test-673 = 673-version-negotiation
test-674 = 674-version-negotiation
test-675 = 675-version-negotiation
-test-676 = 676-ciphersuite-sanity-check-client
-test-677 = 677-ciphersuite-sanity-check-server
+test-676 = 676-ciphersuite-sanity-check-tls-client
+test-677 = 677-ciphersuite-sanity-check-tls-server
# ===========================================================
[0-version-negotiation]
# ===========================================================
-[676-ciphersuite-sanity-check-client]
-ssl_conf = 676-ciphersuite-sanity-check-client-ssl
+[676-ciphersuite-sanity-check-tls-client]
+ssl_conf = 676-ciphersuite-sanity-check-tls-client-ssl
-[676-ciphersuite-sanity-check-client-ssl]
-server = 676-ciphersuite-sanity-check-client-server
-client = 676-ciphersuite-sanity-check-client-client
+[676-ciphersuite-sanity-check-tls-client-ssl]
+server = 676-ciphersuite-sanity-check-tls-client-server
+client = 676-ciphersuite-sanity-check-tls-client-client
-[676-ciphersuite-sanity-check-client-server]
+[676-ciphersuite-sanity-check-tls-client-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
-[676-ciphersuite-sanity-check-client-client]
+[676-ciphersuite-sanity-check-tls-client-client]
CipherString = AES128-SHA
Ciphersuites =
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
[test-676]
ExpectedResult = ClientFail
+Method = TLS
# ===========================================================
-[677-ciphersuite-sanity-check-server]
-ssl_conf = 677-ciphersuite-sanity-check-server-ssl
+[677-ciphersuite-sanity-check-tls-server]
+ssl_conf = 677-ciphersuite-sanity-check-tls-server-ssl
-[677-ciphersuite-sanity-check-server-ssl]
-server = 677-ciphersuite-sanity-check-server-server
-client = 677-ciphersuite-sanity-check-server-client
+[677-ciphersuite-sanity-check-tls-server-ssl]
+server = 677-ciphersuite-sanity-check-tls-server-server
+client = 677-ciphersuite-sanity-check-tls-server-client
-[677-ciphersuite-sanity-check-server-server]
+[677-ciphersuite-sanity-check-tls-server-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = AES128-SHA
Ciphersuites =
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
-[677-ciphersuite-sanity-check-server-client]
+[677-ciphersuite-sanity-check-tls-server-client]
CipherString = AES128-SHA
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
[test-677]
ExpectedResult = ServerFail
+Method = TLS
# Generated with generate_ssl_tests.pl
-num_tests = 169
+num_tests = 171
test-0 = 0-version-negotiation
test-1 = 1-version-negotiation
test-166 = 166-version-negotiation
test-167 = 167-version-negotiation
test-168 = 168-version-negotiation
+test-169 = 169-ciphersuite-sanity-check-dtls-client
+test-170 = 170-ciphersuite-sanity-check-dtls-server
# ===========================================================
[0-version-negotiation]
Method = DTLS
+# ===========================================================
+
+[169-ciphersuite-sanity-check-dtls-client]
+ssl_conf = 169-ciphersuite-sanity-check-dtls-client-ssl
+
+[169-ciphersuite-sanity-check-dtls-client-ssl]
+server = 169-ciphersuite-sanity-check-dtls-client-server
+client = 169-ciphersuite-sanity-check-dtls-client-client
+
+[169-ciphersuite-sanity-check-dtls-client-server]
+Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
+CipherString = DEFAULT
+MaxProtocol = DTLSv1.2
+PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
+
+[169-ciphersuite-sanity-check-dtls-client-client]
+CipherString = AES128-SHA
+Ciphersuites =
+VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
+VerifyMode = Peer
+
+[test-169]
+ExpectedResult = ClientFail
+Method = DTLS
+
+
+# ===========================================================
+
+[170-ciphersuite-sanity-check-dtls-server]
+ssl_conf = 170-ciphersuite-sanity-check-dtls-server-ssl
+
+[170-ciphersuite-sanity-check-dtls-server-ssl]
+server = 170-ciphersuite-sanity-check-dtls-server-server
+client = 170-ciphersuite-sanity-check-dtls-server-client
+
+[170-ciphersuite-sanity-check-dtls-server-server]
+Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
+CipherString = AES128-SHA
+Ciphersuites =
+PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
+
+[170-ciphersuite-sanity-check-dtls-server-client]
+CipherString = AES128-SHA
+MaxProtocol = DTLSv1.2
+VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
+VerifyMode = Peer
+
+[test-170]
+ExpectedResult = ServerFail
+Method = DTLS
+
+
test-61 = 61-resumption
test-62 = 62-resumption
test-63 = 63-resumption
-test-64 = 64-resumption-with-hrr
+test-64 = 64-tls13-resumption-with-hrr
# ===========================================================
[0-resumption]
# ===========================================================
-[64-resumption-with-hrr]
