blob: 5611510bc79305ca77f20ed27b9e0bc9fc3e1d2b [file] [log] [blame]
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001#!/bin/sh
2
3# tls13-compat.sh
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19#
20# Purpose
21#
22# List TLS1.3 compat test cases. They are generated by
Ronald Cronbc5adf42022-10-04 11:06:14 +020023# `./tests/scripts/generate_tls13_compat_tests.py -a -o ./tests/opt-testcases/tls13-compat.sh`.
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000024#
25# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
26# AND REGENERATE THIS FILE.
27#
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020031requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
33requires_openssl_tls1_3
34run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080035 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
36 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000037 0 \
38 -s "Protocol is TLSv1.3" \
39 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
40 -s "received signature algorithm: 0x403" \
41 -s "got named group: secp256r1(0017)" \
42 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000043 -C "received HelloRetryRequest message"
Jerry Yu31018ad2021-11-26 20:36:17 +080044
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000045requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000046requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020048requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
50requires_openssl_tls1_3
51run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +080052 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
53 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000054 0 \
55 -s "Protocol is TLSv1.3" \
56 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
57 -s "received signature algorithm: 0x503" \
58 -s "got named group: secp256r1(0017)" \
59 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000060 -C "received HelloRetryRequest message"
61
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020065requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
67requires_openssl_tls1_3
68run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +080069 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
70 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000071 0 \
72 -s "Protocol is TLSv1.3" \
73 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
74 -s "received signature algorithm: 0x603" \
75 -s "got named group: secp256r1(0017)" \
76 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000077 -C "received HelloRetryRequest message"
78
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000079requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000080requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000081requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020082requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
84requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
85requires_openssl_tls1_3
86run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080087 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
88 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000089 0 \
90 -s "Protocol is TLSv1.3" \
91 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
92 -s "received signature algorithm: 0x804" \
93 -s "got named group: secp256r1(0017)" \
94 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000095 -C "received HelloRetryRequest message"
96
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000097requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000098requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200100requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
102requires_openssl_tls1_3
103run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800104 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
105 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000106 0 \
107 -s "Protocol is TLSv1.3" \
108 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
109 -s "received signature algorithm: 0x403" \
110 -s "got named group: secp384r1(0018)" \
111 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000112 -C "received HelloRetryRequest message"
113
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000114requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000115requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200117requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000118requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
119requires_openssl_tls1_3
120run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800121 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
122 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000123 0 \
124 -s "Protocol is TLSv1.3" \
125 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
126 -s "received signature algorithm: 0x503" \
127 -s "got named group: secp384r1(0018)" \
128 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000129 -C "received HelloRetryRequest message"
130
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000131requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000132requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000133requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200134requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
136requires_openssl_tls1_3
137run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800138 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
139 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000140 0 \
141 -s "Protocol is TLSv1.3" \
142 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
143 -s "received signature algorithm: 0x603" \
144 -s "got named group: secp384r1(0018)" \
145 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000146 -C "received HelloRetryRequest message"
147
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000148requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000149requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000150requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200151requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
153requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
154requires_openssl_tls1_3
155run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800156 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
157 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000158 0 \
159 -s "Protocol is TLSv1.3" \
160 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
161 -s "received signature algorithm: 0x804" \
162 -s "got named group: secp384r1(0018)" \
163 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000164 -C "received HelloRetryRequest message"
165
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000166requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000167requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200169requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
171requires_openssl_tls1_3
172run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800173 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
174 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000175 0 \
176 -s "Protocol is TLSv1.3" \
177 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
178 -s "received signature algorithm: 0x403" \
179 -s "got named group: secp521r1(0019)" \
180 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000181 -C "received HelloRetryRequest message"
182
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000183requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000184requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200186requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
188requires_openssl_tls1_3
189run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800190 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
191 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000192 0 \
193 -s "Protocol is TLSv1.3" \
194 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
195 -s "received signature algorithm: 0x503" \
196 -s "got named group: secp521r1(0019)" \
197 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000198 -C "received HelloRetryRequest message"
199
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000200requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000201requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000202requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200203requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
205requires_openssl_tls1_3
206run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800207 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
208 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000209 0 \
210 -s "Protocol is TLSv1.3" \
211 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
212 -s "received signature algorithm: 0x603" \
213 -s "got named group: secp521r1(0019)" \
214 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000215 -C "received HelloRetryRequest message"
216
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000217requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000218requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000219requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200220requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
222requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
223requires_openssl_tls1_3
224run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800225 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
226 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000227 0 \
228 -s "Protocol is TLSv1.3" \
229 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
230 -s "received signature algorithm: 0x804" \
231 -s "got named group: secp521r1(0019)" \
232 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000233 -C "received HelloRetryRequest message"
234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200238requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000239requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
240requires_openssl_tls1_3
241run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800242 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
243 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000244 0 \
245 -s "Protocol is TLSv1.3" \
246 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
247 -s "received signature algorithm: 0x403" \
248 -s "got named group: x25519(001d)" \
249 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000250 -C "received HelloRetryRequest message"
251
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000252requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000253requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200255requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
257requires_openssl_tls1_3
258run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800259 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
260 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000261 0 \
262 -s "Protocol is TLSv1.3" \
263 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
264 -s "received signature algorithm: 0x503" \
265 -s "got named group: x25519(001d)" \
266 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000267 -C "received HelloRetryRequest message"
268
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000269requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000270requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000271requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200272requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000273requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
274requires_openssl_tls1_3
275run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800276 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
277 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000278 0 \
279 -s "Protocol is TLSv1.3" \
280 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
281 -s "received signature algorithm: 0x603" \
282 -s "got named group: x25519(001d)" \
283 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000284 -C "received HelloRetryRequest message"
285
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000286requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000287requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000288requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200289requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
291requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
292requires_openssl_tls1_3
293run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800294 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
295 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000296 0 \
297 -s "Protocol is TLSv1.3" \
298 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
299 -s "received signature algorithm: 0x804" \
300 -s "got named group: x25519(001d)" \
301 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000302 -C "received HelloRetryRequest message"
303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200307requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000308requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
309requires_openssl_tls1_3
310run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800311 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
312 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000313 0 \
314 -s "Protocol is TLSv1.3" \
315 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
316 -s "received signature algorithm: 0x403" \
317 -s "got named group: x448(001e)" \
318 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000319 -C "received HelloRetryRequest message"
320
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000321requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000322requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200324requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
326requires_openssl_tls1_3
327run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800328 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
329 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000330 0 \
331 -s "Protocol is TLSv1.3" \
332 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
333 -s "received signature algorithm: 0x503" \
334 -s "got named group: x448(001e)" \
335 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000336 -C "received HelloRetryRequest message"
337
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000338requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000339requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000340requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200341requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
343requires_openssl_tls1_3
344run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800345 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
346 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000347 0 \
348 -s "Protocol is TLSv1.3" \
349 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
350 -s "received signature algorithm: 0x603" \
351 -s "got named group: x448(001e)" \
352 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000353 -C "received HelloRetryRequest message"
354
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000355requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000356requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000357requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200358requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
360requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
361requires_openssl_tls1_3
362run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800363 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
364 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000365 0 \
366 -s "Protocol is TLSv1.3" \
367 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
368 -s "received signature algorithm: 0x804" \
369 -s "got named group: x448(001e)" \
370 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000371 -C "received HelloRetryRequest message"
372
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000373requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000374requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200376requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000377requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
378requires_openssl_tls1_3
379run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800380 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
381 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000382 0 \
383 -s "Protocol is TLSv1.3" \
384 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
385 -s "received signature algorithm: 0x403" \
386 -s "got named group: secp256r1(0017)" \
387 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000388 -C "received HelloRetryRequest message"
389
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000390requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200393requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
395requires_openssl_tls1_3
396run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800397 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
398 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000399 0 \
400 -s "Protocol is TLSv1.3" \
401 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
402 -s "received signature algorithm: 0x503" \
403 -s "got named group: secp256r1(0017)" \
404 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000405 -C "received HelloRetryRequest message"
406
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000407requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200410requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
412requires_openssl_tls1_3
413run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800414 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
415 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000416 0 \
417 -s "Protocol is TLSv1.3" \
418 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
419 -s "received signature algorithm: 0x603" \
420 -s "got named group: secp256r1(0017)" \
421 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000422 -C "received HelloRetryRequest message"
423
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000424requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000425requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000426requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200427requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
429requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
430requires_openssl_tls1_3
431run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800432 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
433 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000434 0 \
435 -s "Protocol is TLSv1.3" \
436 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
437 -s "received signature algorithm: 0x804" \
438 -s "got named group: secp256r1(0017)" \
439 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000440 -C "received HelloRetryRequest message"
441
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000442requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000443requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200445requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000446requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
447requires_openssl_tls1_3
448run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800449 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
450 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000451 0 \
452 -s "Protocol is TLSv1.3" \
453 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
454 -s "received signature algorithm: 0x403" \
455 -s "got named group: secp384r1(0018)" \
456 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000457 -C "received HelloRetryRequest message"
458
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200462requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000463requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
464requires_openssl_tls1_3
465run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800466 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
467 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000468 0 \
469 -s "Protocol is TLSv1.3" \
470 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
471 -s "received signature algorithm: 0x503" \
472 -s "got named group: secp384r1(0018)" \
473 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000474 -C "received HelloRetryRequest message"
475
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000476requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000477requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000478requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200479requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000480requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
481requires_openssl_tls1_3
482run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800483 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
484 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000485 0 \
486 -s "Protocol is TLSv1.3" \
487 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
488 -s "received signature algorithm: 0x603" \
489 -s "got named group: secp384r1(0018)" \
490 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000491 -C "received HelloRetryRequest message"
492
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000493requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000494requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000495requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200496requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
498requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
499requires_openssl_tls1_3
500run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800501 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
502 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000503 0 \
504 -s "Protocol is TLSv1.3" \
505 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
506 -s "received signature algorithm: 0x804" \
507 -s "got named group: secp384r1(0018)" \
508 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000509 -C "received HelloRetryRequest message"
510
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000511requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000512requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200514requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000515requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
516requires_openssl_tls1_3
517run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800518 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
519 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000520 0 \
521 -s "Protocol is TLSv1.3" \
522 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
523 -s "received signature algorithm: 0x403" \
524 -s "got named group: secp521r1(0019)" \
525 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000526 -C "received HelloRetryRequest message"
527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200531requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000532requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
533requires_openssl_tls1_3
534run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800535 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
536 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000537 0 \
538 -s "Protocol is TLSv1.3" \
539 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
540 -s "received signature algorithm: 0x503" \
541 -s "got named group: secp521r1(0019)" \
542 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000543 -C "received HelloRetryRequest message"
544
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000545requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000546requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000547requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200548requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
550requires_openssl_tls1_3
551run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800552 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
553 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000554 0 \
555 -s "Protocol is TLSv1.3" \
556 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
557 -s "received signature algorithm: 0x603" \
558 -s "got named group: secp521r1(0019)" \
559 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000560 -C "received HelloRetryRequest message"
561
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000563requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200565requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000566requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
567requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
568requires_openssl_tls1_3
569run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800570 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
571 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000572 0 \
573 -s "Protocol is TLSv1.3" \
574 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
575 -s "received signature algorithm: 0x804" \
576 -s "got named group: secp521r1(0019)" \
577 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000578 -C "received HelloRetryRequest message"
579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200583requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
585requires_openssl_tls1_3
586run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800587 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
588 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000589 0 \
590 -s "Protocol is TLSv1.3" \
591 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
592 -s "received signature algorithm: 0x403" \
593 -s "got named group: x25519(001d)" \
594 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000595 -C "received HelloRetryRequest message"
596
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000597requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200600requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
602requires_openssl_tls1_3
603run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800604 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
605 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000606 0 \
607 -s "Protocol is TLSv1.3" \
608 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
609 -s "received signature algorithm: 0x503" \
610 -s "got named group: x25519(001d)" \
611 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000612 -C "received HelloRetryRequest message"
613
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000614requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000615requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000616requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200617requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
619requires_openssl_tls1_3
620run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800621 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
622 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000623 0 \
624 -s "Protocol is TLSv1.3" \
625 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
626 -s "received signature algorithm: 0x603" \
627 -s "got named group: x25519(001d)" \
628 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000629 -C "received HelloRetryRequest message"
630
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000631requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000632requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000633requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200634requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000635requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
636requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
637requires_openssl_tls1_3
638run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800639 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
640 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000641 0 \
642 -s "Protocol is TLSv1.3" \
643 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
644 -s "received signature algorithm: 0x804" \
645 -s "got named group: x25519(001d)" \
646 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000647 -C "received HelloRetryRequest message"
648
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000649requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000650requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200652requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
654requires_openssl_tls1_3
655run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800656 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
657 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000658 0 \
659 -s "Protocol is TLSv1.3" \
660 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
661 -s "received signature algorithm: 0x403" \
662 -s "got named group: x448(001e)" \
663 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000664 -C "received HelloRetryRequest message"
665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200669requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000670requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
671requires_openssl_tls1_3
672run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800673 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
674 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000675 0 \
676 -s "Protocol is TLSv1.3" \
677 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
678 -s "received signature algorithm: 0x503" \
679 -s "got named group: x448(001e)" \
680 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000681 -C "received HelloRetryRequest message"
682
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000683requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000684requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200686requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
688requires_openssl_tls1_3
689run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800690 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
691 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000692 0 \
693 -s "Protocol is TLSv1.3" \
694 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
695 -s "received signature algorithm: 0x603" \
696 -s "got named group: x448(001e)" \
697 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000698 -C "received HelloRetryRequest message"
699
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000700requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200703requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000704requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
705requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
706requires_openssl_tls1_3
707run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800708 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
709 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000710 0 \
711 -s "Protocol is TLSv1.3" \
712 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
713 -s "received signature algorithm: 0x804" \
714 -s "got named group: x448(001e)" \
715 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000716 -C "received HelloRetryRequest message"
717
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000718requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000719requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200721requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000722requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
723requires_openssl_tls1_3
724run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800725 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
726 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000727 0 \
728 -s "Protocol is TLSv1.3" \
729 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
730 -s "received signature algorithm: 0x403" \
731 -s "got named group: secp256r1(0017)" \
732 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000733 -C "received HelloRetryRequest message"
734
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000735requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000736requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200738requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000739requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
740requires_openssl_tls1_3
741run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800742 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
743 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000744 0 \
745 -s "Protocol is TLSv1.3" \
746 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
747 -s "received signature algorithm: 0x503" \
748 -s "got named group: secp256r1(0017)" \
749 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000750 -C "received HelloRetryRequest message"
751
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000752requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000753requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200755requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
757requires_openssl_tls1_3
758run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800759 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
760 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000761 0 \
762 -s "Protocol is TLSv1.3" \
763 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
764 -s "received signature algorithm: 0x603" \
765 -s "got named group: secp256r1(0017)" \
766 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000767 -C "received HelloRetryRequest message"
768
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000769requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000770requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000771requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200772requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000773requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
774requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
775requires_openssl_tls1_3
776run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800777 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
778 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000779 0 \
780 -s "Protocol is TLSv1.3" \
781 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
782 -s "received signature algorithm: 0x804" \
783 -s "got named group: secp256r1(0017)" \
784 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000785 -C "received HelloRetryRequest message"
786
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000787requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000788requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000789requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200790requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
792requires_openssl_tls1_3
793run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800794 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
795 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000796 0 \
797 -s "Protocol is TLSv1.3" \
798 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
799 -s "received signature algorithm: 0x403" \
800 -s "got named group: secp384r1(0018)" \
801 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000802 -C "received HelloRetryRequest message"
803
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000804requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000805requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000806requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200807requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000808requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
809requires_openssl_tls1_3
810run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800811 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
812 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000813 0 \
814 -s "Protocol is TLSv1.3" \
815 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
816 -s "received signature algorithm: 0x503" \
817 -s "got named group: secp384r1(0018)" \
818 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000819 -C "received HelloRetryRequest message"
820
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000821requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000822requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000823requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200824requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
826requires_openssl_tls1_3
827run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800828 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
829 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000830 0 \
831 -s "Protocol is TLSv1.3" \
832 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
833 -s "received signature algorithm: 0x603" \
834 -s "got named group: secp384r1(0018)" \
835 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000836 -C "received HelloRetryRequest message"
837
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000838requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000839requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200841requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000842requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
843requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
844requires_openssl_tls1_3
845run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800846 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
847 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000848 0 \
849 -s "Protocol is TLSv1.3" \
850 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
851 -s "received signature algorithm: 0x804" \
852 -s "got named group: secp384r1(0018)" \
853 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000854 -C "received HelloRetryRequest message"
855
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000856requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000857requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000858requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200859requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000860requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
861requires_openssl_tls1_3
862run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800863 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
864 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000865 0 \
866 -s "Protocol is TLSv1.3" \
867 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
868 -s "received signature algorithm: 0x403" \
869 -s "got named group: secp521r1(0019)" \
870 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000871 -C "received HelloRetryRequest message"
872
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000873requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000874requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200876requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
878requires_openssl_tls1_3
879run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800880 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
881 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000882 0 \
883 -s "Protocol is TLSv1.3" \
884 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
885 -s "received signature algorithm: 0x503" \
886 -s "got named group: secp521r1(0019)" \
887 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000888 -C "received HelloRetryRequest message"
889
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000890requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000891requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200893requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
895requires_openssl_tls1_3
896run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800897 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
898 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000899 0 \
900 -s "Protocol is TLSv1.3" \
901 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
902 -s "received signature algorithm: 0x603" \
903 -s "got named group: secp521r1(0019)" \
904 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000905 -C "received HelloRetryRequest message"
906
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000907requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000908requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200910requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000911requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
912requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
913requires_openssl_tls1_3
914run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800915 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
916 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000917 0 \
918 -s "Protocol is TLSv1.3" \
919 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
920 -s "received signature algorithm: 0x804" \
921 -s "got named group: secp521r1(0019)" \
922 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000923 -C "received HelloRetryRequest message"
924
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000925requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000926requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200928requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
930requires_openssl_tls1_3
931run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800932 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
933 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000934 0 \
935 -s "Protocol is TLSv1.3" \
936 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
937 -s "received signature algorithm: 0x403" \
938 -s "got named group: x25519(001d)" \
939 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000940 -C "received HelloRetryRequest message"
941
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000942requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000943requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000944requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200945requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000946requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
947requires_openssl_tls1_3
948run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800949 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
950 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000951 0 \
952 -s "Protocol is TLSv1.3" \
953 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
954 -s "received signature algorithm: 0x503" \
955 -s "got named group: x25519(001d)" \
956 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000957 -C "received HelloRetryRequest message"
958
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000959requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000960requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000961requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200962requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000963requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
964requires_openssl_tls1_3
965run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800966 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
967 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000968 0 \
969 -s "Protocol is TLSv1.3" \
970 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
971 -s "received signature algorithm: 0x603" \
972 -s "got named group: x25519(001d)" \
973 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000974 -C "received HelloRetryRequest message"
975
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000976requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000977requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000978requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200979requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000980requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
981requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
982requires_openssl_tls1_3
983run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800984 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
985 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000986 0 \
987 -s "Protocol is TLSv1.3" \
988 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
989 -s "received signature algorithm: 0x804" \
990 -s "got named group: x25519(001d)" \
991 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000992 -C "received HelloRetryRequest message"
993
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000994requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000995requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +0200997requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +0000998requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
999requires_openssl_tls1_3
1000run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001001 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1002 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001003 0 \
1004 -s "Protocol is TLSv1.3" \
1005 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1006 -s "received signature algorithm: 0x403" \
1007 -s "got named group: x448(001e)" \
1008 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001009 -C "received HelloRetryRequest message"
1010
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001011requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001012requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001013requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001014requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001015requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1016requires_openssl_tls1_3
1017run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001018 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1019 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001020 0 \
1021 -s "Protocol is TLSv1.3" \
1022 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1023 -s "received signature algorithm: 0x503" \
1024 -s "got named group: x448(001e)" \
1025 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001026 -C "received HelloRetryRequest message"
1027
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001031requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1033requires_openssl_tls1_3
1034run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001035 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1036 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001037 0 \
1038 -s "Protocol is TLSv1.3" \
1039 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1040 -s "received signature algorithm: 0x603" \
1041 -s "got named group: x448(001e)" \
1042 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001043 -C "received HelloRetryRequest message"
1044
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001045requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001046requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001048requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1050requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1051requires_openssl_tls1_3
1052run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001053 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1054 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001055 0 \
1056 -s "Protocol is TLSv1.3" \
1057 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1058 -s "received signature algorithm: 0x804" \
1059 -s "got named group: x448(001e)" \
1060 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001061 -C "received HelloRetryRequest message"
1062
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001063requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001064requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001066requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001067requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1068requires_openssl_tls1_3
1069run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001070 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1071 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001072 0 \
1073 -s "Protocol is TLSv1.3" \
1074 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1075 -s "received signature algorithm: 0x403" \
1076 -s "got named group: secp256r1(0017)" \
1077 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001078 -C "received HelloRetryRequest message"
1079
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001080requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001081requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001083requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1085requires_openssl_tls1_3
1086run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001087 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1088 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001089 0 \
1090 -s "Protocol is TLSv1.3" \
1091 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1092 -s "received signature algorithm: 0x503" \
1093 -s "got named group: secp256r1(0017)" \
1094 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001095 -C "received HelloRetryRequest message"
1096
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001097requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001098requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001100requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1102requires_openssl_tls1_3
1103run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001104 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1105 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001106 0 \
1107 -s "Protocol is TLSv1.3" \
1108 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1109 -s "received signature algorithm: 0x603" \
1110 -s "got named group: secp256r1(0017)" \
1111 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001112 -C "received HelloRetryRequest message"
1113
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001114requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001115requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001117requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001118requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1119requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1120requires_openssl_tls1_3
1121run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001122 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1123 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001124 0 \
1125 -s "Protocol is TLSv1.3" \
1126 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1127 -s "received signature algorithm: 0x804" \
1128 -s "got named group: secp256r1(0017)" \
1129 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001130 -C "received HelloRetryRequest message"
1131
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001132requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001135requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001136requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1137requires_openssl_tls1_3
1138run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001139 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1140 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001141 0 \
1142 -s "Protocol is TLSv1.3" \
1143 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1144 -s "received signature algorithm: 0x403" \
1145 -s "got named group: secp384r1(0018)" \
1146 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001147 -C "received HelloRetryRequest message"
1148
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001150requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001152requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001153requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1154requires_openssl_tls1_3
1155run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001156 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1157 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001158 0 \
1159 -s "Protocol is TLSv1.3" \
1160 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1161 -s "received signature algorithm: 0x503" \
1162 -s "got named group: secp384r1(0018)" \
1163 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001164 -C "received HelloRetryRequest message"
1165
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001166requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001167requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001169requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1171requires_openssl_tls1_3
1172run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001173 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1174 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001175 0 \
1176 -s "Protocol is TLSv1.3" \
1177 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1178 -s "received signature algorithm: 0x603" \
1179 -s "got named group: secp384r1(0018)" \
1180 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001181 -C "received HelloRetryRequest message"
1182
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001183requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001184requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001186requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1188requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1189requires_openssl_tls1_3
1190run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001191 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1192 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001193 0 \
1194 -s "Protocol is TLSv1.3" \
1195 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1196 -s "received signature algorithm: 0x804" \
1197 -s "got named group: secp384r1(0018)" \
1198 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001199 -C "received HelloRetryRequest message"
1200
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001201requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001202requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001204requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001205requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1206requires_openssl_tls1_3
1207run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001208 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1209 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001210 0 \
1211 -s "Protocol is TLSv1.3" \
1212 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1213 -s "received signature algorithm: 0x403" \
1214 -s "got named group: secp521r1(0019)" \
1215 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001216 -C "received HelloRetryRequest message"
1217
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001218requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001219requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001221requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001222requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1223requires_openssl_tls1_3
1224run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001225 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1226 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001227 0 \
1228 -s "Protocol is TLSv1.3" \
1229 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1230 -s "received signature algorithm: 0x503" \
1231 -s "got named group: secp521r1(0019)" \
1232 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001233 -C "received HelloRetryRequest message"
1234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001238requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001239requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1240requires_openssl_tls1_3
1241run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001242 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1243 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001244 0 \
1245 -s "Protocol is TLSv1.3" \
1246 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1247 -s "received signature algorithm: 0x603" \
1248 -s "got named group: secp521r1(0019)" \
1249 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001250 -C "received HelloRetryRequest message"
1251
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001252requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001253requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001255requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1257requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1258requires_openssl_tls1_3
1259run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001260 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1261 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001262 0 \
1263 -s "Protocol is TLSv1.3" \
1264 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1265 -s "received signature algorithm: 0x804" \
1266 -s "got named group: secp521r1(0019)" \
1267 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001268 -C "received HelloRetryRequest message"
1269
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001270requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001271requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001272requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001273requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001274requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1275requires_openssl_tls1_3
1276run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001277 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1278 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001279 0 \
1280 -s "Protocol is TLSv1.3" \
1281 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1282 -s "received signature algorithm: 0x403" \
1283 -s "got named group: x25519(001d)" \
1284 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001285 -C "received HelloRetryRequest message"
1286
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001287requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001288requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001290requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1292requires_openssl_tls1_3
1293run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001294 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1295 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001296 0 \
1297 -s "Protocol is TLSv1.3" \
1298 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1299 -s "received signature algorithm: 0x503" \
1300 -s "got named group: x25519(001d)" \
1301 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001302 -C "received HelloRetryRequest message"
1303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001307requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001308requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1309requires_openssl_tls1_3
1310run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001311 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1312 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001313 0 \
1314 -s "Protocol is TLSv1.3" \
1315 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1316 -s "received signature algorithm: 0x603" \
1317 -s "got named group: x25519(001d)" \
1318 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001319 -C "received HelloRetryRequest message"
1320
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001321requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001322requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001324requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1326requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1327requires_openssl_tls1_3
1328run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001329 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1330 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001331 0 \
1332 -s "Protocol is TLSv1.3" \
1333 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1334 -s "received signature algorithm: 0x804" \
1335 -s "got named group: x25519(001d)" \
1336 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001337 -C "received HelloRetryRequest message"
1338
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001339requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001340requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001341requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001342requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1344requires_openssl_tls1_3
1345run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001346 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1347 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001348 0 \
1349 -s "Protocol is TLSv1.3" \
1350 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1351 -s "received signature algorithm: 0x403" \
1352 -s "got named group: x448(001e)" \
1353 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001354 -C "received HelloRetryRequest message"
1355
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001359requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1361requires_openssl_tls1_3
1362run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001363 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1364 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001365 0 \
1366 -s "Protocol is TLSv1.3" \
1367 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1368 -s "received signature algorithm: 0x503" \
1369 -s "got named group: x448(001e)" \
1370 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001371 -C "received HelloRetryRequest message"
1372
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001373requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001374requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001376requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001377requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1378requires_openssl_tls1_3
1379run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001380 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1381 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001382 0 \
1383 -s "Protocol is TLSv1.3" \
1384 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1385 -s "received signature algorithm: 0x603" \
1386 -s "got named group: x448(001e)" \
1387 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001388 -C "received HelloRetryRequest message"
1389
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001390requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001393requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1395requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1396requires_openssl_tls1_3
1397run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001398 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1399 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001400 0 \
1401 -s "Protocol is TLSv1.3" \
1402 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1403 -s "received signature algorithm: 0x804" \
1404 -s "got named group: x448(001e)" \
1405 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001406 -C "received HelloRetryRequest message"
1407
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001409requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001411requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001412requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1413requires_openssl_tls1_3
1414run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001415 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1416 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001417 0 \
1418 -s "Protocol is TLSv1.3" \
1419 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1420 -s "received signature algorithm: 0x403" \
1421 -s "got named group: secp256r1(0017)" \
1422 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001423 -C "received HelloRetryRequest message"
1424
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001425requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001426requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001428requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1430requires_openssl_tls1_3
1431run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001432 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1433 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001434 0 \
1435 -s "Protocol is TLSv1.3" \
1436 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1437 -s "received signature algorithm: 0x503" \
1438 -s "got named group: secp256r1(0017)" \
1439 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001440 -C "received HelloRetryRequest message"
1441
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001442requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001443requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001445requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001446requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1447requires_openssl_tls1_3
1448run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001449 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1450 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001451 0 \
1452 -s "Protocol is TLSv1.3" \
1453 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1454 -s "received signature algorithm: 0x603" \
1455 -s "got named group: secp256r1(0017)" \
1456 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001457 -C "received HelloRetryRequest message"
1458
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001462requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001463requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1464requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1465requires_openssl_tls1_3
1466run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001467 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1468 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001469 0 \
1470 -s "Protocol is TLSv1.3" \
1471 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1472 -s "received signature algorithm: 0x804" \
1473 -s "got named group: secp256r1(0017)" \
1474 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001475 -C "received HelloRetryRequest message"
1476
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001477requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001478requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001479requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001480requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001481requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1482requires_openssl_tls1_3
1483run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001484 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1485 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001486 0 \
1487 -s "Protocol is TLSv1.3" \
1488 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1489 -s "received signature algorithm: 0x403" \
1490 -s "got named group: secp384r1(0018)" \
1491 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001492 -C "received HelloRetryRequest message"
1493
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001494requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001495requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001496requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001497requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001498requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1499requires_openssl_tls1_3
1500run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001501 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1502 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001503 0 \
1504 -s "Protocol is TLSv1.3" \
1505 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1506 -s "received signature algorithm: 0x503" \
1507 -s "got named group: secp384r1(0018)" \
1508 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001509 -C "received HelloRetryRequest message"
1510
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001511requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001512requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001514requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001515requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1516requires_openssl_tls1_3
1517run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001518 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1519 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001520 0 \
1521 -s "Protocol is TLSv1.3" \
1522 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1523 -s "received signature algorithm: 0x603" \
1524 -s "got named group: secp384r1(0018)" \
1525 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001526 -C "received HelloRetryRequest message"
1527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001531requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001532requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1533requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1534requires_openssl_tls1_3
1535run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001536 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1537 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001538 0 \
1539 -s "Protocol is TLSv1.3" \
1540 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1541 -s "received signature algorithm: 0x804" \
1542 -s "got named group: secp384r1(0018)" \
1543 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001544 -C "received HelloRetryRequest message"
1545
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001546requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001547requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001549requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1551requires_openssl_tls1_3
1552run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001553 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1554 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001555 0 \
1556 -s "Protocol is TLSv1.3" \
1557 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1558 -s "received signature algorithm: 0x403" \
1559 -s "got named group: secp521r1(0019)" \
1560 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001561 -C "received HelloRetryRequest message"
1562
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001563requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001564requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001565requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001566requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001567requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1568requires_openssl_tls1_3
1569run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001570 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1571 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001572 0 \
1573 -s "Protocol is TLSv1.3" \
1574 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1575 -s "received signature algorithm: 0x503" \
1576 -s "got named group: secp521r1(0019)" \
1577 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001578 -C "received HelloRetryRequest message"
1579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001583requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1585requires_openssl_tls1_3
1586run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001587 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1588 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001589 0 \
1590 -s "Protocol is TLSv1.3" \
1591 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1592 -s "received signature algorithm: 0x603" \
1593 -s "got named group: secp521r1(0019)" \
1594 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001595 -C "received HelloRetryRequest message"
1596
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001597requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001600requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1602requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1603requires_openssl_tls1_3
1604run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001605 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1606 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001607 0 \
1608 -s "Protocol is TLSv1.3" \
1609 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1610 -s "received signature algorithm: 0x804" \
1611 -s "got named group: secp521r1(0019)" \
1612 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001613 -C "received HelloRetryRequest message"
1614
