blob: 05d09f2f8042600791a43031f3f838a1601cff84 [file] [log] [blame]
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001#!/bin/sh
2
3# tls13-compat.sh
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19#
20# Purpose
21#
22# List TLS1.3 compat test cases. They are generated by
23# `./tests/scripts/generate_tls13_compat_tests.py -a -o tests/opt-testcases/tls13-compat.sh`.
24#
25# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
26# AND REGENERATE THIS FILE.
27#
XiaokangQianb1847a22022-06-08 07:49:31 +000028requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000029requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
31requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
32requires_openssl_tls1_3
33run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
34 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
35 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
36 0 \
37 -s "Protocol is TLSv1.3" \
38 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
39 -s "received signature algorithm: 0x403" \
40 -s "got named group: secp256r1(0017)" \
41 -s "Verifying peer X.509 certificate... ok" \
42 -s "HTTP/1.0 200 OK" \
43 -C "received HelloRetryRequest message"
Jerry Yu31018ad2021-11-26 20:36:17 +080044
XiaokangQianb1847a22022-06-08 07:49:31 +000045requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000046requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
48requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
49requires_openssl_tls1_3
50run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
51 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
52 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
53 0 \
54 -s "Protocol is TLSv1.3" \
55 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
56 -s "received signature algorithm: 0x503" \
57 -s "got named group: secp256r1(0017)" \
58 -s "Verifying peer X.509 certificate... ok" \
59 -s "HTTP/1.0 200 OK" \
60 -C "received HelloRetryRequest message"
61
62requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000063requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
65requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
66requires_openssl_tls1_3
67run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
68 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
69 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
70 0 \
71 -s "Protocol is TLSv1.3" \
72 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
73 -s "received signature algorithm: 0x603" \
74 -s "got named group: secp256r1(0017)" \
75 -s "Verifying peer X.509 certificate... ok" \
76 -s "HTTP/1.0 200 OK" \
77 -C "received HelloRetryRequest message"
78
79requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000080requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000081requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
82requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
83requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
84requires_openssl_tls1_3
85run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
86 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
87 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
88 0 \
89 -s "Protocol is TLSv1.3" \
90 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
91 -s "received signature algorithm: 0x804" \
92 -s "got named group: secp256r1(0017)" \
93 -s "Verifying peer X.509 certificate... ok" \
94 -s "HTTP/1.0 200 OK" \
95 -C "received HelloRetryRequest message"
96
97requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000098requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
101requires_openssl_tls1_3
102run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
103 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
104 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
105 0 \
106 -s "Protocol is TLSv1.3" \
107 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
108 -s "received signature algorithm: 0x403" \
109 -s "got named group: secp384r1(0018)" \
110 -s "Verifying peer X.509 certificate... ok" \
111 -s "HTTP/1.0 200 OK" \
112 -C "received HelloRetryRequest message"
113
114requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000115requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
118requires_openssl_tls1_3
119run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
120 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
121 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
122 0 \
123 -s "Protocol is TLSv1.3" \
124 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
125 -s "received signature algorithm: 0x503" \
126 -s "got named group: secp384r1(0018)" \
127 -s "Verifying peer X.509 certificate... ok" \
128 -s "HTTP/1.0 200 OK" \
129 -C "received HelloRetryRequest message"
130
131requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000132requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000133requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
134requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
135requires_openssl_tls1_3
136run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
137 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
138 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
139 0 \
140 -s "Protocol is TLSv1.3" \
141 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
142 -s "received signature algorithm: 0x603" \
143 -s "got named group: secp384r1(0018)" \
144 -s "Verifying peer X.509 certificate... ok" \
145 -s "HTTP/1.0 200 OK" \
146 -C "received HelloRetryRequest message"
147
148requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000150requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
151requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
152requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
153requires_openssl_tls1_3
154run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
155 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
156 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
157 0 \
158 -s "Protocol is TLSv1.3" \
159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
160 -s "received signature algorithm: 0x804" \
161 -s "got named group: secp384r1(0018)" \
162 -s "Verifying peer X.509 certificate... ok" \
163 -s "HTTP/1.0 200 OK" \
164 -C "received HelloRetryRequest message"
165
166requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000167requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
169requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
170requires_openssl_tls1_3
171run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
172 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
173 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
174 0 \
175 -s "Protocol is TLSv1.3" \
176 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
177 -s "received signature algorithm: 0x403" \
178 -s "got named group: secp521r1(0019)" \
179 -s "Verifying peer X.509 certificate... ok" \
180 -s "HTTP/1.0 200 OK" \
181 -C "received HelloRetryRequest message"
182
183requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000184requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
186requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
187requires_openssl_tls1_3
188run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
189 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
190 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
191 0 \
192 -s "Protocol is TLSv1.3" \
193 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
194 -s "received signature algorithm: 0x503" \
195 -s "got named group: secp521r1(0019)" \
