use warnings;
package ssltests;
+use OpenSSL::Test::Utils;
our @tests = (
{
name => "SNI-switch-context",
- server => { },
- server2 => { },
- client => { },
- test => { "ServerName" => "server2",
- "ExpectedServerName" => "server2",
- "ServerNameCallback" => "IgnoreMismatch",
- "ExpectedResult" => "Success" },
+ server => {
+ extra => {
+ "ServerNameCallback" => "IgnoreMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "server2",
+ },
+ },
+ test => {
+ "ExpectedServerName" => "server2",
+ "ExpectedResult" => "Success"
+ },
},
{
name => "SNI-keep-context",
- server => { },
- server2 => { },
- client => { },
- test => { "ServerName" => "server1",
- "ExpectedServerName" => "server1",
- "ServerNameCallback" => "IgnoreMismatch",
- "ExpectedResult" => "Success" },
+ server => {
+ extra => {
+ "ServerNameCallback" => "IgnoreMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "server1",
+ },
+ },
+ test => {
+ "ExpectedServerName" => "server1",
+ "ExpectedResult" => "Success"
+ },
},
{
name => "SNI-no-server-support",
server => { },
- client => { },
- test => { "ServerName" => "server1",
- "ExpectedResult" => "Success" },
+ client => {
+ extra => {
+ "ServerName" => "server1",
+ },
+ },
+ test => { "ExpectedResult" => "Success" },
},
{
name => "SNI-no-client-support",
- server => { },
- server2 => { },
+ server => {
+ extra => {
+ "ServerNameCallback" => "IgnoreMismatch",
+ },
+ },
client => { },
test => {
# We expect that the callback is still called
# to let the application decide whether they tolerate
# missing SNI (as our test callback does).
"ExpectedServerName" => "server1",
- "ServerNameCallback" => "IgnoreMismatch",
"ExpectedResult" => "Success"
},
},
{
name => "SNI-bad-sni-ignore-mismatch",
- server => { },
- server2 => { },
- client => { },
- test => { "ServerName" => "invalid",
- "ExpectedServerName" => "server1",
- "ServerNameCallback" => "IgnoreMismatch",
- "ExpectedResult" => "Success" },
+ server => {
+ extra => {
+ "ServerNameCallback" => "IgnoreMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "invalid",
+ },
+ },
+ test => {
+ "ExpectedServerName" => "server1",
+ "ExpectedResult" => "Success"
+ },
},
{
name => "SNI-bad-sni-reject-mismatch",
- server => { },
- server2 => { },
- client => { },
- test => { "ServerName" => "invalid",
- "ServerNameCallback" => "RejectMismatch",
- "ExpectedResult" => "ServerFail",
- "ServerAlert" => "UnrecognizedName"},
+ server => {
+ extra => {
+ "ServerNameCallback" => "RejectMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "invalid",
+ },
+ },
+ test => {
+ "ExpectedResult" => "ServerFail",
+ "ExpectedServerAlert" => "UnrecognizedName"
+ },
+ },
+ {
+ name => "SNI-bad-clienthello-sni-ignore-mismatch",
+ server => {
+ extra => {
+ "ServerNameCallback" => "ClientHelloIgnoreMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "invalid",
+ },
+ },
+ test => {
+ "ExpectedServerName" => "server1",
+ "ExpectedResult" => "Success"
+ },
+ },
+ {
+ name => "SNI-bad-clienthello-sni-reject-mismatch",
+ server => {
+ extra => {
+ "ServerNameCallback" => "ClientHelloRejectMismatch",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "invalid",
+ },
+ },
+ test => {
+ "ExpectedResult" => "ServerFail",
+ "ExpectedServerAlert" => "UnrecognizedName"
+ },
+ },
+);
+
+our @tests_tls_1_1 = (
+ {
+ name => "SNI-clienthello-disable-v12",
+ server => {
+ extra => {
+ "ServerNameCallback" => "ClientHelloNoV12",
+ },
+ },
+ client => {
+ extra => {
+ "ServerName" => "server2",
+ },
+ },
+ test => {
+ "ExpectedProtocol" => "TLSv1.1",
+ "ExpectedServerName" => "server2",
+ },
},
);
+
+push @tests, @tests_tls_1_1 unless disabled("tls1_1");