# Generated with generate_ssl_tests.pl num_tests = 4 test-0 = 0-ct-permissive test-1 = 1-ct-strict test-2 = 2-ct-permissive-resumption test-3 = 3-ct-strict-resumption # =========================================================== [0-ct-permissive] ssl_conf = 0-ct-permissive-ssl [0-ct-permissive-ssl] server = 0-ct-permissive-server client = 0-ct-permissive-client [0-ct-permissive-server] Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem CipherString = DEFAULT PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem [0-ct-permissive-client] CipherString = DEFAULT VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyMode = Peer [test-0] ExpectedResult = Success client = 0-ct-permissive-client-extra [0-ct-permissive-client-extra] CTValidation = Permissive # =========================================================== [1-ct-strict] ssl_conf = 1-ct-strict-ssl [1-ct-strict-ssl] server = 1-ct-strict-server client = 1-ct-strict-client [1-ct-strict-server] Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem CipherString = DEFAULT PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem [1-ct-strict-client] CipherString = DEFAULT VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyMode = Peer [test-1] ExpectedClientAlert = HandshakeFailure ExpectedResult = ClientFail client = 1-ct-strict-client-extra [1-ct-strict-client-extra] CTValidation = Strict # =========================================================== [2-ct-permissive-resumption] ssl_conf = 2-ct-permissive-resumption-ssl [2-ct-permissive-resumption-ssl] server = 2-ct-permissive-resumption-server client = 2-ct-permissive-resumption-client resume-server = 2-ct-permissive-resumption-server resume-client = 2-ct-permissive-resumption-client [2-ct-permissive-resumption-server] Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem CipherString = DEFAULT PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem [2-ct-permissive-resumption-client] CipherString = DEFAULT MaxProtocol = TLSv1.2 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyMode = Peer [test-2] ExpectedResult = Success HandshakeMode = Resume ResumptionExpected = Yes client = 2-ct-permissive-resumption-client-extra resume-client = 2-ct-permissive-resumption-client-extra [2-ct-permissive-resumption-client-extra] CTValidation = Permissive # =========================================================== [3-ct-strict-resumption] ssl_conf = 3-ct-strict-resumption-ssl [3-ct-strict-resumption-ssl] server = 3-ct-strict-resumption-server client = 3-ct-strict-resumption-client resume-server = 3-ct-strict-resumption-server resume-client = 3-ct-strict-resumption-resume-client [3-ct-strict-resumption-server] Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem CipherString = DEFAULT PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem [3-ct-strict-resumption-client] CipherString = DEFAULT MaxProtocol = TLSv1.2 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyMode = Peer [3-ct-strict-resumption-resume-client] CipherString = DEFAULT MaxProtocol = TLSv1.2 VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyMode = Peer [test-3] ExpectedResult = Success HandshakeMode = Resume ResumptionExpected = Yes client = 3-ct-strict-resumption-client-extra resume-client = 3-ct-strict-resumption-resume-client-extra [3-ct-strict-resumption-client-extra] CTValidation = Permissive [3-ct-strict-resumption-resume-client-extra] CTValidation = Strict