|
Packit |
549fdc |
/*
|
|
Packit |
549fdc |
* Copyright (C) 2017 Red Hat, Inc.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* Author: Nikos Mavrogiannopoulos
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* This file is part of GnuTLS.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* GnuTLS is free software; you can redistribute it and/or modify it
|
|
Packit |
549fdc |
* under the terms of the GNU General Public License as published by
|
|
Packit |
549fdc |
* the Free Software Foundation; either version 3 of the License, or
|
|
Packit |
549fdc |
* (at your option) any later version.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* GnuTLS is distributed in the hope that it will be useful, but
|
|
Packit |
549fdc |
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
Packit |
549fdc |
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Packit |
549fdc |
* General Public License for more details.
|
|
Packit |
549fdc |
*
|
|
Packit |
549fdc |
* You should have received a copy of the GNU Lesser General Public License
|
|
Packit |
549fdc |
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
Packit |
549fdc |
*/
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#ifdef HAVE_CONFIG_H
|
|
Packit |
549fdc |
#include <config.h>
|
|
Packit |
549fdc |
#endif
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
/* This program tests the ciphersuite negotiation for various key exchange
|
|
Packit |
549fdc |
* methods and options. */
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#include <stdio.h>
|
|
Packit |
549fdc |
#include <stdlib.h>
|
|
Packit |
549fdc |
#include <string.h>
|
|
Packit |
549fdc |
#include <errno.h>
|
|
Packit |
549fdc |
#include <gnutls/gnutls.h>
|
|
Packit |
549fdc |
#include "utils.h"
|
|
Packit |
549fdc |
#include "cert-common.h"
|
|
Packit |
549fdc |
#include "eagain-common.h"
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
#include "server-kx-neg-common.c"
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
test_case_st tests[] = {
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ANON-DH without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ANON-DH with cred but no DH params",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_anon_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ANON-DH with cred and DH params (level)",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_anon_cred = 1,
|
|
Packit |
549fdc |
.have_anon_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ANON-DH with cred and DH params (explicit)",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_anon_cred = 1,
|
|
Packit |
549fdc |
.have_anon_exp_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ANON-DH:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred but no DH params or cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and cert but no DH params",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and DH params but no cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_cert_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and incompatible cert and DH params",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.have_cert_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and cert and DH params (level)",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_cert_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and cert and DH params (explicit)",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_cert_exp_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-RSA with cred and multiple certs and DH params",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.have_cert_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-PSK without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-PSK with cred but no DH params",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-PSK with cred and DH params (level)",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.have_psk_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 DHE-PSK with cred and DH params (explicit)",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.have_psk_exp_dh_params = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+DHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred but no common curve or cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP256R1",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP384R1"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred and cert but no common curve",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP256R1",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP384R1"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred and common curve but no cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred and incompatible cert and common curve",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred and cert and common curve",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-RSA with cred and multiple certs and common curve",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred but no common curve or cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP256R1",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP384R1"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and cert but no common curve",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP256R1",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP384R1"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and common curve but no ECDSA cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and common curve but no cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and cert and common curve",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and multiple certs and common curve",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and ed25519 cert",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_ed25519_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-ECDSA with cred and cert but incompatible (ed25519) curves",
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_ed25519_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-ECDSA:-VERS-ALL:+VERS-TLS1.2:-CURVE-ED25519:-SIGN-EDDSA-ED25519"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-PSK without cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-PSK with cred but no common curve",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP256R1",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2:-CURVE-ALL:+CURVE-SECP384R1"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 ECDHE-PSK with cred and common curve",
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+ECDHE-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 RSA-PSK without cert cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 RSA-PSK without psk cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_psk_cred = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 RSA-PSK with cred but invalid cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 RSA-PSK with cred",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 RSA-PSK with cred and multiple certs",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_psk_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+RSA-PSK:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP-RSA without cert cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.have_srp_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP-RSA without srp cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_srp_cred = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP-RSA with cred but invalid cert",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_NO_CIPHER_SUITES,
|
|
Packit |
549fdc |
.have_srp_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP-RSA with cred",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_srp_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP-RSA with cred and multiple certs",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_srp_cred = 1,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.have_rsa_sign_cert = 1,
|
|
Packit |
549fdc |
.have_ecc_sign_cert = 1,
|
|
Packit |
549fdc |
.have_rsa_decrypt_cert = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP-RSA:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP without srp cred",
|
|
Packit |
549fdc |
.client_ret = GNUTLS_E_AGAIN,
|
|
Packit |
549fdc |
.server_ret = GNUTLS_E_INSUFFICIENT_CREDENTIALS,
|
|
Packit |
549fdc |
.have_srp_cred = 0,
|
|
Packit |
549fdc |
.have_cert_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
},
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
.name = "TLS 1.2 SRP with cred",
|
|
Packit |
549fdc |
.server_ret = 0,
|
|
Packit |
549fdc |
.client_ret = 0,
|
|
Packit |
549fdc |
.have_srp_cred = 1,
|
|
Packit |
549fdc |
.server_prio = "NORMAL:-KX-ALL:+SRP:-VERS-ALL:+VERS-TLS1.2",
|
|
Packit |
549fdc |
.client_prio = "NORMAL:-KX-ALL:+SRP:-VERS-ALL:+VERS-TLS1.2"
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
};
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
void doit(void)
|
|
Packit |
549fdc |
{
|
|
Packit |
549fdc |
unsigned i;
|
|
Packit |
549fdc |
global_init();
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
for (i=0;i
|
|
Packit |
549fdc |
try(&tests[i]);
|
|
Packit |
549fdc |
}
|
|
Packit |
549fdc |
|
|
Packit |
549fdc |
gnutls_global_deinit();
|
|
Packit |
549fdc |
}
|