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001615requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001616requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001617requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001618requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001619requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1620requires_openssl_tls1_3
1621run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001622 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1623 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001624 0 \
1625 -s "Protocol is TLSv1.3" \
1626 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1627 -s "received signature algorithm: 0x403" \
1628 -s "got named group: x25519(001d)" \
1629 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001630 -C "received HelloRetryRequest message"
1631
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001632requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001633requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001634requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001635requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001636requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1637requires_openssl_tls1_3
1638run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001639 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1640 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001641 0 \
1642 -s "Protocol is TLSv1.3" \
1643 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1644 -s "received signature algorithm: 0x503" \
1645 -s "got named group: x25519(001d)" \
1646 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001647 -C "received HelloRetryRequest message"
1648
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001649requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001650requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001652requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1654requires_openssl_tls1_3
1655run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001656 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1657 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001658 0 \
1659 -s "Protocol is TLSv1.3" \
1660 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1661 -s "received signature algorithm: 0x603" \
1662 -s "got named group: x25519(001d)" \
1663 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001664 -C "received HelloRetryRequest message"
1665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001669requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001670requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1671requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1672requires_openssl_tls1_3
1673run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001674 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1675 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001676 0 \
1677 -s "Protocol is TLSv1.3" \
1678 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1679 -s "received signature algorithm: 0x804" \
1680 -s "got named group: x25519(001d)" \
1681 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001682 -C "received HelloRetryRequest message"
1683
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001684requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001685requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001686requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001687requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001688requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1689requires_openssl_tls1_3
1690run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001691 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1692 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001693 0 \
1694 -s "Protocol is TLSv1.3" \
1695 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1696 -s "received signature algorithm: 0x403" \
1697 -s "got named group: x448(001e)" \
1698 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001699 -C "received HelloRetryRequest message"
1700
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001701requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001702requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001703requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001704requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001705requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1706requires_openssl_tls1_3
1707run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001708 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1709 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001710 0 \
1711 -s "Protocol is TLSv1.3" \
1712 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1713 -s "received signature algorithm: 0x503" \
1714 -s "got named group: x448(001e)" \
1715 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001716 -C "received HelloRetryRequest message"
1717
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001718requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001719requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001721requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001722requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1723requires_openssl_tls1_3
1724run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001725 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1726 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001727 0 \
1728 -s "Protocol is TLSv1.3" \
1729 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1730 -s "received signature algorithm: 0x603" \
1731 -s "got named group: x448(001e)" \
1732 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001733 -C "received HelloRetryRequest message"
1734
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001735requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001736requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001738requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001739requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1740requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1741requires_openssl_tls1_3
1742run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001743 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1744 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001745 0 \
1746 -s "Protocol is TLSv1.3" \
1747 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1748 -s "received signature algorithm: 0x804" \
1749 -s "got named group: x448(001e)" \
1750 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001751 -C "received HelloRetryRequest message"
1752
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001753requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001754requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001756requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001757requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1758requires_gnutls_tls1_3
1759requires_gnutls_next_no_ticket
1760requires_gnutls_next_disable_tls13_compat
1761run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001762 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1763 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001764 0 \
1765 -s "Protocol is TLSv1.3" \
1766 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1767 -s "received signature algorithm: 0x403" \
1768 -s "got named group: secp256r1(0017)" \
1769 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001770 -C "received HelloRetryRequest message"
1771
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001772requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001775requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1777requires_gnutls_tls1_3
1778requires_gnutls_next_no_ticket
1779requires_gnutls_next_disable_tls13_compat
1780run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001781 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1782 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001783 0 \
1784 -s "Protocol is TLSv1.3" \
1785 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1786 -s "received signature algorithm: 0x503" \
1787 -s "got named group: secp256r1(0017)" \
1788 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001789 -C "received HelloRetryRequest message"
1790
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001791requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001792requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001794requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1796requires_gnutls_tls1_3
1797requires_gnutls_next_no_ticket
1798requires_gnutls_next_disable_tls13_compat
1799run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001800 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1801 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001802 0 \
1803 -s "Protocol is TLSv1.3" \
1804 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1805 -s "received signature algorithm: 0x603" \
1806 -s "got named group: secp256r1(0017)" \
1807 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001808 -C "received HelloRetryRequest message"
1809
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001810requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001811requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001813requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1815requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1816requires_gnutls_tls1_3
1817requires_gnutls_next_no_ticket
1818requires_gnutls_next_disable_tls13_compat
1819run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001820 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1821 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001822 0 \
1823 -s "Protocol is TLSv1.3" \
1824 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1825 -s "received signature algorithm: 0x804" \
1826 -s "got named group: secp256r1(0017)" \
1827 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001828 -C "received HelloRetryRequest message"
1829
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001830requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001831requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001833requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001834requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1835requires_gnutls_tls1_3
1836requires_gnutls_next_no_ticket
1837requires_gnutls_next_disable_tls13_compat
1838run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001839 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1840 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001841 0 \
1842 -s "Protocol is TLSv1.3" \
1843 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1844 -s "received signature algorithm: 0x403" \
1845 -s "got named group: secp384r1(0018)" \
1846 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001847 -C "received HelloRetryRequest message"
1848
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001849requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001850requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001852requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1854requires_gnutls_tls1_3
1855requires_gnutls_next_no_ticket
1856requires_gnutls_next_disable_tls13_compat
1857run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001858 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1859 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001860 0 \
1861 -s "Protocol is TLSv1.3" \
1862 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1863 -s "received signature algorithm: 0x503" \
1864 -s "got named group: secp384r1(0018)" \
1865 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001866 -C "received HelloRetryRequest message"
1867
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001868requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001869requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001871requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1873requires_gnutls_tls1_3
1874requires_gnutls_next_no_ticket
1875requires_gnutls_next_disable_tls13_compat
1876run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001877 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1878 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001879 0 \
1880 -s "Protocol is TLSv1.3" \
1881 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1882 -s "received signature algorithm: 0x603" \
1883 -s "got named group: secp384r1(0018)" \
1884 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001885 -C "received HelloRetryRequest message"
1886
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001887requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001888requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001889requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001890requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1892requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1893requires_gnutls_tls1_3
1894requires_gnutls_next_no_ticket
1895requires_gnutls_next_disable_tls13_compat
1896run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001897 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1898 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001899 0 \
1900 -s "Protocol is TLSv1.3" \
1901 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1902 -s "received signature algorithm: 0x804" \
1903 -s "got named group: secp384r1(0018)" \
1904 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001905 -C "received HelloRetryRequest message"
1906
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001907requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001908requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001910requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001911requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1912requires_gnutls_tls1_3
1913requires_gnutls_next_no_ticket
1914requires_gnutls_next_disable_tls13_compat
1915run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001916 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1917 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001918 0 \
1919 -s "Protocol is TLSv1.3" \
1920 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1921 -s "received signature algorithm: 0x403" \
1922 -s "got named group: secp521r1(0019)" \
1923 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001924 -C "received HelloRetryRequest message"
1925
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001926requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001927requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001929requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1931requires_gnutls_tls1_3
1932requires_gnutls_next_no_ticket
1933requires_gnutls_next_disable_tls13_compat
1934run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001935 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1936 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001937 0 \
1938 -s "Protocol is TLSv1.3" \
1939 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1940 -s "received signature algorithm: 0x503" \
1941 -s "got named group: secp521r1(0019)" \
1942 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001943 -C "received HelloRetryRequest message"
1944
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001945requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001946requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001948requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1950requires_gnutls_tls1_3
1951requires_gnutls_next_no_ticket
1952requires_gnutls_next_disable_tls13_compat
1953run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001954 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1955 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001956 0 \
1957 -s "Protocol is TLSv1.3" \
1958 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1959 -s "received signature algorithm: 0x603" \
1960 -s "got named group: secp521r1(0019)" \
1961 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001962 -C "received HelloRetryRequest message"
1963
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001964requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001967requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1969requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1970requires_gnutls_tls1_3
1971requires_gnutls_next_no_ticket
1972requires_gnutls_next_disable_tls13_compat
1973run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001974 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1975 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001976 0 \
1977 -s "Protocol is TLSv1.3" \
1978 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1979 -s "received signature algorithm: 0x804" \
1980 -s "got named group: secp521r1(0019)" \
1981 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001982 -C "received HelloRetryRequest message"
1983
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001984requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001985requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02001987requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00001988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1989requires_gnutls_tls1_3
1990requires_gnutls_next_no_ticket
1991requires_gnutls_next_disable_tls13_compat
1992run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001993 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1994 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001995 0 \
1996 -s "Protocol is TLSv1.3" \
1997 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1998 -s "received signature algorithm: 0x403" \
1999 -s "got named group: x25519(001d)" \
2000 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002001 -C "received HelloRetryRequest message"
2002
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002003requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002006requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002007requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2008requires_gnutls_tls1_3
2009requires_gnutls_next_no_ticket
2010requires_gnutls_next_disable_tls13_compat
2011run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002012 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2013 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002014 0 \
2015 -s "Protocol is TLSv1.3" \
2016 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2017 -s "received signature algorithm: 0x503" \
2018 -s "got named group: x25519(001d)" \
2019 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002020 -C "received HelloRetryRequest message"
2021
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002022requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002023requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002025requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2027requires_gnutls_tls1_3
2028requires_gnutls_next_no_ticket
2029requires_gnutls_next_disable_tls13_compat
2030run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002031 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2032 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002033 0 \
2034 -s "Protocol is TLSv1.3" \
2035 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2036 -s "received signature algorithm: 0x603" \
2037 -s "got named group: x25519(001d)" \
2038 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002039 -C "received HelloRetryRequest message"
2040
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002041requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002042requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002044requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2046requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2047requires_gnutls_tls1_3
2048requires_gnutls_next_no_ticket
2049requires_gnutls_next_disable_tls13_compat
2050run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002051 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2052 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002053 0 \
2054 -s "Protocol is TLSv1.3" \
2055 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2056 -s "received signature algorithm: 0x804" \
2057 -s "got named group: x25519(001d)" \
2058 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002059 -C "received HelloRetryRequest message"
2060
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002061requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002062requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002063requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002064requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2066requires_gnutls_tls1_3
2067requires_gnutls_next_no_ticket
2068requires_gnutls_next_disable_tls13_compat
2069run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002070 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2071 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002072 0 \
2073 -s "Protocol is TLSv1.3" \
2074 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2075 -s "received signature algorithm: 0x403" \
2076 -s "got named group: x448(001e)" \
2077 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002078 -C "received HelloRetryRequest message"
2079
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002080requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002081requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002083requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2085requires_gnutls_tls1_3
2086requires_gnutls_next_no_ticket
2087requires_gnutls_next_disable_tls13_compat
2088run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002089 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2090 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002091 0 \
2092 -s "Protocol is TLSv1.3" \
2093 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2094 -s "received signature algorithm: 0x503" \
2095 -s "got named group: x448(001e)" \
2096 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002097 -C "received HelloRetryRequest message"
2098
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002099requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002100requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002101requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002102requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2104requires_gnutls_tls1_3
2105requires_gnutls_next_no_ticket
2106requires_gnutls_next_disable_tls13_compat
2107run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002108 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2109 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002110 0 \
2111 -s "Protocol is TLSv1.3" \
2112 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2113 -s "received signature algorithm: 0x603" \
2114 -s "got named group: x448(001e)" \
2115 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002116 -C "received HelloRetryRequest message"
2117
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002118requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002119requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002121requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2123requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2124requires_gnutls_tls1_3
2125requires_gnutls_next_no_ticket
2126requires_gnutls_next_disable_tls13_compat
2127run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002128 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2129 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002130 0 \
2131 -s "Protocol is TLSv1.3" \
2132 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2133 -s "received signature algorithm: 0x804" \
2134 -s "got named group: x448(001e)" \
2135 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002136 -C "received HelloRetryRequest message"
2137
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002138requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002139requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002141requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002142requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2143requires_gnutls_tls1_3
2144requires_gnutls_next_no_ticket
2145requires_gnutls_next_disable_tls13_compat
2146run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002147 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2148 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002149 0 \
2150 -s "Protocol is TLSv1.3" \
2151 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2152 -s "received signature algorithm: 0x403" \
2153 -s "got named group: secp256r1(0017)" \
2154 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002155 -C "received HelloRetryRequest message"
2156
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002157requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002158requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002160requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002161requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2162requires_gnutls_tls1_3
2163requires_gnutls_next_no_ticket
2164requires_gnutls_next_disable_tls13_compat
2165run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002166 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2167 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002168 0 \
2169 -s "Protocol is TLSv1.3" \
2170 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2171 -s "received signature algorithm: 0x503" \
2172 -s "got named group: secp256r1(0017)" \
2173 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002174 -C "received HelloRetryRequest message"
2175
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002176requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002177requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002179requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2181requires_gnutls_tls1_3
2182requires_gnutls_next_no_ticket
2183requires_gnutls_next_disable_tls13_compat
2184run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002185 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2186 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002187 0 \
2188 -s "Protocol is TLSv1.3" \
2189 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2190 -s "received signature algorithm: 0x603" \
2191 -s "got named group: secp256r1(0017)" \
2192 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002193 -C "received HelloRetryRequest message"
2194
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002195requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002196requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002198requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2200requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2201requires_gnutls_tls1_3
2202requires_gnutls_next_no_ticket
2203requires_gnutls_next_disable_tls13_compat
2204run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002205 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2206 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002207 0 \
2208 -s "Protocol is TLSv1.3" \
2209 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2210 -s "received signature algorithm: 0x804" \
2211 -s "got named group: secp256r1(0017)" \
2212 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002213 -C "received HelloRetryRequest message"
2214
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002215requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002216requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002217requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002218requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002219requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2220requires_gnutls_tls1_3
2221requires_gnutls_next_no_ticket
2222requires_gnutls_next_disable_tls13_compat
2223run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002224 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2225 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002226 0 \
2227 -s "Protocol is TLSv1.3" \
2228 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2229 -s "received signature algorithm: 0x403" \
2230 -s "got named group: secp384r1(0018)" \
2231 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002232 -C "received HelloRetryRequest message"
2233
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002234requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002237requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2239requires_gnutls_tls1_3
2240requires_gnutls_next_no_ticket
2241requires_gnutls_next_disable_tls13_compat
2242run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002243 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2244 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002245 0 \
2246 -s "Protocol is TLSv1.3" \
2247 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2248 -s "received signature algorithm: 0x503" \
2249 -s "got named group: secp384r1(0018)" \
2250 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002251 -C "received HelloRetryRequest message"
2252
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002253requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002254requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002256requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2258requires_gnutls_tls1_3
2259requires_gnutls_next_no_ticket
2260requires_gnutls_next_disable_tls13_compat
2261run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002262 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2263 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002264 0 \
2265 -s "Protocol is TLSv1.3" \
2266 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2267 -s "received signature algorithm: 0x603" \
2268 -s "got named group: secp384r1(0018)" \
2269 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002270 -C "received HelloRetryRequest message"
2271
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002272requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002273requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002275requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2277requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2278requires_gnutls_tls1_3
2279requires_gnutls_next_no_ticket
2280requires_gnutls_next_disable_tls13_compat
2281run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002282 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2283 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002284 0 \
2285 -s "Protocol is TLSv1.3" \
2286 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2287 -s "received signature algorithm: 0x804" \
2288 -s "got named group: secp384r1(0018)" \
2289 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002290 -C "received HelloRetryRequest message"
2291
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002292requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002293requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002295requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002296requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2297requires_gnutls_tls1_3
2298requires_gnutls_next_no_ticket
2299requires_gnutls_next_disable_tls13_compat
2300run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002301 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2302 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002303 0 \
2304 -s "Protocol is TLSv1.3" \
2305 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2306 -s "received signature algorithm: 0x403" \
2307 -s "got named group: secp521r1(0019)" \
2308 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002309 -C "received HelloRetryRequest message"
2310
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002311requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002312requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002314requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2316requires_gnutls_tls1_3
2317requires_gnutls_next_no_ticket
2318requires_gnutls_next_disable_tls13_compat
2319run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002320 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2321 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002322 0 \
2323 -s "Protocol is TLSv1.3" \
2324 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2325 -s "received signature algorithm: 0x503" \
2326 -s "got named group: secp521r1(0019)" \
2327 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002328 -C "received HelloRetryRequest message"
2329
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002330requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002331requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002333requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002334requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2335requires_gnutls_tls1_3
2336requires_gnutls_next_no_ticket
2337requires_gnutls_next_disable_tls13_compat
2338run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002339 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2340 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002341 0 \
2342 -s "Protocol is TLSv1.3" \
2343 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2344 -s "received signature algorithm: 0x603" \
2345 -s "got named group: secp521r1(0019)" \
2346 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002347 -C "received HelloRetryRequest message"
2348
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002349requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002350requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002352requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002353requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2354requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2355requires_gnutls_tls1_3
2356requires_gnutls_next_no_ticket
2357requires_gnutls_next_disable_tls13_compat
2358run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002359 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2360 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002361 0 \
2362 -s "Protocol is TLSv1.3" \
2363 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2364 -s "received signature algorithm: 0x804" \
2365 -s "got named group: secp521r1(0019)" \
2366 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002367 -C "received HelloRetryRequest message"
2368
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002369requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002370requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002372requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002373requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2374requires_gnutls_tls1_3
2375requires_gnutls_next_no_ticket
2376requires_gnutls_next_disable_tls13_compat
2377run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002378 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2379 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002380 0 \
2381 -s "Protocol is TLSv1.3" \
2382 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2383 -s "received signature algorithm: 0x403" \
2384 -s "got named group: x25519(001d)" \
2385 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002386 -C "received HelloRetryRequest message"
2387
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002388requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002389requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002390requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002391requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2393requires_gnutls_tls1_3
2394requires_gnutls_next_no_ticket
2395requires_gnutls_next_disable_tls13_compat
2396run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002397 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2398 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002399 0 \
2400 -s "Protocol is TLSv1.3" \
2401 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2402 -s "received signature algorithm: 0x503" \
2403 -s "got named group: x25519(001d)" \
2404 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002405 -C "received HelloRetryRequest message"
2406
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002407requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002410requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2412requires_gnutls_tls1_3
2413requires_gnutls_next_no_ticket
2414requires_gnutls_next_disable_tls13_compat
2415run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002416 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2417 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002418 0 \
2419 -s "Protocol is TLSv1.3" \
2420 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2421 -s "received signature algorithm: 0x603" \
2422 -s "got named group: x25519(001d)" \
2423 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002424 -C "received HelloRetryRequest message"
2425
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002429requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2431requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2432requires_gnutls_tls1_3
2433requires_gnutls_next_no_ticket
2434requires_gnutls_next_disable_tls13_compat
2435run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002436 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2437 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002438 0 \
2439 -s "Protocol is TLSv1.3" \
2440 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2441 -s "received signature algorithm: 0x804" \
2442 -s "got named group: x25519(001d)" \
2443 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002444 -C "received HelloRetryRequest message"
2445
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002446requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002447requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002448requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002449requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002450requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2451requires_gnutls_tls1_3
2452requires_gnutls_next_no_ticket
2453requires_gnutls_next_disable_tls13_compat
2454run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002455 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2456 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002457 0 \
2458 -s "Protocol is TLSv1.3" \
2459 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2460 -s "received signature algorithm: 0x403" \
2461 -s "got named group: x448(001e)" \
2462 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002463 -C "received HelloRetryRequest message"
2464
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002465requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002466requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002467requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002468requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002469requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2470requires_gnutls_tls1_3
2471requires_gnutls_next_no_ticket
2472requires_gnutls_next_disable_tls13_compat
2473run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002474 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2475 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002476 0 \
2477 -s "Protocol is TLSv1.3" \
2478 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2479 -s "received signature algorithm: 0x503" \
2480 -s "got named group: x448(001e)" \
2481 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002482 -C "received HelloRetryRequest message"
2483
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002484requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002485requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002487requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2489requires_gnutls_tls1_3
2490requires_gnutls_next_no_ticket
2491requires_gnutls_next_disable_tls13_compat
2492run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002493 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2494 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002495 0 \
2496 -s "Protocol is TLSv1.3" \
2497 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2498 -s "received signature algorithm: 0x603" \
2499 -s "got named group: x448(001e)" \
2500 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002501 -C "received HelloRetryRequest message"
2502
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002503requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002504requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002506requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2508requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2509requires_gnutls_tls1_3
2510requires_gnutls_next_no_ticket
2511requires_gnutls_next_disable_tls13_compat
2512run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002513 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2514 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002515 0 \
2516 -s "Protocol is TLSv1.3" \
2517 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2518 -s "received signature algorithm: 0x804" \
2519 -s "got named group: x448(001e)" \
2520 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002521 -C "received HelloRetryRequest message"
2522
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002523requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002524requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002525requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002526requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2528requires_gnutls_tls1_3
2529requires_gnutls_next_no_ticket
2530requires_gnutls_next_disable_tls13_compat
2531run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002532 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2533 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002534 0 \
2535 -s "Protocol is TLSv1.3" \
2536 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2537 -s "received signature algorithm: 0x403" \
2538 -s "got named group: secp256r1(0017)" \
2539 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002540 -C "received HelloRetryRequest message"
2541
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002542requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002543requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002544requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002545requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2547requires_gnutls_tls1_3
2548requires_gnutls_next_no_ticket
2549requires_gnutls_next_disable_tls13_compat
2550run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002551 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2552 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002553 0 \
2554 -s "Protocol is TLSv1.3" \
2555 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2556 -s "received signature algorithm: 0x503" \
2557 -s "got named group: secp256r1(0017)" \
2558 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002559 -C "received HelloRetryRequest message"
2560
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002561requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002564requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2566requires_gnutls_tls1_3
2567requires_gnutls_next_no_ticket
2568requires_gnutls_next_disable_tls13_compat
2569run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002570 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2571 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002572 0 \
2573 -s "Protocol is TLSv1.3" \
2574 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2575 -s "received signature algorithm: 0x603" \
2576 -s "got named group: secp256r1(0017)" \
2577 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002578 -C "received HelloRetryRequest message"
2579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002583requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2585requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2586requires_gnutls_tls1_3
2587requires_gnutls_next_no_ticket
2588requires_gnutls_next_disable_tls13_compat
2589run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002590 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2591 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002592 0 \
2593 -s "Protocol is TLSv1.3" \
2594 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2595 -s "received signature algorithm: 0x804" \
2596 -s "got named group: secp256r1(0017)" \
2597 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002598 -C "received HelloRetryRequest message"
2599
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002600requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002601requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002602requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002603requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2605requires_gnutls_tls1_3
2606requires_gnutls_next_no_ticket
2607requires_gnutls_next_disable_tls13_compat
2608run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002609 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2610 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002611 0 \
2612 -s "Protocol is TLSv1.3" \
2613 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2614 -s "received signature algorithm: 0x403" \
2615 -s "got named group: secp384r1(0018)" \
2616 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002617 -C "received HelloRetryRequest message"
2618
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002619requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002620requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002621requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002622requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2624requires_gnutls_tls1_3
2625requires_gnutls_next_no_ticket
2626requires_gnutls_next_disable_tls13_compat
2627run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002628 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2629 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002630 0 \
2631 -s "Protocol is TLSv1.3" \
2632 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2633 -s "received signature algorithm: 0x503" \
2634 -s "got named group: secp384r1(0018)" \
2635 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002636 -C "received HelloRetryRequest message"
2637
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002638requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002639requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002641requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002642requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2643requires_gnutls_tls1_3
2644requires_gnutls_next_no_ticket
2645requires_gnutls_next_disable_tls13_compat
2646run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002647 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2648 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002649 0 \
2650 -s "Protocol is TLSv1.3" \
2651 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2652 -s "received signature algorithm: 0x603" \
2653 -s "got named group: secp384r1(0018)" \
2654 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002655 -C "received HelloRetryRequest message"
2656
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002657requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002658requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002660requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002661requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2662requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2663requires_gnutls_tls1_3
2664requires_gnutls_next_no_ticket
2665requires_gnutls_next_disable_tls13_compat
2666run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002667 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2668 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002669 0 \
2670 -s "Protocol is TLSv1.3" \
2671 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2672 -s "received signature algorithm: 0x804" \
2673 -s "got named group: secp384r1(0018)" \
2674 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002675 -C "received HelloRetryRequest message"
2676
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002677requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002678requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002679requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002680requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002681requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2682requires_gnutls_tls1_3
2683requires_gnutls_next_no_ticket
2684requires_gnutls_next_disable_tls13_compat
2685run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002686 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2687 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002688 0 \
2689 -s "Protocol is TLSv1.3" \
2690 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2691 -s "received signature algorithm: 0x403" \
2692 -s "got named group: secp521r1(0019)" \
2693 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002694 -C "received HelloRetryRequest message"
2695
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002696requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002697requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002699requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002700requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2701requires_gnutls_tls1_3
2702requires_gnutls_next_no_ticket
2703requires_gnutls_next_disable_tls13_compat
2704run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002705 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2706 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002707 0 \
2708 -s "Protocol is TLSv1.3" \
2709 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2710 -s "received signature algorithm: 0x503" \
2711 -s "got named group: secp521r1(0019)" \
2712 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002713 -C "received HelloRetryRequest message"
2714
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002715requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002716requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002718requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002719requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2720requires_gnutls_tls1_3
2721requires_gnutls_next_no_ticket
2722requires_gnutls_next_disable_tls13_compat
2723run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002724 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2725 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002726 0 \
2727 -s "Protocol is TLSv1.3" \
2728 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2729 -s "received signature algorithm: 0x603" \
2730 -s "got named group: secp521r1(0019)" \
2731 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002732 -C "received HelloRetryRequest message"
2733
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002734requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002735requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002736requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002737requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2739requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2740requires_gnutls_tls1_3
2741requires_gnutls_next_no_ticket
2742requires_gnutls_next_disable_tls13_compat
2743run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002744 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2745 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002746 0 \
2747 -s "Protocol is TLSv1.3" \
2748 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2749 -s "received signature algorithm: 0x804" \
2750 -s "got named group: secp521r1(0019)" \
2751 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002752 -C "received HelloRetryRequest message"
2753
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002754requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002755requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002756requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002757requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002758requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2759requires_gnutls_tls1_3
2760requires_gnutls_next_no_ticket
2761requires_gnutls_next_disable_tls13_compat
2762run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002763 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2764 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002765 0 \
2766 -s "Protocol is TLSv1.3" \
2767 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2768 -s "received signature algorithm: 0x403" \
2769 -s "got named group: x25519(001d)" \
2770 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002771 -C "received HelloRetryRequest message"
2772
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002773requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002774requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002775requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002776requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002777requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2778requires_gnutls_tls1_3
2779requires_gnutls_next_no_ticket
2780requires_gnutls_next_disable_tls13_compat
2781run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002782 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2783 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002784 0 \
2785 -s "Protocol is TLSv1.3" \
2786 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2787 -s "received signature algorithm: 0x503" \
2788 -s "got named group: x25519(001d)" \
2789 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002790 -C "received HelloRetryRequest message"
2791
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002792requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002793requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002795requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2797requires_gnutls_tls1_3
2798requires_gnutls_next_no_ticket
2799requires_gnutls_next_disable_tls13_compat
2800run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002801 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2802 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002803 0 \
2804 -s "Protocol is TLSv1.3" \
2805 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2806 -s "received signature algorithm: 0x603" \
2807 -s "got named group: x25519(001d)" \
2808 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002809 -C "received HelloRetryRequest message"
2810
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002811requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002812requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002814requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002815requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2816requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2817requires_gnutls_tls1_3
2818requires_gnutls_next_no_ticket
2819requires_gnutls_next_disable_tls13_compat
2820run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002821 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2822 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002823 0 \
2824 -s "Protocol is TLSv1.3" \
2825 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2826 -s "received signature algorithm: 0x804" \
2827 -s "got named group: x25519(001d)" \
2828 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002829 -C "received HelloRetryRequest message"
2830
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002831requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002832requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002833requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002834requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2836requires_gnutls_tls1_3
2837requires_gnutls_next_no_ticket
2838requires_gnutls_next_disable_tls13_compat
2839run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002840 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2841 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002842 0 \
2843 -s "Protocol is TLSv1.3" \
2844 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2845 -s "received signature algorithm: 0x403" \
2846 -s "got named group: x448(001e)" \
2847 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002848 -C "received HelloRetryRequest message"
2849
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002850requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002851requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002853requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2855requires_gnutls_tls1_3
2856requires_gnutls_next_no_ticket
2857requires_gnutls_next_disable_tls13_compat
2858run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002859 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2860 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002861 0 \
2862 -s "Protocol is TLSv1.3" \
2863 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2864 -s "received signature algorithm: 0x503" \
2865 -s "got named group: x448(001e)" \
2866 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002867 -C "received HelloRetryRequest message"
2868
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002869requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002870requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002872requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002873requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2874requires_gnutls_tls1_3
2875requires_gnutls_next_no_ticket
2876requires_gnutls_next_disable_tls13_compat
2877run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002878 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2879 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002880 0 \
2881 -s "Protocol is TLSv1.3" \
2882 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2883 -s "received signature algorithm: 0x603" \
2884 -s "got named group: x448(001e)" \
2885 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002886 -C "received HelloRetryRequest message"
2887
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002888requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002889requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002890requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002891requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002892requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2893requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2894requires_gnutls_tls1_3
2895requires_gnutls_next_no_ticket
2896requires_gnutls_next_disable_tls13_compat
2897run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002898 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2899 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002900 0 \
2901 -s "Protocol is TLSv1.3" \
2902 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2903 -s "received signature algorithm: 0x804" \
2904 -s "got named group: x448(001e)" \
2905 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002906 -C "received HelloRetryRequest message"
2907
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002908requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002909requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002910requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002911requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002912requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2913requires_gnutls_tls1_3
2914requires_gnutls_next_no_ticket
2915requires_gnutls_next_disable_tls13_compat
2916run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002917 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2918 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002919 0 \
2920 -s "Protocol is TLSv1.3" \
2921 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2922 -s "received signature algorithm: 0x403" \
2923 -s "got named group: secp256r1(0017)" \
2924 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002925 -C "received HelloRetryRequest message"
2926
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002927requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002928requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002929requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002930requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002931requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2932requires_gnutls_tls1_3
2933requires_gnutls_next_no_ticket
2934requires_gnutls_next_disable_tls13_compat
2935run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002936 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2937 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002938 0 \
2939 -s "Protocol is TLSv1.3" \
2940 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2941 -s "received signature algorithm: 0x503" \
2942 -s "got named group: secp256r1(0017)" \
2943 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002944 -C "received HelloRetryRequest message"
2945
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002946requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002947requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002948requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002949requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002950requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2951requires_gnutls_tls1_3
2952requires_gnutls_next_no_ticket
2953requires_gnutls_next_disable_tls13_compat
2954run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002955 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2956 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002957 0 \
2958 -s "Protocol is TLSv1.3" \
2959 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2960 -s "received signature algorithm: 0x603" \
2961 -s "got named group: secp256r1(0017)" \
2962 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002963 -C "received HelloRetryRequest message"
2964
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002965requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002966requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002967requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002968requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002969requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2970requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2971requires_gnutls_tls1_3
2972requires_gnutls_next_no_ticket
2973requires_gnutls_next_disable_tls13_compat
2974run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002975 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2976 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002977 0 \
2978 -s "Protocol is TLSv1.3" \
2979 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2980 -s "received signature algorithm: 0x804" \
2981 -s "got named group: secp256r1(0017)" \
2982 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002983 -C "received HelloRetryRequest message"
2984
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002985requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002986requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02002988requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00002989requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2990requires_gnutls_tls1_3
2991requires_gnutls_next_no_ticket
2992requires_gnutls_next_disable_tls13_compat
2993run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002994 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2995 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002996 0 \
2997 -s "Protocol is TLSv1.3" \
2998 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2999 -s "received signature algorithm: 0x403" \
3000 -s "got named group: secp384r1(0018)" \
3001 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003002 -C "received HelloRetryRequest message"
3003
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003004requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003005requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003007requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003008requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3009requires_gnutls_tls1_3
3010requires_gnutls_next_no_ticket
3011requires_gnutls_next_disable_tls13_compat
3012run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003013 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3014 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003015 0 \
3016 -s "Protocol is TLSv1.3" \
3017 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3018 -s "received signature algorithm: 0x503" \
3019 -s "got named group: secp384r1(0018)" \
3020 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003021 -C "received HelloRetryRequest message"
3022
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003023requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003024requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003026requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3028requires_gnutls_tls1_3
3029requires_gnutls_next_no_ticket
3030requires_gnutls_next_disable_tls13_compat
3031run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003032 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3033 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003034 0 \
3035 -s "Protocol is TLSv1.3" \
3036 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3037 -s "received signature algorithm: 0x603" \
3038 -s "got named group: secp384r1(0018)" \
3039 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003040 -C "received HelloRetryRequest message"
3041
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003042requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003045requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003046requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3047requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3048requires_gnutls_tls1_3
3049requires_gnutls_next_no_ticket
3050requires_gnutls_next_disable_tls13_compat
3051run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003052 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3053 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003054 0 \
3055 -s "Protocol is TLSv1.3" \
3056 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3057 -s "received signature algorithm: 0x804" \
3058 -s "got named group: secp384r1(0018)" \
3059 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003060 -C "received HelloRetryRequest message"
3061
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003065requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3067requires_gnutls_tls1_3
3068requires_gnutls_next_no_ticket
3069requires_gnutls_next_disable_tls13_compat
3070run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003071 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3072 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003073 0 \
3074 -s "Protocol is TLSv1.3" \
3075 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3076 -s "received signature algorithm: 0x403" \
3077 -s "got named group: secp521r1(0019)" \
3078 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003079 -C "received HelloRetryRequest message"
3080
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003081requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003082requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003083requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003084requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3086requires_gnutls_tls1_3
3087requires_gnutls_next_no_ticket
3088requires_gnutls_next_disable_tls13_compat
3089run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003090 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3091 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003092 0 \
3093 -s "Protocol is TLSv1.3" \
3094 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3095 -s "received signature algorithm: 0x503" \
3096 -s "got named group: secp521r1(0019)" \
3097 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003098 -C "received HelloRetryRequest message"
3099
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003100requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003101requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003103requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003104requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3105requires_gnutls_tls1_3
3106requires_gnutls_next_no_ticket
3107requires_gnutls_next_disable_tls13_compat
3108run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003109 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3110 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003111 0 \
3112 -s "Protocol is TLSv1.3" \
3113 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3114 -s "received signature algorithm: 0x603" \
3115 -s "got named group: secp521r1(0019)" \
3116 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003117 -C "received HelloRetryRequest message"
3118
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003119requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003120requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003122requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003123requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3124requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3125requires_gnutls_tls1_3
3126requires_gnutls_next_no_ticket
3127requires_gnutls_next_disable_tls13_compat
3128run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003129 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3130 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003131 0 \
3132 -s "Protocol is TLSv1.3" \
3133 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3134 -s "received signature algorithm: 0x804" \
3135 -s "got named group: secp521r1(0019)" \
3136 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003137 -C "received HelloRetryRequest message"
3138
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003139requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003140requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003141requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003142requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3144requires_gnutls_tls1_3
3145requires_gnutls_next_no_ticket
3146requires_gnutls_next_disable_tls13_compat
3147run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003148 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3149 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003150 0 \
3151 -s "Protocol is TLSv1.3" \
3152 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3153 -s "received signature algorithm: 0x403" \
3154 -s "got named group: x25519(001d)" \
3155 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003156 -C "received HelloRetryRequest message"
3157
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003158requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003159requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003160requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003161requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003162requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3163requires_gnutls_tls1_3
3164requires_gnutls_next_no_ticket
3165requires_gnutls_next_disable_tls13_compat
3166run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003167 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3168 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003169 0 \
3170 -s "Protocol is TLSv1.3" \
3171 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3172 -s "received signature algorithm: 0x503" \
3173 -s "got named group: x25519(001d)" \
3174 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003175 -C "received HelloRetryRequest message"
3176
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003177requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003178requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003179requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003180requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003181requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3182requires_gnutls_tls1_3
3183requires_gnutls_next_no_ticket
3184requires_gnutls_next_disable_tls13_compat
3185run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003186 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3187 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003188 0 \
3189 -s "Protocol is TLSv1.3" \
3190 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3191 -s "received signature algorithm: 0x603" \
3192 -s "got named group: x25519(001d)" \
