X-Git-Url: https://code.wpia.club/?a=blobdiff_plain;f=lib%2Fopenssl%2Ftest%2Fssl-tests%2F12-ct.conf;fp=lib%2Fopenssl%2Ftest%2Fssl-tests%2F12-ct.conf;h=22fa18dd45536396fc02e4df053f7d3bcd18f7f8;hb=02ed66432c92de70694700164f986190aad3cbc5;hp=0000000000000000000000000000000000000000;hpb=89016837dcbf2775cd15dc8cbaba00dc6379f86e;p=cassiopeia.git diff --git a/lib/openssl/test/ssl-tests/12-ct.conf b/lib/openssl/test/ssl-tests/12-ct.conf new file mode 100644 index 0000000..22fa18d --- /dev/null +++ b/lib/openssl/test/ssl-tests/12-ct.conf @@ -0,0 +1,135 @@ +# Generated with generate_ssl_tests.pl + +num_tests = 4 + +test-0 = 0-ct-permissive +test-1 = 1-ct-strict +test-2 = 2-ct-permissive-resumption +test-3 = 3-ct-strict-resumption +# =========================================================== + +[0-ct-permissive] +ssl_conf = 0-ct-permissive-ssl + +[0-ct-permissive-ssl] +server = 0-ct-permissive-server +client = 0-ct-permissive-client + +[0-ct-permissive-server] +Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem +CipherString = DEFAULT +PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem + +[0-ct-permissive-client] +CipherString = DEFAULT +VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem +VerifyMode = Peer + +[test-0] +ExpectedResult = Success +client = 0-ct-permissive-client-extra + +[0-ct-permissive-client-extra] +CTValidation = Permissive + + +# =========================================================== + +[1-ct-strict] +ssl_conf = 1-ct-strict-ssl + +[1-ct-strict-ssl] +server = 1-ct-strict-server +client = 1-ct-strict-client + +[1-ct-strict-server] +Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem +CipherString = DEFAULT +PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem + +[1-ct-strict-client] +CipherString = DEFAULT +VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem +VerifyMode = Peer + +[test-1] +ExpectedClientAlert = HandshakeFailure +ExpectedResult = ClientFail +client = 1-ct-strict-client-extra + +[1-ct-strict-client-extra] +CTValidation = Strict + + +# =========================================================== + +[2-ct-permissive-resumption] +ssl_conf = 2-ct-permissive-resumption-ssl + +[2-ct-permissive-resumption-ssl] +server = 2-ct-permissive-resumption-server +client = 2-ct-permissive-resumption-client +resume-server = 2-ct-permissive-resumption-server +resume-client = 2-ct-permissive-resumption-client + +[2-ct-permissive-resumption-server] +Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem +CipherString = DEFAULT +PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem + +[2-ct-permissive-resumption-client] +CipherString = DEFAULT +VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem +VerifyMode = Peer + +[test-2] +ExpectedResult = Success +HandshakeMode = Resume +ResumptionExpected = Yes +client = 2-ct-permissive-resumption-client-extra +resume-client = 2-ct-permissive-resumption-client-extra + +[2-ct-permissive-resumption-client-extra] +CTValidation = Permissive + + +# =========================================================== + +[3-ct-strict-resumption] +ssl_conf = 3-ct-strict-resumption-ssl + +[3-ct-strict-resumption-ssl] +server = 3-ct-strict-resumption-server +client = 3-ct-strict-resumption-client +resume-server = 3-ct-strict-resumption-server +resume-client = 3-ct-strict-resumption-resume-client + +[3-ct-strict-resumption-server] +Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem +CipherString = DEFAULT +PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem + +[3-ct-strict-resumption-client] +CipherString = DEFAULT +VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem +VerifyMode = Peer + +[3-ct-strict-resumption-resume-client] +CipherString = DEFAULT +VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem +VerifyMode = Peer + +[test-3] +ExpectedResult = Success +HandshakeMode = Resume +ResumptionExpected = Yes +client = 3-ct-strict-resumption-client-extra +resume-client = 3-ct-strict-resumption-resume-client-extra + +[3-ct-strict-resumption-client-extra] +CTValidation = Permissive + +[3-ct-strict-resumption-resume-client-extra] +CTValidation = Strict + +