Send and Receive a TLSv1.3 format ServerHello
[openssl.git] / test / ssl-tests / 12-ct.conf
1 # Generated with generate_ssl_tests.pl
2
3 num_tests = 4
4
5 test-0 = 0-ct-permissive
6 test-1 = 1-ct-strict
7 test-2 = 2-ct-permissive-resumption
8 test-3 = 3-ct-strict-resumption
9 # ===========================================================
10
11 [0-ct-permissive]
12 ssl_conf = 0-ct-permissive-ssl
13
14 [0-ct-permissive-ssl]
15 server = 0-ct-permissive-server
16 client = 0-ct-permissive-client
17
18 [0-ct-permissive-server]
19 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
20 CipherString = DEFAULT
21 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
22
23 [0-ct-permissive-client]
24 CipherString = DEFAULT
25 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
26 VerifyMode = Peer
27
28 [test-0]
29 ExpectedResult = Success
30 client = 0-ct-permissive-client-extra
31
32 [0-ct-permissive-client-extra]
33 CTValidation = Permissive
34
35
36 # ===========================================================
37
38 [1-ct-strict]
39 ssl_conf = 1-ct-strict-ssl
40
41 [1-ct-strict-ssl]
42 server = 1-ct-strict-server
43 client = 1-ct-strict-client
44
45 [1-ct-strict-server]
46 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
47 CipherString = DEFAULT
48 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
49
50 [1-ct-strict-client]
51 CipherString = DEFAULT
52 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
53 VerifyMode = Peer
54
55 [test-1]
56 ExpectedClientAlert = HandshakeFailure
57 ExpectedResult = ClientFail
58 client = 1-ct-strict-client-extra
59
60 [1-ct-strict-client-extra]
61 CTValidation = Strict
62
63
64 # ===========================================================
65
66 [2-ct-permissive-resumption]
67 ssl_conf = 2-ct-permissive-resumption-ssl
68
69 [2-ct-permissive-resumption-ssl]
70 server = 2-ct-permissive-resumption-server
71 client = 2-ct-permissive-resumption-client
72 resume-server = 2-ct-permissive-resumption-server
73 resume-client = 2-ct-permissive-resumption-client
74
75 [2-ct-permissive-resumption-server]
76 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
77 CipherString = DEFAULT
78 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
79
80 [2-ct-permissive-resumption-client]
81 CipherString = DEFAULT
82 MaxProtocol = TLSv1.2
83 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
84 VerifyMode = Peer
85
86 [test-2]
87 ExpectedResult = Success
88 HandshakeMode = Resume
89 ResumptionExpected = Yes
90 client = 2-ct-permissive-resumption-client-extra
91 resume-client = 2-ct-permissive-resumption-client-extra
92
93 [2-ct-permissive-resumption-client-extra]
94 CTValidation = Permissive
95
96
97 # ===========================================================
98
99 [3-ct-strict-resumption]
100 ssl_conf = 3-ct-strict-resumption-ssl
101
102 [3-ct-strict-resumption-ssl]
103 server = 3-ct-strict-resumption-server
104 client = 3-ct-strict-resumption-client
105 resume-server = 3-ct-strict-resumption-server
106 resume-client = 3-ct-strict-resumption-resume-client
107
108 [3-ct-strict-resumption-server]
109 Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
110 CipherString = DEFAULT
111 PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
112
113 [3-ct-strict-resumption-client]
114 CipherString = DEFAULT
115 MaxProtocol = TLSv1.2
116 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
117 VerifyMode = Peer
118
119 [3-ct-strict-resumption-resume-client]
120 CipherString = DEFAULT
121 MaxProtocol = TLSv1.2
122 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
123 VerifyMode = Peer
124
125 [test-3]
126 ExpectedResult = Success
127 HandshakeMode = Resume
128 ResumptionExpected = Yes
129 client = 3-ct-strict-resumption-client-extra
130 resume-client = 3-ct-strict-resumption-resume-client-extra
131
132 [3-ct-strict-resumption-client-extra]
133 CTValidation = Permissive
134
135 [3-ct-strict-resumption-resume-client-extra]
136 CTValidation = Strict
137
138