3193 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003194 -C "received HelloRetryRequest message"
3195
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003196requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003197requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003199requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3201requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3202requires_gnutls_tls1_3
3203requires_gnutls_next_no_ticket
3204requires_gnutls_next_disable_tls13_compat
3205run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003206 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3207 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003208 0 \
3209 -s "Protocol is TLSv1.3" \
3210 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3211 -s "received signature algorithm: 0x804" \
3212 -s "got named group: x25519(001d)" \
3213 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003214 -C "received HelloRetryRequest message"
3215
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003216requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003217requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003218requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003219requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3221requires_gnutls_tls1_3
3222requires_gnutls_next_no_ticket
3223requires_gnutls_next_disable_tls13_compat
3224run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003225 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3226 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003227 0 \
3228 -s "Protocol is TLSv1.3" \
3229 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3230 -s "received signature algorithm: 0x403" \
3231 -s "got named group: x448(001e)" \
3232 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003233 -C "received HelloRetryRequest message"
3234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003238requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003239requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3240requires_gnutls_tls1_3
3241requires_gnutls_next_no_ticket
3242requires_gnutls_next_disable_tls13_compat
3243run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003244 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3245 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003246 0 \
3247 -s "Protocol is TLSv1.3" \
3248 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3249 -s "received signature algorithm: 0x503" \
3250 -s "got named group: x448(001e)" \
3251 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003252 -C "received HelloRetryRequest message"
3253
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003254requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003255requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003257requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3259requires_gnutls_tls1_3
3260requires_gnutls_next_no_ticket
3261requires_gnutls_next_disable_tls13_compat
3262run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003263 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3264 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003265 0 \
3266 -s "Protocol is TLSv1.3" \
3267 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3268 -s "received signature algorithm: 0x603" \
3269 -s "got named group: x448(001e)" \
3270 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003271 -C "received HelloRetryRequest message"
3272
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003273requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003274requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003276requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003277requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3278requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3279requires_gnutls_tls1_3
3280requires_gnutls_next_no_ticket
3281requires_gnutls_next_disable_tls13_compat
3282run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003283 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3284 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003285 0 \
3286 -s "Protocol is TLSv1.3" \
3287 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3288 -s "received signature algorithm: 0x804" \
3289 -s "got named group: x448(001e)" \
3290 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003291 -C "received HelloRetryRequest message"
3292
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003293requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003294requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003295requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003296requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003297requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3298requires_gnutls_tls1_3
3299requires_gnutls_next_no_ticket
3300requires_gnutls_next_disable_tls13_compat
3301run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003302 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3303 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003304 0 \
3305 -s "Protocol is TLSv1.3" \
3306 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3307 -s "received signature algorithm: 0x403" \
3308 -s "got named group: secp256r1(0017)" \
3309 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003310 -C "received HelloRetryRequest message"
3311
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003312requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003315requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003316requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3317requires_gnutls_tls1_3
3318requires_gnutls_next_no_ticket
3319requires_gnutls_next_disable_tls13_compat
3320run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003321 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3322 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003323 0 \
3324 -s "Protocol is TLSv1.3" \
3325 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3326 -s "received signature algorithm: 0x503" \
3327 -s "got named group: secp256r1(0017)" \
3328 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003329 -C "received HelloRetryRequest message"
3330
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003331requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003332requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003333requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003334requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3336requires_gnutls_tls1_3
3337requires_gnutls_next_no_ticket
3338requires_gnutls_next_disable_tls13_compat
3339run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003340 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3341 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003342 0 \
3343 -s "Protocol is TLSv1.3" \
3344 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3345 -s "received signature algorithm: 0x603" \
3346 -s "got named group: secp256r1(0017)" \
3347 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003348 -C "received HelloRetryRequest message"
3349
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003350requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003351requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003352requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003353requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003354requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3355requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3356requires_gnutls_tls1_3
3357requires_gnutls_next_no_ticket
3358requires_gnutls_next_disable_tls13_compat
3359run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003360 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3361 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003362 0 \
3363 -s "Protocol is TLSv1.3" \
3364 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3365 -s "received signature algorithm: 0x804" \
3366 -s "got named group: secp256r1(0017)" \
3367 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003368 -C "received HelloRetryRequest message"
3369
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003370requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003371requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003372requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003373requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003374requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3375requires_gnutls_tls1_3
3376requires_gnutls_next_no_ticket
3377requires_gnutls_next_disable_tls13_compat
3378run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003379 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3380 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003381 0 \
3382 -s "Protocol is TLSv1.3" \
3383 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3384 -s "received signature algorithm: 0x403" \
3385 -s "got named group: secp384r1(0018)" \
3386 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003387 -C "received HelloRetryRequest message"
3388
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003389requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003390requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003391requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003392requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3394requires_gnutls_tls1_3
3395requires_gnutls_next_no_ticket
3396requires_gnutls_next_disable_tls13_compat
3397run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003398 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3399 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003400 0 \
3401 -s "Protocol is TLSv1.3" \
3402 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3403 -s "received signature algorithm: 0x503" \
3404 -s "got named group: secp384r1(0018)" \
3405 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003406 -C "received HelloRetryRequest message"
3407
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003409requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003411requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003412requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3413requires_gnutls_tls1_3
3414requires_gnutls_next_no_ticket
3415requires_gnutls_next_disable_tls13_compat
3416run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003417 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3418 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003419 0 \
3420 -s "Protocol is TLSv1.3" \
3421 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3422 -s "received signature algorithm: 0x603" \
3423 -s "got named group: secp384r1(0018)" \
3424 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003425 -C "received HelloRetryRequest message"
3426
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003427requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003428requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003429requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003430requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003431requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3432requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3433requires_gnutls_tls1_3
3434requires_gnutls_next_no_ticket
3435requires_gnutls_next_disable_tls13_compat
3436run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003437 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3438 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003439 0 \
3440 -s "Protocol is TLSv1.3" \
3441 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3442 -s "received signature algorithm: 0x804" \
3443 -s "got named group: secp384r1(0018)" \
3444 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003445 -C "received HelloRetryRequest message"
3446
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003447requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003448requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003449requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003450requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003451requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3452requires_gnutls_tls1_3
3453requires_gnutls_next_no_ticket
3454requires_gnutls_next_disable_tls13_compat
3455run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003456 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3457 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003458 0 \
3459 -s "Protocol is TLSv1.3" \
3460 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3461 -s "received signature algorithm: 0x403" \
3462 -s "got named group: secp521r1(0019)" \
3463 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003464 -C "received HelloRetryRequest message"
3465
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003466requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003467requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003468requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003469requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003470requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3471requires_gnutls_tls1_3
3472requires_gnutls_next_no_ticket
3473requires_gnutls_next_disable_tls13_compat
3474run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003475 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3476 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003477 0 \
3478 -s "Protocol is TLSv1.3" \
3479 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3480 -s "received signature algorithm: 0x503" \
3481 -s "got named group: secp521r1(0019)" \
3482 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003483 -C "received HelloRetryRequest message"
3484
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003485requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003486requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003487requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003488requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003489requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3490requires_gnutls_tls1_3
3491requires_gnutls_next_no_ticket
3492requires_gnutls_next_disable_tls13_compat
3493run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003494 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3495 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003496 0 \
3497 -s "Protocol is TLSv1.3" \
3498 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3499 -s "received signature algorithm: 0x603" \
3500 -s "got named group: secp521r1(0019)" \
3501 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003502 -C "received HelloRetryRequest message"
3503
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003504requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003507requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003508requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3509requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3510requires_gnutls_tls1_3
3511requires_gnutls_next_no_ticket
3512requires_gnutls_next_disable_tls13_compat
3513run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003514 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3515 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003516 0 \
3517 -s "Protocol is TLSv1.3" \
3518 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3519 -s "received signature algorithm: 0x804" \
3520 -s "got named group: secp521r1(0019)" \
3521 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003522 -C "received HelloRetryRequest message"
3523
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003524requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003525requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003527requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003528requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3529requires_gnutls_tls1_3
3530requires_gnutls_next_no_ticket
3531requires_gnutls_next_disable_tls13_compat
3532run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003533 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3534 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003535 0 \
3536 -s "Protocol is TLSv1.3" \
3537 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3538 -s "received signature algorithm: 0x403" \
3539 -s "got named group: x25519(001d)" \
3540 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003541 -C "received HelloRetryRequest message"
3542
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003543requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003544requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003545requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003546requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3548requires_gnutls_tls1_3
3549requires_gnutls_next_no_ticket
3550requires_gnutls_next_disable_tls13_compat
3551run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003552 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3553 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003554 0 \
3555 -s "Protocol is TLSv1.3" \
3556 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3557 -s "received signature algorithm: 0x503" \
3558 -s "got named group: x25519(001d)" \
3559 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003560 -C "received HelloRetryRequest message"
3561
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003563requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003565requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003566requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3567requires_gnutls_tls1_3
3568requires_gnutls_next_no_ticket
3569requires_gnutls_next_disable_tls13_compat
3570run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003571 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3572 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003573 0 \
3574 -s "Protocol is TLSv1.3" \
3575 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3576 -s "received signature algorithm: 0x603" \
3577 -s "got named group: x25519(001d)" \
3578 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003579 -C "received HelloRetryRequest message"
3580
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003581requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003582requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003583requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003584requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3586requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3587requires_gnutls_tls1_3
3588requires_gnutls_next_no_ticket
3589requires_gnutls_next_disable_tls13_compat
3590run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003591 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3592 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003593 0 \
3594 -s "Protocol is TLSv1.3" \
3595 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3596 -s "received signature algorithm: 0x804" \
3597 -s "got named group: x25519(001d)" \
3598 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003599 -C "received HelloRetryRequest message"
3600
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003601requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003602requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003603requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003604requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3606requires_gnutls_tls1_3
3607requires_gnutls_next_no_ticket
3608requires_gnutls_next_disable_tls13_compat
3609run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003610 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3611 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003612 0 \
3613 -s "Protocol is TLSv1.3" \
3614 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3615 -s "received signature algorithm: 0x403" \
3616 -s "got named group: x448(001e)" \
3617 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003618 -C "received HelloRetryRequest message"
3619
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003621requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003623requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003624requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3625requires_gnutls_tls1_3
3626requires_gnutls_next_no_ticket
3627requires_gnutls_next_disable_tls13_compat
3628run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003629 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3630 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003631 0 \
3632 -s "Protocol is TLSv1.3" \
3633 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3634 -s "received signature algorithm: 0x503" \
3635 -s "got named group: x448(001e)" \
3636 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003637 -C "received HelloRetryRequest message"
3638
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003639requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003640requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003641requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003642requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003643requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3644requires_gnutls_tls1_3
3645requires_gnutls_next_no_ticket
3646requires_gnutls_next_disable_tls13_compat
3647run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003648 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3649 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003650 0 \
3651 -s "Protocol is TLSv1.3" \
3652 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3653 -s "received signature algorithm: 0x603" \
3654 -s "got named group: x448(001e)" \
3655 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003656 -C "received HelloRetryRequest message"
3657
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003658requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003659requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003660requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003661requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00003662requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3663requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3664requires_gnutls_tls1_3
3665requires_gnutls_next_no_ticket
3666requires_gnutls_next_disable_tls13_compat
3667run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003668 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3669 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003670 0 \
3671 -s "Protocol is TLSv1.3" \
3672 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3673 -s "received signature algorithm: 0x804" \
3674 -s "got named group: x448(001e)" \
3675 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003676 -C "received HelloRetryRequest message"
3677
Jerry Yu31018ad2021-11-26 20:36:17 +08003678requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003679requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003680requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003682requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003683requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003684run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003685 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3686 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003687 0 \
3688 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003689 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003690 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3691 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003692 -c "NamedGroup: secp256r1 ( 17 )" \
3693 -c "Verifying peer X.509 certificate... ok" \
3694 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003695
Jerry Yu31018ad2021-11-26 20:36:17 +08003696requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003697requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003698requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003699requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003700requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003701requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003702run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003703 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3704 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003705 0 \
3706 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003707 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003708 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3709 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003710 -c "NamedGroup: secp256r1 ( 17 )" \
3711 -c "Verifying peer X.509 certificate... ok" \
3712 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003713
Jerry Yu31018ad2021-11-26 20:36:17 +08003714requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003715requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003716requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003718requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003719requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003720run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003721 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3722 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003723 0 \
3724 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003725 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003726 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3727 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003728 -c "NamedGroup: secp256r1 ( 17 )" \
3729 -c "Verifying peer X.509 certificate... ok" \
3730 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003731
Jerry Yu31018ad2021-11-26 20:36:17 +08003732requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003733requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003734requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003735requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003736requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003738requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003739run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003740 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3741 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003742 0 \
3743 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003744 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003745 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3746 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003747 -c "NamedGroup: secp256r1 ( 17 )" \
3748 -c "Verifying peer X.509 certificate... ok" \
3749 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003750
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003751requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003752requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003753requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003755requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003757run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003758 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3759 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003760 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003761 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003762 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003763 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003764 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3765 -c "NamedGroup: secp384r1 ( 18 )" \
3766 -c "Verifying peer X.509 certificate... ok" \
3767 -C "received HelloRetryRequest message"
3768
3769requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003770requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003771requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003772requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003773requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003774requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3775run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003776 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3777 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003778 0 \
3779 -c "HTTP/1.0 200 ok" \
3780 -c "Protocol is TLSv1.3" \
3781 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3782 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3783 -c "NamedGroup: secp384r1 ( 18 )" \
3784 -c "Verifying peer X.509 certificate... ok" \
3785 -C "received HelloRetryRequest message"
3786
3787requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003788requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003789requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003790requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003791requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003792requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3793run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003794 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3795 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003796 0 \
3797 -c "HTTP/1.0 200 ok" \
3798 -c "Protocol is TLSv1.3" \
3799 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3800 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3801 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003802 -c "Verifying peer X.509 certificate... ok" \
3803 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003804
Jerry Yu31018ad2021-11-26 20:36:17 +08003805requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003806requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003807requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003808requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003809requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003810requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003811requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003812run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003813 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3814 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003815 0 \
3816 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003817 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003818 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3819 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003820 -c "NamedGroup: secp384r1 ( 18 )" \
3821 -c "Verifying peer X.509 certificate... ok" \
3822 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003823
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003824requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003825requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003826requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003827requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003828requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003829requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003830run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003831 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3832 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003833 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003834 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003835 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003836 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003837 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3838 -c "NamedGroup: secp521r1 ( 19 )" \
3839 -c "Verifying peer X.509 certificate... ok" \
3840 -C "received HelloRetryRequest message"
3841
3842requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003843requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003844requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003845requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003846requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003847requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3848run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003849 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3850 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003851 0 \
3852 -c "HTTP/1.0 200 ok" \
3853 -c "Protocol is TLSv1.3" \
3854 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3855 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3856 -c "NamedGroup: secp521r1 ( 19 )" \
3857 -c "Verifying peer X.509 certificate... ok" \
3858 -C "received HelloRetryRequest message"
3859
3860requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003861requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003862requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003863requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003864requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003865requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3866run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003867 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3868 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003869 0 \
3870 -c "HTTP/1.0 200 ok" \
3871 -c "Protocol is TLSv1.3" \
3872 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3873 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3874 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003875 -c "Verifying peer X.509 certificate... ok" \
3876 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003877
Jerry Yu31018ad2021-11-26 20:36:17 +08003878requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003879requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003880requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003881requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003882requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003883requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003884requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003885run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003886 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3887 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003888 0 \
3889 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003890 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003891 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3892 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003893 -c "NamedGroup: secp521r1 ( 19 )" \
3894 -c "Verifying peer X.509 certificate... ok" \
3895 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003896
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003897requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003898requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003899requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003901requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003902requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003903run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003904 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3905 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003906 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003907 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003908 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003909 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003910 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3911 -c "NamedGroup: x25519 ( 1d )" \
3912 -c "Verifying peer X.509 certificate... ok" \
3913 -C "received HelloRetryRequest message"
3914
3915requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003916requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003917requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003919requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003920requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3921run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003922 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3923 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003924 0 \
3925 -c "HTTP/1.0 200 ok" \
3926 -c "Protocol is TLSv1.3" \
3927 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3928 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3929 -c "NamedGroup: x25519 ( 1d )" \
3930 -c "Verifying peer X.509 certificate... ok" \
3931 -C "received HelloRetryRequest message"
3932
3933requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003934requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003935requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003936requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003937requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003938requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3939run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003940 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3941 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003942 0 \
3943 -c "HTTP/1.0 200 ok" \
3944 -c "Protocol is TLSv1.3" \
3945 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3946 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3947 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003948 -c "Verifying peer X.509 certificate... ok" \
3949 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003950
Jerry Yu31018ad2021-11-26 20:36:17 +08003951requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003952requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003953requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003954requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003955requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003956requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003957requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003958run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003959 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3960 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003961 0 \
3962 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003963 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003964 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3965 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003966 -c "NamedGroup: x25519 ( 1d )" \
3967 -c "Verifying peer X.509 certificate... ok" \
3968 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003969
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003970requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003971requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003972requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003973requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003974requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01003975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003976run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003977 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3978 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003979 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003980 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003981 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003982 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003983 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3984 -c "NamedGroup: x448 ( 1e )" \
3985 -c "Verifying peer X.509 certificate... ok" \
3986 -C "received HelloRetryRequest message"
3987
3988requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003989requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003990requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003991requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02003992requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3994run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003995 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3996 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003997 0 \
3998 -c "HTTP/1.0 200 ok" \
3999 -c "Protocol is TLSv1.3" \
4000 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4001 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4002 -c "NamedGroup: x448 ( 1e )" \
4003 -c "Verifying peer X.509 certificate... ok" \
4004 -C "received HelloRetryRequest message"
4005
4006requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004007requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004008requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004009requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004010requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004011requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4012run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004013 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4014 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004015 0 \
4016 -c "HTTP/1.0 200 ok" \
4017 -c "Protocol is TLSv1.3" \
4018 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4019 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4020 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004021 -c "Verifying peer X.509 certificate... ok" \
4022 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004023
Jerry Yu31018ad2021-11-26 20:36:17 +08004024requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004025requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004026requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004027requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004028requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004029requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004030requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004031run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004032 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4033 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004034 0 \
4035 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004036 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004037 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4038 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004039 -c "NamedGroup: x448 ( 1e )" \
4040 -c "Verifying peer X.509 certificate... ok" \
4041 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004042
Jerry Yu31018ad2021-11-26 20:36:17 +08004043requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004044requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004045requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004046requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004047requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004048requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004049run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004050 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4051 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004052 0 \
4053 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004054 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004055 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4056 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004057 -c "NamedGroup: secp256r1 ( 17 )" \
4058 -c "Verifying peer X.509 certificate... ok" \
4059 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004060
Jerry Yu31018ad2021-11-26 20:36:17 +08004061requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004062requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004063requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004065requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004067run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004068 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4069 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004070 0 \
4071 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004072 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004073 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4074 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004075 -c "NamedGroup: secp256r1 ( 17 )" \
4076 -c "Verifying peer X.509 certificate... ok" \
4077 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004078
Jerry Yu31018ad2021-11-26 20:36:17 +08004079requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004080requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004081requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004083requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004085run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004086 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4087 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004088 0 \
4089 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004090 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004091 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4092 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004093 -c "NamedGroup: secp256r1 ( 17 )" \
4094 -c "Verifying peer X.509 certificate... ok" \
4095 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004096
Jerry Yu31018ad2021-11-26 20:36:17 +08004097requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004098requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004099requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004100requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004101requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004103requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004104run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004105 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4106 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004107 0 \
4108 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004109 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004110 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4111 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004112 -c "NamedGroup: secp256r1 ( 17 )" \
4113 -c "Verifying peer X.509 certificate... ok" \
4114 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004115
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004116requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004117requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004118requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004119requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004120requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004122run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004123 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4124 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004125 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004126 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004127 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004128 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004129 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4130 -c "NamedGroup: secp384r1 ( 18 )" \
4131 -c "Verifying peer X.509 certificate... ok" \
4132 -C "received HelloRetryRequest message"
4133
4134requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004135requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004136requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004137requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004138requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4140run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004141 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4142 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004143 0 \
4144 -c "HTTP/1.0 200 ok" \
4145 -c "Protocol is TLSv1.3" \
4146 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4147 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4148 -c "NamedGroup: secp384r1 ( 18 )" \
4149 -c "Verifying peer X.509 certificate... ok" \
4150 -C "received HelloRetryRequest message"
4151
4152requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004153requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004154requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004155requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004156requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004157requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4158run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004159 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4160 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004161 0 \
4162 -c "HTTP/1.0 200 ok" \
4163 -c "Protocol is TLSv1.3" \
4164 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4165 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4166 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004167 -c "Verifying peer X.509 certificate... ok" \
4168 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004169
Jerry Yu31018ad2021-11-26 20:36:17 +08004170requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004171requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004172requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004173requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004174requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004175requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004176requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004177run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004178 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4179 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004180 0 \
4181 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004182 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004183 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4184 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004185 -c "NamedGroup: secp384r1 ( 18 )" \
4186 -c "Verifying peer X.509 certificate... ok" \
4187 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004188
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004189requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004190requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004191requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004193requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004194requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004195run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004196 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4197 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004198 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004199 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004200 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004201 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004202 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4203 -c "NamedGroup: secp521r1 ( 19 )" \
4204 -c "Verifying peer X.509 certificate... ok" \
4205 -C "received HelloRetryRequest message"
4206
4207requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004208requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004209requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004210requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004211requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004212requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4213run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004214 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4215 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004216 0 \
4217 -c "HTTP/1.0 200 ok" \
4218 -c "Protocol is TLSv1.3" \
4219 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4220 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4221 -c "NamedGroup: secp521r1 ( 19 )" \
4222 -c "Verifying peer X.509 certificate... ok" \
4223 -C "received HelloRetryRequest message"
4224
4225requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004226requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004227requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004228requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004229requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004230requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4231run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004232 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4233 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004234 0 \
4235 -c "HTTP/1.0 200 ok" \
4236 -c "Protocol is TLSv1.3" \
4237 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4238 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4239 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004240 -c "Verifying peer X.509 certificate... ok" \
4241 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004242
Jerry Yu31018ad2021-11-26 20:36:17 +08004243requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004244requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004245requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004246requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004247requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004248requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004249requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004250run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004251 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4252 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004253 0 \
4254 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004255 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004256 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4257 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004258 -c "NamedGroup: secp521r1 ( 19 )" \
4259 -c "Verifying peer X.509 certificate... ok" \
4260 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004261
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004262requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004263requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004264requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004265requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004266requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004267requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004268run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004269 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4270 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004271 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004272 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004273 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004274 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004275 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4276 -c "NamedGroup: x25519 ( 1d )" \
4277 -c "Verifying peer X.509 certificate... ok" \
4278 -C "received HelloRetryRequest message"
4279
4280requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004281requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004282requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004283requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004284requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4286run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004287 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4288 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004289 0 \
4290 -c "HTTP/1.0 200 ok" \
4291 -c "Protocol is TLSv1.3" \
4292 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4293 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4294 -c "NamedGroup: x25519 ( 1d )" \
4295 -c "Verifying peer X.509 certificate... ok" \
4296 -C "received HelloRetryRequest message"
4297
4298requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004299requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004300requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004301requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004302requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4304run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004305 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4306 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004307 0 \
4308 -c "HTTP/1.0 200 ok" \
4309 -c "Protocol is TLSv1.3" \
4310 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4311 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4312 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004313 -c "Verifying peer X.509 certificate... ok" \
4314 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004315
Jerry Yu31018ad2021-11-26 20:36:17 +08004316requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004317requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004318requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004320requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004321requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004322requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004323run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004324 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4325 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004326 0 \
4327 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004328 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004329 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4330 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004331 -c "NamedGroup: x25519 ( 1d )" \
4332 -c "Verifying peer X.509 certificate... ok" \
4333 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004334
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004335requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004336requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004337requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004339requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004340requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004341run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004342 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4343 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004344 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004345 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004346 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004347 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004348 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4349 -c "NamedGroup: x448 ( 1e )" \
4350 -c "Verifying peer X.509 certificate... ok" \
4351 -C "received HelloRetryRequest message"
4352
4353requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004354requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004355requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004356requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004357requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004358requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4359run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004360 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4361 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004362 0 \
4363 -c "HTTP/1.0 200 ok" \
4364 -c "Protocol is TLSv1.3" \
4365 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4366 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4367 -c "NamedGroup: x448 ( 1e )" \
4368 -c "Verifying peer X.509 certificate... ok" \
4369 -C "received HelloRetryRequest message"
4370
4371requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004372requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004373requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004374requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004375requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004376requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4377run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004378 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4379 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004380 0 \
4381 -c "HTTP/1.0 200 ok" \
4382 -c "Protocol is TLSv1.3" \
4383 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4384 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4385 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004386 -c "Verifying peer X.509 certificate... ok" \
4387 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004388
Jerry Yu31018ad2021-11-26 20:36:17 +08004389requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004390requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004391requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004393requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004395requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004396run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004397 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4398 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004399 0 \
4400 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004401 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004402 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4403 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004404 -c "NamedGroup: x448 ( 1e )" \
4405 -c "Verifying peer X.509 certificate... ok" \
4406 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004407
Jerry Yu31018ad2021-11-26 20:36:17 +08004408requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004409requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004410requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004411requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004412requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004414run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004415 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4416 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004417 0 \
4418 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004419 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004420 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4421 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004422 -c "NamedGroup: secp256r1 ( 17 )" \
4423 -c "Verifying peer X.509 certificate... ok" \
4424 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004425
Jerry Yu31018ad2021-11-26 20:36:17 +08004426requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004427requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004428requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004429requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004430requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004431requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004432run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004433 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4434 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004435 0 \
4436 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004437 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004438 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4439 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004440 -c "NamedGroup: secp256r1 ( 17 )" \
4441 -c "Verifying peer X.509 certificate... ok" \
4442 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004443
Jerry Yu31018ad2021-11-26 20:36:17 +08004444requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004445requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004446requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004447requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004448requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004449requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004450run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004451 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4452 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004453 0 \
4454 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004455 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004456 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4457 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004458 -c "NamedGroup: secp256r1 ( 17 )" \
4459 -c "Verifying peer X.509 certificate... ok" \
4460 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004461
Jerry Yu31018ad2021-11-26 20:36:17 +08004462requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004463requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004464requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004466requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004468requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004469run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004470 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4471 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004472 0 \
4473 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004474 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004475 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4476 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004477 -c "NamedGroup: secp256r1 ( 17 )" \
4478 -c "Verifying peer X.509 certificate... ok" \
4479 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004480
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004481requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004482requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004483requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004484requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004485requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004487run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004488 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4489 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004490 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004491 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004492 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004493 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004494 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4495 -c "NamedGroup: secp384r1 ( 18 )" \
4496 -c "Verifying peer X.509 certificate... ok" \
4497 -C "received HelloRetryRequest message"
4498
4499requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004500requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004501requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004502requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004503requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004504requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4505run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004506 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4507 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004508 0 \
4509 -c "HTTP/1.0 200 ok" \
4510 -c "Protocol is TLSv1.3" \
4511 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4512 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4513 -c "NamedGroup: secp384r1 ( 18 )" \
4514 -c "Verifying peer X.509 certificate... ok" \
4515 -C "received HelloRetryRequest message"
4516
4517requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004518requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004519requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004520requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004521requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004522requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4523run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004524 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4525 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004526 0 \
4527 -c "HTTP/1.0 200 ok" \
4528 -c "Protocol is TLSv1.3" \
4529 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4530 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4531 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004532 -c "Verifying peer X.509 certificate... ok" \
4533 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004534
Jerry Yu31018ad2021-11-26 20:36:17 +08004535requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004536requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004537requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004538requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004539requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004540requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004541requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004542run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004543 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4544 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004545 0 \
4546 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004547 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004548 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4549 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004550 -c "NamedGroup: secp384r1 ( 18 )" \
4551 -c "Verifying peer X.509 certificate... ok" \
4552 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004553
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004554requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004555requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004556requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004557requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004558requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004560run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004561 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4562 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004563 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004564 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004565 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004566 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004567 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4568 -c "NamedGroup: secp521r1 ( 19 )" \
4569 -c "Verifying peer X.509 certificate... ok" \
4570 -C "received HelloRetryRequest message"
4571
4572requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004573requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004574requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004575requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004576requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4578run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004579 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4580 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004581 0 \
4582 -c "HTTP/1.0 200 ok" \
4583 -c "Protocol is TLSv1.3" \
4584 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4585 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4586 -c "NamedGroup: secp521r1 ( 19 )" \
4587 -c "Verifying peer X.509 certificate... ok" \
4588 -C "received HelloRetryRequest message"
4589
4590requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004591requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004592requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004593requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004594requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004595requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4596run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004597 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4598 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004599 0 \
4600 -c "HTTP/1.0 200 ok" \
4601 -c "Protocol is TLSv1.3" \
4602 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4603 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4604 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004605 -c "Verifying peer X.509 certificate... ok" \
4606 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004607
Jerry Yu31018ad2021-11-26 20:36:17 +08004608requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004609requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004610requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004611requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004612requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004614requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004615run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004616 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4617 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004618 0 \
4619 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004620 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004621 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4622 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004623 -c "NamedGroup: secp521r1 ( 19 )" \
4624 -c "Verifying peer X.509 certificate... ok" \
4625 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004626
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004627requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004628requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004629requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004630requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004631requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004633run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004634 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4635 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004636 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004637 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004638 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004639 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004640 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4641 -c "NamedGroup: x25519 ( 1d )" \