196 -s "Verifying peer X.509 certificate... ok" \
197 -s "HTTP/1.0 200 OK" \
198 -C "received HelloRetryRequest message"
199
200requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000201requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000202requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
203requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
204requires_openssl_tls1_3
205run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
206 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
207 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
208 0 \
209 -s "Protocol is TLSv1.3" \
210 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
211 -s "received signature algorithm: 0x603" \
212 -s "got named group: secp521r1(0019)" \
213 -s "Verifying peer X.509 certificate... ok" \
214 -s "HTTP/1.0 200 OK" \
215 -C "received HelloRetryRequest message"
216
217requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000218requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000219requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
221requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
222requires_openssl_tls1_3
223run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
225 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
226 0 \
227 -s "Protocol is TLSv1.3" \
228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
229 -s "received signature algorithm: 0x804" \
230 -s "got named group: secp521r1(0019)" \
231 -s "Verifying peer X.509 certificate... ok" \
232 -s "HTTP/1.0 200 OK" \
233 -C "received HelloRetryRequest message"
234
235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000236requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
239requires_openssl_tls1_3
240run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
241 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
242 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
243 0 \
244 -s "Protocol is TLSv1.3" \
245 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
246 -s "received signature algorithm: 0x403" \
247 -s "got named group: x25519(001d)" \
248 -s "Verifying peer X.509 certificate... ok" \
249 -s "HTTP/1.0 200 OK" \
250 -C "received HelloRetryRequest message"
251
252requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000253requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
255requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
256requires_openssl_tls1_3
257run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
258 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
259 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
260 0 \
261 -s "Protocol is TLSv1.3" \
262 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
263 -s "received signature algorithm: 0x503" \
264 -s "got named group: x25519(001d)" \
265 -s "Verifying peer X.509 certificate... ok" \
266 -s "HTTP/1.0 200 OK" \
267 -C "received HelloRetryRequest message"
268
269requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000270requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000271requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
272requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
273requires_openssl_tls1_3
274run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
275 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
276 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
277 0 \
278 -s "Protocol is TLSv1.3" \
279 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
280 -s "received signature algorithm: 0x603" \
281 -s "got named group: x25519(001d)" \
282 -s "Verifying peer X.509 certificate... ok" \
283 -s "HTTP/1.0 200 OK" \
284 -C "received HelloRetryRequest message"
285
286requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000287requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000288requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
289requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
290requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
291requires_openssl_tls1_3
292run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
294 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
295 0 \
296 -s "Protocol is TLSv1.3" \
297 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
298 -s "received signature algorithm: 0x804" \
299 -s "got named group: x25519(001d)" \
300 -s "Verifying peer X.509 certificate... ok" \
301 -s "HTTP/1.0 200 OK" \
302 -C "received HelloRetryRequest message"
303
304requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000305requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
308requires_openssl_tls1_3
309run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
310 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
311 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
312 0 \
313 -s "Protocol is TLSv1.3" \
314 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
315 -s "received signature algorithm: 0x403" \
316 -s "got named group: x448(001e)" \
317 -s "Verifying peer X.509 certificate... ok" \
318 -s "HTTP/1.0 200 OK" \
319 -C "received HelloRetryRequest message"
320
321requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000322requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
324requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
325requires_openssl_tls1_3
326run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
327 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
328 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
329 0 \
330 -s "Protocol is TLSv1.3" \
331 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
332 -s "received signature algorithm: 0x503" \
333 -s "got named group: x448(001e)" \
334 -s "Verifying peer X.509 certificate... ok" \
335 -s "HTTP/1.0 200 OK" \
336 -C "received HelloRetryRequest message"
337
338requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000339requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000340requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
341requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
342requires_openssl_tls1_3
343run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
344 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
345 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
346 0 \
347 -s "Protocol is TLSv1.3" \
348 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
349 -s "received signature algorithm: 0x603" \
350 -s "got named group: x448(001e)" \
351 -s "Verifying peer X.509 certificate... ok" \
352 -s "HTTP/1.0 200 OK" \
353 -C "received HelloRetryRequest message"
354
355requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000357requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
358requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
359requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
360requires_openssl_tls1_3
361run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
362 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
363 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
364 0 \
365 -s "Protocol is TLSv1.3" \
366 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
367 -s "received signature algorithm: 0x804" \
368 -s "got named group: x448(001e)" \
369 -s "Verifying peer X.509 certificate... ok" \
370 -s "HTTP/1.0 200 OK" \
371 -C "received HelloRetryRequest message"
372
373requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000374requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
376requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
377requires_openssl_tls1_3