-ssl_conf = 64-resumption-with-hrr-ssl
+[64-tls13-resumption-with-hrr]
+ssl_conf = 64-tls13-resumption-with-hrr-ssl
-[64-resumption-with-hrr-ssl]
-server = 64-resumption-with-hrr-server
-client = 64-resumption-with-hrr-client
-resume-server = 64-resumption-with-hrr-server
-resume-client = 64-resumption-with-hrr-resume-client
+[64-tls13-resumption-with-hrr-ssl]
+server = 64-tls13-resumption-with-hrr-server
+client = 64-tls13-resumption-with-hrr-client
+resume-server = 64-tls13-resumption-with-hrr-server
+resume-client = 64-tls13-resumption-with-hrr-resume-client
-[64-resumption-with-hrr-server]
+[64-tls13-resumption-with-hrr-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = P-256
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
-[64-resumption-with-hrr-client]
+[64-tls13-resumption-with-hrr-client]
CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
-[64-resumption-with-hrr-resume-client]
+[64-tls13-resumption-with-hrr-resume-client]
CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
sub no_tests {
my ($dtls, $fips) = @_;
if ($dtls && $fips) {
- return disabled("dtls1_2", "dtls1_3");
+ return alldisabled("dtls1_2", "dtls1_3");
}
return $dtls ? alldisabled("dtls1", "dtls1_2", "dtls1_3") :
alldisabled("ssl3", "tls1", "tls1_1", "tls1_2", "tls1_3");
}
}
}
- return @tests
- if disabled("tls1_3")
- || disabled("tls1_2")
- || (disabled("ec") && disabled("dh"))
- || $dtls;
-
- #Add some version/ciphersuite sanity check tests
- push @tests, {
- "name" => "ciphersuite-sanity-check-client",
- "client" => {
- #Offering only <=TLSv1.2 ciphersuites with TLSv1.3 should fail
- "CipherString" => "AES128-SHA",
- "Ciphersuites" => "",
- },
- "server" => {
- "MaxProtocol" => "TLSv1.2"
- },
- "test" => {
- "ExpectedResult" => "ClientFail",
- }
- };
- push @tests, {
- "name" => "ciphersuite-sanity-check-server",
- "client" => {
- "CipherString" => "AES128-SHA",
- "MaxProtocol" => "TLSv1.2"
- },
- "server" => {
- #Allowing only <=TLSv1.2 ciphersuites with TLSv1.3 should fail
- "CipherString" => "AES128-SHA",
- "Ciphersuites" => "",
- },
- "test" => {
- "ExpectedResult" => "ServerFail",
- }
- };
+
+ if (!$dtls && !(disabled("tls1_3")
+ || disabled("tls1_2")
+ || (disabled("ec") && disabled("dh"))))
+ {
+ #Add some version/ciphersuite sanity check tests
+ push @tests, {
+ "name" => "ciphersuite-sanity-check-tls-client",
+ "client" => {
+ #Offering only <=TLSv1.2 ciphersuites with TLSv1.3 should fail
+ "CipherString" => "AES128-SHA",
+ "Ciphersuites" => "",
+ },
+ "server" => {
+ "MaxProtocol" => "TLSv1.2"
+ },
+ "test" => {
+ "Method" => "TLS",
+ "ExpectedResult" => "ClientFail",
+ }
+ };
+ push @tests, {
+ "name" => "ciphersuite-sanity-check-tls-server",
+ "client" => {
+ "CipherString" => "AES128-SHA",
+ "MaxProtocol" => "TLSv1.2"
+ },
+ "server" => {
+ #Allowing only <=TLSv1.2 ciphersuites with TLSv1.3 should fail
+ "CipherString" => "AES128-SHA",
+ "Ciphersuites" => "",
+ },
+ "test" => {
+ "Method" => "TLS",
+ "ExpectedResult" => "ServerFail",
+ }
+ };
+ }
+
+ if ($dtls && !(disabled("dtls1_3")
+ || disabled("dtls1_2")
+ || (disabled("ec") && disabled("dh"))))
+ {
+ #Add some version/ciphersuite sanity check tests
+ push @tests, {
+ "name" => "ciphersuite-sanity-check-dtls-client",
+ "client" => {
+ #Offering only <=DTLSv1.2 ciphersuites with DTLSv1.3 should fail
+ "CipherString" => "AES128-SHA",
+ "Ciphersuites" => "",
+ },
+ "server" => {
+ "MaxProtocol" => "DTLSv1.2"
+ },
+ "test" => {
+ "Method" => "DTLS",
+ "ExpectedResult" => "ClientFail",
+ }
+ };
+ push @tests, {
+ "name" => "ciphersuite-sanity-check-dtls-server",
+ "client" => {
+ "CipherString" => "AES128-SHA",
+ "MaxProtocol" => "DTLSv1.2"
+ },
+ "server" => {
+ #Allowing only <=DTLSv1.2 ciphersuites with DTLSv1.3 should fail
+ "CipherString" => "AES128-SHA",
+ "Ciphersuites" => "",
+ },
+ "test" => {
+ "Method" => "DTLS",
+ "ExpectedResult" => "ServerFail",
+ }
+ };
+ }
return @tests;
}
if (!disabled("tls1_3") && (!disabled("ec") || !disabled("dh")) && !$dtls) {
push @client_tests, {
- "name" => "resumption-with-hrr",
+ "name" => "tls13-resumption-with-hrr",
"client" => {
},
"server" => {
};
}
+ if (!disabled("dtls1_3") && (!disabled("ec") || !disabled("dh")) && $dtls) {
+ push @client_tests, {
+ "name" => "dtls13-resumption-with-hrr",
+ "client" => {
+ },
+ "server" => {
+ "Curves" => disabled("ec") ? "ffdhe3072" : "P-256"
+ },
+ "resume_client" => {
+ },
+ "test" => {
+ "ExpectedProtocol" => "DTLSv1.3",
+ "Method" => "DTLS",
+ "HandshakeMode" => "Resume",
+ "ResumptionExpected" => "Yes",
+ }
+ };
+ }
+
return (@server_tests, @client_tests);
}