4642 -c "Verifying peer X.509 certificate... ok" \
4643 -C "received HelloRetryRequest message"
4644
4645requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004646requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004647requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004648requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004649requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004650requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4651run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004652 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4653 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004654 0 \
4655 -c "HTTP/1.0 200 ok" \
4656 -c "Protocol is TLSv1.3" \
4657 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4658 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4659 -c "NamedGroup: x25519 ( 1d )" \
4660 -c "Verifying peer X.509 certificate... ok" \
4661 -C "received HelloRetryRequest message"
4662
4663requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004664requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004665requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004666requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004667requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004668requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4669run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004670 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4671 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004672 0 \
4673 -c "HTTP/1.0 200 ok" \
4674 -c "Protocol is TLSv1.3" \
4675 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4676 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4677 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004678 -c "Verifying peer X.509 certificate... ok" \
4679 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004680
Jerry Yu31018ad2021-11-26 20:36:17 +08004681requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004682requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004683requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004684requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004685requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004687requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004688run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004689 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4690 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004691 0 \
4692 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004693 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004694 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4695 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004696 -c "NamedGroup: x25519 ( 1d )" \
4697 -c "Verifying peer X.509 certificate... ok" \
4698 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004699
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004700requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004701requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004702requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004703requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004704requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004705requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004706run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004707 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4708 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004709 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004710 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004711 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004712 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004713 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4714 -c "NamedGroup: x448 ( 1e )" \
4715 -c "Verifying peer X.509 certificate... ok" \
4716 -C "received HelloRetryRequest message"
4717
4718requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004719requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004720requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004721requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004722requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4724run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004725 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4726 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004727 0 \
4728 -c "HTTP/1.0 200 ok" \
4729 -c "Protocol is TLSv1.3" \
4730 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4731 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4732 -c "NamedGroup: x448 ( 1e )" \
4733 -c "Verifying peer X.509 certificate... ok" \
4734 -C "received HelloRetryRequest message"
4735
4736requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004737requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004738requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004739requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004740requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004741requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4742run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004743 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4744 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004745 0 \
4746 -c "HTTP/1.0 200 ok" \
4747 -c "Protocol is TLSv1.3" \
4748 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4749 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4750 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004751 -c "Verifying peer X.509 certificate... ok" \
4752 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004753
Jerry Yu31018ad2021-11-26 20:36:17 +08004754requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004755requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004756requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004757requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004758requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004759requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004760requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004761run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004762 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4763 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004764 0 \
4765 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004766 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004767 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4768 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004769 -c "NamedGroup: x448 ( 1e )" \
4770 -c "Verifying peer X.509 certificate... ok" \
4771 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004772
Jerry Yu31018ad2021-11-26 20:36:17 +08004773requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004774requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004775requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004776requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004777requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004778requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004779run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004780 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4781 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004782 0 \
4783 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004784 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004785 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4786 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004787 -c "NamedGroup: secp256r1 ( 17 )" \
4788 -c "Verifying peer X.509 certificate... ok" \
4789 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004790
Jerry Yu31018ad2021-11-26 20:36:17 +08004791requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004792requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004793requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004795requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004797run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004798 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4799 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004800 0 \
4801 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004802 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004803 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4804 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004805 -c "NamedGroup: secp256r1 ( 17 )" \
4806 -c "Verifying peer X.509 certificate... ok" \
4807 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004808
Jerry Yu31018ad2021-11-26 20:36:17 +08004809requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004810requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004811requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004813requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004815run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004816 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4817 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004818 0 \
4819 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004820 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004821 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4822 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004823 -c "NamedGroup: secp256r1 ( 17 )" \
4824 -c "Verifying peer X.509 certificate... ok" \
4825 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004826
Jerry Yu31018ad2021-11-26 20:36:17 +08004827requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004828requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004829requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004830requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004831requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004832requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004833requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004834run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004835 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4836 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004837 0 \
4838 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004839 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004840 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4841 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004842 -c "NamedGroup: secp256r1 ( 17 )" \
4843 -c "Verifying peer X.509 certificate... ok" \
4844 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004845
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004846requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004847requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004848requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004849requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004850requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004851requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004852run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004853 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4854 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004855 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004856 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004857 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004858 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004859 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4860 -c "NamedGroup: secp384r1 ( 18 )" \
4861 -c "Verifying peer X.509 certificate... ok" \
4862 -C "received HelloRetryRequest message"
4863
4864requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004865requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004866requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004867requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004868requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4870run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004871 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4872 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004873 0 \
4874 -c "HTTP/1.0 200 ok" \
4875 -c "Protocol is TLSv1.3" \
4876 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4877 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4878 -c "NamedGroup: secp384r1 ( 18 )" \
4879 -c "Verifying peer X.509 certificate... ok" \
4880 -C "received HelloRetryRequest message"
4881
4882requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004883requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004884requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004885requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004886requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004887requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4888run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004889 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4890 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004891 0 \
4892 -c "HTTP/1.0 200 ok" \
4893 -c "Protocol is TLSv1.3" \
4894 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4895 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4896 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004897 -c "Verifying peer X.509 certificate... ok" \
4898 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004899
Jerry Yu31018ad2021-11-26 20:36:17 +08004900requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004901requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004902requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004903requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004904requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004905requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004906requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004907run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004908 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4909 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004910 0 \
4911 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004912 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004913 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4914 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004915 -c "NamedGroup: secp384r1 ( 18 )" \
4916 -c "Verifying peer X.509 certificate... ok" \
4917 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004918
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004919requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004920requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004921requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004923requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004925run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004926 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4927 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004928 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004929 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004930 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004931 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004932 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4933 -c "NamedGroup: secp521r1 ( 19 )" \
4934 -c "Verifying peer X.509 certificate... ok" \
4935 -C "received HelloRetryRequest message"
4936
4937requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004938requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004939requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004941requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004942requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4943run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004944 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4945 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004946 0 \
4947 -c "HTTP/1.0 200 ok" \
4948 -c "Protocol is TLSv1.3" \
4949 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4950 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4951 -c "NamedGroup: secp521r1 ( 19 )" \
4952 -c "Verifying peer X.509 certificate... ok" \
4953 -C "received HelloRetryRequest message"
4954
4955requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004956requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004957requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004958requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004959requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004960requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4961run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004962 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4963 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004964 0 \
4965 -c "HTTP/1.0 200 ok" \
4966 -c "Protocol is TLSv1.3" \
4967 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4968 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4969 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004970 -c "Verifying peer X.509 certificate... ok" \
4971 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004972
Jerry Yu31018ad2021-11-26 20:36:17 +08004973requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004974requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004975requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004976requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004977requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004978requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004979requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004980run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004981 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4982 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004983 0 \
4984 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004985 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004986 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4987 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004988 -c "NamedGroup: secp521r1 ( 19 )" \
4989 -c "Verifying peer X.509 certificate... ok" \
4990 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004991
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004992requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004993requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004994requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004995requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02004996requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01004997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004998run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004999 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5000 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005001 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005002 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005003 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005004 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005005 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5006 -c "NamedGroup: x25519 ( 1d )" \
5007 -c "Verifying peer X.509 certificate... ok" \
5008 -C "received HelloRetryRequest message"
5009
5010requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005011requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005012requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005013requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005014requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005015requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5016run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005017 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5018 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005019 0 \
5020 -c "HTTP/1.0 200 ok" \
5021 -c "Protocol is TLSv1.3" \
5022 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5023 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5024 -c "NamedGroup: x25519 ( 1d )" \
5025 -c "Verifying peer X.509 certificate... ok" \
5026 -C "received HelloRetryRequest message"
5027
5028requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005029requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005030requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005031requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005032requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005033requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5034run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005035 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5036 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005037 0 \
5038 -c "HTTP/1.0 200 ok" \
5039 -c "Protocol is TLSv1.3" \
5040 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5041 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5042 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005043 -c "Verifying peer X.509 certificate... ok" \
5044 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005045
Jerry Yu31018ad2021-11-26 20:36:17 +08005046requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005047requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005048requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005049requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005050requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08005052requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02005053run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005054 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5055 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005056 0 \
5057 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005058 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005059 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5060 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005061 -c "NamedGroup: x25519 ( 1d )" \
5062 -c "Verifying peer X.509 certificate... ok" \
5063 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005064
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005065requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005066requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005067requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005069requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005070requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005071run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005072 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5073 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005074 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005075 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005076 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005077 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005078 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5079 -c "NamedGroup: x448 ( 1e )" \
5080 -c "Verifying peer X.509 certificate... ok" \
5081 -C "received HelloRetryRequest message"
5082
5083requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005084requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005085requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005086requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005087requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005088requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5089run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005090 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5091 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005092 0 \
5093 -c "HTTP/1.0 200 ok" \
5094 -c "Protocol is TLSv1.3" \
5095 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5096 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5097 -c "NamedGroup: x448 ( 1e )" \
5098 -c "Verifying peer X.509 certificate... ok" \
5099 -C "received HelloRetryRequest message"
5100
5101requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005102requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005103requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005104requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005105requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005106requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5107run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005108 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5109 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005110 0 \
5111 -c "HTTP/1.0 200 ok" \
5112 -c "Protocol is TLSv1.3" \
5113 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5114 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5115 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005116 -c "Verifying peer X.509 certificate... ok" \
5117 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005118
Jerry Yu31018ad2021-11-26 20:36:17 +08005119requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005120requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005121requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005122requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005123requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005124requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08005125requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02005126run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005127 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5128 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005129 0 \
5130 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005131 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005132 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5133 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005134 -c "NamedGroup: x448 ( 1e )" \
5135 -c "Verifying peer X.509 certificate... ok" \
5136 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005137
Jerry Yu31018ad2021-11-26 20:36:17 +08005138requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005139requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005140requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005141requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005142requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005144run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005145 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5146 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005147 0 \
5148 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005149 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005150 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5151 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005152 -c "NamedGroup: secp256r1 ( 17 )" \
5153 -c "Verifying peer X.509 certificate... ok" \
5154 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005155
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005156requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005157requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005158requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005160requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005161requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005162run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005163 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5164 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005165 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005166 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005167 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005168 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005169 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5170 -c "NamedGroup: secp256r1 ( 17 )" \
5171 -c "Verifying peer X.509 certificate... ok" \
5172 -C "received HelloRetryRequest message"
5173
5174requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005175requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005176requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005177requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005178requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5180run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005181 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5182 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005183 0 \
5184 -c "HTTP/1.0 200 ok" \
5185 -c "Protocol is TLSv1.3" \
5186 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5187 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5188 -c "NamedGroup: secp256r1 ( 17 )" \
5189 -c "Verifying peer X.509 certificate... ok" \
5190 -C "received HelloRetryRequest message"
5191
5192requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005193requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005194requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005195requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005196requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5198requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5199run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005200 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5201 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005202 0 \
5203 -c "HTTP/1.0 200 ok" \
5204 -c "Protocol is TLSv1.3" \
5205 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5206 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005207 -c "NamedGroup: secp256r1 ( 17 )" \
5208 -c "Verifying peer X.509 certificate... ok" \
5209 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005210
Jerry Yu31018ad2021-11-26 20:36:17 +08005211requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005212requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005213requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005214requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005215requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005216requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005217run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005218 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5219 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005220 0 \
5221 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005222 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005223 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5224 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005225 -c "NamedGroup: secp384r1 ( 18 )" \
5226 -c "Verifying peer X.509 certificate... ok" \
5227 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005228
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005229requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005230requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005231requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005233requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005235run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005236 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5237 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005238 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005239 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005240 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005241 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005242 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5243 -c "NamedGroup: secp384r1 ( 18 )" \
5244 -c "Verifying peer X.509 certificate... ok" \
5245 -C "received HelloRetryRequest message"
5246
5247requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005248requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005249requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005251requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005252requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5253run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005254 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5255 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005256 0 \
5257 -c "HTTP/1.0 200 ok" \
5258 -c "Protocol is TLSv1.3" \
5259 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5260 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5261 -c "NamedGroup: secp384r1 ( 18 )" \
5262 -c "Verifying peer X.509 certificate... ok" \
5263 -C "received HelloRetryRequest message"
5264
5265requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005266requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005267requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005268requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005269requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005270requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5271requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5272run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005273 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5274 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005275 0 \
5276 -c "HTTP/1.0 200 ok" \
5277 -c "Protocol is TLSv1.3" \
5278 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5279 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005280 -c "NamedGroup: secp384r1 ( 18 )" \
5281 -c "Verifying peer X.509 certificate... ok" \
5282 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005283
Jerry Yu31018ad2021-11-26 20:36:17 +08005284requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005285requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005286requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005287requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005288requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005289requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005290run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005291 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5292 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005293 0 \
5294 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005295 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005296 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5297 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005298 -c "NamedGroup: secp521r1 ( 19 )" \
5299 -c "Verifying peer X.509 certificate... ok" \
5300 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005301
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005302requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005303requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005304requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005305requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005306requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005308run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005309 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5310 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005311 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005312 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005313 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005314 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005315 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5316 -c "NamedGroup: secp521r1 ( 19 )" \
5317 -c "Verifying peer X.509 certificate... ok" \
5318 -C "received HelloRetryRequest message"
5319
5320requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005321requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005322requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005324requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5326run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005327 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5328 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005329 0 \
5330 -c "HTTP/1.0 200 ok" \
5331 -c "Protocol is TLSv1.3" \
5332 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5333 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5334 -c "NamedGroup: secp521r1 ( 19 )" \
5335 -c "Verifying peer X.509 certificate... ok" \
5336 -C "received HelloRetryRequest message"
5337
5338requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005339requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005340requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005341requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005342requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5344requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5345run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005346 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5347 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005348 0 \
5349 -c "HTTP/1.0 200 ok" \
5350 -c "Protocol is TLSv1.3" \
5351 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5352 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005353 -c "NamedGroup: secp521r1 ( 19 )" \
5354 -c "Verifying peer X.509 certificate... ok" \
5355 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005356
Jerry Yu31018ad2021-11-26 20:36:17 +08005357requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005358requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005359requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005360requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005361requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005362requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005363run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005364 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5365 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005366 0 \
5367 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005368 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005369 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5370 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005371 -c "NamedGroup: x25519 ( 1d )" \
5372 -c "Verifying peer X.509 certificate... ok" \
5373 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005374
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005375requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005376requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005377requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005379requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005381run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005382 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5383 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005384 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005385 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005386 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005387 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005388 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5389 -c "NamedGroup: x25519 ( 1d )" \
5390 -c "Verifying peer X.509 certificate... ok" \
5391 -C "received HelloRetryRequest message"
5392
5393requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005394requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005395requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005396requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005397requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005398requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5399run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005400 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5401 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005402 0 \
5403 -c "HTTP/1.0 200 ok" \
5404 -c "Protocol is TLSv1.3" \
5405 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5406 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5407 -c "NamedGroup: x25519 ( 1d )" \
5408 -c "Verifying peer X.509 certificate... ok" \
5409 -C "received HelloRetryRequest message"
5410
5411requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005412requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005413requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005414requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005415requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005416requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5417requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5418run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005419 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5420 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005421 0 \
5422 -c "HTTP/1.0 200 ok" \
5423 -c "Protocol is TLSv1.3" \
5424 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5425 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005426 -c "NamedGroup: x25519 ( 1d )" \
5427 -c "Verifying peer X.509 certificate... ok" \
5428 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005429
Jerry Yu31018ad2021-11-26 20:36:17 +08005430requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005431requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005432requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005433requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005434requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005435requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005436run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005437 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5438 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005439 0 \
5440 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005441 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005442 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5443 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005444 -c "NamedGroup: x448 ( 1e )" \
5445 -c "Verifying peer X.509 certificate... ok" \
5446 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005447
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005448requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005449requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005450requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005451requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005452requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005454run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005455 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5456 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005457 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005458 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005459 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005460 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005461 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005462 -c "NamedGroup: x448 ( 1e )" \
5463 -c "Verifying peer X.509 certificate... ok" \
5464 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005465
Jerry Yu31018ad2021-11-26 20:36:17 +08005466requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005467requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005468requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005469requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005470requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005471requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005472run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005473 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5474 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005475 0 \
5476 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005477 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005478 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005479 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5480 -c "NamedGroup: x448 ( 1e )" \
5481 -c "Verifying peer X.509 certificate... ok" \
5482 -C "received HelloRetryRequest message"
5483
5484requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005485requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005486requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005487requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005488requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005489requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5490requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5491run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005492 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5493 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005494 0 \
5495 -c "HTTP/1.0 200 ok" \
5496 -c "Protocol is TLSv1.3" \
5497 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5498 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5499 -c "NamedGroup: x448 ( 1e )" \
5500 -c "Verifying peer X.509 certificate... ok" \
5501 -C "received HelloRetryRequest message"
5502
5503requires_gnutls_tls1_3
5504requires_gnutls_next_no_ticket
5505requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005506requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005507requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005508requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005509requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005510requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5511run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005512 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005513 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005514 0 \
5515 -c "HTTP/1.0 200 OK" \
5516 -c "Protocol is TLSv1.3" \
5517 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5518 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5519 -c "NamedGroup: secp256r1 ( 17 )" \
5520 -c "Verifying peer X.509 certificate... ok" \
5521 -C "received HelloRetryRequest message"
5522
5523requires_gnutls_tls1_3
5524requires_gnutls_next_no_ticket
5525requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005526requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005527requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005528requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005529requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005530requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5531run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005532 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005533 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005534 0 \
5535 -c "HTTP/1.0 200 OK" \
5536 -c "Protocol is TLSv1.3" \
5537 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005538 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005539 -c "NamedGroup: secp256r1 ( 17 )" \
5540 -c "Verifying peer X.509 certificate... ok" \
5541 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005542
Jerry Yu31018ad2021-11-26 20:36:17 +08005543requires_gnutls_tls1_3
5544requires_gnutls_next_no_ticket
5545requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08005546requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005547requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005549requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01005550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005551run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005552 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005553 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005554 0 \
5555 -c "HTTP/1.0 200 OK" \
5556 -c "Protocol is TLSv1.3" \
5557 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5558 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5559 -c "NamedGroup: secp256r1 ( 17 )" \
5560 -c "Verifying peer X.509 certificate... ok" \
5561 -C "received HelloRetryRequest message"
5562
5563requires_gnutls_tls1_3
5564requires_gnutls_next_no_ticket
5565requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005566requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005567requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005568requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005569requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005570requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5571requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5572run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005573 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005574 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005575 0 \
5576 -c "HTTP/1.0 200 OK" \
5577 -c "Protocol is TLSv1.3" \
5578 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5579 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5580 -c "NamedGroup: secp256r1 ( 17 )" \
5581 -c "Verifying peer X.509 certificate... ok" \
5582 -C "received HelloRetryRequest message"
5583
5584requires_gnutls_tls1_3
5585requires_gnutls_next_no_ticket
5586requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005587requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005588requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005589requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005590requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005591requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5592run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005593 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005594 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005595 0 \
5596 -c "HTTP/1.0 200 OK" \
5597 -c "Protocol is TLSv1.3" \
5598 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5599 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5600 -c "NamedGroup: secp384r1 ( 18 )" \
5601 -c "Verifying peer X.509 certificate... ok" \
5602 -C "received HelloRetryRequest message"
5603
5604requires_gnutls_tls1_3
5605requires_gnutls_next_no_ticket
5606requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005607requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005608requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005609requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005610requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005611requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5612run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005613 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005614 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005615 0 \
5616 -c "HTTP/1.0 200 OK" \
5617 -c "Protocol is TLSv1.3" \
5618 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5619 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5620 -c "NamedGroup: secp384r1 ( 18 )" \
5621 -c "Verifying peer X.509 certificate... ok" \
5622 -C "received HelloRetryRequest message"
5623
5624requires_gnutls_tls1_3
5625requires_gnutls_next_no_ticket
5626requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005627requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005628requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005629requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005630requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005631requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5632run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005633 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005634 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005635 0 \
5636 -c "HTTP/1.0 200 OK" \
5637 -c "Protocol is TLSv1.3" \
5638 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5639 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5640 -c "NamedGroup: secp384r1 ( 18 )" \
5641 -c "Verifying peer X.509 certificate... ok" \
5642 -C "received HelloRetryRequest message"
5643
5644requires_gnutls_tls1_3
5645requires_gnutls_next_no_ticket
5646requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005647requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005648requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005649requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005650requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005651requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5652requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5653run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005654 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005655 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005656 0 \
5657 -c "HTTP/1.0 200 OK" \
5658 -c "Protocol is TLSv1.3" \
5659 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5660 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5661 -c "NamedGroup: secp384r1 ( 18 )" \
5662 -c "Verifying peer X.509 certificate... ok" \
5663 -C "received HelloRetryRequest message"
5664
5665requires_gnutls_tls1_3
5666requires_gnutls_next_no_ticket
5667requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005668requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005669requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005670requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005671requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005672requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5673run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005674 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005675 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005676 0 \
5677 -c "HTTP/1.0 200 OK" \
5678 -c "Protocol is TLSv1.3" \
5679 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5680 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5681 -c "NamedGroup: secp521r1 ( 19 )" \
5682 -c "Verifying peer X.509 certificate... ok" \
5683 -C "received HelloRetryRequest message"
5684
5685requires_gnutls_tls1_3
5686requires_gnutls_next_no_ticket
5687requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005688requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005689requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005690requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005691requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005692requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5693run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005694 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005695 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005696 0 \
5697 -c "HTTP/1.0 200 OK" \
5698 -c "Protocol is TLSv1.3" \
5699 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5700 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5701 -c "NamedGroup: secp521r1 ( 19 )" \
5702 -c "Verifying peer X.509 certificate... ok" \
5703 -C "received HelloRetryRequest message"
5704
5705requires_gnutls_tls1_3
5706requires_gnutls_next_no_ticket
5707requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005708requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005709requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005711requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005712requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5713run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005714 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005715 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005716 0 \
5717 -c "HTTP/1.0 200 OK" \
5718 -c "Protocol is TLSv1.3" \
5719 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5720 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5721 -c "NamedGroup: secp521r1 ( 19 )" \
5722 -c "Verifying peer X.509 certificate... ok" \
5723 -C "received HelloRetryRequest message"
5724
5725requires_gnutls_tls1_3
5726requires_gnutls_next_no_ticket
5727requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005728requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005729requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005731requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5733requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5734run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005735 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005736 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005737 0 \
5738 -c "HTTP/1.0 200 OK" \
5739 -c "Protocol is TLSv1.3" \
5740 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5741 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5742 -c "NamedGroup: secp521r1 ( 19 )" \
5743 -c "Verifying peer X.509 certificate... ok" \
5744 -C "received HelloRetryRequest message"
5745
5746requires_gnutls_tls1_3
5747requires_gnutls_next_no_ticket
5748requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005749requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005750requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005751requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005752requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005753requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5754run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005755 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005756 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005757 0 \
5758 -c "HTTP/1.0 200 OK" \
5759 -c "Protocol is TLSv1.3" \
5760 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5761 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5762 -c "NamedGroup: x25519 ( 1d )" \
5763 -c "Verifying peer X.509 certificate... ok" \
5764 -C "received HelloRetryRequest message"
5765
5766requires_gnutls_tls1_3
5767requires_gnutls_next_no_ticket
5768requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005769requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005770requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005771requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005772requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005773requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5774run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005775 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005776 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005777 0 \
5778 -c "HTTP/1.0 200 OK" \
5779 -c "Protocol is TLSv1.3" \
5780 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5781 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5782 -c "NamedGroup: x25519 ( 1d )" \
5783 -c "Verifying peer X.509 certificate... ok" \
5784 -C "received HelloRetryRequest message"
5785
5786requires_gnutls_tls1_3
5787requires_gnutls_next_no_ticket
5788requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005789requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005790requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005791requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005792requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005793requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5794run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005795 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005796 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005797 0 \
5798 -c "HTTP/1.0 200 OK" \
5799 -c "Protocol is TLSv1.3" \
5800 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5801 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5802 -c "NamedGroup: x25519 ( 1d )" \
5803 -c "Verifying peer X.509 certificate... ok" \
5804 -C "received HelloRetryRequest message"
5805
5806requires_gnutls_tls1_3
5807requires_gnutls_next_no_ticket
5808requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005809requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005810requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005811requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005812requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5814requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5815run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005816 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005817 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005818 0 \
5819 -c "HTTP/1.0 200 OK" \
5820 -c "Protocol is TLSv1.3" \
5821 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5822 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5823 -c "NamedGroup: x25519 ( 1d )" \
5824 -c "Verifying peer X.509 certificate... ok" \
5825 -C "received HelloRetryRequest message"
5826
5827requires_gnutls_tls1_3
5828requires_gnutls_next_no_ticket
5829requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005830requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005831requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005833requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005834requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5835run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005836 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005837 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005838 0 \
5839 -c "HTTP/1.0 200 OK" \
5840 -c "Protocol is TLSv1.3" \
5841 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5842 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5843 -c "NamedGroup: x448 ( 1e )" \
5844 -c "Verifying peer X.509 certificate... ok" \
5845 -C "received HelloRetryRequest message"
5846
5847requires_gnutls_tls1_3
5848requires_gnutls_next_no_ticket
5849requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005850requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005851requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005853requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5855run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005856 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005857 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005858 0 \
5859 -c "HTTP/1.0 200 OK" \
5860 -c "Protocol is TLSv1.3" \
5861 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5862 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5863 -c "NamedGroup: x448 ( 1e )" \
5864 -c "Verifying peer X.509 certificate... ok" \
5865 -C "received HelloRetryRequest message"
5866
5867requires_gnutls_tls1_3
5868requires_gnutls_next_no_ticket
5869requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005870requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005871requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005872requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005873requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005874requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5875run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005876 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005877 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005878 0 \
5879 -c "HTTP/1.0 200 OK" \
5880 -c "Protocol is TLSv1.3" \
5881 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5882 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5883 -c "NamedGroup: x448 ( 1e )" \
5884 -c "Verifying peer X.509 certificate... ok" \
5885 -C "received HelloRetryRequest message"
5886
5887requires_gnutls_tls1_3
5888requires_gnutls_next_no_ticket
5889requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005890requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005891requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005893requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5895requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5896run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005897 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005898 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005899 0 \
5900 -c "HTTP/1.0 200 OK" \
5901 -c "Protocol is TLSv1.3" \
5902 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5903 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5904 -c "NamedGroup: x448 ( 1e )" \
5905 -c "Verifying peer X.509 certificate... ok" \
5906 -C "received HelloRetryRequest message"
5907
5908requires_gnutls_tls1_3
5909requires_gnutls_next_no_ticket
5910requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005911requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005912requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005913requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005914requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005915requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5916run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005917 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005918 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005919 0 \
5920 -c "HTTP/1.0 200 OK" \
5921 -c "Protocol is TLSv1.3" \
5922 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5923 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5924 -c "NamedGroup: secp256r1 ( 17 )" \
5925 -c "Verifying peer X.509 certificate... ok" \
5926 -C "received HelloRetryRequest message"
5927
5928requires_gnutls_tls1_3
5929requires_gnutls_next_no_ticket
5930requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005931requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005932requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005933requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005934requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005935requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5936run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005937 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005938 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005939 0 \
5940 -c "HTTP/1.0 200 OK" \
5941 -c "Protocol is TLSv1.3" \
5942 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5943 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5944 -c "NamedGroup: secp256r1 ( 17 )" \
5945 -c "Verifying peer X.509 certificate... ok" \
5946 -C "received HelloRetryRequest message"
5947
5948requires_gnutls_tls1_3
5949requires_gnutls_next_no_ticket
5950requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005951requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005952requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005953requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005954requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005955requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5956run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005957 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005958 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005959 0 \
5960 -c "HTTP/1.0 200 OK" \
5961 -c "Protocol is TLSv1.3" \
5962 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5963 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5964 -c "NamedGroup: secp256r1 ( 17 )" \
5965 -c "Verifying peer X.509 certificate... ok" \
5966 -C "received HelloRetryRequest message"
5967
5968requires_gnutls_tls1_3
5969requires_gnutls_next_no_ticket
5970requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005971requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005972requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005973requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005974requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5976requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5977run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005978 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005979 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005980 0 \
5981 -c "HTTP/1.0 200 OK" \
5982 -c "Protocol is TLSv1.3" \
5983 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5984 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5985 -c "NamedGroup: secp256r1 ( 17 )" \
5986 -c "Verifying peer X.509 certificate... ok" \
5987 -C "received HelloRetryRequest message"
5988
5989requires_gnutls_tls1_3
5990requires_gnutls_next_no_ticket
5991requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005992requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005993requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005994requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02005995requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5997run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005998 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005999 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006000 0 \
6001 -c "HTTP/1.0 200 OK" \
6002 -c "Protocol is TLSv1.3" \
6003 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6004 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6005 -c "NamedGroup: secp384r1 ( 18 )" \
6006 -c "Verifying peer X.509 certificate... ok" \
6007 -C "received HelloRetryRequest message"
6008
6009requires_gnutls_tls1_3
6010requires_gnutls_next_no_ticket
6011requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006012requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006013requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006014requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006015requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6017run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006018 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006019 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006020 0 \
6021 -c "HTTP/1.0 200 OK" \
6022 -c "Protocol is TLSv1.3" \
6023 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6024 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6025 -c "NamedGroup: secp384r1 ( 18 )" \
6026 -c "Verifying peer X.509 certificate... ok" \
6027 -C "received HelloRetryRequest message"
6028
6029requires_gnutls_tls1_3
6030requires_gnutls_next_no_ticket
6031requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006032requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006033requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006034requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006035requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006036requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6037run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006038 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006039 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006040 0 \
6041 -c "HTTP/1.0 200 OK" \
6042 -c "Protocol is TLSv1.3" \
6043 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6044 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6045 -c "NamedGroup: secp384r1 ( 18 )" \
6046 -c "Verifying peer X.509 certificate... ok" \
6047 -C "received HelloRetryRequest message"
6048
6049requires_gnutls_tls1_3
6050requires_gnutls_next_no_ticket
6051requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006052requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006053requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006054requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006055requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006056requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6057requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6058run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006059 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006060 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006061 0 \
6062 -c "HTTP/1.0 200 OK" \
6063 -c "Protocol is TLSv1.3" \
6064 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6065 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6066 -c "NamedGroup: secp384r1 ( 18 )" \
6067 -c "Verifying peer X.509 certificate... ok" \
6068 -C "received HelloRetryRequest message"
6069
6070requires_gnutls_tls1_3
6071requires_gnutls_next_no_ticket
6072requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006073requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006074requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006075requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006076requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006077requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6078run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006079 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006080 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006081 0 \
6082 -c "HTTP/1.0 200 OK" \
6083 -c "Protocol is TLSv1.3" \
6084 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6085 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6086 -c "NamedGroup: secp521r1 ( 19 )" \
6087 -c "Verifying peer X.509 certificate... ok" \
6088 -C "received HelloRetryRequest message"
6089
6090requires_gnutls_tls1_3
6091requires_gnutls_next_no_ticket
6092requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006093requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006094requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006096requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006097requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6098run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006099 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006100 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006101 0 \
6102 -c "HTTP/1.0 200 OK" \
6103 -c "Protocol is TLSv1.3" \
6104 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6105 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6106 -c "NamedGroup: secp521r1 ( 19 )" \
6107 -c "Verifying peer X.509 certificate... ok" \
6108 -C "received HelloRetryRequest message"
6109
6110requires_gnutls_tls1_3
