![David Garske](/assets/img/avatar_default.png)
* Added test for certificate with bad alt name containing a null character mid byte stream. * Fix for issue with suites unit test where last arg in file doesn't conain data for a param, causing it to skip test. * Fix for last test in tests/test.conf not being run for `TLSv1.2 RSA 3072-bit DH 3072-bit`. * Moved the `tls-cert-fail.test` tests into the new expected failure suite test (`./tests/test-fails.conf`). Now it explicilty checks RSA and ECC for the no signer and no sig tests.
303 lines
4.2 KiB
Plaintext
303 lines
4.2 KiB
Plaintext
# No Hint server TLSv1.2 PSK-CHACHA20-POLY1305
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint client TLSv1.2 PSK-CHACHA20-POLY1305
|
|
-s
|
|
-v 3
|
|
-l PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint server TLSv1.2 DHE-PSK-CHACHA20-POLY1305
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l DHE-PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint client TLSv1.2 DHE-PSK-CHACHA20-POLY1305
|
|
-s
|
|
-v 3
|
|
-l DHE-PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint server TLSv1.2 ECDHE-PSK-CHACHA20-POLY1305
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l ECDHE-PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint client TLSv1.2 ECDHE-PSK-CHACHA20-POLY1305
|
|
-s
|
|
-v 3
|
|
-l ECDHE-PSK-CHACHA20-POLY1305
|
|
|
|
# No Hint server TLSv1 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint client TLSv1 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-v 1
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint server TLSv1.1 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint client TLSv1.1 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-v 2
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint server TLSv1.2 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint client TLSv1.2 ECDHE-PSK-AES128-SHA256
|
|
-s
|
|
-v 3
|
|
-l ECDHE-PSK-AES128-SHA256
|
|
|
|
# No Hint server TLSv1 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint client TLSv1 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-v 1
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint server TLSv1.1 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint client TLSv1.1 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-v 2
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint server TLSv1.2 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint client TLSv1.2 ECDHE-PSK-NULL-SHA256
|
|
-s
|
|
-v 3
|
|
-l ECDHE-PSK-NULL-SHA256
|
|
|
|
# No Hint server TLSv1 PSK-AES128
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint client TLSv1 PSK-AES128
|
|
-s
|
|
-v 1
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint server TLSv1 PSK-AES256
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint client TLSv1 PSK-AES256
|
|
-s
|
|
-v 1
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint server TLSv1.1 PSK-AES128
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint client TLSv1.1 PSK-AES128
|
|
-s
|
|
-v 2
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint server TLSv1.1 PSK-AES256
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint client TLSv1.1 PSK-AES256
|
|
-s
|
|
-v 2
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint server TLSv1.2 PSK-AES128
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint client TLSv1.2 PSK-AES128
|
|
-s
|
|
-v 3
|
|
-l PSK-AES128-CBC-SHA
|
|
|
|
# No Hint server TLSv1.2 PSK-AES256
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint client TLSv1.2 PSK-AES256
|
|
-s
|
|
-v 3
|
|
-l PSK-AES256-CBC-SHA
|
|
|
|
# No Hint server TLSv1.0 PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint client TLSv1.0 PSK-AES128-SHA256
|
|
-s
|
|
-v 1
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint server TLSv1.1 PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint client TLSv1.1 PSK-AES128-SHA256
|
|
-s
|
|
-v 2
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint server TLSv1.2 PSK-AES128-SHA256
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint client TLSv1.2 PSK-AES128-SHA256
|
|
-s
|
|
-v 3
|
|
-l PSK-AES128-CBC-SHA256
|
|
|
|
# No Hint server TLSv1.0 PSK-AES256-SHA384
|
|
-s
|
|
-I
|
|
-v 1
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# No Hint client TLSv1.0 PSK-AES256-SHA384
|
|
-s
|
|
-v 1
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# No Hint server TLSv1.1 PSK-AES256-SHA384
|
|
-s
|
|
-I
|
|
-v 2
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# No Hint client TLSv1.1 PSK-AES256-SHA384
|
|
-s
|
|
-v 2
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# No Hint server TLSv1.2 PSK-AES256-SHA384
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# No Hint client TLSv1.2 PSK-AES256-SHA384
|
|
-s
|
|
-v 3
|
|
-l PSK-AES256-CBC-SHA384
|
|
|
|
# server TLSv1.2 PSK-AES128-GCM-SHA256
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES128-GCM-SHA256
|
|
|
|
# client TLSv1.2 PSK-AES128-GCM-SHA256
|
|
-s
|
|
-v 3
|
|
-l PSK-AES128-GCM-SHA256
|
|
|
|
# server TLSv1.2 PSK-AES256-GCM-SHA384
|
|
-s
|
|
-I
|
|
-v 3
|
|
-l PSK-AES256-GCM-SHA384
|
|
|
|
# client TLSv1.2 PSK-AES256-GCM-SHA384
|
|
-s
|
|
-v 3
|
|
-l PSK-AES256-GCM-SHA384
|
|
|
|
# server TLSv1.3 AES128-GCM-SHA256
|
|
-s
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
|
|
# client TLSv1.3 AES128-GCM-SHA256
|
|
-s
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
|
|
# server TLSv1.3 accepting EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|
|
-0
|
|
|
|
# client TLSv1.3 sending EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|
|
-0
|
|
|
|
# server TLSv1.3 not accepting EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|
|
|
|
# client TLSv1.3 sending EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|
|
-0
|
|
|
|
# server TLSv1.3 accepting EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|
|
-0
|
|
|
|
# client TLSv1.3 not sending EarlyData using PSK
|
|
-v 4
|
|
-l TLS13-AES128-GCM-SHA256
|
|
-r
|
|
-s
|