2 # Copyright 2016-2016 The OpenSSL Project Authors. All Rights Reserved.
4 # Licensed under the OpenSSL license (the "License"). You may not use
5 # this file except in compliance with the License. You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
19 name => "renegotiate-client-no-resume",
21 "Options" => "NoResumptionOnRenegotiation"
26 "HandshakeMode" => "RenegotiateClient",
27 "ResumptionExpected" => "No",
28 "ExpectedResult" => "Success"
32 name => "renegotiate-client-resume",
37 "HandshakeMode" => "RenegotiateClient",
38 "ResumptionExpected" => "Yes",
39 "ExpectedResult" => "Success"
42 # Note: Unlike the TLS tests, we will never do resumption with server
43 # initiated reneg. This is because an OpenSSL DTLS client will always do a full
44 # handshake (i.e. it doesn't supply a session id) when it receives a
45 # HelloRequest. This is different to the OpenSSL TLS implementation where an
46 # OpenSSL client will always try an abbreviated handshake (i.e. it will supply
47 # the session id). This goes all the way to commit 48ae85b6f when abbreviated
48 # handshake support was first added. Neither behaviour is wrong, but the
49 # discrepancy is strange. TODO: Should we harmonise the TLS and DTLS behaviour,
52 name => "renegotiate-server-resume",
57 "HandshakeMode" => "RenegotiateServer",
58 "ResumptionExpected" => "No",
59 "ExpectedResult" => "Success"
63 name => "renegotiate-client-auth-require",
65 "VerifyCAFile" => test_pem("root-cert.pem"),
66 "VerifyMode" => "Require",
69 "Certificate" => test_pem("ee-client-chain.pem"),
70 "PrivateKey" => test_pem("ee-key.pem"),
74 "HandshakeMode" => "RenegotiateServer",
75 "ResumptionExpected" => "No",
76 "ExpectedResult" => "Success"
80 name => "renegotiate-client-auth-once",
82 "VerifyCAFile" => test_pem("root-cert.pem"),
83 "VerifyMode" => "Once",
86 "Certificate" => test_pem("ee-client-chain.pem"),
87 "PrivateKey" => test_pem("ee-key.pem"),
91 "HandshakeMode" => "RenegotiateServer",
92 "ResumptionExpected" => "No",
93 "ExpectedResult" => "Success"
97 name => "renegotiate-aead-to-non-aead",
99 "Options" => "NoResumptionOnRenegotiation"
102 "CipherString" => "AES128-GCM-SHA256",
104 "RenegotiateCiphers" => "AES128-SHA"
109 "HandshakeMode" => "RenegotiateClient",
110 "ResumptionExpected" => "No",
111 "ExpectedResult" => "Success"
115 name => "renegotiate-non-aead-to-aead",
117 "Options" => "NoResumptionOnRenegotiation"
120 "CipherString" => "AES128-SHA",
122 "RenegotiateCiphers" => "AES128-GCM-SHA256"
127 "HandshakeMode" => "RenegotiateClient",
128 "ResumptionExpected" => "No",
129 "ExpectedResult" => "Success"
133 name => "renegotiate-non-aead-to-non-aead",
135 "Options" => "NoResumptionOnRenegotiation"
138 "CipherString" => "AES128-SHA",
140 "RenegotiateCiphers" => "AES256-SHA"
145 "HandshakeMode" => "RenegotiateClient",
146 "ResumptionExpected" => "No",
147 "ExpectedResult" => "Success"
151 name => "renegotiate-aead-to-aead",
153 "Options" => "NoResumptionOnRenegotiation"
156 "CipherString" => "AES128-GCM-SHA256",
158 "RenegotiateCiphers" => "AES256-GCM-SHA384"
163 "HandshakeMode" => "RenegotiateClient",
164 "ResumptionExpected" => "No",
165 "ExpectedResult" => "Success"