6111requires_gnutls_next_no_ticket
6112requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006113requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006114requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006115requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006116requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6118run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006119 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006120 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006121 0 \
6122 -c "HTTP/1.0 200 OK" \
6123 -c "Protocol is TLSv1.3" \
6124 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6125 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6126 -c "NamedGroup: secp521r1 ( 19 )" \
6127 -c "Verifying peer X.509 certificate... ok" \
6128 -C "received HelloRetryRequest message"
6129
6130requires_gnutls_tls1_3
6131requires_gnutls_next_no_ticket
6132requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006133requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006134requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006135requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006136requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006137requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6138requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6139run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006140 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006141 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006142 0 \
6143 -c "HTTP/1.0 200 OK" \
6144 -c "Protocol is TLSv1.3" \
6145 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6146 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6147 -c "NamedGroup: secp521r1 ( 19 )" \
6148 -c "Verifying peer X.509 certificate... ok" \
6149 -C "received HelloRetryRequest message"
6150
6151requires_gnutls_tls1_3
6152requires_gnutls_next_no_ticket
6153requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006154requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006155requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006156requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006157requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6159run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006160 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006161 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006162 0 \
6163 -c "HTTP/1.0 200 OK" \
6164 -c "Protocol is TLSv1.3" \
6165 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6166 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6167 -c "NamedGroup: x25519 ( 1d )" \
6168 -c "Verifying peer X.509 certificate... ok" \
6169 -C "received HelloRetryRequest message"
6170
6171requires_gnutls_tls1_3
6172requires_gnutls_next_no_ticket
6173requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006174requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006175requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006176requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006177requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006178requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6179run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006180 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006181 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006182 0 \
6183 -c "HTTP/1.0 200 OK" \
6184 -c "Protocol is TLSv1.3" \
6185 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6186 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6187 -c "NamedGroup: x25519 ( 1d )" \
6188 -c "Verifying peer X.509 certificate... ok" \
6189 -C "received HelloRetryRequest message"
6190
6191requires_gnutls_tls1_3
6192requires_gnutls_next_no_ticket
6193requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006194requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006195requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006196requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006197requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006198requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6199run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006200 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006201 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006202 0 \
6203 -c "HTTP/1.0 200 OK" \
6204 -c "Protocol is TLSv1.3" \
6205 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6206 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6207 -c "NamedGroup: x25519 ( 1d )" \
6208 -c "Verifying peer X.509 certificate... ok" \
6209 -C "received HelloRetryRequest message"
6210
6211requires_gnutls_tls1_3
6212requires_gnutls_next_no_ticket
6213requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006214requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006215requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006217requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006218requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6219requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6220run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006221 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006222 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006223 0 \
6224 -c "HTTP/1.0 200 OK" \
6225 -c "Protocol is TLSv1.3" \
6226 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6227 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6228 -c "NamedGroup: x25519 ( 1d )" \
6229 -c "Verifying peer X.509 certificate... ok" \
6230 -C "received HelloRetryRequest message"
6231
6232requires_gnutls_tls1_3
6233requires_gnutls_next_no_ticket
6234requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006235requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006236requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006238requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006239requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6240run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006241 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006242 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006243 0 \
6244 -c "HTTP/1.0 200 OK" \
6245 -c "Protocol is TLSv1.3" \
6246 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6247 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6248 -c "NamedGroup: x448 ( 1e )" \
6249 -c "Verifying peer X.509 certificate... ok" \
6250 -C "received HelloRetryRequest message"
6251
6252requires_gnutls_tls1_3
6253requires_gnutls_next_no_ticket
6254requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006255requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006256requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006258requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006259requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6260run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006261 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006262 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006263 0 \
6264 -c "HTTP/1.0 200 OK" \
6265 -c "Protocol is TLSv1.3" \
6266 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6267 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6268 -c "NamedGroup: x448 ( 1e )" \
6269 -c "Verifying peer X.509 certificate... ok" \
6270 -C "received HelloRetryRequest message"
6271
6272requires_gnutls_tls1_3
6273requires_gnutls_next_no_ticket
6274requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006275requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006276requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006277requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006278requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006279requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6280run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006281 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006282 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006283 0 \
6284 -c "HTTP/1.0 200 OK" \
6285 -c "Protocol is TLSv1.3" \
6286 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6287 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6288 -c "NamedGroup: x448 ( 1e )" \
6289 -c "Verifying peer X.509 certificate... ok" \
6290 -C "received HelloRetryRequest message"
6291
6292requires_gnutls_tls1_3
6293requires_gnutls_next_no_ticket
6294requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006295requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006296requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006297requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006298requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006299requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6300requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6301run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006302 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006303 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006304 0 \
6305 -c "HTTP/1.0 200 OK" \
6306 -c "Protocol is TLSv1.3" \
6307 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6308 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6309 -c "NamedGroup: x448 ( 1e )" \
6310 -c "Verifying peer X.509 certificate... ok" \
6311 -C "received HelloRetryRequest message"
6312
6313requires_gnutls_tls1_3
6314requires_gnutls_next_no_ticket
6315requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006316requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006317requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006318requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006319requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6321run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006322 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006323 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006324 0 \
6325 -c "HTTP/1.0 200 OK" \
6326 -c "Protocol is TLSv1.3" \
6327 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6328 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6329 -c "NamedGroup: secp256r1 ( 17 )" \
6330 -c "Verifying peer X.509 certificate... ok" \
6331 -C "received HelloRetryRequest message"
6332
6333requires_gnutls_tls1_3
6334requires_gnutls_next_no_ticket
6335requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006336requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006337requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006339requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006340requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6341run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006342 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006343 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006344 0 \
6345 -c "HTTP/1.0 200 OK" \
6346 -c "Protocol is TLSv1.3" \
6347 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6348 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6349 -c "NamedGroup: secp256r1 ( 17 )" \
6350 -c "Verifying peer X.509 certificate... ok" \
6351 -C "received HelloRetryRequest message"
6352
6353requires_gnutls_tls1_3
6354requires_gnutls_next_no_ticket
6355requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006356requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006357requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006359requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6361run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006362 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006363 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006364 0 \
6365 -c "HTTP/1.0 200 OK" \
6366 -c "Protocol is TLSv1.3" \
6367 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6368 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6369 -c "NamedGroup: secp256r1 ( 17 )" \
6370 -c "Verifying peer X.509 certificate... ok" \
6371 -C "received HelloRetryRequest message"
6372
6373requires_gnutls_tls1_3
6374requires_gnutls_next_no_ticket
6375requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006376requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006377requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006379requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6381requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6382run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006383 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006384 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006385 0 \
6386 -c "HTTP/1.0 200 OK" \
6387 -c "Protocol is TLSv1.3" \
6388 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6389 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6390 -c "NamedGroup: secp256r1 ( 17 )" \
6391 -c "Verifying peer X.509 certificate... ok" \
6392 -C "received HelloRetryRequest message"
6393
6394requires_gnutls_tls1_3
6395requires_gnutls_next_no_ticket
6396requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006397requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006398requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006399requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006400requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006401requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6402run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006403 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006404 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006405 0 \
6406 -c "HTTP/1.0 200 OK" \
6407 -c "Protocol is TLSv1.3" \
6408 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6409 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6410 -c "NamedGroup: secp384r1 ( 18 )" \
6411 -c "Verifying peer X.509 certificate... ok" \
6412 -C "received HelloRetryRequest message"
6413
6414requires_gnutls_tls1_3
6415requires_gnutls_next_no_ticket
6416requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006417requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006418requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006419requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006420requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006421requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6422run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006423 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006424 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006425 0 \
6426 -c "HTTP/1.0 200 OK" \
6427 -c "Protocol is TLSv1.3" \
6428 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6429 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6430 -c "NamedGroup: secp384r1 ( 18 )" \
6431 -c "Verifying peer X.509 certificate... ok" \
6432 -C "received HelloRetryRequest message"
6433
6434requires_gnutls_tls1_3
6435requires_gnutls_next_no_ticket
6436requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006437requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006438requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006439requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006440requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6442run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006443 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006444 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006445 0 \
6446 -c "HTTP/1.0 200 OK" \
6447 -c "Protocol is TLSv1.3" \
6448 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6449 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6450 -c "NamedGroup: secp384r1 ( 18 )" \
6451 -c "Verifying peer X.509 certificate... ok" \
6452 -C "received HelloRetryRequest message"
6453
6454requires_gnutls_tls1_3
6455requires_gnutls_next_no_ticket
6456requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006457requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006458requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006459requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006460requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6462requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6463run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006464 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006465 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006466 0 \
6467 -c "HTTP/1.0 200 OK" \
6468 -c "Protocol is TLSv1.3" \
6469 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6470 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6471 -c "NamedGroup: secp384r1 ( 18 )" \
6472 -c "Verifying peer X.509 certificate... ok" \
6473 -C "received HelloRetryRequest message"
6474
6475requires_gnutls_tls1_3
6476requires_gnutls_next_no_ticket
6477requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006478requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006479requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006481requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6483run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006484 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006485 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006486 0 \
6487 -c "HTTP/1.0 200 OK" \
6488 -c "Protocol is TLSv1.3" \
6489 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6490 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6491 -c "NamedGroup: secp521r1 ( 19 )" \
6492 -c "Verifying peer X.509 certificate... ok" \
6493 -C "received HelloRetryRequest message"
6494
6495requires_gnutls_tls1_3
6496requires_gnutls_next_no_ticket
6497requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006498requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006499requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006500requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006501requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006502requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6503run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006504 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006505 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006506 0 \
6507 -c "HTTP/1.0 200 OK" \
6508 -c "Protocol is TLSv1.3" \
6509 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6510 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6511 -c "NamedGroup: secp521r1 ( 19 )" \
6512 -c "Verifying peer X.509 certificate... ok" \
6513 -C "received HelloRetryRequest message"
6514
6515requires_gnutls_tls1_3
6516requires_gnutls_next_no_ticket
6517requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006518requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006519requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006520requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006521requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006522requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6523run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006524 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006525 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006526 0 \
6527 -c "HTTP/1.0 200 OK" \
6528 -c "Protocol is TLSv1.3" \
6529 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6530 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6531 -c "NamedGroup: secp521r1 ( 19 )" \
6532 -c "Verifying peer X.509 certificate... ok" \
6533 -C "received HelloRetryRequest message"
6534
6535requires_gnutls_tls1_3
6536requires_gnutls_next_no_ticket
6537requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006538requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006539requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006540requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006541requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006542requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6543requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6544run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006545 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006546 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006547 0 \
6548 -c "HTTP/1.0 200 OK" \
6549 -c "Protocol is TLSv1.3" \
6550 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6551 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6552 -c "NamedGroup: secp521r1 ( 19 )" \
6553 -c "Verifying peer X.509 certificate... ok" \
6554 -C "received HelloRetryRequest message"
6555
6556requires_gnutls_tls1_3
6557requires_gnutls_next_no_ticket
6558requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006559requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006560requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006561requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006562requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6564run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006565 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006566 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006567 0 \
6568 -c "HTTP/1.0 200 OK" \
6569 -c "Protocol is TLSv1.3" \
6570 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6571 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6572 -c "NamedGroup: x25519 ( 1d )" \
6573 -c "Verifying peer X.509 certificate... ok" \
6574 -C "received HelloRetryRequest message"
6575
6576requires_gnutls_tls1_3
6577requires_gnutls_next_no_ticket
6578requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006579requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006580requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006581requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006582requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6584run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006585 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006586 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006587 0 \
6588 -c "HTTP/1.0 200 OK" \
6589 -c "Protocol is TLSv1.3" \
6590 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6591 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6592 -c "NamedGroup: x25519 ( 1d )" \
6593 -c "Verifying peer X.509 certificate... ok" \
6594 -C "received HelloRetryRequest message"
6595
6596requires_gnutls_tls1_3
6597requires_gnutls_next_no_ticket
6598requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006599requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006600requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006602requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6604run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006605 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006606 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006607 0 \
6608 -c "HTTP/1.0 200 OK" \
6609 -c "Protocol is TLSv1.3" \
6610 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6611 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6612 -c "NamedGroup: x25519 ( 1d )" \
6613 -c "Verifying peer X.509 certificate... ok" \
6614 -C "received HelloRetryRequest message"
6615
6616requires_gnutls_tls1_3
6617requires_gnutls_next_no_ticket
6618requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006619requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006620requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006621requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006622requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6624requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6625run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006626 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006627 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006628 0 \
6629 -c "HTTP/1.0 200 OK" \
6630 -c "Protocol is TLSv1.3" \
6631 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6632 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6633 -c "NamedGroup: x25519 ( 1d )" \
6634 -c "Verifying peer X.509 certificate... ok" \
6635 -C "received HelloRetryRequest message"
6636
6637requires_gnutls_tls1_3
6638requires_gnutls_next_no_ticket
6639requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006640requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006641requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006642requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006643requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006644requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6645run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006646 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006647 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006648 0 \
6649 -c "HTTP/1.0 200 OK" \
6650 -c "Protocol is TLSv1.3" \
6651 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6652 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6653 -c "NamedGroup: x448 ( 1e )" \
6654 -c "Verifying peer X.509 certificate... ok" \
6655 -C "received HelloRetryRequest message"
6656
6657requires_gnutls_tls1_3
6658requires_gnutls_next_no_ticket
6659requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006660requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006661requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006662requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006663requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006664requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6665run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006666 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006667 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006668 0 \
6669 -c "HTTP/1.0 200 OK" \
6670 -c "Protocol is TLSv1.3" \
6671 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6672 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6673 -c "NamedGroup: x448 ( 1e )" \
6674 -c "Verifying peer X.509 certificate... ok" \
6675 -C "received HelloRetryRequest message"
6676
6677requires_gnutls_tls1_3
6678requires_gnutls_next_no_ticket
6679requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006680requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006681requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006682requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006683requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006684requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6685run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006686 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006687 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006688 0 \
6689 -c "HTTP/1.0 200 OK" \
6690 -c "Protocol is TLSv1.3" \
6691 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6692 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6693 -c "NamedGroup: x448 ( 1e )" \
6694 -c "Verifying peer X.509 certificate... ok" \
6695 -C "received HelloRetryRequest message"
6696
6697requires_gnutls_tls1_3
6698requires_gnutls_next_no_ticket
6699requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006700requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006701requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006703requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006704requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6705requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6706run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006707 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006708 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006709 0 \
6710 -c "HTTP/1.0 200 OK" \
6711 -c "Protocol is TLSv1.3" \
6712 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6713 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6714 -c "NamedGroup: x448 ( 1e )" \
6715 -c "Verifying peer X.509 certificate... ok" \
6716 -C "received HelloRetryRequest message"
6717
6718requires_gnutls_tls1_3
6719requires_gnutls_next_no_ticket
6720requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006721requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006722requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006723requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006724requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006725requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6726run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006727 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006728 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006729 0 \
6730 -c "HTTP/1.0 200 OK" \
6731 -c "Protocol is TLSv1.3" \
6732 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6733 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6734 -c "NamedGroup: secp256r1 ( 17 )" \
6735 -c "Verifying peer X.509 certificate... ok" \
6736 -C "received HelloRetryRequest message"
6737
6738requires_gnutls_tls1_3
6739requires_gnutls_next_no_ticket
6740requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006741requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006742requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006743requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006744requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006745requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6746run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006747 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006748 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006749 0 \
6750 -c "HTTP/1.0 200 OK" \
6751 -c "Protocol is TLSv1.3" \
6752 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6753 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6754 -c "NamedGroup: secp256r1 ( 17 )" \
6755 -c "Verifying peer X.509 certificate... ok" \
6756 -C "received HelloRetryRequest message"
6757
6758requires_gnutls_tls1_3
6759requires_gnutls_next_no_ticket
6760requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006761requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006762requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006763requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006764requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006765requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6766run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006767 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006768 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006769 0 \
6770 -c "HTTP/1.0 200 OK" \
6771 -c "Protocol is TLSv1.3" \
6772 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6773 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6774 -c "NamedGroup: secp256r1 ( 17 )" \
6775 -c "Verifying peer X.509 certificate... ok" \
6776 -C "received HelloRetryRequest message"
6777
6778requires_gnutls_tls1_3
6779requires_gnutls_next_no_ticket
6780requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006781requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006782requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006783requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006784requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006785requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6786requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6787run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006788 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006789 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006790 0 \
6791 -c "HTTP/1.0 200 OK" \
6792 -c "Protocol is TLSv1.3" \
6793 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6794 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6795 -c "NamedGroup: secp256r1 ( 17 )" \
6796 -c "Verifying peer X.509 certificate... ok" \
6797 -C "received HelloRetryRequest message"
6798
6799requires_gnutls_tls1_3
6800requires_gnutls_next_no_ticket
6801requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006802requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006803requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006805requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006806requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6807run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006808 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006809 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006810 0 \
6811 -c "HTTP/1.0 200 OK" \
6812 -c "Protocol is TLSv1.3" \
6813 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6814 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6815 -c "NamedGroup: secp384r1 ( 18 )" \
6816 -c "Verifying peer X.509 certificate... ok" \
6817 -C "received HelloRetryRequest message"
6818
6819requires_gnutls_tls1_3
6820requires_gnutls_next_no_ticket
6821requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006822requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006823requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006825requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006826requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6827run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006828 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006829 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006830 0 \
6831 -c "HTTP/1.0 200 OK" \
6832 -c "Protocol is TLSv1.3" \
6833 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6834 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6835 -c "NamedGroup: secp384r1 ( 18 )" \
6836 -c "Verifying peer X.509 certificate... ok" \
6837 -C "received HelloRetryRequest message"
6838
6839requires_gnutls_tls1_3
6840requires_gnutls_next_no_ticket
6841requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006842requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006843requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006845requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006846requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6847run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006848 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006849 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006850 0 \
6851 -c "HTTP/1.0 200 OK" \
6852 -c "Protocol is TLSv1.3" \
6853 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6854 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6855 -c "NamedGroup: secp384r1 ( 18 )" \
6856 -c "Verifying peer X.509 certificate... ok" \
6857 -C "received HelloRetryRequest message"
6858
6859requires_gnutls_tls1_3
6860requires_gnutls_next_no_ticket
6861requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006862requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006863requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006864requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006865requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006866requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6867requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6868run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006869 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006870 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006871 0 \
6872 -c "HTTP/1.0 200 OK" \
6873 -c "Protocol is TLSv1.3" \
6874 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6875 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6876 -c "NamedGroup: secp384r1 ( 18 )" \
6877 -c "Verifying peer X.509 certificate... ok" \
6878 -C "received HelloRetryRequest message"
6879
6880requires_gnutls_tls1_3
6881requires_gnutls_next_no_ticket
6882requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006883requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006884requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006885requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006886requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006887requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6888run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006889 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006890 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006891 0 \
6892 -c "HTTP/1.0 200 OK" \
6893 -c "Protocol is TLSv1.3" \
6894 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6895 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6896 -c "NamedGroup: secp521r1 ( 19 )" \
6897 -c "Verifying peer X.509 certificate... ok" \
6898 -C "received HelloRetryRequest message"
6899
6900requires_gnutls_tls1_3
6901requires_gnutls_next_no_ticket
6902requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006903requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006904requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006906requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006907requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6908run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006909 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006910 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006911 0 \
6912 -c "HTTP/1.0 200 OK" \
6913 -c "Protocol is TLSv1.3" \
6914 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6915 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6916 -c "NamedGroup: secp521r1 ( 19 )" \
6917 -c "Verifying peer X.509 certificate... ok" \
6918 -C "received HelloRetryRequest message"
6919
6920requires_gnutls_tls1_3
6921requires_gnutls_next_no_ticket
6922requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006923requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006924requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006925requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006926requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006927requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6928run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006929 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006930 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006931 0 \
6932 -c "HTTP/1.0 200 OK" \
6933 -c "Protocol is TLSv1.3" \
6934 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6935 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6936 -c "NamedGroup: secp521r1 ( 19 )" \
6937 -c "Verifying peer X.509 certificate... ok" \
6938 -C "received HelloRetryRequest message"
6939
6940requires_gnutls_tls1_3
6941requires_gnutls_next_no_ticket
6942requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006943requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006944requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006945requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006946requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6948requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6949run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006950 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006951 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006952 0 \
6953 -c "HTTP/1.0 200 OK" \
6954 -c "Protocol is TLSv1.3" \
6955 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6956 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6957 -c "NamedGroup: secp521r1 ( 19 )" \
6958 -c "Verifying peer X.509 certificate... ok" \
6959 -C "received HelloRetryRequest message"
6960
6961requires_gnutls_tls1_3
6962requires_gnutls_next_no_ticket
6963requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006964requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006965requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006967requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6969run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006970 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006971 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006972 0 \
6973 -c "HTTP/1.0 200 OK" \
6974 -c "Protocol is TLSv1.3" \
6975 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6976 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6977 -c "NamedGroup: x25519 ( 1d )" \
6978 -c "Verifying peer X.509 certificate... ok" \
6979 -C "received HelloRetryRequest message"
6980
6981requires_gnutls_tls1_3
6982requires_gnutls_next_no_ticket
6983requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006984requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006985requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02006987requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6989run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006990 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006991 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006992 0 \
6993 -c "HTTP/1.0 200 OK" \
6994 -c "Protocol is TLSv1.3" \
6995 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6996 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6997 -c "NamedGroup: x25519 ( 1d )" \
6998 -c "Verifying peer X.509 certificate... ok" \
6999 -C "received HelloRetryRequest message"
7000
7001requires_gnutls_tls1_3
7002requires_gnutls_next_no_ticket
7003requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007004requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007005requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007007requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007008requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7009run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007010 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007011 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007012 0 \
7013 -c "HTTP/1.0 200 OK" \
7014 -c "Protocol is TLSv1.3" \
7015 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7016 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7017 -c "NamedGroup: x25519 ( 1d )" \
7018 -c "Verifying peer X.509 certificate... ok" \
7019 -C "received HelloRetryRequest message"
7020
7021requires_gnutls_tls1_3
7022requires_gnutls_next_no_ticket
7023requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007024requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007025requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007026requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007027requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007028requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7029requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7030run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007031 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007032 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007033 0 \
7034 -c "HTTP/1.0 200 OK" \
7035 -c "Protocol is TLSv1.3" \
7036 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7037 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7038 -c "NamedGroup: x25519 ( 1d )" \
7039 -c "Verifying peer X.509 certificate... ok" \
7040 -C "received HelloRetryRequest message"
7041
7042requires_gnutls_tls1_3
7043requires_gnutls_next_no_ticket
7044requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007045requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007046requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007048requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7050run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007051 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007052 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007053 0 \
7054 -c "HTTP/1.0 200 OK" \
7055 -c "Protocol is TLSv1.3" \
7056 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7057 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7058 -c "NamedGroup: x448 ( 1e )" \
7059 -c "Verifying peer X.509 certificate... ok" \
7060 -C "received HelloRetryRequest message"
7061
7062requires_gnutls_tls1_3
7063requires_gnutls_next_no_ticket
7064requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007065requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007066requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007067requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007068requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7070run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007071 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007072 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007073 0 \
7074 -c "HTTP/1.0 200 OK" \
7075 -c "Protocol is TLSv1.3" \
7076 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7077 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7078 -c "NamedGroup: x448 ( 1e )" \
7079 -c "Verifying peer X.509 certificate... ok" \
7080 -C "received HelloRetryRequest message"
7081
7082requires_gnutls_tls1_3
7083requires_gnutls_next_no_ticket
7084requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007085requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007086requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007087requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007088requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7090run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007091 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007092 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007093 0 \
7094 -c "HTTP/1.0 200 OK" \
7095 -c "Protocol is TLSv1.3" \
7096 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7097 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7098 -c "NamedGroup: x448 ( 1e )" \
7099 -c "Verifying peer X.509 certificate... ok" \
7100 -C "received HelloRetryRequest message"
7101
7102requires_gnutls_tls1_3
7103requires_gnutls_next_no_ticket
7104requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007105requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007106requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007107requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007108requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007109requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7110requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7111run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007112 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007113 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007114 0 \
7115 -c "HTTP/1.0 200 OK" \
7116 -c "Protocol is TLSv1.3" \
7117 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
7118 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7119 -c "NamedGroup: x448 ( 1e )" \
7120 -c "Verifying peer X.509 certificate... ok" \
7121 -C "received HelloRetryRequest message"
7122
7123requires_gnutls_tls1_3
7124requires_gnutls_next_no_ticket
7125requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007126requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007127requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007128requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007129requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007130requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7131run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007132 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007133 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007134 0 \
7135 -c "HTTP/1.0 200 OK" \
7136 -c "Protocol is TLSv1.3" \
7137 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7138 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7139 -c "NamedGroup: secp256r1 ( 17 )" \
7140 -c "Verifying peer X.509 certificate... ok" \
7141 -C "received HelloRetryRequest message"
7142
7143requires_gnutls_tls1_3
7144requires_gnutls_next_no_ticket
7145requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007146requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007147requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007148requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007149requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007150requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02007151run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007152 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007153 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007154 0 \
7155 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007156 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007157 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7158 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007159 -c "NamedGroup: secp256r1 ( 17 )" \
7160 -c "Verifying peer X.509 certificate... ok" \
7161 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007162
Jerry Yu31018ad2021-11-26 20:36:17 +08007163requires_gnutls_tls1_3
7164requires_gnutls_next_no_ticket
7165requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007166requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007167requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007169requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02007171run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007172 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007173 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007174 0 \
7175 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007176 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007177 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7178 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007179 -c "NamedGroup: secp256r1 ( 17 )" \
7180 -c "Verifying peer X.509 certificate... ok" \
7181 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007182
Jerry Yu31018ad2021-11-26 20:36:17 +08007183requires_gnutls_tls1_3
7184requires_gnutls_next_no_ticket
7185requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007186requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007187requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007188requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007189requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007190requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007191requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007192run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007193 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007194 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007195 0 \
7196 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007197 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007198 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7199 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007200 -c "NamedGroup: secp256r1 ( 17 )" \
7201 -c "Verifying peer X.509 certificate... ok" \
7202 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007203
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007204requires_gnutls_tls1_3
7205requires_gnutls_next_no_ticket
7206requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007207requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007208requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007209requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007210requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007211requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007212run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007213 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007214 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007215 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007216 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007217 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007218 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007219 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7220 -c "NamedGroup: secp384r1 ( 18 )" \
7221 -c "Verifying peer X.509 certificate... ok" \
7222 -C "received HelloRetryRequest message"
7223
7224requires_gnutls_tls1_3
7225requires_gnutls_next_no_ticket
7226requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007227requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007228requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007229requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007230requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007231requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7232run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007233 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007234 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007235 0 \
7236 -c "HTTP/1.0 200 OK" \
7237 -c "Protocol is TLSv1.3" \
7238 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7239 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7240 -c "NamedGroup: secp384r1 ( 18 )" \
7241 -c "Verifying peer X.509 certificate... ok" \
7242 -C "received HelloRetryRequest message"
7243
7244requires_gnutls_tls1_3
7245requires_gnutls_next_no_ticket
7246requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007247requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007248requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007249requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007250requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7252run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007253 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007254 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007255 0 \
7256 -c "HTTP/1.0 200 OK" \
7257 -c "Protocol is TLSv1.3" \
7258 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7259 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007260 -c "NamedGroup: secp384r1 ( 18 )" \
7261 -c "Verifying peer X.509 certificate... ok" \
7262 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007263
Jerry Yu31018ad2021-11-26 20:36:17 +08007264requires_gnutls_tls1_3
7265requires_gnutls_next_no_ticket
7266requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007267requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007268requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007269requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007270requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007271requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007272requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007273run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007274 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007275 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007276 0 \
7277 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007278 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007279 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7280 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007281 -c "NamedGroup: secp384r1 ( 18 )" \
7282 -c "Verifying peer X.509 certificate... ok" \
7283 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007284
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007285requires_gnutls_tls1_3
7286requires_gnutls_next_no_ticket
7287requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007288requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007289requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007291requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007293run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007294 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007295 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007296 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007297 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007298 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007299 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007300 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7301 -c "NamedGroup: secp521r1 ( 19 )" \
7302 -c "Verifying peer X.509 certificate... ok" \
7303 -C "received HelloRetryRequest message"
7304
7305requires_gnutls_tls1_3
7306requires_gnutls_next_no_ticket
7307requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007308requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007309requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007311requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007312requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7313run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007314 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007315 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007316 0 \
7317 -c "HTTP/1.0 200 OK" \
7318 -c "Protocol is TLSv1.3" \
7319 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7320 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7321 -c "NamedGroup: secp521r1 ( 19 )" \
7322 -c "Verifying peer X.509 certificate... ok" \
7323 -C "received HelloRetryRequest message"
7324
7325requires_gnutls_tls1_3
7326requires_gnutls_next_no_ticket
7327requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007328requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007329requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007331requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007332requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7333run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007334 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007335 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007336 0 \
7337 -c "HTTP/1.0 200 OK" \
7338 -c "Protocol is TLSv1.3" \
7339 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7340 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007341 -c "NamedGroup: secp521r1 ( 19 )" \
7342 -c "Verifying peer X.509 certificate... ok" \
7343 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007344
Jerry Yu31018ad2021-11-26 20:36:17 +08007345requires_gnutls_tls1_3
7346requires_gnutls_next_no_ticket
7347requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007348requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007349requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007350requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007351requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007353requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007354run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007355 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007356 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007357 0 \
7358 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007359 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007360 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7361 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007362 -c "NamedGroup: secp521r1 ( 19 )" \
7363 -c "Verifying peer X.509 certificate... ok" \
7364 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007365
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007366requires_gnutls_tls1_3
7367requires_gnutls_next_no_ticket
7368requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007369requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007370requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007372requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007373requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007374run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007375 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007376 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007377 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007378 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007379 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007380 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007381 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7382 -c "NamedGroup: x25519 ( 1d )" \
7383 -c "Verifying peer X.509 certificate... ok" \
7384 -C "received HelloRetryRequest message"
7385
7386requires_gnutls_tls1_3
7387requires_gnutls_next_no_ticket
7388requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007389requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007390requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007391requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007392requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7394run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007395 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007396 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007397 0 \
7398 -c "HTTP/1.0 200 OK" \
7399 -c "Protocol is TLSv1.3" \
7400 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7401 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7402 -c "NamedGroup: x25519 ( 1d )" \
7403 -c "Verifying peer X.509 certificate... ok" \
7404 -C "received HelloRetryRequest message"
7405
7406requires_gnutls_tls1_3
7407requires_gnutls_next_no_ticket
7408requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007409requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007410requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007411requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007412requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7414run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007415 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007416 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007417 0 \
7418 -c "HTTP/1.0 200 OK" \
7419 -c "Protocol is TLSv1.3" \
7420 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7421 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007422 -c "NamedGroup: x25519 ( 1d )" \
7423 -c "Verifying peer X.509 certificate... ok" \
7424 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007425
Jerry Yu31018ad2021-11-26 20:36:17 +08007426requires_gnutls_tls1_3
7427requires_gnutls_next_no_ticket
7428requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007429requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007430requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007431requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007432requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007434requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007435run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007436 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007437 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007438 0 \
7439 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007440 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007441 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7442 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007443 -c "NamedGroup: x25519 ( 1d )" \
7444 -c "Verifying peer X.509 certificate... ok" \
7445 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007446
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007447requires_gnutls_tls1_3
7448requires_gnutls_next_no_ticket
7449requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007450requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007451requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007453requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007454requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007455run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007456 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007457 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007458 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007459 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007460 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007461 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007462 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7463 -c "NamedGroup: x448 ( 1e )" \
7464 -c "Verifying peer X.509 certificate... ok" \
7465 -C "received HelloRetryRequest message"
7466
7467requires_gnutls_tls1_3
7468requires_gnutls_next_no_ticket
7469requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007470requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007471requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007472requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007473requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007474requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7475run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007476 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007477 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007478 0 \
7479 -c "HTTP/1.0 200 OK" \
7480 -c "Protocol is TLSv1.3" \
7481 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7482 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7483 -c "NamedGroup: x448 ( 1e )" \
7484 -c "Verifying peer X.509 certificate... ok" \
7485 -C "received HelloRetryRequest message"
7486
7487requires_gnutls_tls1_3
7488requires_gnutls_next_no_ticket
7489requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007490requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007491requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007492requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007493requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007494requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7495run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007496 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007497 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007498 0 \
7499 -c "HTTP/1.0 200 OK" \
7500 -c "Protocol is TLSv1.3" \
7501 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7502 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007503 -c "NamedGroup: x448 ( 1e )" \
7504 -c "Verifying peer X.509 certificate... ok" \
7505 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007506
Jerry Yu31018ad2021-11-26 20:36:17 +08007507requires_gnutls_tls1_3
7508requires_gnutls_next_no_ticket
7509requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007510requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007511requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007512requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007513requires_key_exchange_with_cert_in_tls13_enabled
Ronald Cronae937252021-12-10 09:55:15 +01007514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007515requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007516run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007517 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007518 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007519 0 \
7520 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007521 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007522 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007523 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007524 -c "NamedGroup: x448 ( 1e )" \
7525 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007526 -C "received HelloRetryRequest message"
XiaokangQian83f81882022-03-17 06:26:36 +00007527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007531requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007532requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007533requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007534requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007535requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007536requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007537requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7538run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007539 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7540 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007541 0 \
7542 -s "Protocol is TLSv1.3" \
7543 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7544 -s "received signature algorithm: 0x403" \
7545 -s "got named group: secp256r1(0017)" \
7546 -s "Verifying peer X.509 certificate... ok" \
7547 -c "Protocol is TLSv1.3" \
7548 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7549 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7550 -c "NamedGroup: secp256r1 ( 17 )" \
7551 -c "Verifying peer X.509 certificate... ok" \
7552 -C "received HelloRetryRequest message"
7553
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007554requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007555requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007556requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007557requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007558requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007559requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007560requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007561requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007562requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7564run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007565 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7566 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007567 0 \
7568 -s "Protocol is TLSv1.3" \
7569 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7570 -s "received signature algorithm: 0x503" \
7571 -s "got named group: secp256r1(0017)" \
7572 -s "Verifying peer X.509 certificate... ok" \
7573 -c "Protocol is TLSv1.3" \
7574 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7575 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7576 -c "NamedGroup: secp256r1 ( 17 )" \
7577 -c "Verifying peer X.509 certificate... ok" \
7578 -C "received HelloRetryRequest message"
7579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007583requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007585requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007586requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007587requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007588requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007589requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7590run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007591 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7592 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007593 0 \
7594 -s "Protocol is TLSv1.3" \
7595 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7596 -s "received signature algorithm: 0x603" \
7597 -s "got named group: secp256r1(0017)" \
7598 -s "Verifying peer X.509 certificate... ok" \
7599 -c "Protocol is TLSv1.3" \
7600 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7601 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7602 -c "NamedGroup: secp256r1 ( 17 )" \
7603 -c "Verifying peer X.509 certificate... ok" \
7604 -C "received HelloRetryRequest message"
7605
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007606requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007607requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007609requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007610requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7611requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007612requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007613requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007614requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007615requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007616requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7617requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7618run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007619 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7620 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007621 0 \
7622 -s "Protocol is TLSv1.3" \
7623 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7624 -s "received signature algorithm: 0x804" \
7625 -s "got named group: secp256r1(0017)" \
7626 -s "Verifying peer X.509 certificate... ok" \
7627 -c "Protocol is TLSv1.3" \
7628 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7629 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7630 -c "NamedGroup: secp256r1 ( 17 )" \
7631 -c "Verifying peer X.509 certificate... ok" \
7632 -C "received HelloRetryRequest message"
7633
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007634requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007635requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007637requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007638requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007639requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007640requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007641requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007642requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007643requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7644run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007645 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7646 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007647 0 \
7648 -s "Protocol is TLSv1.3" \
7649 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7650 -s "received signature algorithm: 0x403" \
7651 -s "got named group: secp384r1(0018)" \
7652 -s "Verifying peer X.509 certificate... ok" \
7653 -c "Protocol is TLSv1.3" \
7654 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7655 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7656 -c "NamedGroup: secp384r1 ( 18 )" \
7657 -c "Verifying peer X.509 certificate... ok" \
7658 -C "received HelloRetryRequest message"
7659
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007660requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007661requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007662requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007663requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007664requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007665requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007666requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007667requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007668requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7670run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007671 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7672 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007673 0 \