378run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
379 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
380 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
381 0 \
382 -s "Protocol is TLSv1.3" \
383 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
384 -s "received signature algorithm: 0x403" \
385 -s "got named group: secp256r1(0017)" \
386 -s "Verifying peer X.509 certificate... ok" \
387 -s "HTTP/1.0 200 OK" \
388 -C "received HelloRetryRequest message"
389
390requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000391requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
394requires_openssl_tls1_3
395run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
396 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
397 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
398 0 \
399 -s "Protocol is TLSv1.3" \
400 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
401 -s "received signature algorithm: 0x503" \
402 -s "got named group: secp256r1(0017)" \
403 -s "Verifying peer X.509 certificate... ok" \
404 -s "HTTP/1.0 200 OK" \
405 -C "received HelloRetryRequest message"
406
407requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
411requires_openssl_tls1_3
412run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
413 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
414 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
415 0 \
416 -s "Protocol is TLSv1.3" \
417 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
418 -s "received signature algorithm: 0x603" \
419 -s "got named group: secp256r1(0017)" \
420 -s "Verifying peer X.509 certificate... ok" \
421 -s "HTTP/1.0 200 OK" \
422 -C "received HelloRetryRequest message"
423
424requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000425requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000426requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
427requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
428requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
429requires_openssl_tls1_3
430run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
431 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
432 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
433 0 \
434 -s "Protocol is TLSv1.3" \
435 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
436 -s "received signature algorithm: 0x804" \
437 -s "got named group: secp256r1(0017)" \
438 -s "Verifying peer X.509 certificate... ok" \
439 -s "HTTP/1.0 200 OK" \
440 -C "received HelloRetryRequest message"
441
442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000443requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
446requires_openssl_tls1_3
447run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
448 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
449 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
450 0 \
451 -s "Protocol is TLSv1.3" \
452 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
453 -s "received signature algorithm: 0x403" \
454 -s "got named group: secp384r1(0018)" \
455 -s "Verifying peer X.509 certificate... ok" \
456 -s "HTTP/1.0 200 OK" \
457 -C "received HelloRetryRequest message"
458
459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000460requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
463requires_openssl_tls1_3
464run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
465 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
466 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
467 0 \
468 -s "Protocol is TLSv1.3" \
469 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
470 -s "received signature algorithm: 0x503" \
471 -s "got named group: secp384r1(0018)" \
472 -s "Verifying peer X.509 certificate... ok" \
473 -s "HTTP/1.0 200 OK" \
474 -C "received HelloRetryRequest message"
475
476requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000477requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000478requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
479requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
480requires_openssl_tls1_3
481run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
482 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
483 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
484 0 \
485 -s "Protocol is TLSv1.3" \
486 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
487 -s "received signature algorithm: 0x603" \
488 -s "got named group: secp384r1(0018)" \
489 -s "Verifying peer X.509 certificate... ok" \
490 -s "HTTP/1.0 200 OK" \
491 -C "received HelloRetryRequest message"
492
493requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000494requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000495requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
497requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
498requires_openssl_tls1_3
499run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
500 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
501 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
502 0 \
503 -s "Protocol is TLSv1.3" \
504 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
505 -s "received signature algorithm: 0x804" \
506 -s "got named group: secp384r1(0018)" \
507 -s "Verifying peer X.509 certificate... ok" \
508 -s "HTTP/1.0 200 OK" \
509 -C "received HelloRetryRequest message"
510
511requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000512requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
515requires_openssl_tls1_3
516run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
518 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
519 0 \
520 -s "Protocol is TLSv1.3" \
521 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
522 -s "received signature algorithm: 0x403" \
523 -s "got named group: secp521r1(0019)" \
524 -s "Verifying peer X.509 certificate... ok" \
525 -s "HTTP/1.0 200 OK" \
526 -C "received HelloRetryRequest message"
527
528requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000529requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
532requires_openssl_tls1_3
533run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
534 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
535 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
536 0 \
537 -s "Protocol is TLSv1.3" \
538 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
539 -s "received signature algorithm: 0x503" \
540 -s "got named group: secp521r1(0019)" \
541 -s "Verifying peer X.509 certificate... ok" \
542 -s "HTTP/1.0 200 OK" \
543 -C "received HelloRetryRequest message"
544
545requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000546requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000547requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
548requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
549requires_openssl_tls1_3
550run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
551 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
552 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
553 0 \
554 -s "Protocol is TLSv1.3" \
555 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
556 -s "received signature algorithm: 0x603" \
557 -s "got named group: secp521r1(0019)" \
558 -s "Verifying peer X.509 certificate... ok" \
559 -s "HTTP/1.0 200 OK" \
560 -C "received HelloRetryRequest message"
561
562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000563requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
566requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
567requires_openssl_tls1_3
568run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
