Reduce the security bits for MD5 and SHA1 based signatures in TLS
[openssl.git] / test / ssl-tests / 20-cert-select.cnf.in
index 38cac87ceaccfb8d66a64c2f22dfadcd12fee5c0..228ba88cf37491dbceafef4bb82898637b3bdaf5 100644 (file)
@@ -201,8 +201,18 @@ our @tests = (
     },
     {
         name => "ECDSA Signature Algorithm Selection SHA1",
-        server => $server,
+        server => {
+            "CipherString" => "DEFAULT:\@SECLEVEL=0",
+            "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
+            "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
+            "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
+            "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
+            "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
+            "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
+            "MaxProtocol" => "TLSv1.2"
+        },
         client => {
+            "CipherString" => "DEFAULT:\@SECLEVEL=0",
             "SignatureAlgorithms" => "ECDSA+SHA1",
         },
         test   => {
@@ -669,8 +679,19 @@ my @tests_tls_1_3 = (
     },
     {
         name => "TLS 1.3 ECDSA Signature Algorithm Selection SHA1",
-        server => $server_tls_1_3,
+        server => {
+            "CipherString" => "DEFAULT:\@SECLEVEL=0",
+            "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
+            "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
+            "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
+            "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
+            "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
+            "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
+            "MinProtocol" => "TLSv1.3",
+            "MaxProtocol" => "TLSv1.3"
+        },
         client => {
+            "CipherString" => "DEFAULT:\@SECLEVEL=0",
             "SignatureAlgorithms" => "ECDSA+SHA1",
         },
         test   => {