7674 -s "Protocol is TLSv1.3" \
7675 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7676 -s "received signature algorithm: 0x503" \
7677 -s "got named group: secp384r1(0018)" \
7678 -s "Verifying peer X.509 certificate... ok" \
7679 -c "Protocol is TLSv1.3" \
7680 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7681 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7682 -c "NamedGroup: secp384r1 ( 18 )" \
7683 -c "Verifying peer X.509 certificate... ok" \
7684 -C "received HelloRetryRequest message"
7685
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007686requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007687requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007688requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007689requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007690requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007691requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007692requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007693requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007694requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007695requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7696run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007697 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7698 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007699 0 \
7700 -s "Protocol is TLSv1.3" \
7701 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7702 -s "received signature algorithm: 0x603" \
7703 -s "got named group: secp384r1(0018)" \
7704 -s "Verifying peer X.509 certificate... ok" \
7705 -c "Protocol is TLSv1.3" \
7706 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7707 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7708 -c "NamedGroup: secp384r1 ( 18 )" \
7709 -c "Verifying peer X.509 certificate... ok" \
7710 -C "received HelloRetryRequest message"
7711
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007712requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007713requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007714requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007715requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007716requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7717requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007718requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007719requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007721requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007722requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7723requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7724run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007725 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7726 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007727 0 \
7728 -s "Protocol is TLSv1.3" \
7729 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7730 -s "received signature algorithm: 0x804" \
7731 -s "got named group: secp384r1(0018)" \
7732 -s "Verifying peer X.509 certificate... ok" \
7733 -c "Protocol is TLSv1.3" \
7734 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7735 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7736 -c "NamedGroup: secp384r1 ( 18 )" \
7737 -c "Verifying peer X.509 certificate... ok" \
7738 -C "received HelloRetryRequest message"
7739
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007740requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007741requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007742requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007743requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007744requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007745requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007746requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007747requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007748requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007749requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7750run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007751 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7752 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007753 0 \
7754 -s "Protocol is TLSv1.3" \
7755 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7756 -s "received signature algorithm: 0x403" \
7757 -s "got named group: secp521r1(0019)" \
7758 -s "Verifying peer X.509 certificate... ok" \
7759 -c "Protocol is TLSv1.3" \
7760 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7761 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7762 -c "NamedGroup: secp521r1 ( 19 )" \
7763 -c "Verifying peer X.509 certificate... ok" \
7764 -C "received HelloRetryRequest message"
7765
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007766requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007767requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007768requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007769requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007770requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007771requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007772requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007773requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007774requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7776run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007777 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7778 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007779 0 \
7780 -s "Protocol is TLSv1.3" \
7781 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7782 -s "received signature algorithm: 0x503" \
7783 -s "got named group: secp521r1(0019)" \
7784 -s "Verifying peer X.509 certificate... ok" \
7785 -c "Protocol is TLSv1.3" \
7786 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7787 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7788 -c "NamedGroup: secp521r1 ( 19 )" \
7789 -c "Verifying peer X.509 certificate... ok" \
7790 -C "received HelloRetryRequest message"
7791
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007792requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007793requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007795requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007797requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007798requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007799requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007800requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007801requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7802run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007803 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7804 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007805 0 \
7806 -s "Protocol is TLSv1.3" \
7807 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7808 -s "received signature algorithm: 0x603" \
7809 -s "got named group: secp521r1(0019)" \
7810 -s "Verifying peer X.509 certificate... ok" \
7811 -c "Protocol is TLSv1.3" \
7812 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7813 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7814 -c "NamedGroup: secp521r1 ( 19 )" \
7815 -c "Verifying peer X.509 certificate... ok" \
7816 -C "received HelloRetryRequest message"
7817
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007818requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007819requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007821requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007822requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7823requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007824requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007825requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007826requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007827requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007828requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7829requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7830run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007831 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7832 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007833 0 \
7834 -s "Protocol is TLSv1.3" \
7835 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7836 -s "received signature algorithm: 0x804" \
7837 -s "got named group: secp521r1(0019)" \
7838 -s "Verifying peer X.509 certificate... ok" \
7839 -c "Protocol is TLSv1.3" \
7840 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7841 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7842 -c "NamedGroup: secp521r1 ( 19 )" \
7843 -c "Verifying peer X.509 certificate... ok" \
7844 -C "received HelloRetryRequest message"
7845
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007846requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007847requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007849requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007850requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007851requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007852requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007853requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007854requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007855requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7856run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007857 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7858 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007859 0 \
7860 -s "Protocol is TLSv1.3" \
7861 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7862 -s "received signature algorithm: 0x403" \
7863 -s "got named group: x25519(001d)" \
7864 -s "Verifying peer X.509 certificate... ok" \
7865 -c "Protocol is TLSv1.3" \
7866 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7867 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7868 -c "NamedGroup: x25519 ( 1d )" \
7869 -c "Verifying peer X.509 certificate... ok" \
7870 -C "received HelloRetryRequest message"
7871
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007872requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007873requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007874requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007875requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007877requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007878requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007879requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007880requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007881requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7882run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007883 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7884 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007885 0 \
7886 -s "Protocol is TLSv1.3" \
7887 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7888 -s "received signature algorithm: 0x503" \
7889 -s "got named group: x25519(001d)" \
7890 -s "Verifying peer X.509 certificate... ok" \
7891 -c "Protocol is TLSv1.3" \
7892 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7893 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7894 -c "NamedGroup: x25519 ( 1d )" \
7895 -c "Verifying peer X.509 certificate... ok" \
7896 -C "received HelloRetryRequest message"
7897
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007898requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007899requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007901requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007902requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007903requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007904requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007906requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007907requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7908run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007909 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7910 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007911 0 \
7912 -s "Protocol is TLSv1.3" \
7913 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7914 -s "received signature algorithm: 0x603" \
7915 -s "got named group: x25519(001d)" \
7916 -s "Verifying peer X.509 certificate... ok" \
7917 -c "Protocol is TLSv1.3" \
7918 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7919 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7920 -c "NamedGroup: x25519 ( 1d )" \
7921 -c "Verifying peer X.509 certificate... ok" \
7922 -C "received HelloRetryRequest message"
7923
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007924requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007925requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007926requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007927requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7929requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007930requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007931requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007932requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007933requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007934requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7935requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7936run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007937 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7938 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007939 0 \
7940 -s "Protocol is TLSv1.3" \
7941 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7942 -s "received signature algorithm: 0x804" \
7943 -s "got named group: x25519(001d)" \
7944 -s "Verifying peer X.509 certificate... ok" \
7945 -c "Protocol is TLSv1.3" \
7946 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7947 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7948 -c "NamedGroup: x25519 ( 1d )" \
7949 -c "Verifying peer X.509 certificate... ok" \
7950 -C "received HelloRetryRequest message"
7951
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007952requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007953requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007954requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007955requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007956requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007957requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007958requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007959requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007960requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007961requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7962run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007963 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7964 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007965 0 \
7966 -s "Protocol is TLSv1.3" \
7967 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7968 -s "received signature algorithm: 0x403" \
7969 -s "got named group: x448(001e)" \
7970 -s "Verifying peer X.509 certificate... ok" \
7971 -c "Protocol is TLSv1.3" \
7972 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7973 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7974 -c "NamedGroup: x448 ( 1e )" \
7975 -c "Verifying peer X.509 certificate... ok" \
7976 -C "received HelloRetryRequest message"
7977
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007978requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007979requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007980requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007981requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007983requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007984requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02007986requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00007987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7988run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007989 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7990 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007991 0 \
7992 -s "Protocol is TLSv1.3" \
7993 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7994 -s "received signature algorithm: 0x503" \
7995 -s "got named group: x448(001e)" \
7996 -s "Verifying peer X.509 certificate... ok" \
7997 -c "Protocol is TLSv1.3" \
7998 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7999 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8000 -c "NamedGroup: x448 ( 1e )" \
8001 -c "Verifying peer X.509 certificate... ok" \
8002 -C "received HelloRetryRequest message"
8003
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008004requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008005requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008007requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008008requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008009requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008010requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008011requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008012requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008013requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8014run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008015 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8016 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008017 0 \
8018 -s "Protocol is TLSv1.3" \
8019 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
8020 -s "received signature algorithm: 0x603" \
8021 -s "got named group: x448(001e)" \
8022 -s "Verifying peer X.509 certificate... ok" \
8023 -c "Protocol is TLSv1.3" \
8024 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
8025 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8026 -c "NamedGroup: x448 ( 1e )" \
8027 -c "Verifying peer X.509 certificate... ok" \
8028 -C "received HelloRetryRequest message"
8029
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008030requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008031requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008032requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008033requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008034requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8035requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008036requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008037requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008038requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008039requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008040requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8041requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8042run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008043 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8044 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008045 0 \
8046 -s "Protocol is TLSv1.3" \
8047 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
8048 -s "received signature algorithm: 0x804" \
8049 -s "got named group: x448(001e)" \
8050 -s "Verifying peer X.509 certificate... ok" \
8051 -c "Protocol is TLSv1.3" \
8052 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
8053 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8054 -c "NamedGroup: x448 ( 1e )" \
8055 -c "Verifying peer X.509 certificate... ok" \
8056 -C "received HelloRetryRequest message"
8057
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008058requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008059requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008061requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008063requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008064requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008066requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008067requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8068run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008069 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8070 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008071 0 \
8072 -s "Protocol is TLSv1.3" \
8073 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8074 -s "received signature algorithm: 0x403" \
8075 -s "got named group: secp256r1(0017)" \
8076 -s "Verifying peer X.509 certificate... ok" \
8077 -c "Protocol is TLSv1.3" \
8078 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8079 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8080 -c "NamedGroup: secp256r1 ( 17 )" \
8081 -c "Verifying peer X.509 certificate... ok" \
8082 -C "received HelloRetryRequest message"
8083
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008084requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008085requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008086requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008087requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008088requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008089requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008090requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008091requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008092requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008093requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8094run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008095 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8096 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008097 0 \
8098 -s "Protocol is TLSv1.3" \
8099 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8100 -s "received signature algorithm: 0x503" \
8101 -s "got named group: secp256r1(0017)" \
8102 -s "Verifying peer X.509 certificate... ok" \
8103 -c "Protocol is TLSv1.3" \
8104 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8105 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8106 -c "NamedGroup: secp256r1 ( 17 )" \
8107 -c "Verifying peer X.509 certificate... ok" \
8108 -C "received HelloRetryRequest message"
8109
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008110requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008111requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008113requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008114requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008115requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008116requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008117requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008118requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8120run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008121 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8122 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008123 0 \
8124 -s "Protocol is TLSv1.3" \
8125 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8126 -s "received signature algorithm: 0x603" \
8127 -s "got named group: secp256r1(0017)" \
8128 -s "Verifying peer X.509 certificate... ok" \
8129 -c "Protocol is TLSv1.3" \
8130 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8131 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8132 -c "NamedGroup: secp256r1 ( 17 )" \
8133 -c "Verifying peer X.509 certificate... ok" \
8134 -C "received HelloRetryRequest message"
8135
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008136requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008137requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008138requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008139requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008140requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8141requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008142requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008143requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008144requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008145requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008146requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8147requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8148run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008149 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8150 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008151 0 \
8152 -s "Protocol is TLSv1.3" \
8153 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8154 -s "received signature algorithm: 0x804" \
8155 -s "got named group: secp256r1(0017)" \
8156 -s "Verifying peer X.509 certificate... ok" \
8157 -c "Protocol is TLSv1.3" \
8158 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8159 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8160 -c "NamedGroup: secp256r1 ( 17 )" \
8161 -c "Verifying peer X.509 certificate... ok" \
8162 -C "received HelloRetryRequest message"
8163
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008164requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008165requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008167requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008169requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008170requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008171requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008172requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008173requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8174run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008175 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8176 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008177 0 \
8178 -s "Protocol is TLSv1.3" \
8179 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8180 -s "received signature algorithm: 0x403" \
8181 -s "got named group: secp384r1(0018)" \
8182 -s "Verifying peer X.509 certificate... ok" \
8183 -c "Protocol is TLSv1.3" \
8184 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8185 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8186 -c "NamedGroup: secp384r1 ( 18 )" \
8187 -c "Verifying peer X.509 certificate... ok" \
8188 -C "received HelloRetryRequest message"
8189
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008190requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008191requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008193requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008194requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008195requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008196requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008198requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8200run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008201 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8202 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008203 0 \
8204 -s "Protocol is TLSv1.3" \
8205 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8206 -s "received signature algorithm: 0x503" \
8207 -s "got named group: secp384r1(0018)" \
8208 -s "Verifying peer X.509 certificate... ok" \
8209 -c "Protocol is TLSv1.3" \
8210 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8211 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8212 -c "NamedGroup: secp384r1 ( 18 )" \
8213 -c "Verifying peer X.509 certificate... ok" \
8214 -C "received HelloRetryRequest message"
8215
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008216requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008217requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008218requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008219requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008221requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008222requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008223requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008224requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8226run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008227 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8228 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008229 0 \
8230 -s "Protocol is TLSv1.3" \
8231 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8232 -s "received signature algorithm: 0x603" \
8233 -s "got named group: secp384r1(0018)" \
8234 -s "Verifying peer X.509 certificate... ok" \
8235 -c "Protocol is TLSv1.3" \
8236 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8237 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8238 -c "NamedGroup: secp384r1 ( 18 )" \
8239 -c "Verifying peer X.509 certificate... ok" \
8240 -C "received HelloRetryRequest message"
8241
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008242requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008243requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008244requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008245requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008246requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8247requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008248requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008249requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008251requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008252requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8253requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8254run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008255 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8256 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008257 0 \
8258 -s "Protocol is TLSv1.3" \
8259 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8260 -s "received signature algorithm: 0x804" \
8261 -s "got named group: secp384r1(0018)" \
8262 -s "Verifying peer X.509 certificate... ok" \
8263 -c "Protocol is TLSv1.3" \
8264 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8265 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8266 -c "NamedGroup: secp384r1 ( 18 )" \
8267 -c "Verifying peer X.509 certificate... ok" \
8268 -C "received HelloRetryRequest message"
8269
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008270requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008271requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008272requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008273requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008274requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008275requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008276requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008277requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008278requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008279requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8280run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008281 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8282 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008283 0 \
8284 -s "Protocol is TLSv1.3" \
8285 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8286 -s "received signature algorithm: 0x403" \
8287 -s "got named group: secp521r1(0019)" \
8288 -s "Verifying peer X.509 certificate... ok" \
8289 -c "Protocol is TLSv1.3" \
8290 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8291 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8292 -c "NamedGroup: secp521r1 ( 19 )" \
8293 -c "Verifying peer X.509 certificate... ok" \
8294 -C "received HelloRetryRequest message"
8295
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008296requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008297requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008298requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008299requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008300requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008301requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008302requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008303requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008304requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008305requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8306run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008307 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8308 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008309 0 \
8310 -s "Protocol is TLSv1.3" \
8311 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8312 -s "received signature algorithm: 0x503" \
8313 -s "got named group: secp521r1(0019)" \
8314 -s "Verifying peer X.509 certificate... ok" \
8315 -c "Protocol is TLSv1.3" \
8316 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8317 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8318 -c "NamedGroup: secp521r1 ( 19 )" \
8319 -c "Verifying peer X.509 certificate... ok" \
8320 -C "received HelloRetryRequest message"
8321
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008322requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008323requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008324requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008325requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008327requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008328requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008329requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008330requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8332run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008333 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8334 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008335 0 \
8336 -s "Protocol is TLSv1.3" \
8337 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8338 -s "received signature algorithm: 0x603" \
8339 -s "got named group: secp521r1(0019)" \
8340 -s "Verifying peer X.509 certificate... ok" \
8341 -c "Protocol is TLSv1.3" \
8342 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8343 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8344 -c "NamedGroup: secp521r1 ( 19 )" \
8345 -c "Verifying peer X.509 certificate... ok" \
8346 -C "received HelloRetryRequest message"
8347
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008348requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008349requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008350requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008351requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8353requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008354requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008355requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008356requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008357requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008358requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8359requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8360run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008361 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8362 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008363 0 \
8364 -s "Protocol is TLSv1.3" \
8365 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8366 -s "received signature algorithm: 0x804" \
8367 -s "got named group: secp521r1(0019)" \
8368 -s "Verifying peer X.509 certificate... ok" \
8369 -c "Protocol is TLSv1.3" \
8370 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8371 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8372 -c "NamedGroup: secp521r1 ( 19 )" \
8373 -c "Verifying peer X.509 certificate... ok" \
8374 -C "received HelloRetryRequest message"
8375
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008376requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008377requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008379requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008381requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008382requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008383requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008384requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008385requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8386run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008387 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8388 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008389 0 \
8390 -s "Protocol is TLSv1.3" \
8391 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8392 -s "received signature algorithm: 0x403" \
8393 -s "got named group: x25519(001d)" \
8394 -s "Verifying peer X.509 certificate... ok" \
8395 -c "Protocol is TLSv1.3" \
8396 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8397 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8398 -c "NamedGroup: x25519 ( 1d )" \
8399 -c "Verifying peer X.509 certificate... ok" \
8400 -C "received HelloRetryRequest message"
8401
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008402requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008403requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008404requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008405requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008406requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008407requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008410requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8412run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008413 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8414 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008415 0 \
8416 -s "Protocol is TLSv1.3" \
8417 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8418 -s "received signature algorithm: 0x503" \
8419 -s "got named group: x25519(001d)" \
8420 -s "Verifying peer X.509 certificate... ok" \
8421 -c "Protocol is TLSv1.3" \
8422 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8423 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8424 -c "NamedGroup: x25519 ( 1d )" \
8425 -c "Verifying peer X.509 certificate... ok" \
8426 -C "received HelloRetryRequest message"
8427
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008428requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008429requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008430requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008431requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008432requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008433requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008434requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008435requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008436requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8438run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008439 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8440 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008441 0 \
8442 -s "Protocol is TLSv1.3" \
8443 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8444 -s "received signature algorithm: 0x603" \
8445 -s "got named group: x25519(001d)" \
8446 -s "Verifying peer X.509 certificate... ok" \
8447 -c "Protocol is TLSv1.3" \
8448 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8449 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8450 -c "NamedGroup: x25519 ( 1d )" \
8451 -c "Verifying peer X.509 certificate... ok" \
8452 -C "received HelloRetryRequest message"
8453
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008454requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008455requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008457requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008458requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8459requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008460requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008461requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008462requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008463requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008464requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8465requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8466run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008467 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8468 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008469 0 \
8470 -s "Protocol is TLSv1.3" \
8471 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8472 -s "received signature algorithm: 0x804" \
8473 -s "got named group: x25519(001d)" \
8474 -s "Verifying peer X.509 certificate... ok" \
8475 -c "Protocol is TLSv1.3" \
8476 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8477 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8478 -c "NamedGroup: x25519 ( 1d )" \
8479 -c "Verifying peer X.509 certificate... ok" \
8480 -C "received HelloRetryRequest message"
8481
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008482requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008483requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008484requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008485requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008487requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008488requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008489requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008490requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008491requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8492run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008493 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8494 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008495 0 \
8496 -s "Protocol is TLSv1.3" \
8497 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8498 -s "received signature algorithm: 0x403" \
8499 -s "got named group: x448(001e)" \
8500 -s "Verifying peer X.509 certificate... ok" \
8501 -c "Protocol is TLSv1.3" \
8502 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8503 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8504 -c "NamedGroup: x448 ( 1e )" \
8505 -c "Verifying peer X.509 certificate... ok" \
8506 -C "received HelloRetryRequest message"
8507
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008508requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008509requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008511requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008512requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008513requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008514requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008515requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008516requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008517requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8518run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008519 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8520 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008521 0 \
8522 -s "Protocol is TLSv1.3" \
8523 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8524 -s "received signature algorithm: 0x503" \
8525 -s "got named group: x448(001e)" \
8526 -s "Verifying peer X.509 certificate... ok" \
8527 -c "Protocol is TLSv1.3" \
8528 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8529 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8530 -c "NamedGroup: x448 ( 1e )" \
8531 -c "Verifying peer X.509 certificate... ok" \
8532 -C "received HelloRetryRequest message"
8533
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008534requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008535requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008536requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008537requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008538requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008539requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008540requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008541requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008542requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008543requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8544run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008545 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8546 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008547 0 \
8548 -s "Protocol is TLSv1.3" \
8549 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8550 -s "received signature algorithm: 0x603" \
8551 -s "got named group: x448(001e)" \
8552 -s "Verifying peer X.509 certificate... ok" \
8553 -c "Protocol is TLSv1.3" \
8554 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8555 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8556 -c "NamedGroup: x448 ( 1e )" \
8557 -c "Verifying peer X.509 certificate... ok" \
8558 -C "received HelloRetryRequest message"
8559
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008560requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008561requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008562requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008563requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8565requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008566requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008567requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008568requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008569requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008570requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8571requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8572run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008573 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8574 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008575 0 \
8576 -s "Protocol is TLSv1.3" \
8577 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8578 -s "received signature algorithm: 0x804" \
8579 -s "got named group: x448(001e)" \
8580 -s "Verifying peer X.509 certificate... ok" \
8581 -c "Protocol is TLSv1.3" \
8582 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8583 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8584 -c "NamedGroup: x448 ( 1e )" \
8585 -c "Verifying peer X.509 certificate... ok" \
8586 -C "received HelloRetryRequest message"
8587
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008588requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008589requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008590requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008591requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008592requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008593requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008594requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008595requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008596requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008597requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8598run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008599 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8600 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008601 0 \
8602 -s "Protocol is TLSv1.3" \
8603 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8604 -s "received signature algorithm: 0x403" \
8605 -s "got named group: secp256r1(0017)" \
8606 -s "Verifying peer X.509 certificate... ok" \
8607 -c "Protocol is TLSv1.3" \
8608 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8609 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8610 -c "NamedGroup: secp256r1 ( 17 )" \
8611 -c "Verifying peer X.509 certificate... ok" \
8612 -C "received HelloRetryRequest message"
8613
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008614requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008615requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008616requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008617requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008619requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008620requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008621requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008622requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8624run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008625 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8626 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008627 0 \
8628 -s "Protocol is TLSv1.3" \
8629 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8630 -s "received signature algorithm: 0x503" \
8631 -s "got named group: secp256r1(0017)" \
8632 -s "Verifying peer X.509 certificate... ok" \
8633 -c "Protocol is TLSv1.3" \
8634 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8635 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8636 -c "NamedGroup: secp256r1 ( 17 )" \
8637 -c "Verifying peer X.509 certificate... ok" \
8638 -C "received HelloRetryRequest message"
8639
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008640requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008641requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008642requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008643requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008644requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008645requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008646requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008648requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8650run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008651 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8652 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008653 0 \
8654 -s "Protocol is TLSv1.3" \
8655 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8656 -s "received signature algorithm: 0x603" \
8657 -s "got named group: secp256r1(0017)" \
8658 -s "Verifying peer X.509 certificate... ok" \
8659 -c "Protocol is TLSv1.3" \
8660 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8661 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8662 -c "NamedGroup: secp256r1 ( 17 )" \
8663 -c "Verifying peer X.509 certificate... ok" \
8664 -C "received HelloRetryRequest message"
8665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008669requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008670requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8671requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008672requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008673requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008674requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008675requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008676requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8677requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8678run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008679 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8680 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008681 0 \
8682 -s "Protocol is TLSv1.3" \
8683 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8684 -s "received signature algorithm: 0x804" \
8685 -s "got named group: secp256r1(0017)" \
8686 -s "Verifying peer X.509 certificate... ok" \
8687 -c "Protocol is TLSv1.3" \
8688 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8689 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8690 -c "NamedGroup: secp256r1 ( 17 )" \
8691 -c "Verifying peer X.509 certificate... ok" \
8692 -C "received HelloRetryRequest message"
8693
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008694requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008695requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008697requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008698requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008699requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008700requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008701requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008702requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8704run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008705 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8706 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008707 0 \
8708 -s "Protocol is TLSv1.3" \
8709 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8710 -s "received signature algorithm: 0x403" \
8711 -s "got named group: secp384r1(0018)" \
8712 -s "Verifying peer X.509 certificate... ok" \
8713 -c "Protocol is TLSv1.3" \
8714 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8715 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8716 -c "NamedGroup: secp384r1 ( 18 )" \
8717 -c "Verifying peer X.509 certificate... ok" \
8718 -C "received HelloRetryRequest message"
8719
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008720requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008721requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008723requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008724requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008725requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008726requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008727requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008728requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8730run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008731 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8732 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008733 0 \
8734 -s "Protocol is TLSv1.3" \
8735 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8736 -s "received signature algorithm: 0x503" \
8737 -s "got named group: secp384r1(0018)" \
8738 -s "Verifying peer X.509 certificate... ok" \
8739 -c "Protocol is TLSv1.3" \
8740 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8741 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8742 -c "NamedGroup: secp384r1 ( 18 )" \
8743 -c "Verifying peer X.509 certificate... ok" \
8744 -C "received HelloRetryRequest message"
8745
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008746requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008747requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008748requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008749requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008750requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008751requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008752requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008753requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008754requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8756run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008757 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8758 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008759 0 \
8760 -s "Protocol is TLSv1.3" \
8761 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8762 -s "received signature algorithm: 0x603" \
8763 -s "got named group: secp384r1(0018)" \
8764 -s "Verifying peer X.509 certificate... ok" \
8765 -c "Protocol is TLSv1.3" \
8766 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8767 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8768 -c "NamedGroup: secp384r1 ( 18 )" \
8769 -c "Verifying peer X.509 certificate... ok" \
8770 -C "received HelloRetryRequest message"
8771
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008772requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008775requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8777requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008778requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008779requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008780requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008781requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008782requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8783requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8784run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008785 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8786 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008787 0 \
8788 -s "Protocol is TLSv1.3" \
8789 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8790 -s "received signature algorithm: 0x804" \
8791 -s "got named group: secp384r1(0018)" \
8792 -s "Verifying peer X.509 certificate... ok" \
8793 -c "Protocol is TLSv1.3" \
8794 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8795 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8796 -c "NamedGroup: secp384r1 ( 18 )" \
8797 -c "Verifying peer X.509 certificate... ok" \
8798 -C "received HelloRetryRequest message"
8799
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008800requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008801requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008802requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008803requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008804requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008805requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008806requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008807requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008808requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008809requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8810run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008811 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8812 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008813 0 \
8814 -s "Protocol is TLSv1.3" \
8815 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8816 -s "received signature algorithm: 0x403" \
8817 -s "got named group: secp521r1(0019)" \
8818 -s "Verifying peer X.509 certificate... ok" \
8819 -c "Protocol is TLSv1.3" \
8820 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8821 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8822 -c "NamedGroup: secp521r1 ( 19 )" \
8823 -c "Verifying peer X.509 certificate... ok" \
8824 -C "received HelloRetryRequest message"
8825
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008826requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008827requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008828requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008829requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008830requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008831requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008832requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008833requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008834requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8836run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008837 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8838 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008839 0 \
8840 -s "Protocol is TLSv1.3" \
8841 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8842 -s "received signature algorithm: 0x503" \
8843 -s "got named group: secp521r1(0019)" \
8844 -s "Verifying peer X.509 certificate... ok" \
8845 -c "Protocol is TLSv1.3" \
8846 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8847 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8848 -c "NamedGroup: secp521r1 ( 19 )" \
8849 -c "Verifying peer X.509 certificate... ok" \
8850 -C "received HelloRetryRequest message"
8851
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008852requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008853requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008854requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008855requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008857requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008858requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008859requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008860requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008861requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8862run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008863 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8864 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008865 0 \
8866 -s "Protocol is TLSv1.3" \
8867 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8868 -s "received signature algorithm: 0x603" \
8869 -s "got named group: secp521r1(0019)" \
8870 -s "Verifying peer X.509 certificate... ok" \
8871 -c "Protocol is TLSv1.3" \
8872 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8873 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8874 -c "NamedGroup: secp521r1 ( 19 )" \
8875 -c "Verifying peer X.509 certificate... ok" \
8876 -C "received HelloRetryRequest message"
8877
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008878requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008879requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008880requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008881requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008882requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8883requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008884requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008885requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008886requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008887requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008888requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8889requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8890run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008891 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8892 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008893 0 \
8894 -s "Protocol is TLSv1.3" \
8895 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8896 -s "received signature algorithm: 0x804" \
8897 -s "got named group: secp521r1(0019)" \
8898 -s "Verifying peer X.509 certificate... ok" \
8899 -c "Protocol is TLSv1.3" \
8900 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8901 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8902 -c "NamedGroup: secp521r1 ( 19 )" \
8903 -c "Verifying peer X.509 certificate... ok" \
8904 -C "received HelloRetryRequest message"
8905
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008906requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008907requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008908requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008909requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008911requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008912requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008913requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008914requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008915requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8916run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008917 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8918 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008919 0 \
8920 -s "Protocol is TLSv1.3" \
8921 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8922 -s "received signature algorithm: 0x403" \
8923 -s "got named group: x25519(001d)" \
8924 -s "Verifying peer X.509 certificate... ok" \
8925 -c "Protocol is TLSv1.3" \
8926 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8927 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8928 -c "NamedGroup: x25519 ( 1d )" \
8929 -c "Verifying peer X.509 certificate... ok" \
8930 -C "received HelloRetryRequest message"
8931
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008932requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008933requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008934requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008935requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008936requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008937requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008938requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008939requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008940requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8942run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008943 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8944 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008945 0 \
8946 -s "Protocol is TLSv1.3" \
8947 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8948 -s "received signature algorithm: 0x503" \
8949 -s "got named group: x25519(001d)" \
8950 -s "Verifying peer X.509 certificate... ok" \
8951 -c "Protocol is TLSv1.3" \
8952 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8953 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8954 -c "NamedGroup: x25519 ( 1d )" \
8955 -c "Verifying peer X.509 certificate... ok" \
8956 -C "received HelloRetryRequest message"
8957
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008958requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008959requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008960requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008961requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008963requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008964requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008965requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008966requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8968run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008969 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8970 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008971 0 \
8972 -s "Protocol is TLSv1.3" \
8973 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8974 -s "received signature algorithm: 0x603" \
8975 -s "got named group: x25519(001d)" \
8976 -s "Verifying peer X.509 certificate... ok" \
8977 -c "Protocol is TLSv1.3" \
8978 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8979 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8980 -c "NamedGroup: x25519 ( 1d )" \
8981 -c "Verifying peer X.509 certificate... ok" \
8982 -C "received HelloRetryRequest message"
8983
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008984requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008985requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008987requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8989requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008990requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008991requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008992requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02008993requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00008994requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8995requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8996run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008997 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8998 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008999 0 \
9000 -s "Protocol is TLSv1.3" \
9001 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
9002 -s "received signature algorithm: 0x804" \
9003 -s "got named group: x25519(001d)" \
9004 -s "Verifying peer X.509 certificate... ok" \
9005 -c "Protocol is TLSv1.3" \
9006 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
9007 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9008 -c "NamedGroup: x25519 ( 1d )" \
9009 -c "Verifying peer X.509 certificate... ok" \
9010 -C "received HelloRetryRequest message"
9011
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009012requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009013requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009014requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009015requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009017requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009018requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009019requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009020requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9022run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009023 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9024 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009025 0 \
9026 -s "Protocol is TLSv1.3" \
9027 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
9028 -s "received signature algorithm: 0x403" \
9029 -s "got named group: x448(001e)" \
9030 -s "Verifying peer X.509 certificate... ok" \
9031 -c "Protocol is TLSv1.3" \
9032 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
9033 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9034 -c "NamedGroup: x448 ( 1e )" \
9035 -c "Verifying peer X.509 certificate... ok" \
9036 -C "received HelloRetryRequest message"
9037
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009038requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009039requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009040requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009041requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009042requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009043requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009044requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009045requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009046requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009047requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9048run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009049 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9050 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009051 0 \
9052 -s "Protocol is TLSv1.3" \
9053 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
9054 -s "received signature algorithm: 0x503" \
9055 -s "got named group: x448(001e)" \
9056 -s "Verifying peer X.509 certificate... ok" \
9057 -c "Protocol is TLSv1.3" \
9058 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
9059 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9060 -c "NamedGroup: x448 ( 1e )" \
9061 -c "Verifying peer X.509 certificate... ok" \
9062 -C "received HelloRetryRequest message"
9063
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009064requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009065requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009066requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009067requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009069requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009070requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009071requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009072requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009073requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9074run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009075 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9076 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009077 0 \
9078 -s "Protocol is TLSv1.3" \
9079 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
9080 -s "received signature algorithm: 0x603" \
9081 -s "got named group: x448(001e)" \
9082 -s "Verifying peer X.509 certificate... ok" \
9083 -c "Protocol is TLSv1.3" \
9084 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
9085 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9086 -c "NamedGroup: x448 ( 1e )" \
9087 -c "Verifying peer X.509 certificate... ok" \
9088 -C "received HelloRetryRequest message"
9089
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009090requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009091requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009092requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009093requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9095requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009096requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009097requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009098requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009099requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9101requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9102run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009103 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9104 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009105 0 \