570 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
571 0 \
572 -s "Protocol is TLSv1.3" \
573 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
574 -s "received signature algorithm: 0x804" \
575 -s "got named group: secp521r1(0019)" \
576 -s "Verifying peer X.509 certificate... ok" \
577 -s "HTTP/1.0 200 OK" \
578 -C "received HelloRetryRequest message"
579
580requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000581requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
584requires_openssl_tls1_3
585run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
586 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
587 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
588 0 \
589 -s "Protocol is TLSv1.3" \
590 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
591 -s "received signature algorithm: 0x403" \
592 -s "got named group: x25519(001d)" \
593 -s "Verifying peer X.509 certificate... ok" \
594 -s "HTTP/1.0 200 OK" \
595 -C "received HelloRetryRequest message"
596
597requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000598requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
601requires_openssl_tls1_3
602run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
603 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
604 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
605 0 \
606 -s "Protocol is TLSv1.3" \
607 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
608 -s "received signature algorithm: 0x503" \
609 -s "got named group: x25519(001d)" \
610 -s "Verifying peer X.509 certificate... ok" \
611 -s "HTTP/1.0 200 OK" \
612 -C "received HelloRetryRequest message"
613
614requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000615requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000616requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
617requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
618requires_openssl_tls1_3
619run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
620 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
621 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
622 0 \
623 -s "Protocol is TLSv1.3" \
624 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
625 -s "received signature algorithm: 0x603" \
626 -s "got named group: x25519(001d)" \
627 -s "Verifying peer X.509 certificate... ok" \
628 -s "HTTP/1.0 200 OK" \
629 -C "received HelloRetryRequest message"
630
631requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000632requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000633requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
634requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
635requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
636requires_openssl_tls1_3
637run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
638 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
639 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
640 0 \
641 -s "Protocol is TLSv1.3" \
642 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
643 -s "received signature algorithm: 0x804" \
644 -s "got named group: x25519(001d)" \
645 -s "Verifying peer X.509 certificate... ok" \
646 -s "HTTP/1.0 200 OK" \
647 -C "received HelloRetryRequest message"
648
649requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000650requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
653requires_openssl_tls1_3
654run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
656 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
657 0 \
658 -s "Protocol is TLSv1.3" \
659 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
660 -s "received signature algorithm: 0x403" \
661 -s "got named group: x448(001e)" \
662 -s "Verifying peer X.509 certificate... ok" \
663 -s "HTTP/1.0 200 OK" \
664 -C "received HelloRetryRequest message"
665
666requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000667requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
670requires_openssl_tls1_3
671run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
672 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
673 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
674 0 \
675 -s "Protocol is TLSv1.3" \
676 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
677 -s "received signature algorithm: 0x503" \
678 -s "got named group: x448(001e)" \
679 -s "Verifying peer X.509 certificate... ok" \
680 -s "HTTP/1.0 200 OK" \
681 -C "received HelloRetryRequest message"
682
683requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000684requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
687requires_openssl_tls1_3
688run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
689 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
690 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
691 0 \
692 -s "Protocol is TLSv1.3" \
693 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
694 -s "received signature algorithm: 0x603" \
695 -s "got named group: x448(001e)" \
696 -s "Verifying peer X.509 certificate... ok" \
697 -s "HTTP/1.0 200 OK" \
698 -C "received HelloRetryRequest message"
699
700requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000701requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
704requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
705requires_openssl_tls1_3
706run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
707 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
708 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
709 0 \
710 -s "Protocol is TLSv1.3" \
711 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
712 -s "received signature algorithm: 0x804" \
713 -s "got named group: x448(001e)" \
714 -s "Verifying peer X.509 certificate... ok" \
715 -s "HTTP/1.0 200 OK" \
716 -C "received HelloRetryRequest message"
717
718requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000719requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
722requires_openssl_tls1_3
723run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
724 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
725 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
726 0 \
727 -s "Protocol is TLSv1.3" \
728 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
729 -s "received signature algorithm: 0x403" \
730 -s "got named group: secp256r1(0017)" \
731 -s "Verifying peer X.509 certificate... ok" \
732 -s "HTTP/1.0 200 OK" \
733 -C "received HelloRetryRequest message"
734
735requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000736requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
739requires_openssl_tls1_3
740run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
741 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
742 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
743 0 \
744 -s "Protocol is TLSv1.3" \
745 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
746 -s "received signature algorithm: 0x503" \
747 -s "got named group: secp256r1(0017)" \
748 -s "Verifying peer X.509 certificate... ok" \
749 -s "HTTP/1.0 200 OK" \
750 -C "received HelloRetryRequest message"
751
752requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000753requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
756requires_openssl_tls1_3
757run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
758 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
759 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
760 0 \
761 -s "Protocol is TLSv1.3" \
762 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
763 -s "received signature algorithm: 0x603" \
