProtocol = TLSv1.2
b1b22b0b
KR
385PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
386
387[12-curve-sect571k1-client]
388CipherString = ECDHE
389Curves = sect571k1
aafec89c 390MaxProtocol = TLSv1.2
b1b22b0b
KR
391VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
392VerifyMode = Peer
393
394[test-12]
395ExpectedResult = Success
9c4319bd 396ExpectedTmpKeyType = sect571k1
b1b22b0b
KR
397
398
399# ===========================================================
400
401[13-curve-sect571r1]
402ssl_conf = 13-curve-sect571r1-ssl
403
404[13-curve-sect571r1-ssl]
405server = 13-curve-sect571r1-server
406client = 13-curve-sect571r1-client
407
408[13-curve-sect571r1-server]
409Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
410CipherString = DEFAULT
411Curves = sect571r1
582a17d6 412MaxProtocol = TLSv1.2
b1b22b0b
KR
413PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
414
415[13-curve-sect571r1-client]
416CipherString = ECDHE
417Curves = sect571r1
aafec89c 418MaxProtocol = TLSv1.2
b1b22b0b
KR
419VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
420VerifyMode = Peer
421
422[test-13]
423ExpectedResult = Success
9c4319bd 424ExpectedTmpKeyType = sect571r1
b1b22b0b
KR
425
426
427# ===========================================================
428
429[14-curve-secp160k1]
430ssl_conf = 14-curve-secp160k1-ssl
431
432[14-curve-secp160k1-ssl]
433server = 14-curve-secp160k1-server
434client = 14-curve-secp160k1-client
435
436[14-curve-secp160k1-server]
437Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
438CipherString = DEFAULT
439Curves = secp160k1
582a17d6 440MaxProtocol = TLSv1.2
b1b22b0b
KR
441PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
442
443[14-curve-secp160k1-client]
444CipherString = ECDHE
445Curves = secp160k1
aafec89c 446MaxProtocol = TLSv1.2
b1b22b0b
KR
447VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
448VerifyMode = Peer
449
450[test-14]
451ExpectedResult = Success
9c4319bd 452ExpectedTmpKeyType = secp160k1
b1b22b0b
KR
453
454
455# ===========================================================
456
457[15-curve-secp160r1]
458ssl_conf = 15-curve-secp160r1-ssl
459
460[15-curve-secp160r1-ssl]
461server = 15-curve-secp160r1-server
462client = 15-curve-secp160r1-client
463
464[15-curve-secp160r1-server]
465Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
466CipherString = DEFAULT
467Curves = secp160r1
582a17d6 468MaxProtocol = TLSv1.2
b1b22b0b
KR
469PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
470
471[15-curve-secp160r1-client]
472CipherString = ECDHE
473Curves = secp160r1
aafec89c 474MaxProtocol = TLSv1.2
b1b22b0b
KR
475VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
476VerifyMode = Peer
477
478[test-15]
479ExpectedResult = Success
9c4319bd 480ExpectedTmpKeyType = secp160r1
b1b22b0b
KR
481
482
483# ===========================================================
484
485[16-curve-secp160r2]
486ssl_conf = 16-curve-secp160r2-ssl
487
488[16-curve-secp160r2-ssl]
489server = 16-curve-secp160r2-server
490client = 16-curve-secp160r2-client
491
492[16-curve-secp160r2-server]
493Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
494CipherString = DEFAULT
495Curves = secp160r2
582a17d6 496MaxProtocol = TLSv1.2
b1b22b0b
KR
497PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
498
499[16-curve-secp160r2-client]
500CipherString = ECDHE
501Curves = secp160r2
aafec89c 502MaxProtocol = TLSv1.2
b1b22b0b
KR
503VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
504VerifyMode = Peer
505
506[test-16]
507ExpectedResult = Success
9c4319bd 508ExpectedTmpKeyType = secp160r2
b1b22b0b
KR
509
510
511# ===========================================================
512
513[17-curve-secp192k1]
514ssl_conf = 17-curve-secp192k1-ssl
515
516[17-curve-secp192k1-ssl]
517server = 17-curve-secp192k1-server
518client = 17-curve-secp192k1-client
519
520[17-curve-secp192k1-server]
521Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
522CipherString = DEFAULT
523Curves = secp192k1
582a17d6 524MaxProtocol = TLSv1.2
b1b22b0b
KR
525PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
526
527[17-curve-secp192k1-client]
528CipherString = ECDHE
529Curves = secp192k1
aafec89c 530MaxProtocol = TLSv1.2
b1b22b0b
KR
531VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
532VerifyMode = Peer
533
534[test-17]
535ExpectedResult = Success
9c4319bd 536ExpectedTmpKeyType = secp192k1
b1b22b0b
KR
537
538
539# ===========================================================
540
541[18-curve-prime192v1]
542ssl_conf = 18-curve-prime192v1-ssl
543
544[18-curve-prime192v1-ssl]
545server = 18-curve-prime192v1-server
546client = 18-curve-prime192v1-client
547
548[18-curve-prime192v1-server]
549Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
550CipherString = DEFAULT
551Curves = prime192v1
582a17d6 552MaxProtocol = TLSv1.2
b1b22b0b
KR
553PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
554
555[18-curve-prime192v1-client]
556CipherString = ECDHE
557Curves = prime192v1
aafec89c 558MaxProtocol = TLSv1.2
b1b22b0b
KR
559VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
560VerifyMode = Peer
561
562[test-18]
563ExpectedResult = Success
9c4319bd 564ExpectedTmpKeyType = prime192v1
b1b22b0b
KR
565
566
567# ===========================================================
568
569[19-curve-secp224k1]
570ssl_conf = 19-curve-secp224k1-ssl
571
572[19-curve-secp224k1-ssl]
573server = 19-curve-secp224k1-server
574client = 19-curve-secp224k1-client
575
576[19-curve-secp224k1-server]
577Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
578CipherString = DEFAULT
579Curves = secp224k1
582a17d6 580MaxProtocol = TLSv1.2
b1b22b0b
KR
581PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
582
583[19-curve-secp224k1-client]
584CipherString = ECDHE
585Curves = secp224k1
aafec89c 586MaxProtocol = TLSv1.2
b1b22b0b
KR
587VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
588VerifyMode = Peer
589
590[test-19]
591ExpectedResult = Success
9c4319bd 592ExpectedTmpKeyType = secp224k1
b1b22b0b
KR
593
594
595# ===========================================================
596
597[20-curve-secp224r1]
598ssl_conf = 20-curve-secp224r1-ssl
599
600[20-curve-secp224r1-ssl]
601server = 20-curve-secp224r1-server
602client = 20-curve-secp224r1-client
603
604[20-curve-secp224r1-server]
605Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
606CipherString = DEFAULT
607Curves = secp224r1
582a17d6 608MaxProtocol = TLSv1.2
b1b22b0b
KR
609PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
610
611[20-curve-secp224r1-client]
612CipherString = ECDHE
613Curves = secp224r1
aafec89c 614MaxProtocol = TLSv1.2
b1b22b0b
KR
615VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
616VerifyMode = Peer
617
618[test-20]
619ExpectedResult = Success
9c4319bd 620ExpectedTmpKeyType = secp224r1
b1b22b0b
KR
621
622
623# ===========================================================
624
625[21-curve-secp256k1]
626ssl_conf = 21-curve-secp256k1-ssl
627
628[21-curve-secp256k1-ssl]
629server = 21-curve-secp256k1-server
630client = 21-curve-secp256k1-client
631
632[21-curve-secp256k1-server]
633Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
634CipherString = DEFAULT
635Curves = secp256k1
582a17d6 636MaxProtocol = TLSv1.2
b1b22b0b
KR
637PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
638
639[21-curve-secp256k1-client]
640CipherString = ECDHE
641Curves = secp256k1
aafec89c 642MaxProtocol = TLSv1.2
b1b22b0b
KR
643VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
644VerifyMode = Peer
645
646[test-21]
647ExpectedResult = Success
9c4319bd 648ExpectedTmpKeyType = secp256k1
b1b22b0b
KR
649
650
651# ===========================================================
652
653[22-curve-prime256v1]
654ssl_conf = 22-curve-prime256v1-ssl
655
656[22-curve-prime256v1-ssl]
657server = 22-curve-prime256v1-server
658client = 22-curve-prime256v1-client
659
660[22-curve-prime256v1-server]
661Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
662CipherString = DEFAULT
663Curves = prime256v1
582a17d6 664MaxProtocol = TLSv1.2
b1b22b0b
KR
665PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
666
667[22-curve-prime256v1-client]
668CipherString = ECDHE
669Curves = prime256v1
aafec89c 670MaxProtocol = TLSv1.2
b1b22b0b
KR
671VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
672VerifyMode = Peer
673
674[test-22]
675ExpectedResult = Success
9c4319bd 676ExpectedTmpKeyType = prime256v1
b1b22b0b
KR
677
678
679# ===========================================================
680
681[23-curve-secp384r1]
682ssl_conf = 23-curve-secp384r1-ssl
683
684[23-curve-secp384r1-ssl]
685server = 23-curve-secp384r1-server
686client = 23-curve-secp384r1-client
687
688[23-curve-secp384r1-server]
689Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
690CipherString = DEFAULT
691Curves = secp384r1
582a17d6 692MaxProtocol = TLSv1.2
b1b22b0b
KR
693PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
694
695[23-curve-secp384r1-client]
696CipherString = ECDHE
697Curves = secp384r1
aafec89c 698MaxProtocol = TLSv1.2
b1b22b0b
KR
699VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
700VerifyMode = Peer
701
702[test-23]
703ExpectedResult = Success
9c4319bd 704ExpectedTmpKeyType = secp384r1
b1b22b0b
KR
705
706
707# ===========================================================
708
709[24-curve-secp521r1]
710ssl_conf = 24-curve-secp521r1-ssl
711
712[24-curve-secp521r1-ssl]