9106 -s "Protocol is TLSv1.3" \
9107 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
9108 -s "received signature algorithm: 0x804" \
9109 -s "got named group: x448(001e)" \
9110 -s "Verifying peer X.509 certificate... ok" \
9111 -c "Protocol is TLSv1.3" \
9112 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
9113 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9114 -c "NamedGroup: x448 ( 1e )" \
9115 -c "Verifying peer X.509 certificate... ok" \
9116 -C "received HelloRetryRequest message"
9117
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009118requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009119requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009121requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009123requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009124requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009125requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009126requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009127requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9128run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009129 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9130 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009131 0 \
9132 -s "Protocol is TLSv1.3" \
9133 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9134 -s "received signature algorithm: 0x403" \
9135 -s "got named group: secp256r1(0017)" \
9136 -s "Verifying peer X.509 certificate... ok" \
9137 -c "Protocol is TLSv1.3" \
9138 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9139 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9140 -c "NamedGroup: secp256r1 ( 17 )" \
9141 -c "Verifying peer X.509 certificate... ok" \
9142 -C "received HelloRetryRequest message"
9143
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009144requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009145requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009146requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009147requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009148requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009149requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009150requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009152requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009153requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9154run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009155 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9156 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009157 0 \
9158 -s "Protocol is TLSv1.3" \
9159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9160 -s "received signature algorithm: 0x503" \
9161 -s "got named group: secp256r1(0017)" \
9162 -s "Verifying peer X.509 certificate... ok" \
9163 -c "Protocol is TLSv1.3" \
9164 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9165 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9166 -c "NamedGroup: secp256r1 ( 17 )" \
9167 -c "Verifying peer X.509 certificate... ok" \
9168 -C "received HelloRetryRequest message"
9169
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009170requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009171requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009172requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009173requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009174requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009175requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009176requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009177requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009178requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9180run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009181 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9182 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009183 0 \
9184 -s "Protocol is TLSv1.3" \
9185 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9186 -s "received signature algorithm: 0x603" \
9187 -s "got named group: secp256r1(0017)" \
9188 -s "Verifying peer X.509 certificate... ok" \
9189 -c "Protocol is TLSv1.3" \
9190 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9191 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9192 -c "NamedGroup: secp256r1 ( 17 )" \
9193 -c "Verifying peer X.509 certificate... ok" \
9194 -C "received HelloRetryRequest message"
9195
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009196requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009197requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009199requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9201requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009202requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009203requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009204requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009205requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009206requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9207requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9208run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009209 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9210 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009211 0 \
9212 -s "Protocol is TLSv1.3" \
9213 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9214 -s "received signature algorithm: 0x804" \
9215 -s "got named group: secp256r1(0017)" \
9216 -s "Verifying peer X.509 certificate... ok" \
9217 -c "Protocol is TLSv1.3" \
9218 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9219 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9220 -c "NamedGroup: secp256r1 ( 17 )" \
9221 -c "Verifying peer X.509 certificate... ok" \
9222 -C "received HelloRetryRequest message"
9223
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009224requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009225requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009226requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009227requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009228requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009229requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009230requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009231requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009232requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9234run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009235 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9236 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009237 0 \
9238 -s "Protocol is TLSv1.3" \
9239 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9240 -s "received signature algorithm: 0x403" \
9241 -s "got named group: secp384r1(0018)" \
9242 -s "Verifying peer X.509 certificate... ok" \
9243 -c "Protocol is TLSv1.3" \
9244 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9245 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9246 -c "NamedGroup: secp384r1 ( 18 )" \
9247 -c "Verifying peer X.509 certificate... ok" \
9248 -C "received HelloRetryRequest message"
9249
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009250requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009251requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009252requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009253requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009254requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009255requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009256requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009258requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009259requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9260run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009261 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9262 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009263 0 \
9264 -s "Protocol is TLSv1.3" \
9265 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9266 -s "received signature algorithm: 0x503" \
9267 -s "got named group: secp384r1(0018)" \
9268 -s "Verifying peer X.509 certificate... ok" \
9269 -c "Protocol is TLSv1.3" \
9270 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9271 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9272 -c "NamedGroup: secp384r1 ( 18 )" \
9273 -c "Verifying peer X.509 certificate... ok" \
9274 -C "received HelloRetryRequest message"
9275
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009276requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009277requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009278requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009279requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009280requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009281requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009282requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009283requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009284requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9286run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009287 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9288 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009289 0 \
9290 -s "Protocol is TLSv1.3" \
9291 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9292 -s "received signature algorithm: 0x603" \
9293 -s "got named group: secp384r1(0018)" \
9294 -s "Verifying peer X.509 certificate... ok" \
9295 -c "Protocol is TLSv1.3" \
9296 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9297 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9298 -c "NamedGroup: secp384r1 ( 18 )" \
9299 -c "Verifying peer X.509 certificate... ok" \
9300 -C "received HelloRetryRequest message"
9301
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009302requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009303requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009304requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009305requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9307requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009308requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009309requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009311requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009312requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9313requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9314run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009315 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9316 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009317 0 \
9318 -s "Protocol is TLSv1.3" \
9319 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9320 -s "received signature algorithm: 0x804" \
9321 -s "got named group: secp384r1(0018)" \
9322 -s "Verifying peer X.509 certificate... ok" \
9323 -c "Protocol is TLSv1.3" \
9324 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9325 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9326 -c "NamedGroup: secp384r1 ( 18 )" \
9327 -c "Verifying peer X.509 certificate... ok" \
9328 -C "received HelloRetryRequest message"
9329
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009330requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009331requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009333requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009334requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009335requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009336requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009337requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009338requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9340run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009341 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9342 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009343 0 \
9344 -s "Protocol is TLSv1.3" \
9345 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9346 -s "received signature algorithm: 0x403" \
9347 -s "got named group: secp521r1(0019)" \
9348 -s "Verifying peer X.509 certificate... ok" \
9349 -c "Protocol is TLSv1.3" \
9350 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9351 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9352 -c "NamedGroup: secp521r1 ( 19 )" \
9353 -c "Verifying peer X.509 certificate... ok" \
9354 -C "received HelloRetryRequest message"
9355
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009359requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009361requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009362requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009363requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009364requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009365requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9366run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009367 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9368 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009369 0 \
9370 -s "Protocol is TLSv1.3" \
9371 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9372 -s "received signature algorithm: 0x503" \
9373 -s "got named group: secp521r1(0019)" \
9374 -s "Verifying peer X.509 certificate... ok" \
9375 -c "Protocol is TLSv1.3" \
9376 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9377 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9378 -c "NamedGroup: secp521r1 ( 19 )" \
9379 -c "Verifying peer X.509 certificate... ok" \
9380 -C "received HelloRetryRequest message"
9381
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009382requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009383requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009384requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009385requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009386requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009387requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009388requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009389requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009390requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009391requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9392run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009393 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9394 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009395 0 \
9396 -s "Protocol is TLSv1.3" \
9397 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9398 -s "received signature algorithm: 0x603" \
9399 -s "got named group: secp521r1(0019)" \
9400 -s "Verifying peer X.509 certificate... ok" \
9401 -c "Protocol is TLSv1.3" \
9402 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9403 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9404 -c "NamedGroup: secp521r1 ( 19 )" \
9405 -c "Verifying peer X.509 certificate... ok" \
9406 -C "received HelloRetryRequest message"
9407
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009409requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009411requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009412requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9413requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009414requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009415requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009416requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009417requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009418requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9419requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9420run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009421 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9422 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009423 0 \
9424 -s "Protocol is TLSv1.3" \
9425 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9426 -s "received signature algorithm: 0x804" \
9427 -s "got named group: secp521r1(0019)" \
9428 -s "Verifying peer X.509 certificate... ok" \
9429 -c "Protocol is TLSv1.3" \
9430 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9431 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9432 -c "NamedGroup: secp521r1 ( 19 )" \
9433 -c "Verifying peer X.509 certificate... ok" \
9434 -C "received HelloRetryRequest message"
9435
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009436requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009437requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009438requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009439requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009440requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009441requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009443requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009444requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9446run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009447 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9448 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009449 0 \
9450 -s "Protocol is TLSv1.3" \
9451 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9452 -s "received signature algorithm: 0x403" \
9453 -s "got named group: x25519(001d)" \
9454 -s "Verifying peer X.509 certificate... ok" \
9455 -c "Protocol is TLSv1.3" \
9456 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9457 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9458 -c "NamedGroup: x25519 ( 1d )" \
9459 -c "Verifying peer X.509 certificate... ok" \
9460 -C "received HelloRetryRequest message"
9461
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009462requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009463requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009464requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009465requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009467requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009468requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009469requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009470requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009471requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9472run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009473 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9474 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009475 0 \
9476 -s "Protocol is TLSv1.3" \
9477 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9478 -s "received signature algorithm: 0x503" \
9479 -s "got named group: x25519(001d)" \
9480 -s "Verifying peer X.509 certificate... ok" \
9481 -c "Protocol is TLSv1.3" \
9482 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9483 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9484 -c "NamedGroup: x25519 ( 1d )" \
9485 -c "Verifying peer X.509 certificate... ok" \
9486 -C "received HelloRetryRequest message"
9487
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009488requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009489requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009490requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009491requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009492requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009493requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009494requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009495requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009496requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9498run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009499 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9500 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009501 0 \
9502 -s "Protocol is TLSv1.3" \
9503 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9504 -s "received signature algorithm: 0x603" \
9505 -s "got named group: x25519(001d)" \
9506 -s "Verifying peer X.509 certificate... ok" \
9507 -c "Protocol is TLSv1.3" \
9508 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9509 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9510 -c "NamedGroup: x25519 ( 1d )" \
9511 -c "Verifying peer X.509 certificate... ok" \
9512 -C "received HelloRetryRequest message"
9513
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009514requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009515requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009516requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009517requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009518requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9519requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009520requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009521requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009522requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009523requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009524requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9525requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9526run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009527 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9528 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009529 0 \
9530 -s "Protocol is TLSv1.3" \
9531 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9532 -s "received signature algorithm: 0x804" \
9533 -s "got named group: x25519(001d)" \
9534 -s "Verifying peer X.509 certificate... ok" \
9535 -c "Protocol is TLSv1.3" \
9536 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9537 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9538 -c "NamedGroup: x25519 ( 1d )" \
9539 -c "Verifying peer X.509 certificate... ok" \
9540 -C "received HelloRetryRequest message"
9541
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009542requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009543requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009544requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009545requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009547requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009548requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009549requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009550requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9552run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009553 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9554 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009555 0 \
9556 -s "Protocol is TLSv1.3" \
9557 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9558 -s "received signature algorithm: 0x403" \
9559 -s "got named group: x448(001e)" \
9560 -s "Verifying peer X.509 certificate... ok" \
9561 -c "Protocol is TLSv1.3" \
9562 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9563 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9564 -c "NamedGroup: x448 ( 1e )" \
9565 -c "Verifying peer X.509 certificate... ok" \
9566 -C "received HelloRetryRequest message"
9567
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009568requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009569requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009570requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009571requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009572requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009573requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009574requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009575requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009576requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9578run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009579 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9580 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009581 0 \
9582 -s "Protocol is TLSv1.3" \
9583 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9584 -s "received signature algorithm: 0x503" \
9585 -s "got named group: x448(001e)" \
9586 -s "Verifying peer X.509 certificate... ok" \
9587 -c "Protocol is TLSv1.3" \
9588 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9589 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9590 -c "NamedGroup: x448 ( 1e )" \
9591 -c "Verifying peer X.509 certificate... ok" \
9592 -C "received HelloRetryRequest message"
9593
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009594requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009595requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009596requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009597requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009598requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009599requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009600requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009602requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9604run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009605 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9606 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009607 0 \
9608 -s "Protocol is TLSv1.3" \
9609 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9610 -s "received signature algorithm: 0x603" \
9611 -s "got named group: x448(001e)" \
9612 -s "Verifying peer X.509 certificate... ok" \
9613 -c "Protocol is TLSv1.3" \
9614 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9615 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9616 -c "NamedGroup: x448 ( 1e )" \
9617 -c "Verifying peer X.509 certificate... ok" \
9618 -C "received HelloRetryRequest message"
9619
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009621requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009623requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009624requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9625requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009626requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009627requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009629requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009630requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9631requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9632run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009633 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9634 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009635 0 \
9636 -s "Protocol is TLSv1.3" \
9637 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9638 -s "received signature algorithm: 0x804" \
9639 -s "got named group: x448(001e)" \
9640 -s "Verifying peer X.509 certificate... ok" \
9641 -c "Protocol is TLSv1.3" \
9642 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9643 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9644 -c "NamedGroup: x448 ( 1e )" \
9645 -c "Verifying peer X.509 certificate... ok" \
9646 -C "received HelloRetryRequest message"
9647
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009648requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009649requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009650requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009651requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009653requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009654requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009655requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009656requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9658run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009659 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9660 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009661 0 \
9662 -s "Protocol is TLSv1.3" \
9663 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9664 -s "received signature algorithm: 0x403" \
9665 -s "got named group: secp256r1(0017)" \
9666 -s "Verifying peer X.509 certificate... ok" \
9667 -c "Protocol is TLSv1.3" \
9668 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9669 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9670 -c "NamedGroup: secp256r1 ( 17 )" \
9671 -c "Verifying peer X.509 certificate... ok" \
9672 -C "received HelloRetryRequest message"
9673
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009674requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009675requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009677requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009679requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009680requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009682requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009683requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9684run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009685 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9686 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009687 0 \
9688 -s "Protocol is TLSv1.3" \
9689 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9690 -s "received signature algorithm: 0x503" \
9691 -s "got named group: secp256r1(0017)" \
9692 -s "Verifying peer X.509 certificate... ok" \
9693 -c "Protocol is TLSv1.3" \
9694 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9695 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9696 -c "NamedGroup: secp256r1 ( 17 )" \
9697 -c "Verifying peer X.509 certificate... ok" \
9698 -C "received HelloRetryRequest message"
9699
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009700requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009703requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009704requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009705requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009706requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009707requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009708requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009709requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9710run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009711 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9712 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009713 0 \
9714 -s "Protocol is TLSv1.3" \
9715 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9716 -s "received signature algorithm: 0x603" \
9717 -s "got named group: secp256r1(0017)" \
9718 -s "Verifying peer X.509 certificate... ok" \
9719 -c "Protocol is TLSv1.3" \
9720 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9721 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9722 -c "NamedGroup: secp256r1 ( 17 )" \
9723 -c "Verifying peer X.509 certificate... ok" \
9724 -C "received HelloRetryRequest message"
9725
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009726requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009727requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009728requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009729requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009730requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9731requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009732requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009733requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009734requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009735requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009736requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9737requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9738run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009739 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9740 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009741 0 \
9742 -s "Protocol is TLSv1.3" \
9743 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9744 -s "received signature algorithm: 0x804" \
9745 -s "got named group: secp256r1(0017)" \
9746 -s "Verifying peer X.509 certificate... ok" \
9747 -c "Protocol is TLSv1.3" \
9748 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9749 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9750 -c "NamedGroup: secp256r1 ( 17 )" \
9751 -c "Verifying peer X.509 certificate... ok" \
9752 -C "received HelloRetryRequest message"
9753
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009754requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009755requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009756requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009757requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009758requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009759requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009760requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009761requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009762requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009763requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9764run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009765 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9766 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009767 0 \
9768 -s "Protocol is TLSv1.3" \
9769 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9770 -s "received signature algorithm: 0x403" \
9771 -s "got named group: secp384r1(0018)" \
9772 -s "Verifying peer X.509 certificate... ok" \
9773 -c "Protocol is TLSv1.3" \
9774 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9775 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9776 -c "NamedGroup: secp384r1 ( 18 )" \
9777 -c "Verifying peer X.509 certificate... ok" \
9778 -C "received HelloRetryRequest message"
9779
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009780requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009781requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009782requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009783requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009784requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009785requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009786requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009787requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009788requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009789requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9790run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009791 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9792 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009793 0 \
9794 -s "Protocol is TLSv1.3" \
9795 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9796 -s "received signature algorithm: 0x503" \
9797 -s "got named group: secp384r1(0018)" \
9798 -s "Verifying peer X.509 certificate... ok" \
9799 -c "Protocol is TLSv1.3" \
9800 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9801 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9802 -c "NamedGroup: secp384r1 ( 18 )" \
9803 -c "Verifying peer X.509 certificate... ok" \
9804 -C "received HelloRetryRequest message"
9805
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009806requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009807requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009808requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009809requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009810requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009811requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009812requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009814requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009815requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9816run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009817 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9818 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009819 0 \
9820 -s "Protocol is TLSv1.3" \
9821 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9822 -s "received signature algorithm: 0x603" \
9823 -s "got named group: secp384r1(0018)" \
9824 -s "Verifying peer X.509 certificate... ok" \
9825 -c "Protocol is TLSv1.3" \
9826 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9827 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9828 -c "NamedGroup: secp384r1 ( 18 )" \
9829 -c "Verifying peer X.509 certificate... ok" \
9830 -C "received HelloRetryRequest message"
9831
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009832requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009833requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009834requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009835requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009836requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9837requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009838requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009839requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009841requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009842requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9843requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9844run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009845 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9846 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009847 0 \
9848 -s "Protocol is TLSv1.3" \
9849 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9850 -s "received signature algorithm: 0x804" \
9851 -s "got named group: secp384r1(0018)" \
9852 -s "Verifying peer X.509 certificate... ok" \
9853 -c "Protocol is TLSv1.3" \
9854 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9855 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9856 -c "NamedGroup: secp384r1 ( 18 )" \
9857 -c "Verifying peer X.509 certificate... ok" \
9858 -C "received HelloRetryRequest message"
9859
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009860requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009861requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009862requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009863requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009864requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009865requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009866requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009867requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009868requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9870run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009871 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9872 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009873 0 \
9874 -s "Protocol is TLSv1.3" \
9875 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9876 -s "received signature algorithm: 0x403" \
9877 -s "got named group: secp521r1(0019)" \
9878 -s "Verifying peer X.509 certificate... ok" \
9879 -c "Protocol is TLSv1.3" \
9880 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9881 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9882 -c "NamedGroup: secp521r1 ( 19 )" \
9883 -c "Verifying peer X.509 certificate... ok" \
9884 -C "received HelloRetryRequest message"
9885
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009886requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009887requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009889requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009890requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009891requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009892requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009893requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009894requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009895requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9896run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009897 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9898 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009899 0 \
9900 -s "Protocol is TLSv1.3" \
9901 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9902 -s "received signature algorithm: 0x503" \
9903 -s "got named group: secp521r1(0019)" \
9904 -s "Verifying peer X.509 certificate... ok" \
9905 -c "Protocol is TLSv1.3" \
9906 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9907 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9908 -c "NamedGroup: secp521r1 ( 19 )" \
9909 -c "Verifying peer X.509 certificate... ok" \
9910 -C "received HelloRetryRequest message"
9911
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009912requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009913requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009914requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009915requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009916requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009917requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009918requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009919requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009920requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009921requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9922run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009923 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9924 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009925 0 \
9926 -s "Protocol is TLSv1.3" \
9927 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9928 -s "received signature algorithm: 0x603" \
9929 -s "got named group: secp521r1(0019)" \
9930 -s "Verifying peer X.509 certificate... ok" \
9931 -c "Protocol is TLSv1.3" \
9932 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9933 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9934 -c "NamedGroup: secp521r1 ( 19 )" \
9935 -c "Verifying peer X.509 certificate... ok" \
9936 -C "received HelloRetryRequest message"
9937
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009938requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009939requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009941requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009942requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9943requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009944requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009947requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9949requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9950run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009951 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9952 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009953 0 \
9954 -s "Protocol is TLSv1.3" \
9955 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9956 -s "received signature algorithm: 0x804" \
9957 -s "got named group: secp521r1(0019)" \
9958 -s "Verifying peer X.509 certificate... ok" \
9959 -c "Protocol is TLSv1.3" \
9960 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9961 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9962 -c "NamedGroup: secp521r1 ( 19 )" \
9963 -c "Verifying peer X.509 certificate... ok" \
9964 -C "received HelloRetryRequest message"
9965
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009966requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009967requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009968requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009969requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009970requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009971requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009972requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009973requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009974requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9976run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009977 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9978 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009979 0 \
9980 -s "Protocol is TLSv1.3" \
9981 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9982 -s "received signature algorithm: 0x403" \
9983 -s "got named group: x25519(001d)" \
9984 -s "Verifying peer X.509 certificate... ok" \
9985 -c "Protocol is TLSv1.3" \
9986 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9987 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9988 -c "NamedGroup: x25519 ( 1d )" \
9989 -c "Verifying peer X.509 certificate... ok" \
9990 -C "received HelloRetryRequest message"
9991
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009992requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009993requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009994requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +02009995requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +00009996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009997requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009998requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009999requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010000requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010001requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10002run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010003 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10004 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010005 0 \
10006 -s "Protocol is TLSv1.3" \
10007 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10008 -s "received signature algorithm: 0x503" \
10009 -s "got named group: x25519(001d)" \
10010 -s "Verifying peer X.509 certificate... ok" \
10011 -c "Protocol is TLSv1.3" \
10012 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10013 -c "Certificate Verify: Signature algorithm ( 0503 )" \
10014 -c "NamedGroup: x25519 ( 1d )" \
10015 -c "Verifying peer X.509 certificate... ok" \
10016 -C "received HelloRetryRequest message"
10017
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010018requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010019requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010021requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010022requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010023requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010024requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010026requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10028run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010029 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10030 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010031 0 \
10032 -s "Protocol is TLSv1.3" \
10033 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10034 -s "received signature algorithm: 0x603" \
10035 -s "got named group: x25519(001d)" \
10036 -s "Verifying peer X.509 certificate... ok" \
10037 -c "Protocol is TLSv1.3" \
10038 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10039 -c "Certificate Verify: Signature algorithm ( 0603 )" \
10040 -c "NamedGroup: x25519 ( 1d )" \
10041 -c "Verifying peer X.509 certificate... ok" \
10042 -C "received HelloRetryRequest message"
10043
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010044requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010045requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010046requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010047requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010048requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10049requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +000010050requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010051requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010052requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010053requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010054requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10055requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10056run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010057 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10058 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010059 0 \
10060 -s "Protocol is TLSv1.3" \
10061 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10062 -s "received signature algorithm: 0x804" \
10063 -s "got named group: x25519(001d)" \
10064 -s "Verifying peer X.509 certificate... ok" \
10065 -c "Protocol is TLSv1.3" \
10066 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10067 -c "Certificate Verify: Signature algorithm ( 0804 )" \
10068 -c "NamedGroup: x25519 ( 1d )" \
10069 -c "Verifying peer X.509 certificate... ok" \
10070 -C "received HelloRetryRequest message"
10071
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010072requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010073requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010074requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010075requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010076requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010077requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010078requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010079requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010080requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10082run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010083 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10084 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010085 0 \
10086 -s "Protocol is TLSv1.3" \
10087 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10088 -s "received signature algorithm: 0x403" \
10089 -s "got named group: x448(001e)" \
10090 -s "Verifying peer X.509 certificate... ok" \
10091 -c "Protocol is TLSv1.3" \
10092 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10093 -c "Certificate Verify: Signature algorithm ( 0403 )" \
10094 -c "NamedGroup: x448 ( 1e )" \
10095 -c "Verifying peer X.509 certificate... ok" \
10096 -C "received HelloRetryRequest message"
10097
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010098requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010099requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010100requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010101requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010103requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010104requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010105requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010106requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010107requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10108run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010109 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10110 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010111 0 \
10112 -s "Protocol is TLSv1.3" \
10113 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10114 -s "received signature algorithm: 0x503" \
10115 -s "got named group: x448(001e)" \
10116 -s "Verifying peer X.509 certificate... ok" \
10117 -c "Protocol is TLSv1.3" \
10118 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10119 -c "Certificate Verify: Signature algorithm ( 0503 )" \
10120 -c "NamedGroup: x448 ( 1e )" \
10121 -c "Verifying peer X.509 certificate... ok" \
10122 -C "received HelloRetryRequest message"
10123
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010124requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010125requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010126requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010127requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010128requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010129requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010130requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010131requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010132requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010133requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10134run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010135 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10136 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010137 0 \
10138 -s "Protocol is TLSv1.3" \
10139 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10140 -s "received signature algorithm: 0x603" \
10141 -s "got named group: x448(001e)" \
10142 -s "Verifying peer X.509 certificate... ok" \
10143 -c "Protocol is TLSv1.3" \
10144 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10145 -c "Certificate Verify: Signature algorithm ( 0603 )" \
10146 -c "NamedGroup: x448 ( 1e )" \
10147 -c "Verifying peer X.509 certificate... ok" \
10148 -C "received HelloRetryRequest message"
10149
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010150requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010151requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010152requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010153requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010154requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10155requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +000010156requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010157requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010159requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000010160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10161requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10162run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010163 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10164 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010165 0 \
10166 -s "Protocol is TLSv1.3" \
10167 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
10168 -s "received signature algorithm: 0x804" \
10169 -s "got named group: x448(001e)" \
10170 -s "Verifying peer X.509 certificate... ok" \
10171 -c "Protocol is TLSv1.3" \
10172 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
10173 -c "Certificate Verify: Signature algorithm ( 0804 )" \
10174 -c "NamedGroup: x448 ( 1e )" \
10175 -c "Verifying peer X.509 certificate... ok" \
10176 -C "received HelloRetryRequest message"
10177
XiaokangQian9b938b72022-06-10 03:10:59 +000010178requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian83f81882022-03-17 06:26:36 +000010179requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010180requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010181requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10183requires_openssl_tls1_3
10184run_test "TLS 1.3 O->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010185 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10186 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010187 0 \
10188 -s "Protocol is TLSv1.3" \
10189 -s "got named group: secp384r1(0018)" \
10190 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010191 -s "HRR selected_group: secp384r1"
10192
10193requires_config_enabled MBEDTLS_SSL_SRV_C
10194requires_config_enabled MBEDTLS_DEBUG_C
10195requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010196requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10198requires_openssl_tls1_3
10199run_test "TLS 1.3 O->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010200 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10201 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010202 0 \
10203 -s "Protocol is TLSv1.3" \
10204 -s "got named group: secp521r1(0019)" \
10205 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010206 -s "HRR selected_group: secp521r1"
10207
10208requires_config_enabled MBEDTLS_SSL_SRV_C
10209requires_config_enabled MBEDTLS_DEBUG_C
10210requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010211requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010212requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10213requires_openssl_tls1_3
10214run_test "TLS 1.3 O->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010215 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10216 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010217 0 \
10218 -s "Protocol is TLSv1.3" \
10219 -s "got named group: x25519(001d)" \
10220 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010221 -s "HRR selected_group: x25519"
10222
10223requires_config_enabled MBEDTLS_SSL_SRV_C
10224requires_config_enabled MBEDTLS_DEBUG_C
10225requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010226requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010227requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10228requires_openssl_tls1_3
10229run_test "TLS 1.3 O->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010230 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10231 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010232 0 \
10233 -s "Protocol is TLSv1.3" \
10234 -s "got named group: x448(001e)" \
10235 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010236 -s "HRR selected_group: x448"
10237
10238requires_config_enabled MBEDTLS_SSL_SRV_C
10239requires_config_enabled MBEDTLS_DEBUG_C
10240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010241requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010242requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10243requires_openssl_tls1_3
10244run_test "TLS 1.3 O->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010245 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10246 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010247 0 \
10248 -s "Protocol is TLSv1.3" \
10249 -s "got named group: secp256r1(0017)" \
10250 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010251 -s "HRR selected_group: secp256r1"
10252
10253requires_config_enabled MBEDTLS_SSL_SRV_C
10254requires_config_enabled MBEDTLS_DEBUG_C
10255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010256requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10258requires_openssl_tls1_3
10259run_test "TLS 1.3 O->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010260 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10261 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010262 0 \
10263 -s "Protocol is TLSv1.3" \
10264 -s "got named group: secp521r1(0019)" \
10265 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010266 -s "HRR selected_group: secp521r1"
10267
10268requires_config_enabled MBEDTLS_SSL_SRV_C
10269requires_config_enabled MBEDTLS_DEBUG_C
10270requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010271requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010272requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10273requires_openssl_tls1_3
10274run_test "TLS 1.3 O->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010275 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10276 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010277 0 \
10278 -s "Protocol is TLSv1.3" \
10279 -s "got named group: x25519(001d)" \
10280 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010281 -s "HRR selected_group: x25519"
10282
10283requires_config_enabled MBEDTLS_SSL_SRV_C
10284requires_config_enabled MBEDTLS_DEBUG_C
10285requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010286requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010287requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10288requires_openssl_tls1_3
10289run_test "TLS 1.3 O->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010290 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10291 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010292 0 \
10293 -s "Protocol is TLSv1.3" \
10294 -s "got named group: x448(001e)" \
10295 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010296 -s "HRR selected_group: x448"
10297
10298requires_config_enabled MBEDTLS_SSL_SRV_C
10299requires_config_enabled MBEDTLS_DEBUG_C
10300requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010301requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10303requires_openssl_tls1_3
10304run_test "TLS 1.3 O->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010305 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10306 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010307 0 \
10308 -s "Protocol is TLSv1.3" \
10309 -s "got named group: secp256r1(0017)" \
10310 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010311 -s "HRR selected_group: secp256r1"
10312
10313requires_config_enabled MBEDTLS_SSL_SRV_C
10314requires_config_enabled MBEDTLS_DEBUG_C
10315requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010316requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010317requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10318requires_openssl_tls1_3
10319run_test "TLS 1.3 O->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010320 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10321 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010322 0 \
10323 -s "Protocol is TLSv1.3" \
10324 -s "got named group: secp384r1(0018)" \
10325 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010326 -s "HRR selected_group: secp384r1"
10327
10328requires_config_enabled MBEDTLS_SSL_SRV_C
10329requires_config_enabled MBEDTLS_DEBUG_C
10330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010331requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010332requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10333requires_openssl_tls1_3
10334run_test "TLS 1.3 O->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010335 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10336 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010337 0 \
10338 -s "Protocol is TLSv1.3" \
10339 -s "got named group: x25519(001d)" \
10340 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010341 -s "HRR selected_group: x25519"
10342
10343requires_config_enabled MBEDTLS_SSL_SRV_C
10344requires_config_enabled MBEDTLS_DEBUG_C
10345requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010346requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010347requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10348requires_openssl_tls1_3
10349run_test "TLS 1.3 O->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010350 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10351 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010352 0 \
10353 -s "Protocol is TLSv1.3" \
10354 -s "got named group: x448(001e)" \
10355 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010356 -s "HRR selected_group: x448"
10357
10358requires_config_enabled MBEDTLS_SSL_SRV_C
10359requires_config_enabled MBEDTLS_DEBUG_C
10360requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010361requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010362requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10363requires_openssl_tls1_3
10364run_test "TLS 1.3 O->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010365 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10366 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010367 0 \
10368 -s "Protocol is TLSv1.3" \
10369 -s "got named group: secp256r1(0017)" \
10370 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010371 -s "HRR selected_group: secp256r1"
10372
10373requires_config_enabled MBEDTLS_SSL_SRV_C
10374requires_config_enabled MBEDTLS_DEBUG_C
10375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010376requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010377requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10378requires_openssl_tls1_3
10379run_test "TLS 1.3 O->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010380 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10381 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010382 0 \
10383 -s "Protocol is TLSv1.3" \
10384 -s "got named group: secp384r1(0018)" \
10385 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010386 -s "HRR selected_group: secp384r1"
10387
10388requires_config_enabled MBEDTLS_SSL_SRV_C
10389requires_config_enabled MBEDTLS_DEBUG_C
10390requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010391requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10393requires_openssl_tls1_3
10394run_test "TLS 1.3 O->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010395 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10396 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010397 0 \
10398 -s "Protocol is TLSv1.3" \
10399 -s "got named group: secp521r1(0019)" \
10400 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010401 -s "HRR selected_group: secp521r1"
10402
10403requires_config_enabled MBEDTLS_SSL_SRV_C
10404requires_config_enabled MBEDTLS_DEBUG_C
10405requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010406requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010407requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10408requires_openssl_tls1_3
10409run_test "TLS 1.3 O->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010410 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10411 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010412 0 \
10413 -s "Protocol is TLSv1.3" \
10414 -s "got named group: x448(001e)" \
10415 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010416 -s "HRR selected_group: x448"
10417
10418requires_config_enabled MBEDTLS_SSL_SRV_C
10419requires_config_enabled MBEDTLS_DEBUG_C
10420requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010421requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010422requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10423requires_openssl_tls1_3
10424run_test "TLS 1.3 O->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010425 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10426 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010427 0 \
10428 -s "Protocol is TLSv1.3" \
10429 -s "got named group: secp256r1(0017)" \
10430 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010431 -s "HRR selected_group: secp256r1"
10432
10433requires_config_enabled MBEDTLS_SSL_SRV_C
10434requires_config_enabled MBEDTLS_DEBUG_C
10435requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010436requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10438requires_openssl_tls1_3
10439run_test "TLS 1.3 O->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010440 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10441 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010442 0 \
10443 -s "Protocol is TLSv1.3" \
10444 -s "got named group: secp384r1(0018)" \
10445 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010446 -s "HRR selected_group: secp384r1"
10447
10448requires_config_enabled MBEDTLS_SSL_SRV_C
10449requires_config_enabled MBEDTLS_DEBUG_C
10450requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010451requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010452requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10453requires_openssl_tls1_3
10454run_test "TLS 1.3 O->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010455 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10456 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010457 0 \
10458 -s "Protocol is TLSv1.3" \
10459 -s "got named group: secp521r1(0019)" \
10460 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010461 -s "HRR selected_group: secp521r1"
10462
10463requires_config_enabled MBEDTLS_SSL_SRV_C
10464requires_config_enabled MBEDTLS_DEBUG_C
10465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010466requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10468requires_openssl_tls1_3
10469run_test "TLS 1.3 O->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010470 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10471 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010472 0 \
10473 -s "Protocol is TLSv1.3" \
10474 -s "got named group: x25519(001d)" \
10475 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010476 -s "HRR selected_group: x25519"
10477
10478requires_config_enabled MBEDTLS_SSL_SRV_C
10479requires_config_enabled MBEDTLS_DEBUG_C
10480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010481requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10483requires_gnutls_tls1_3
10484requires_gnutls_next_no_ticket
10485requires_gnutls_next_disable_tls13_compat
10486run_test "TLS 1.3 G->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010487 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10488 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010489 0 \
10490 -s "Protocol is TLSv1.3" \
10491 -s "got named group: secp384r1(0018)" \
10492 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010493 -s "HRR selected_group: secp384r1"
10494
10495requires_config_enabled MBEDTLS_SSL_SRV_C
10496requires_config_enabled MBEDTLS_DEBUG_C
10497requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010498requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010499requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10500requires_gnutls_tls1_3
10501requires_gnutls_next_no_ticket
10502requires_gnutls_next_disable_tls13_compat
10503run_test "TLS 1.3 G->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010504 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10505 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010506 0 \
10507 -s "Protocol is TLSv1.3" \
10508 -s "got named group: secp521r1(0019)" \
10509 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010510 -s "HRR selected_group: secp521r1"
10511
10512requires_config_enabled MBEDTLS_SSL_SRV_C
10513requires_config_enabled MBEDTLS_DEBUG_C
10514requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010515requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010516requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10517requires_gnutls_tls1_3
10518requires_gnutls_next_no_ticket
10519requires_gnutls_next_disable_tls13_compat
10520run_test "TLS 1.3 G->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010521 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10522 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010523 0 \
10524 -s "Protocol is TLSv1.3" \
10525 -s "got named group: x25519(001d)" \
10526 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010527 -s "HRR selected_group: x25519"
10528
10529requires_config_enabled MBEDTLS_SSL_SRV_C
10530requires_config_enabled MBEDTLS_DEBUG_C
10531requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010532requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010533requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10534requires_gnutls_tls1_3
10535requires_gnutls_next_no_ticket
10536requires_gnutls_next_disable_tls13_compat
10537run_test "TLS 1.3 G->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010538 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10539 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010540 0 \
10541 -s "Protocol is TLSv1.3" \
10542 -s "got named group: x448(001e)" \
10543 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010544 -s "HRR selected_group: x448"
10545
10546requires_config_enabled MBEDTLS_SSL_SRV_C
10547requires_config_enabled MBEDTLS_DEBUG_C
10548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010549requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10551requires_gnutls_tls1_3
10552requires_gnutls_next_no_ticket
10553requires_gnutls_next_disable_tls13_compat
10554run_test "TLS 1.3 G->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010555 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10556 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010557 0 \
10558 -s "Protocol is TLSv1.3" \
10559 -s "got named group: secp256r1(0017)" \
10560 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010561 -s "HRR selected_group: secp256r1"
10562
10563requires_config_enabled MBEDTLS_SSL_SRV_C
10564requires_config_enabled MBEDTLS_DEBUG_C
10565requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010566requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010567requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10568requires_gnutls_tls1_3
10569requires_gnutls_next_no_ticket
10570requires_gnutls_next_disable_tls13_compat
10571run_test "TLS 1.3 G->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010572 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10573 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010574 0 \
10575 -s "Protocol is TLSv1.3" \
10576 -s "got named group: secp521r1(0019)" \
10577 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010578 -s "HRR selected_group: secp521r1"
10579
10580requires_config_enabled MBEDTLS_SSL_SRV_C
10581requires_config_enabled MBEDTLS_DEBUG_C
10582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010583requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10585requires_gnutls_tls1_3
10586requires_gnutls_next_no_ticket
10587requires_gnutls_next_disable_tls13_compat