764 -s "got named group: secp256r1(0017)" \
765 -s "Verifying peer X.509 certificate... ok" \
766 -s "HTTP/1.0 200 OK" \
767 -C "received HelloRetryRequest message"
768
769requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000770requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000771requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
772requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
773requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
774requires_openssl_tls1_3
775run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
776 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
777 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
778 0 \
779 -s "Protocol is TLSv1.3" \
780 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
781 -s "received signature algorithm: 0x804" \
782 -s "got named group: secp256r1(0017)" \
783 -s "Verifying peer X.509 certificate... ok" \
784 -s "HTTP/1.0 200 OK" \
785 -C "received HelloRetryRequest message"
786
787requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000788requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000789requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
790requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
791requires_openssl_tls1_3
792run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
793 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
794 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
795 0 \
796 -s "Protocol is TLSv1.3" \
797 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
798 -s "received signature algorithm: 0x403" \
799 -s "got named group: secp384r1(0018)" \
800 -s "Verifying peer X.509 certificate... ok" \
801 -s "HTTP/1.0 200 OK" \
802 -C "received HelloRetryRequest message"
803
804requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000805requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000806requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
807requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
808requires_openssl_tls1_3
809run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
810 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
811 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
812 0 \
813 -s "Protocol is TLSv1.3" \
814 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
815 -s "received signature algorithm: 0x503" \
816 -s "got named group: secp384r1(0018)" \
817 -s "Verifying peer X.509 certificate... ok" \
818 -s "HTTP/1.0 200 OK" \
819 -C "received HelloRetryRequest message"
820
821requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000822requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000823requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
824requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
825requires_openssl_tls1_3
826run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
827 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
828 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
829 0 \
830 -s "Protocol is TLSv1.3" \
831 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
832 -s "received signature algorithm: 0x603" \
833 -s "got named group: secp384r1(0018)" \
834 -s "Verifying peer X.509 certificate... ok" \
835 -s "HTTP/1.0 200 OK" \
836 -C "received HelloRetryRequest message"
837
838requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000839requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
842requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
843requires_openssl_tls1_3
844run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
845 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
846 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
847 0 \
848 -s "Protocol is TLSv1.3" \
849 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
850 -s "received signature algorithm: 0x804" \
851 -s "got named group: secp384r1(0018)" \
852 -s "Verifying peer X.509 certificate... ok" \
853 -s "HTTP/1.0 200 OK" \
854 -C "received HelloRetryRequest message"
855
856requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000857requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000858requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
860requires_openssl_tls1_3
861run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
862 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
863 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
864 0 \
865 -s "Protocol is TLSv1.3" \
866 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
867 -s "received signature algorithm: 0x403" \
868 -s "got named group: secp521r1(0019)" \
869 -s "Verifying peer X.509 certificate... ok" \
870 -s "HTTP/1.0 200 OK" \
871 -C "received HelloRetryRequest message"
872
873requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000874requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
877requires_openssl_tls1_3
878run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
879 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
880 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
881 0 \
882 -s "Protocol is TLSv1.3" \
883 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
884 -s "received signature algorithm: 0x503" \
885 -s "got named group: secp521r1(0019)" \
886 -s "Verifying peer X.509 certificate... ok" \
887 -s "HTTP/1.0 200 OK" \
888 -C "received HelloRetryRequest message"
889
890requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000891requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
894requires_openssl_tls1_3
895run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
896 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
897 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
898 0 \
899 -s "Protocol is TLSv1.3" \
900 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
901 -s "received signature algorithm: 0x603" \
902 -s "got named group: secp521r1(0019)" \
903 -s "Verifying peer X.509 certificate... ok" \
904 -s "HTTP/1.0 200 OK" \
905 -C "received HelloRetryRequest message"
906
907requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000908requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
911requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
912requires_openssl_tls1_3
913run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
914 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
915 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
916 0 \
917 -s "Protocol is TLSv1.3" \
918 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
919 -s "received signature algorithm: 0x804" \
920 -s "got named group: secp521r1(0019)" \
921 -s "Verifying peer X.509 certificate... ok" \
922 -s "HTTP/1.0 200 OK" \
923 -C "received HelloRetryRequest message"
924
925requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000926requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
929requires_openssl_tls1_3
930run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
931 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
932 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
933 0 \
934 -s "Protocol is TLSv1.3" \
935 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
936 -s "received signature algorithm: 0x403" \
937 -s "got named group: x25519(001d)" \
938 -s "Verifying peer X.509 certificate... ok" \
939 -s "HTTP/1.0 200 OK" \
940 -C "received HelloRetryRequest message"
941
942requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000943requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000944requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
945requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