713server = 24-curve-secp521r1-server
714client = 24-curve-secp521r1-client
715
716[24-curve-secp521r1-server]
717Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
718CipherString = DEFAULT
719Curves = secp521r1
582a17d6 720MaxProtocol = TLSv1.2
b1b22b0b
KR
721PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
722
723[24-curve-secp521r1-client]
724CipherString = ECDHE
725Curves = secp521r1
aafec89c 726MaxProtocol = TLSv1.2
b1b22b0b
KR
727VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
728VerifyMode = Peer
729
730[test-24]
731ExpectedResult = Success
9c4319bd 732ExpectedTmpKeyType = secp521r1
b1b22b0b
KR
733
734
735# ===========================================================
736
737[25-curve-brainpoolP256r1]
738ssl_conf = 25-curve-brainpoolP256r1-ssl
739
740[25-curve-brainpoolP256r1-ssl]
741server = 25-curve-brainpoolP256r1-server
742client = 25-curve-brainpoolP256r1-client
743
744[25-curve-brainpoolP256r1-server]
745Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
746CipherString = DEFAULT
747Curves = brainpoolP256r1
582a17d6 748MaxProtocol = TLSv1.2
b1b22b0b
KR
749PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
750
751[25-curve-brainpoolP256r1-client]
752CipherString = ECDHE
753Curves = brainpoolP256r1
aafec89c 754MaxProtocol = TLSv1.2
b1b22b0b
KR
755VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
756VerifyMode = Peer
757
758[test-25]
759ExpectedResult = Success
9c4319bd 760ExpectedTmpKeyType = brainpoolP256r1
b1b22b0b
KR
761
762
763# ===========================================================
764
765[26-curve-brainpoolP384r1]
766ssl_conf = 26-curve-brainpoolP384r1-ssl
767
768[26-curve-brainpoolP384r1-ssl]
769server = 26-curve-brainpoolP384r1-server
770client = 26-curve-brainpoolP384r1-client
771
772[26-curve-brainpoolP384r1-server]
773Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
774CipherString = DEFAULT
775Curves = brainpoolP384r1
582a17d6 776MaxProtocol = TLSv1.2
b1b22b0b
KR
777PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
778
779[26-curve-brainpoolP384r1-client]
780CipherString = ECDHE
781Curves = brainpoolP384r1
aafec89c 782MaxProtocol = TLSv1.2
b1b22b0b
KR
783VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
784VerifyMode = Peer
785
786[test-26]
787ExpectedResult = Success
9c4319bd 788ExpectedTmpKeyType = brainpoolP384r1
b1b22b0b
KR
789
790
791# ===========================================================
792
793[27-curve-brainpoolP512r1]
794ssl_conf = 27-curve-brainpoolP512r1-ssl
795
796[27-curve-brainpoolP512r1-ssl]
797server = 27-curve-brainpoolP512r1-server
798client = 27-curve-brainpoolP512r1-client
799
800[27-curve-brainpoolP512r1-server]
801Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
802CipherString = DEFAULT
803Curves = brainpoolP512r1
582a17d6 804MaxProtocol = TLSv1.2
b1b22b0b
KR
805PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
806
807[27-curve-brainpoolP512r1-client]
808CipherString = ECDHE
809Curves = brainpoolP512r1
aafec89c 810MaxProtocol = TLSv1.2
b1b22b0b
KR
811VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
812VerifyMode = Peer
813
814[test-27]
815ExpectedResult = Success
9c4319bd 816ExpectedTmpKeyType = brainpoolP512r1
b1b22b0b
KR
817
818
819# ===========================================================
820
821[28-curve-X25519]
822ssl_conf = 28-curve-X25519-ssl
823
824[28-curve-X25519-ssl]
825server = 28-curve-X25519-server
826client = 28-curve-X25519-client
827
828[28-curve-X25519-server]
829Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
830CipherString = DEFAULT
831Curves = X25519
582a17d6 832MaxProtocol = TLSv1.2
b1b22b0b
KR
833PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
834
835[28-curve-X25519-client]
836CipherString = ECDHE
837Curves = X25519
aafec89c 838MaxProtocol = TLSv1.2
b1b22b0b
KR
839VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
840VerifyMode = Peer
841
842[test-28]
843ExpectedResult = Success
9c4319bd 844ExpectedTmpKeyType = X25519
b1b22b0b
KR
845
846
fe93b010
MC
847# ===========================================================
848
849[29-curve-X448]
850ssl_conf = 29-curve-X448-ssl
851
852[29-curve-X448-ssl]
853server = 29-curve-X448-server
854client = 29-curve-X448-client
855
856[29-curve-X448-server]
857Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
858CipherString = DEFAULT
859Curves = X448
860MaxProtocol = TLSv1.2
861PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
862
863[29-curve-X448-client]
864CipherString = ECDHE
865Curves = X448
866MaxProtocol = TLSv1.2
867VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
868VerifyMode = Peer
869
870[test-29]
871ExpectedResult = Success
872ExpectedTmpKeyType = X448
873
874