10588run_test "TLS 1.3 G->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010589 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10590 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010591 0 \
10592 -s "Protocol is TLSv1.3" \
10593 -s "got named group: x25519(001d)" \
10594 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010595 -s "HRR selected_group: x25519"
10596
10597requires_config_enabled MBEDTLS_SSL_SRV_C
10598requires_config_enabled MBEDTLS_DEBUG_C
10599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010600requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10602requires_gnutls_tls1_3
10603requires_gnutls_next_no_ticket
10604requires_gnutls_next_disable_tls13_compat
10605run_test "TLS 1.3 G->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010606 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10607 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010608 0 \
10609 -s "Protocol is TLSv1.3" \
10610 -s "got named group: x448(001e)" \
10611 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010612 -s "HRR selected_group: x448"
10613
10614requires_config_enabled MBEDTLS_SSL_SRV_C
10615requires_config_enabled MBEDTLS_DEBUG_C
10616requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010617requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10619requires_gnutls_tls1_3
10620requires_gnutls_next_no_ticket
10621requires_gnutls_next_disable_tls13_compat
10622run_test "TLS 1.3 G->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010623 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10624 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010625 0 \
10626 -s "Protocol is TLSv1.3" \
10627 -s "got named group: secp256r1(0017)" \
10628 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010629 -s "HRR selected_group: secp256r1"
10630
10631requires_config_enabled MBEDTLS_SSL_SRV_C
10632requires_config_enabled MBEDTLS_DEBUG_C
10633requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010634requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010635requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10636requires_gnutls_tls1_3
10637requires_gnutls_next_no_ticket
10638requires_gnutls_next_disable_tls13_compat
10639run_test "TLS 1.3 G->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010640 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10641 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010642 0 \
10643 -s "Protocol is TLSv1.3" \
10644 -s "got named group: secp384r1(0018)" \
10645 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010646 -s "HRR selected_group: secp384r1"
10647
10648requires_config_enabled MBEDTLS_SSL_SRV_C
10649requires_config_enabled MBEDTLS_DEBUG_C
10650requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010651requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10653requires_gnutls_tls1_3
10654requires_gnutls_next_no_ticket
10655requires_gnutls_next_disable_tls13_compat
10656run_test "TLS 1.3 G->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010657 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10658 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010659 0 \
10660 -s "Protocol is TLSv1.3" \
10661 -s "got named group: x25519(001d)" \
10662 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010663 -s "HRR selected_group: x25519"
10664
10665requires_config_enabled MBEDTLS_SSL_SRV_C
10666requires_config_enabled MBEDTLS_DEBUG_C
10667requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010668requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10670requires_gnutls_tls1_3
10671requires_gnutls_next_no_ticket
10672requires_gnutls_next_disable_tls13_compat
10673run_test "TLS 1.3 G->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010674 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10675 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010676 0 \
10677 -s "Protocol is TLSv1.3" \
10678 -s "got named group: x448(001e)" \
10679 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010680 -s "HRR selected_group: x448"
10681
10682requires_config_enabled MBEDTLS_SSL_SRV_C
10683requires_config_enabled MBEDTLS_DEBUG_C
10684requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010685requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10687requires_gnutls_tls1_3
10688requires_gnutls_next_no_ticket
10689requires_gnutls_next_disable_tls13_compat
10690run_test "TLS 1.3 G->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010691 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10692 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010693 0 \
10694 -s "Protocol is TLSv1.3" \
10695 -s "got named group: secp256r1(0017)" \
10696 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010697 -s "HRR selected_group: secp256r1"
10698
10699requires_config_enabled MBEDTLS_SSL_SRV_C
10700requires_config_enabled MBEDTLS_DEBUG_C
10701requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010702requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10704requires_gnutls_tls1_3
10705requires_gnutls_next_no_ticket
10706requires_gnutls_next_disable_tls13_compat
10707run_test "TLS 1.3 G->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010708 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10709 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010710 0 \
10711 -s "Protocol is TLSv1.3" \
10712 -s "got named group: secp384r1(0018)" \
10713 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010714 -s "HRR selected_group: secp384r1"
10715
10716requires_config_enabled MBEDTLS_SSL_SRV_C
10717requires_config_enabled MBEDTLS_DEBUG_C
10718requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010719requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010720requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10721requires_gnutls_tls1_3
10722requires_gnutls_next_no_ticket
10723requires_gnutls_next_disable_tls13_compat
10724run_test "TLS 1.3 G->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010725 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10726 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010727 0 \
10728 -s "Protocol is TLSv1.3" \
10729 -s "got named group: secp521r1(0019)" \
10730 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010731 -s "HRR selected_group: secp521r1"
10732
10733requires_config_enabled MBEDTLS_SSL_SRV_C
10734requires_config_enabled MBEDTLS_DEBUG_C
10735requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010736requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10738requires_gnutls_tls1_3
10739requires_gnutls_next_no_ticket
10740requires_gnutls_next_disable_tls13_compat
10741run_test "TLS 1.3 G->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010742 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10743 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010744 0 \
10745 -s "Protocol is TLSv1.3" \
10746 -s "got named group: x448(001e)" \
10747 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010748 -s "HRR selected_group: x448"
10749
10750requires_config_enabled MBEDTLS_SSL_SRV_C
10751requires_config_enabled MBEDTLS_DEBUG_C
10752requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010753requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010754requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10755requires_gnutls_tls1_3
10756requires_gnutls_next_no_ticket
10757requires_gnutls_next_disable_tls13_compat
10758run_test "TLS 1.3 G->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010759 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10760 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010761 0 \
10762 -s "Protocol is TLSv1.3" \
10763 -s "got named group: secp256r1(0017)" \
10764 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010765 -s "HRR selected_group: secp256r1"
10766
10767requires_config_enabled MBEDTLS_SSL_SRV_C
10768requires_config_enabled MBEDTLS_DEBUG_C
10769requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010770requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10772requires_gnutls_tls1_3
10773requires_gnutls_next_no_ticket
10774requires_gnutls_next_disable_tls13_compat
10775run_test "TLS 1.3 G->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010776 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10777 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010778 0 \
10779 -s "Protocol is TLSv1.3" \
10780 -s "got named group: secp384r1(0018)" \
10781 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010782 -s "HRR selected_group: secp384r1"
10783
10784requires_config_enabled MBEDTLS_SSL_SRV_C
10785requires_config_enabled MBEDTLS_DEBUG_C
10786requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010787requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010788requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10789requires_gnutls_tls1_3
10790requires_gnutls_next_no_ticket
10791requires_gnutls_next_disable_tls13_compat
10792run_test "TLS 1.3 G->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010793 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10794 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010795 0 \
10796 -s "Protocol is TLSv1.3" \
10797 -s "got named group: secp521r1(0019)" \
10798 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010799 -s "HRR selected_group: secp521r1"
10800
10801requires_config_enabled MBEDTLS_SSL_SRV_C
10802requires_config_enabled MBEDTLS_DEBUG_C
10803requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010804requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian9b938b72022-06-10 03:10:59 +000010805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10806requires_gnutls_tls1_3
10807requires_gnutls_next_no_ticket
10808requires_gnutls_next_disable_tls13_compat
10809run_test "TLS 1.3 G->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010810 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10811 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010812 0 \
10813 -s "Protocol is TLSv1.3" \
10814 -s "got named group: x25519(001d)" \
10815 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010816 -s "HRR selected_group: x25519"
10817
10818requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010819requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010820requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010821requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010822requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian83f81882022-03-17 06:26:36 +000010823requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQiana1931442022-03-25 11:58:22 +000010824run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010825 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10826 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQiana1931442022-03-25 11:58:22 +000010827 0 \
10828 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010829 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010830 -c "NamedGroup: secp256r1 ( 17 )" \
10831 -c "NamedGroup: secp384r1 ( 18 )" \
10832 -c "Verifying peer X.509 certificate... ok" \
10833 -c "received HelloRetryRequest message" \
10834 -c "selected_group ( 24 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010835
XiaokangQian83f81882022-03-17 06:26:36 +000010836requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010837requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010838requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010839requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010840requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian83f81882022-03-17 06:26:36 +000010841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010842run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010843 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10844 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010845 0 \
10846 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010847 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010848 -c "NamedGroup: secp256r1 ( 17 )" \
10849 -c "NamedGroup: secp521r1 ( 19 )" \
10850 -c "Verifying peer X.509 certificate... ok" \
10851 -c "received HelloRetryRequest message" \
10852 -c "selected_group ( 25 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010853
XiaokangQian83f81882022-03-17 06:26:36 +000010854requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010855requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010856requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010857requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010858requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian83f81882022-03-17 06:26:36 +000010859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010860run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010861 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10862 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010863 0 \
10864 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010865 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010866 -c "NamedGroup: secp256r1 ( 17 )" \
10867 -c "NamedGroup: x25519 ( 1d )" \
10868 -c "Verifying peer X.509 certificate... ok" \
10869 -c "received HelloRetryRequest message" \
10870 -c "selected_group ( 29 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010871
XiaokangQian83f81882022-03-17 06:26:36 +000010872requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010873requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010874requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010876requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian83f81882022-03-17 06:26:36 +000010877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010878run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010879 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10880 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010881 0 \
10882 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010883 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010884 -c "NamedGroup: secp256r1 ( 17 )" \
10885 -c "NamedGroup: x448 ( 1e )" \
10886 -c "Verifying peer X.509 certificate... ok" \
10887 -c "received HelloRetryRequest message" \
10888 -c "selected_group ( 30 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010889
XiaokangQian2e17fb82022-03-28 03:30:05 +000010890requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010891requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010892requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010893requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010894requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010895requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10896run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010897 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10898 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010899 0 \
10900 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010901 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010902 -c "NamedGroup: secp384r1 ( 18 )" \
10903 -c "NamedGroup: secp256r1 ( 17 )" \
10904 -c "Verifying peer X.509 certificate... ok" \
10905 -c "received HelloRetryRequest message" \
10906 -c "selected_group ( 23 )"
10907
10908requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010909requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010910requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010911requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010912requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010913requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10914run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010915 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10916 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010917 0 \
10918 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010919 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010920 -c "NamedGroup: secp384r1 ( 18 )" \
10921 -c "NamedGroup: secp521r1 ( 19 )" \
10922 -c "Verifying peer X.509 certificate... ok" \
10923 -c "received HelloRetryRequest message" \
10924 -c "selected_group ( 25 )"
10925
10926requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010927requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010928requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010929requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010930requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010931requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10932run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010933 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10934 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010935 0 \
10936 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010937 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010938 -c "NamedGroup: secp384r1 ( 18 )" \
10939 -c "NamedGroup: x25519 ( 1d )" \
10940 -c "Verifying peer X.509 certificate... ok" \
10941 -c "received HelloRetryRequest message" \
10942 -c "selected_group ( 29 )"
10943
10944requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010945requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010946requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010948requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10950run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010951 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10952 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010953 0 \
10954 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010955 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010956 -c "NamedGroup: secp384r1 ( 18 )" \
10957 -c "NamedGroup: x448 ( 1e )" \
10958 -c "Verifying peer X.509 certificate... ok" \
10959 -c "received HelloRetryRequest message" \
10960 -c "selected_group ( 30 )"
10961
10962requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010963requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010964requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010965requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010966requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10968run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010969 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10970 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010971 0 \
10972 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010973 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010974 -c "NamedGroup: secp521r1 ( 19 )" \
10975 -c "NamedGroup: secp256r1 ( 17 )" \
10976 -c "Verifying peer X.509 certificate... ok" \
10977 -c "received HelloRetryRequest message" \
10978 -c "selected_group ( 23 )"
10979
10980requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010981requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010982requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010983requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020010984requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000010985requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10986run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010987 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10988 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010989 0 \
10990 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010991 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010992 -c "NamedGroup: secp521r1 ( 19 )" \
10993 -c "NamedGroup: secp384r1 ( 18 )" \
10994 -c "Verifying peer X.509 certificate... ok" \
10995 -c "received HelloRetryRequest message" \
10996 -c "selected_group ( 24 )"
10997
10998requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010999requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011000requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011001requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011002requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011003requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11004run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011005 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11006 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011007 0 \
11008 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011009 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011010 -c "NamedGroup: secp521r1 ( 19 )" \
11011 -c "NamedGroup: x25519 ( 1d )" \
11012 -c "Verifying peer X.509 certificate... ok" \
11013 -c "received HelloRetryRequest message" \
11014 -c "selected_group ( 29 )"
11015
11016requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011017requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011018requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011019requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011020requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11022run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011023 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11024 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011025 0 \
11026 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011027 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011028 -c "NamedGroup: secp521r1 ( 19 )" \
11029 -c "NamedGroup: x448 ( 1e )" \
11030 -c "Verifying peer X.509 certificate... ok" \
11031 -c "received HelloRetryRequest message" \
11032 -c "selected_group ( 30 )"
11033
11034requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011035requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011036requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011037requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011038requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011039requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11040run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011041 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11042 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011043 0 \
11044 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011045 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011046 -c "NamedGroup: x25519 ( 1d )" \
11047 -c "NamedGroup: secp256r1 ( 17 )" \
11048 -c "Verifying peer X.509 certificate... ok" \
11049 -c "received HelloRetryRequest message" \
11050 -c "selected_group ( 23 )"
11051
11052requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011053requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011054requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011055requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011056requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011057requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11058run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011059 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11060 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011061 0 \
11062 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011063 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011064 -c "NamedGroup: x25519 ( 1d )" \
11065 -c "NamedGroup: secp384r1 ( 18 )" \
11066 -c "Verifying peer X.509 certificate... ok" \
11067 -c "received HelloRetryRequest message" \
11068 -c "selected_group ( 24 )"
11069
11070requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011071requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011072requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011073requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011074requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011075requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11076run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011077 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11078 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011079 0 \
11080 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011081 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011082 -c "NamedGroup: x25519 ( 1d )" \
11083 -c "NamedGroup: secp521r1 ( 19 )" \
11084 -c "Verifying peer X.509 certificate... ok" \
11085 -c "received HelloRetryRequest message" \
11086 -c "selected_group ( 25 )"
11087
11088requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011089requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011090requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011091requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011092requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011093requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11094run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011095 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11096 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011097 0 \
11098 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011099 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011100 -c "NamedGroup: x25519 ( 1d )" \
11101 -c "NamedGroup: x448 ( 1e )" \
11102 -c "Verifying peer X.509 certificate... ok" \
11103 -c "received HelloRetryRequest message" \
11104 -c "selected_group ( 30 )"
11105
11106requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011107requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011108requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011109requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011110requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011111requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11112run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011113 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11114 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011115 0 \
11116 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011117 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011118 -c "NamedGroup: x448 ( 1e )" \
11119 -c "NamedGroup: secp256r1 ( 17 )" \
11120 -c "Verifying peer X.509 certificate... ok" \
11121 -c "received HelloRetryRequest message" \
11122 -c "selected_group ( 23 )"
11123
11124requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011125requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011126requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011127requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011128requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011129requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11130run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011131 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11132 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011133 0 \
11134 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011135 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011136 -c "NamedGroup: x448 ( 1e )" \
11137 -c "NamedGroup: secp384r1 ( 18 )" \
11138 -c "Verifying peer X.509 certificate... ok" \
11139 -c "received HelloRetryRequest message" \
11140 -c "selected_group ( 24 )"
11141
11142requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011143requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011144requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011145requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011146requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11148run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011149 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11150 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011151 0 \
11152 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011153 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011154 -c "NamedGroup: x448 ( 1e )" \
11155 -c "NamedGroup: secp521r1 ( 19 )" \
11156 -c "Verifying peer X.509 certificate... ok" \
11157 -c "received HelloRetryRequest message" \
11158 -c "selected_group ( 25 )"
11159
11160requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000011161requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011162requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011163requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011164requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11166run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011167 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
11168 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011169 0 \
11170 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011171 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011172 -c "NamedGroup: x448 ( 1e )" \
11173 -c "NamedGroup: x25519 ( 1d )" \
11174 -c "Verifying peer X.509 certificate... ok" \
11175 -c "received HelloRetryRequest message" \
11176 -c "selected_group ( 29 )"
11177
11178requires_gnutls_tls1_3
11179requires_gnutls_next_no_ticket
11180requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011181requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011182requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011183requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011184requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011185requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11186run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011187 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011188 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011189 0 \
11190 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011191 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011192 -c "NamedGroup: secp256r1 ( 17 )" \
11193 -c "NamedGroup: secp384r1 ( 18 )" \
11194 -c "Verifying peer X.509 certificate... ok" \
11195 -c "received HelloRetryRequest message" \
11196 -c "selected_group ( 24 )"
11197
11198requires_gnutls_tls1_3
11199requires_gnutls_next_no_ticket
11200requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011201requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011202requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011204requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011205requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11206run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011207 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011208 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011209 0 \
11210 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011211 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011212 -c "NamedGroup: secp256r1 ( 17 )" \
11213 -c "NamedGroup: secp521r1 ( 19 )" \
11214 -c "Verifying peer X.509 certificate... ok" \
11215 -c "received HelloRetryRequest message" \
11216 -c "selected_group ( 25 )"
11217
11218requires_gnutls_tls1_3
11219requires_gnutls_next_no_ticket
11220requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011221requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011222requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011223requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011224requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11226run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011227 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011228 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011229 0 \
11230 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011231 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011232 -c "NamedGroup: secp256r1 ( 17 )" \
11233 -c "NamedGroup: x25519 ( 1d )" \
11234 -c "Verifying peer X.509 certificate... ok" \
11235 -c "received HelloRetryRequest message" \
11236 -c "selected_group ( 29 )"
11237
XiaokangQian83f81882022-03-17 06:26:36 +000011238requires_gnutls_tls1_3
11239requires_gnutls_next_no_ticket
11240requires_gnutls_next_disable_tls13_compat
XiaokangQian83f81882022-03-17 06:26:36 +000011241requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011242requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000011243requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011244requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian83f81882022-03-17 06:26:36 +000011245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000011246run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011247 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011248 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000011249 0 \
11250 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011251 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000011252 -c "NamedGroup: secp256r1 ( 17 )" \
11253 -c "NamedGroup: x448 ( 1e )" \
11254 -c "Verifying peer X.509 certificate... ok" \
11255 -c "received HelloRetryRequest message" \
11256 -c "selected_group ( 30 )"
XiaokangQian2e17fb82022-03-28 03:30:05 +000011257
11258requires_gnutls_tls1_3
11259requires_gnutls_next_no_ticket
11260requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011261requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011262requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011263requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011264requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11266run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011267 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011268 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011269 0 \
11270 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011271 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011272 -c "NamedGroup: secp384r1 ( 18 )" \
11273 -c "NamedGroup: secp256r1 ( 17 )" \
11274 -c "Verifying peer X.509 certificate... ok" \
11275 -c "received HelloRetryRequest message" \
11276 -c "selected_group ( 23 )"
11277
11278requires_gnutls_tls1_3
11279requires_gnutls_next_no_ticket
11280requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011281requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011282requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011283requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011284requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11286run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011287 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011288 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011289 0 \
11290 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011291 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011292 -c "NamedGroup: secp384r1 ( 18 )" \
11293 -c "NamedGroup: secp521r1 ( 19 )" \
11294 -c "Verifying peer X.509 certificate... ok" \
11295 -c "received HelloRetryRequest message" \
11296 -c "selected_group ( 25 )"
11297
11298requires_gnutls_tls1_3
11299requires_gnutls_next_no_ticket
11300requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011301requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011302requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011303requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011304requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011305requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11306run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011307 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011308 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011309 0 \
11310 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011311 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011312 -c "NamedGroup: secp384r1 ( 18 )" \
11313 -c "NamedGroup: x25519 ( 1d )" \
11314 -c "Verifying peer X.509 certificate... ok" \
11315 -c "received HelloRetryRequest message" \
11316 -c "selected_group ( 29 )"
11317
11318requires_gnutls_tls1_3
11319requires_gnutls_next_no_ticket
11320requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011321requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011322requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011324requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11326run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011327 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011328 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011329 0 \
11330 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011331 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011332 -c "NamedGroup: secp384r1 ( 18 )" \
11333 -c "NamedGroup: x448 ( 1e )" \
11334 -c "Verifying peer X.509 certificate... ok" \
11335 -c "received HelloRetryRequest message" \
11336 -c "selected_group ( 30 )"
11337
11338requires_gnutls_tls1_3
11339requires_gnutls_next_no_ticket
11340requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011341requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011342requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011343requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011344requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011345requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11346run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011347 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011348 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011349 0 \
11350 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011351 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011352 -c "NamedGroup: secp521r1 ( 19 )" \
11353 -c "NamedGroup: secp256r1 ( 17 )" \
11354 -c "Verifying peer X.509 certificate... ok" \
11355 -c "received HelloRetryRequest message" \
11356 -c "selected_group ( 23 )"
11357
11358requires_gnutls_tls1_3
11359requires_gnutls_next_no_ticket
11360requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011361requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011362requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011363requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011364requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011365requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11366run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011367 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011368 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011369 0 \
11370 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011371 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011372 -c "NamedGroup: secp521r1 ( 19 )" \
11373 -c "NamedGroup: secp384r1 ( 18 )" \
11374 -c "Verifying peer X.509 certificate... ok" \
11375 -c "received HelloRetryRequest message" \
11376 -c "selected_group ( 24 )"
11377
11378requires_gnutls_tls1_3
11379requires_gnutls_next_no_ticket
11380requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011381requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011382requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011383requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011384requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011385requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11386run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011387 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011388 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011389 0 \
11390 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011391 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011392 -c "NamedGroup: secp521r1 ( 19 )" \
11393 -c "NamedGroup: x25519 ( 1d )" \
11394 -c "Verifying peer X.509 certificate... ok" \
11395 -c "received HelloRetryRequest message" \
11396 -c "selected_group ( 29 )"
11397
11398requires_gnutls_tls1_3
11399requires_gnutls_next_no_ticket
11400requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011401requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011402requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011403requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011404requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011405requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11406run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011407 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011408 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011409 0 \
11410 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011411 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011412 -c "NamedGroup: secp521r1 ( 19 )" \
11413 -c "NamedGroup: x448 ( 1e )" \
11414 -c "Verifying peer X.509 certificate... ok" \
11415 -c "received HelloRetryRequest message" \
11416 -c "selected_group ( 30 )"
11417
11418requires_gnutls_tls1_3
11419requires_gnutls_next_no_ticket
11420requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011421requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011422requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011423requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011424requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011425requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11426run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011427 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011428 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011429 0 \
11430 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011431 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011432 -c "NamedGroup: x25519 ( 1d )" \
11433 -c "NamedGroup: secp256r1 ( 17 )" \
11434 -c "Verifying peer X.509 certificate... ok" \
11435 -c "received HelloRetryRequest message" \
11436 -c "selected_group ( 23 )"
11437
11438requires_gnutls_tls1_3
11439requires_gnutls_next_no_ticket
11440requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011441requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011443requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011444requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11446run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011447 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011448 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011449 0 \
11450 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011451 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011452 -c "NamedGroup: x25519 ( 1d )" \
11453 -c "NamedGroup: secp384r1 ( 18 )" \
11454 -c "Verifying peer X.509 certificate... ok" \
11455 -c "received HelloRetryRequest message" \
11456 -c "selected_group ( 24 )"
11457
11458requires_gnutls_tls1_3
11459requires_gnutls_next_no_ticket
11460requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011461requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011462requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011463requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011464requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011465requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11466run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011467 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011468 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011469 0 \
11470 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011471 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011472 -c "NamedGroup: x25519 ( 1d )" \
11473 -c "NamedGroup: secp521r1 ( 19 )" \
11474 -c "Verifying peer X.509 certificate... ok" \
11475 -c "received HelloRetryRequest message" \
11476 -c "selected_group ( 25 )"
11477
11478requires_gnutls_tls1_3
11479requires_gnutls_next_no_ticket
11480requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011481requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011482requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011483requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011484requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011485requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11486run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011487 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011488 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011489 0 \
11490 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011491 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011492 -c "NamedGroup: x25519 ( 1d )" \
11493 -c "NamedGroup: x448 ( 1e )" \
11494 -c "Verifying peer X.509 certificate... ok" \
11495 -c "received HelloRetryRequest message" \
11496 -c "selected_group ( 30 )"
11497
11498requires_gnutls_tls1_3
11499requires_gnutls_next_no_ticket
11500requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011501requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011502requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011503requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011504requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011505requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11506run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011507 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011508 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011509 0 \
11510 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011511 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011512 -c "NamedGroup: x448 ( 1e )" \
11513 -c "NamedGroup: secp256r1 ( 17 )" \
11514 -c "Verifying peer X.509 certificate... ok" \
11515 -c "received HelloRetryRequest message" \
11516 -c "selected_group ( 23 )"
11517
11518requires_gnutls_tls1_3
11519requires_gnutls_next_no_ticket
11520requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011521requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011522requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011523requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011524requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011525requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11526run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011527 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011528 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011529 0 \
11530 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011531 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011532 -c "NamedGroup: x448 ( 1e )" \
11533 -c "NamedGroup: secp384r1 ( 18 )" \
11534 -c "Verifying peer X.509 certificate... ok" \
11535 -c "received HelloRetryRequest message" \
11536 -c "selected_group ( 24 )"
11537
11538requires_gnutls_tls1_3
11539requires_gnutls_next_no_ticket
11540requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011541requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011542requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011543requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011544requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011545requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11546run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011547 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011548 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011549 0 \
11550 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011551 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011552 -c "NamedGroup: x448 ( 1e )" \
11553 -c "NamedGroup: secp521r1 ( 19 )" \
11554 -c "Verifying peer X.509 certificate... ok" \
11555 -c "received HelloRetryRequest message" \
11556 -c "selected_group ( 25 )"
11557
11558requires_gnutls_tls1_3
11559requires_gnutls_next_no_ticket
11560requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011561requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011564requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQian2e17fb82022-03-28 03:30:05 +000011565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11566run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011567 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011568 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011569 0 \
11570 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011571 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011572 -c "NamedGroup: x448 ( 1e )" \
11573 -c "NamedGroup: x25519 ( 1d )" \
11574 -c "Verifying peer X.509 certificate... ok" \
11575 -c "received HelloRetryRequest message" \
11576 -c "selected_group ( 29 )"
XiaokangQianb1847a22022-06-08 07:49:31 +000011577
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011578requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011579requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011580requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011581requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011583requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011584requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011585requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011586requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011587requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11588run_test "TLS 1.3 m->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011589 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11590 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011591 0 \
11592 -s "Protocol is TLSv1.3" \
11593 -s "got named group: secp384r1(0018)" \
11594 -s "Verifying peer X.509 certificate... ok" \
11595 -c "Protocol is TLSv1.3" \
11596 -c "NamedGroup: secp256r1 ( 17 )" \
11597 -c "NamedGroup: secp384r1 ( 18 )" \
11598 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011599 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011600 -c "received HelloRetryRequest message" \
11601 -c "selected_group ( 24 )"
11602
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011603requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011604requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011605requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011606requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011607requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011608requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011609requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011610requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011611requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011612requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11613run_test "TLS 1.3 m->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011614 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11615 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011616 0 \
11617 -s "Protocol is TLSv1.3" \
11618 -s "got named group: secp521r1(0019)" \
11619 -s "Verifying peer X.509 certificate... ok" \
11620 -c "Protocol is TLSv1.3" \
11621 -c "NamedGroup: secp256r1 ( 17 )" \
11622 -c "NamedGroup: secp521r1 ( 19 )" \
11623 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011624 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011625 -c "received HelloRetryRequest message" \
11626 -c "selected_group ( 25 )"
11627
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011628requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011629requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011630requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011631requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011633requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011634requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011635requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011636requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11638run_test "TLS 1.3 m->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011639 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11640 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011641 0 \
11642 -s "Protocol is TLSv1.3" \
11643 -s "got named group: x25519(001d)" \
11644 -s "Verifying peer X.509 certificate... ok" \
11645 -c "Protocol is TLSv1.3" \
11646 -c "NamedGroup: secp256r1 ( 17 )" \
11647 -c "NamedGroup: x25519 ( 1d )" \
11648 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011649 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011650 -c "received HelloRetryRequest message" \
11651 -c "selected_group ( 29 )"
11652
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011653requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011654requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011655requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011656requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011658requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011659requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011660requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011661requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011662requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11663run_test "TLS 1.3 m->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011664 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11665 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011666 0 \
11667 -s "Protocol is TLSv1.3" \
11668 -s "got named group: x448(001e)" \
11669 -s "Verifying peer X.509 certificate... ok" \
11670 -c "Protocol is TLSv1.3" \
11671 -c "NamedGroup: secp256r1 ( 17 )" \
11672 -c "NamedGroup: x448 ( 1e )" \
11673 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011674 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011675 -c "received HelloRetryRequest message" \
11676 -c "selected_group ( 30 )"
11677
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011678requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011679requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011680requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011681requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011683requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011684requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011686requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11688run_test "TLS 1.3 m->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011689 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11690 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011691 0 \
11692 -s "Protocol is TLSv1.3" \
11693 -s "got named group: secp256r1(0017)" \
11694 -s "Verifying peer X.509 certificate... ok" \
11695 -c "Protocol is TLSv1.3" \
11696 -c "NamedGroup: secp384r1 ( 18 )" \
11697 -c "NamedGroup: secp256r1 ( 17 )" \
11698 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011699 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011700 -c "received HelloRetryRequest message" \
11701 -c "selected_group ( 23 )"
11702
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011703requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011704requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011705requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011706requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011708requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011709requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011711requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011712requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11713run_test "TLS 1.3 m->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011714 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11715 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011716 0 \
11717 -s "Protocol is TLSv1.3" \
11718 -s "got named group: secp521r1(0019)" \
11719 -s "Verifying peer X.509 certificate... ok" \
11720 -c "Protocol is TLSv1.3" \
11721 -c "NamedGroup: secp384r1 ( 18 )" \
11722 -c "NamedGroup: secp521r1 ( 19 )" \
11723 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011724 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011725 -c "received HelloRetryRequest message" \
11726 -c "selected_group ( 25 )"
11727
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011728requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011729requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011731requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011733requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011734requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011735requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011736requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11738run_test "TLS 1.3 m->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011739 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11740 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011741 0 \
11742 -s "Protocol is TLSv1.3" \
11743 -s "got named group: x25519(001d)" \
11744 -s "Verifying peer X.509 certificate... ok" \
11745 -c "Protocol is TLSv1.3" \
11746 -c "NamedGroup: secp384r1 ( 18 )" \
11747 -c "NamedGroup: x25519 ( 1d )" \
11748 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011749 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011750 -c "received HelloRetryRequest message" \
11751 -c "selected_group ( 29 )"
11752
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011753requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011754requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011756requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011757requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011758requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011759requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011760requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011761requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011762requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11763run_test "TLS 1.3 m->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011764 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11765 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011766 0 \
11767 -s "Protocol is TLSv1.3" \
11768 -s "got named group: x448(001e)" \
11769 -s "Verifying peer X.509 certificate... ok" \
11770 -c "Protocol is TLSv1.3" \
11771 -c "NamedGroup: secp384r1 ( 18 )" \
11772 -c "NamedGroup: x448 ( 1e )" \
11773 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011774 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011775 -c "received HelloRetryRequest message" \
11776 -c "selected_group ( 30 )"
11777
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011778requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011779requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011780requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011781requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011782requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011783requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011784requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011785requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011786requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011787requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11788run_test "TLS 1.3 m->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011789 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11790 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011791 0 \
11792 -s "Protocol is TLSv1.3" \
11793 -s "got named group: secp256r1(0017)" \
11794 -s "Verifying peer X.509 certificate... ok" \
11795 -c "Protocol is TLSv1.3" \
11796 -c "NamedGroup: secp521r1 ( 19 )" \
11797 -c "NamedGroup: secp256r1 ( 17 )" \
11798 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011799 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011800 -c "received HelloRetryRequest message" \
11801 -c "selected_group ( 23 )"
11802
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011803requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011804requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011805requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011806requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011807requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011808requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011809requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011810requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011811requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011812requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11813run_test "TLS 1.3 m->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011814 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11815 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011816 0 \
11817 -s "Protocol is TLSv1.3" \
11818 -s "got named group: secp384r1(0018)" \
11819 -s "Verifying peer X.509 certificate... ok" \
11820 -c "Protocol is TLSv1.3" \
11821 -c "NamedGroup: secp521r1 ( 19 )" \
11822 -c "NamedGroup: secp384r1 ( 18 )" \
11823 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011824 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011825 -c "received HelloRetryRequest message" \
11826 -c "selected_group ( 24 )"
11827
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011828requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011829requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011830requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011831requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011832requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011833requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011834requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011835requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011836requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11838run_test "TLS 1.3 m->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011839 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11840 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011841 0 \
11842 -s "Protocol is TLSv1.3" \
11843 -s "got named group: x25519(001d)" \
11844 -s "Verifying peer X.509 certificate... ok" \
11845 -c "Protocol is TLSv1.3" \
11846 -c "NamedGroup: secp521r1 ( 19 )" \
11847 -c "NamedGroup: x25519 ( 1d )" \
11848 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011849 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011850 -c "received HelloRetryRequest message" \
11851 -c "selected_group ( 29 )"
11852
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011853requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011854requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011855requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011856requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011857requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011858requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011859requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011860requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011861requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011862requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11863run_test "TLS 1.3 m->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011864 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11865 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011866 0 \
11867 -s "Protocol is TLSv1.3" \
11868 -s "got named group: x448(001e)" \
11869 -s "Verifying peer X.509 certificate... ok" \
11870 -c "Protocol is TLSv1.3" \
11871 -c "NamedGroup: secp521r1 ( 19 )" \
11872 -c "NamedGroup: x448 ( 1e )" \
11873 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011874 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011875 -c "received HelloRetryRequest message" \
11876 -c "selected_group ( 30 )"
11877
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011878requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011879requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011880requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011881requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011882requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011883requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011884requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011885requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011886requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011887requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11888run_test "TLS 1.3 m->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011889 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11890 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011891 0 \
11892 -s "Protocol is TLSv1.3" \
11893 -s "got named group: secp256r1(0017)" \
11894 -s "Verifying peer X.509 certificate... ok" \
11895 -c "Protocol is TLSv1.3" \
11896 -c "NamedGroup: x25519 ( 1d )" \
11897 -c "NamedGroup: secp256r1 ( 17 )" \
11898 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011899 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011900 -c "received HelloRetryRequest message" \
11901 -c "selected_group ( 23 )"
11902
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011903requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011904requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011906requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011907requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011908requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011909requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011910requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011911requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011912requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11913run_test "TLS 1.3 m->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011914 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11915 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011916 0 \
11917 -s "Protocol is TLSv1.3" \
11918 -s "got named group: secp384r1(0018)" \
11919 -s "Verifying peer X.509 certificate... ok" \
11920 -c "Protocol is TLSv1.3" \
11921 -c "NamedGroup: x25519 ( 1d )" \
11922 -c "NamedGroup: secp384r1 ( 18 )" \
11923 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011924 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011925 -c "received HelloRetryRequest message" \
11926 -c "selected_group ( 24 )"
11927
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011928requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011929requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011930requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011931requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011932requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011933requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011934requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011935requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011936requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011937requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11938run_test "TLS 1.3 m->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011939 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11940 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011941 0 \
11942 -s "Protocol is TLSv1.3" \
11943 -s "got named group: secp521r1(0019)" \
11944 -s "Verifying peer X.509 certificate... ok" \
11945 -c "Protocol is TLSv1.3" \
11946 -c "NamedGroup: x25519 ( 1d )" \
11947 -c "NamedGroup: secp521r1 ( 19 )" \
11948 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011949 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011950 -c "received HelloRetryRequest message" \
11951 -c "selected_group ( 25 )"
11952
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011953requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011954requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011955requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011956requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011958requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011959requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011960requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011961requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11963run_test "TLS 1.3 m->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011964 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11965 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011966 0 \
11967 -s "Protocol is TLSv1.3" \
11968 -s "got named group: x448(001e)" \
11969 -s "Verifying peer X.509 certificate... ok" \
11970 -c "Protocol is TLSv1.3" \
11971 -c "NamedGroup: x25519 ( 1d )" \
11972 -c "NamedGroup: x448 ( 1e )" \
11973 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011974 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011975 -c "received HelloRetryRequest message" \
11976 -c "selected_group ( 30 )"
11977
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011978requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011979requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011980requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011981requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011983requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011984requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020011986requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000011987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11988run_test "TLS 1.3 m->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011989 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11990 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011991 0 \
11992 -s "Protocol is TLSv1.3" \
11993 -s "got named group: secp256r1(0017)" \
11994 -s "Verifying peer X.509 certificate... ok" \
11995 -c "Protocol is TLSv1.3" \
11996 -c "NamedGroup: x448 ( 1e )" \
11997 -c "NamedGroup: secp256r1 ( 17 )" \
11998 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011999 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012000 -c "received HelloRetryRequest message" \
12001 -c "selected_group ( 23 )"
12002
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000012003requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012006requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012007requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000012008requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012009requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012010requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012011requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012012requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12013run_test "TLS 1.3 m->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080012014 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12015 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012016 0 \
12017 -s "Protocol is TLSv1.3" \
12018 -s "got named group: secp384r1(0018)" \
12019 -s "Verifying peer X.509 certificate... ok" \
12020 -c "Protocol is TLSv1.3" \
12021 -c "NamedGroup: x448 ( 1e )" \
12022 -c "NamedGroup: secp384r1 ( 18 )" \
12023 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000012024 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012025 -c "received HelloRetryRequest message" \
12026 -c "selected_group ( 24 )"
12027
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000012028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012031requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000012033requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012034requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012035requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012036requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012037requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12038run_test "TLS 1.3 m->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080012039 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12040 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012041 0 \
12042 -s "Protocol is TLSv1.3" \
12043 -s "got named group: secp521r1(0019)" \
12044 -s "Verifying peer X.509 certificate... ok" \
12045 -c "Protocol is TLSv1.3" \
12046 -c "NamedGroup: x448 ( 1e )" \
12047 -c "NamedGroup: secp521r1 ( 19 )" \
12048 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000012049 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012050 -c "received HelloRetryRequest message" \
12051 -c "selected_group ( 25 )"
12052
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000012053requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012054requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012055requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012056requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012057requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000012058requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000012059requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000012060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronbc5adf42022-10-04 11:06:14 +020012061requires_key_exchange_with_cert_in_tls13_enabled
XiaokangQianb1847a22022-06-08 07:49:31 +000012062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12063run_test "TLS 1.3 m->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080012064 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12065 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012066 0 \
12067 -s "Protocol is TLSv1.3" \
12068 -s "got named group: x25519(001d)" \
12069 -s "Verifying peer X.509 certificate... ok" \
12070 -c "Protocol is TLSv1.3" \
12071 -c "NamedGroup: x448 ( 1e )" \
12072 -c "NamedGroup: x25519 ( 1d )" \
12073 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000012074 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000012075 -c "received HelloRetryRequest message" \
12076 -c "selected_group ( 29 )"