946requires_openssl_tls1_3
947run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
948 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
949 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
950 0 \
951 -s "Protocol is TLSv1.3" \
952 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
953 -s "received signature algorithm: 0x503" \
954 -s "got named group: x25519(001d)" \
955 -s "Verifying peer X.509 certificate... ok" \
956 -s "HTTP/1.0 200 OK" \
957 -C "received HelloRetryRequest message"
958
959requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000960requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000961requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
963requires_openssl_tls1_3
964run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
965 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
966 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
967 0 \
968 -s "Protocol is TLSv1.3" \
969 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
970 -s "received signature algorithm: 0x603" \
971 -s "got named group: x25519(001d)" \
972 -s "Verifying peer X.509 certificate... ok" \
973 -s "HTTP/1.0 200 OK" \
974 -C "received HelloRetryRequest message"
975
976requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000977requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000978requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
979requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
980requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
981requires_openssl_tls1_3
982run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
983 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
984 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
985 0 \
986 -s "Protocol is TLSv1.3" \
987 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
988 -s "received signature algorithm: 0x804" \
989 -s "got named group: x25519(001d)" \
990 -s "Verifying peer X.509 certificate... ok" \
991 -s "HTTP/1.0 200 OK" \
992 -C "received HelloRetryRequest message"
993
994requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000995requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
998requires_openssl_tls1_3
999run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
1000 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1001 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1002 0 \
1003 -s "Protocol is TLSv1.3" \
1004 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1005 -s "received signature algorithm: 0x403" \
1006 -s "got named group: x448(001e)" \
1007 -s "Verifying peer X.509 certificate... ok" \
1008 -s "HTTP/1.0 200 OK" \
1009 -C "received HelloRetryRequest message"
1010
1011requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001012requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001013requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1014requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1015requires_openssl_tls1_3
1016run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
1017 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1018 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1019 0 \
1020 -s "Protocol is TLSv1.3" \
1021 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1022 -s "received signature algorithm: 0x503" \
1023 -s "got named group: x448(001e)" \
1024 -s "Verifying peer X.509 certificate... ok" \
1025 -s "HTTP/1.0 200 OK" \
1026 -C "received HelloRetryRequest message"
1027
1028requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001029requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1031requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1032requires_openssl_tls1_3
1033run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
1034 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1035 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1036 0 \
1037 -s "Protocol is TLSv1.3" \
1038 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1039 -s "received signature algorithm: 0x603" \
1040 -s "got named group: x448(001e)" \
1041 -s "Verifying peer X.509 certificate... ok" \
1042 -s "HTTP/1.0 200 OK" \
1043 -C "received HelloRetryRequest message"
1044
1045requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001046requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1048requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1049requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1050requires_openssl_tls1_3
1051run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
1052 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1053 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1054 0 \
1055 -s "Protocol is TLSv1.3" \
1056 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1057 -s "received signature algorithm: 0x804" \
1058 -s "got named group: x448(001e)" \
1059 -s "Verifying peer X.509 certificate... ok" \
1060 -s "HTTP/1.0 200 OK" \
1061 -C "received HelloRetryRequest message"
1062
1063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001064requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1067requires_openssl_tls1_3
1068run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1069 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1070 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1071 0 \
1072 -s "Protocol is TLSv1.3" \
1073 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1074 -s "received signature algorithm: 0x403" \
1075 -s "got named group: secp256r1(0017)" \
1076 -s "Verifying peer X.509 certificate... ok" \
1077 -s "HTTP/1.0 200 OK" \
1078 -C "received HelloRetryRequest message"
1079
1080requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001081requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1084requires_openssl_tls1_3
1085run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1086 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1087 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1088 0 \
1089 -s "Protocol is TLSv1.3" \
1090 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1091 -s "received signature algorithm: 0x503" \
1092 -s "got named group: secp256r1(0017)" \
1093 -s "Verifying peer X.509 certificate... ok" \
1094 -s "HTTP/1.0 200 OK" \
1095 -C "received HelloRetryRequest message"
1096
1097requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001098requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1101requires_openssl_tls1_3
1102run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1103 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1104 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1105 0 \
1106 -s "Protocol is TLSv1.3" \
1107 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1108 -s "received signature algorithm: 0x603" \
1109 -s "got named group: secp256r1(0017)" \
1110 -s "Verifying peer X.509 certificate... ok" \
1111 -s "HTTP/1.0 200 OK" \
1112 -C "received HelloRetryRequest message"
1113
1114requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001115requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1118requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1119requires_openssl_tls1_3
1120run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1121 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1122 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1123 0 \
1124 -s "Protocol is TLSv1.3" \
1125 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1126 -s "received signature algorithm: 0x804" \
1127 -s "got named group: secp256r1(0017)" \
1128 -s "Verifying peer X.509 certificate... ok" \
1129 -s "HTTP/1.0 200 OK" \
