tls: ban SSL3, TLS1, TLS1.1 and DTLS1.0 at security level one and above
[openssl.git] / test / ssl-tests / 12-ct.cnf.in
1 # -*- mode: perl; -*-
2 # Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
3 #
4 # Licensed under the Apache License 2.0 (the "License").  You may not use
5 # this file except in compliance with the License.  You can obtain a copy
6 # in the file LICENSE in the source distribution or at
7 # https://www.openssl.org/source/license.html
8
9
10 ## Test version negotiation
11
12 use strict;
13 use warnings;
14
15 package ssltests;
16
17
18 our @tests = (
19     {
20         name => "ct-permissive-without-scts",
21         server => {
22             "CipherString" => 'DEFAULT@SECLEVEL=1',
23         },
24         client => {
25             "CipherString" => 'DEFAULT@SECLEVEL=1',
26             extra => {
27                 "CTValidation" => "Permissive",
28             },
29         },
30         test => {
31             "ExpectedResult" => "Success",
32         },
33     },
34     {
35         name => "ct-permissive-with-scts",
36         server => {
37             "CipherString" => 'DEFAULT@SECLEVEL=1',
38             "Certificate" => test_pem("embeddedSCTs1.pem"),
39             "PrivateKey"  => test_pem("embeddedSCTs1-key.pem"),
40         },
41         client => {
42             "CipherString" => 'DEFAULT@SECLEVEL=1',
43             "VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
44             extra => {
45                 "CTValidation" => "Permissive",
46             },
47         },
48         test => {
49             "ExpectedResult" => "Success",
50         },
51     },
52     {
53         name => "ct-strict-without-scts",
54         server => {
55             "CipherString" => 'DEFAULT@SECLEVEL=1',
56         },
57         client => {
58             "CipherString" => 'DEFAULT@SECLEVEL=1',
59             extra => {
60                 "CTValidation" => "Strict",
61             },
62         },
63         test => {
64             "ExpectedResult" => "ClientFail",
65             "ExpectedClientAlert" => "HandshakeFailure",
66         },
67     },
68     {
69         name => "ct-strict-with-scts",
70         server => {
71             "CipherString" => 'DEFAULT@SECLEVEL=1',
72             "Certificate" => test_pem("embeddedSCTs1.pem"),
73             "PrivateKey"  => test_pem("embeddedSCTs1-key.pem"),
74         },
75         client => {
76             "CipherString" => 'DEFAULT@SECLEVEL=1',
77             "VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
78             extra => {
79                 "CTValidation" => "Strict",
80             },
81         },
82         test => {
83             "ExpectedResult" => "Success",
84         },
85     },
86     {
87         name => "ct-permissive-resumption",
88         server => {
89             "CipherString" => 'DEFAULT@SECLEVEL=1',
90             "Certificate" => test_pem("embeddedSCTs1.pem"),
91             "PrivateKey"  => test_pem("embeddedSCTs1-key.pem"),
92         },
93         client => {
94             "CipherString" => 'DEFAULT@SECLEVEL=1',
95             "VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
96             extra => {
97                 "CTValidation" => "Permissive",
98             },
99         },
100         test => {
101             "HandshakeMode" => "Resume",
102             "ResumptionExpected" => "Yes",
103             "ExpectedResult" => "Success",
104         },
105     },
106     {
107         name => "ct-strict-resumption",
108         server => {
109             "CipherString" => 'DEFAULT@SECLEVEL=1',
110             "Certificate" => test_pem("embeddedSCTs1.pem"),
111             "PrivateKey"  => test_pem("embeddedSCTs1-key.pem"),
112         },
113         client => {
114             "CipherString" => 'DEFAULT@SECLEVEL=1',
115             "VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
116             extra => {
117                 "CTValidation" => "Strict",
118             },
119         },
120         # SCTs are not present during resumption, so the resumption
121         # should succeed.
122         resume_client => {
123             extra => {
124                 "CTValidation" => "Strict",
125             },
126         },
127         test => {
128             "HandshakeMode" => "Resume",
129             "ResumptionExpected" => "Yes",
130             "ExpectedResult" => "Success",
131         },
132     },
133 );