|
|
9b88be |
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in
|
|
|
9b88be |
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in.no-brainpool 2019-09-10 15:13:07.000000000 +0200
|
|
|
9b88be |
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.in 2019-09-13 15:11:07.358687169 +0200
|
|
|
9b88be |
@@ -147,22 +147,22 @@ our @tests = (
|
|
|
9b88be |
{
|
|
|
9b88be |
name => "ECDSA with brainpool",
|
|
|
9b88be |
server => {
|
|
|
9b88be |
- "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
|
|
|
9b88be |
- "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
|
|
|
9b88be |
- "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
+ "Certificate" => test_pem("server-ecdsa-cert.pem"),
|
|
|
9b88be |
+ "PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
|
|
9b88be |
+# "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
},
|
|
|
9b88be |
client => {
|
|
|
9b88be |
#We don't restrict this to TLSv1.2, although use of brainpool
|
|
|
9b88be |
#should force this anyway so that this should succeed
|
|
|
9b88be |
"CipherString" => "aECDSA",
|
|
|
9b88be |
"RequestCAFile" => test_pem("root-cert.pem"),
|
|
|
9b88be |
- "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
+# "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
},
|
|
|
9b88be |
test => {
|
|
|
9b88be |
- "ExpectedServerCertType" =>, "brainpoolP256r1",
|
|
|
9b88be |
- "ExpectedServerSignType" =>, "EC",
|
|
|
9b88be |
+# "ExpectedServerCertType" =>, "brainpoolP256r1",
|
|
|
9b88be |
+# "ExpectedServerSignType" =>, "EC",
|
|
|
9b88be |
# Note: certificate_authorities not sent for TLS < 1.3
|
|
|
9b88be |
- "ExpectedServerCANames" =>, "empty",
|
|
|
9b88be |
+# "ExpectedServerCANames" =>, "empty",
|
|
|
9b88be |
"ExpectedResult" => "Success"
|
|
|
9b88be |
},
|
|
|
9b88be |
},
|
|
|
9b88be |
@@ -853,18 +853,18 @@ my @tests_tls_1_3 = (
|
|
|
9b88be |
{
|
|
|
9b88be |
name => "TLS 1.3 ECDSA with brainpool",
|
|
|
9b88be |
server => {
|
|
|
9b88be |
- "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
|
|
|
9b88be |
- "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
|
|
|
9b88be |
- "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
+ "Certificate" => test_pem("server-ecdsa-cert.pem"),
|
|
|
9b88be |
+ "PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
|
|
9b88be |
+# "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
},
|
|
|
9b88be |
client => {
|
|
|
9b88be |
"RequestCAFile" => test_pem("root-cert.pem"),
|
|
|
9b88be |
- "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
+# "Groups" => "brainpoolP256r1",
|
|
|
9b88be |
"MinProtocol" => "TLSv1.3",
|
|
|
9b88be |
"MaxProtocol" => "TLSv1.3"
|
|
|
9b88be |
},
|
|
|
9b88be |
test => {
|
|
|
9b88be |
- "ExpectedResult" => "ServerFail"
|
|
|
9b88be |
+ "ExpectedResult" => "Success"
|
|
|
9b88be |
},
|
|
|
9b88be |
},
|
|
|
9b88be |
);
|
|
|
9b88be |
diff -up openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool openssl-1.1.1d/test/ssl-tests/20-cert-select.conf
|
|
|
9b88be |
--- openssl-1.1.1d/test/ssl-tests/20-cert-select.conf.no-brainpool 2019-09-10 15:13:07.000000000 +0200
|
|
|
9b88be |
+++ openssl-1.1.1d/test/ssl-tests/20-cert-select.conf 2019-09-13 15:12:27.380288469 +0200
|
|
|
9b88be |
@@ -238,23 +238,18 @@ server = 5-ECDSA with brainpool-server
|
|
|
9b88be |
client = 5-ECDSA with brainpool-client
|
|
|
9b88be |
|
|
|
9b88be |
[5-ECDSA with brainpool-server]
|
|
|
9b88be |
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
|
|
|
9b88be |
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
|
|
9b88be |
CipherString = DEFAULT
|
|
|
9b88be |
-Groups = brainpoolP256r1
|
|
|
9b88be |
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
|
|
|
9b88be |
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
|
|
9b88be |
|
|
|
9b88be |
[5-ECDSA with brainpool-client]
|
|
|
9b88be |
CipherString = aECDSA
|
|
|
9b88be |
-Groups = brainpoolP256r1
|
|
|
9b88be |
RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|
|
9b88be |
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
|
|
9b88be |
VerifyMode = Peer
|
|
|
9b88be |
|
|
|
9b88be |
[test-5]
|
|
|
9b88be |
ExpectedResult = Success
|
|
|
9b88be |
-ExpectedServerCANames = empty
|
|
|
9b88be |
-ExpectedServerCertType = brainpoolP256r1
|
|
|
9b88be |
-ExpectedServerSignType = EC
|
|
|
9b88be |
|
|
|
9b88be |
|
|
|
9b88be |
# ===========================================================
|
|
|
9b88be |
@@ -1713,14 +1708,12 @@ server = 52-TLS 1.3 ECDSA with brainpool
|
|
|
9b88be |
client = 52-TLS 1.3 ECDSA with brainpool-client
|
|
|
9b88be |
|
|
|
9b88be |
[52-TLS 1.3 ECDSA with brainpool-server]
|
|
|
9b88be |
-Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-cert.pem
|
|
|
9b88be |
+Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
|
|
9b88be |
CipherString = DEFAULT
|
|
|
9b88be |
-Groups = brainpoolP256r1
|
|
|
9b88be |
-PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-brainpoolP256r1-key.pem
|
|
|
9b88be |
+PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
|
|
9b88be |
|
|
|
9b88be |
[52-TLS 1.3 ECDSA with brainpool-client]
|
|
|
9b88be |
CipherString = DEFAULT
|
|
|
9b88be |
-Groups = brainpoolP256r1
|
|
|
9b88be |
MaxProtocol = TLSv1.3
|
|
|
9b88be |
MinProtocol = TLSv1.3
|
|
|
9b88be |
RequestCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|
|
9b88be |
@@ -1728,7 +1721,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/ro
|
|
|
9b88be |
VerifyMode = Peer
|
|
|
9b88be |
|
|
|
9b88be |
[test-52]
|
|
|
9b88be |
-ExpectedResult = ServerFail
|
|
|
9b88be |
+ExpectedResult = Success
|
|
|
9b88be |
|
|
|
9b88be |
|
|
|
9b88be |
# ===========================================================
|