1130 -C "received HelloRetryRequest message"
1131
1132requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001133requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1136requires_openssl_tls1_3
1137run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1138 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1139 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1140 0 \
1141 -s "Protocol is TLSv1.3" \
1142 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1143 -s "received signature algorithm: 0x403" \
1144 -s "got named group: secp384r1(0018)" \
1145 -s "Verifying peer X.509 certificate... ok" \
1146 -s "HTTP/1.0 200 OK" \
1147 -C "received HelloRetryRequest message"
1148
1149requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001150requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1153requires_openssl_tls1_3
1154run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1155 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1156 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1157 0 \
1158 -s "Protocol is TLSv1.3" \
1159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1160 -s "received signature algorithm: 0x503" \
1161 -s "got named group: secp384r1(0018)" \
1162 -s "Verifying peer X.509 certificate... ok" \
1163 -s "HTTP/1.0 200 OK" \
1164 -C "received HelloRetryRequest message"
1165
1166requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001167requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1169requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1170requires_openssl_tls1_3
1171run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1172 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1173 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1174 0 \
1175 -s "Protocol is TLSv1.3" \
1176 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1177 -s "received signature algorithm: 0x603" \
1178 -s "got named group: secp384r1(0018)" \
1179 -s "Verifying peer X.509 certificate... ok" \
1180 -s "HTTP/1.0 200 OK" \
1181 -C "received HelloRetryRequest message"
1182
1183requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001184requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1186requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1187requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1188requires_openssl_tls1_3
1189run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1190 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1191 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1192 0 \
1193 -s "Protocol is TLSv1.3" \
1194 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1195 -s "received signature algorithm: 0x804" \
1196 -s "got named group: secp384r1(0018)" \
1197 -s "Verifying peer X.509 certificate... ok" \
1198 -s "HTTP/1.0 200 OK" \
1199 -C "received HelloRetryRequest message"
1200
1201requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001202requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1205requires_openssl_tls1_3
1206run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1207 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1208 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1209 0 \
1210 -s "Protocol is TLSv1.3" \
1211 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1212 -s "received signature algorithm: 0x403" \
1213 -s "got named group: secp521r1(0019)" \
1214 -s "Verifying peer X.509 certificate... ok" \
1215 -s "HTTP/1.0 200 OK" \
1216 -C "received HelloRetryRequest message"
1217
1218requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001219requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1222requires_openssl_tls1_3
1223run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1225 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1226 0 \
1227 -s "Protocol is TLSv1.3" \
1228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1229 -s "received signature algorithm: 0x503" \
1230 -s "got named group: secp521r1(0019)" \
1231 -s "Verifying peer X.509 certificate... ok" \
1232 -s "HTTP/1.0 200 OK" \
1233 -C "received HelloRetryRequest message"
1234
1235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001236requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1239requires_openssl_tls1_3
1240run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1241 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1242 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1243 0 \
1244 -s "Protocol is TLSv1.3" \
1245 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1246 -s "received signature algorithm: 0x603" \
1247 -s "got named group: secp521r1(0019)" \
1248 -s "Verifying peer X.509 certificate... ok" \
1249 -s "HTTP/1.0 200 OK" \
1250 -C "received HelloRetryRequest message"
1251
1252requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001253requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1255requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1256requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1257requires_openssl_tls1_3
1258run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1259 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1260 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1261 0 \
1262 -s "Protocol is TLSv1.3" \
1263 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1264 -s "received signature algorithm: 0x804" \
1265 -s "got named group: secp521r1(0019)" \
1266 -s "Verifying peer X.509 certificate... ok" \
1267 -s "HTTP/1.0 200 OK" \
1268 -C "received HelloRetryRequest message"
1269
1270requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001271requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001272requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1273requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1274requires_openssl_tls1_3
1275run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
1276 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1277 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1278 0 \
1279 -s "Protocol is TLSv1.3" \
1280 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1281 -s "received signature algorithm: 0x403" \
1282 -s "got named group: x25519(001d)" \
1283 -s "Verifying peer X.509 certificate... ok" \
1284 -s "HTTP/1.0 200 OK" \
1285 -C "received HelloRetryRequest message"
1286
1287requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001288requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1291requires_openssl_tls1_3
1292run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
1293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1294 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1295 0 \
1296 -s "Protocol is TLSv1.3" \
1297 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1298 -s "received signature algorithm: 0x503" \
1299 -s "got named group: x25519(001d)" \
1300 -s "Verifying peer X.509 certificate... ok" \
1301 -s "HTTP/1.0 200 OK" \
1302 -C "received HelloRetryRequest message"
1303
1304requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001305requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1308requires_openssl_tls1_3
1309run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
1310 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1311 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1312 0 \
1313 -s "Protocol is TLSv1.3" \
1314 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1315 -s "received signature algorithm: 0x603" \
1316 -s "got named group: x25519(001d)" \
1317 -s "Verifying peer X.509 certificate... ok" \
1318 -s "HTTP/1.0 200 OK" \
1319 -C "received HelloRetryRequest message"
1320
1321requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001322requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1324requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1325requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1326requires_openssl_tls1_3
1327run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
1328 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1329 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1330 0 \
1331 -s "Protocol is TLSv1.3" \
1332 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1333 -s "received signature algorithm: 0x804" \
1334 -s "got named group: x25519(001d)" \
1335 -s "Verifying peer X.509 certificate... ok" \
1336 -s "HTTP/1.0 200 OK" \
1337 -C "received HelloRetryRequest message"
1338
1339requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001340requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001341requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1343requires_openssl_tls1_3
1344run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
1345 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1346 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1347 0 \
1348 -s "Protocol is TLSv1.3" \
1349 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1350 -s "received signature algorithm: 0x403" \
1351 -s "got named group: x448(001e)" \
1352 -s "Verifying peer X.509 certificate... ok" \
1353 -s "HTTP/1.0 200 OK" \
1354 -C "received HelloRetryRequest message"
1355
1356requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001357requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1360requires_openssl_tls1_3
1361run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
1362 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1363 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1364 0 \
1365 -s "Protocol is TLSv1.3" \
1366 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1367 -s "received signature algorithm: 0x503" \
1368 -s "got named group: x448(001e)" \
1369 -s "Verifying peer X.509 certificate... ok" \
1370 -s "HTTP/1.0 200 OK" \
1371 -C "received HelloRetryRequest message"
1372
1373requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001374requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1376requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1377requires_openssl_tls1_3
1378run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
1379 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1380 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1381 0 \
1382 -s "Protocol is TLSv1.3" \
1383 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1384 -s "received signature algorithm: 0x603" \
1385 -s "got named group: x448(001e)" \
1386 -s "Verifying peer X.509 certificate... ok" \
1387 -s "HTTP/1.0 200 OK" \
1388 -C "received HelloRetryRequest message"
1389
1390requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001391requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1394requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1395requires_openssl_tls1_3
1396run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
1397 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1398 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1399 0 \
1400 -s "Protocol is TLSv1.3" \
1401 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1402 -s "received signature algorithm: 0x804" \
1403 -s "got named group: x448(001e)" \
1404 -s "Verifying peer X.509 certificate... ok" \
1405 -s "HTTP/1.0 200 OK" \
1406 -C "received HelloRetryRequest message"
1407
1408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001409requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1412requires_openssl_tls1_3
1413run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1414 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1415 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1416 0 \
1417 -s "Protocol is TLSv1.3" \
1418 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1419 -s "received signature algorithm: 0x403" \
1420 -s "got named group: secp256r1(0017)" \
1421 -s "Verifying peer X.509 certificate... ok" \
1422 -s "HTTP/1.0 200 OK" \
1423 -C "received HelloRetryRequest message"
1424
1425requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1429requires_openssl_tls1_3
1430run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1431 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1432 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1433 0 \
1434 -s "Protocol is TLSv1.3" \
1435 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1436 -s "received signature algorithm: 0x503" \
1437 -s "got named group: secp256r1(0017)" \
1438 -s "Verifying peer X.509 certificate... ok" \
1439 -s "HTTP/1.0 200 OK" \
1440 -C "received HelloRetryRequest message"
1441
1442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001443requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1446requires_openssl_tls1_3
1447run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1448 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1449 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1450 0 \
1451 -s "Protocol is TLSv1.3" \
1452 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1453 -s "received signature algorithm: 0x603" \
1454 -s "got named group: secp256r1(0017)" \
1455 -s "Verifying peer X.509 certificate... ok" \
1456 -s "HTTP/1.0 200 OK" \
1457 -C "received HelloRetryRequest message"
1458
1459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001460requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1463requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1464requires_openssl_tls1_3
1465run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1466 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1467 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1468 0 \
1469 -s "Protocol is TLSv1.3" \
1470 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1471 -s "received signature algorithm: 0x804" \
1472 -s "got named group: secp256r1(0017)" \
1473 -s "Verifying peer X.509 certificate... ok" \
1474 -s "HTTP/1.0 200 OK" \
1475 -C "received HelloRetryRequest message"
1476
1477requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001478requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001479requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1480requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1481requires_openssl_tls1_3
1482run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1483 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1484 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1485 0 \
1486 -s "Protocol is TLSv1.3" \
1487 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1488 -s "received signature algorithm: 0x403" \
1489 -s "got named group: secp384r1(0018)" \
1490 -s "Verifying peer X.509 certificate... ok" \
1491 -s "HTTP/1.0 200 OK" \
1492 -C "received HelloRetryRequest message"
1493
1494requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001495requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001496requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1498requires_openssl_tls1_3
1499run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1500 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1501 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1502 0 \
1503 -s "Protocol is TLSv1.3" \
1504 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1505 -s "received signature algorithm: 0x503" \
1506 -s "got named group: secp384r1(0018)" \
1507 -s "Verifying peer X.509 certificate... ok" \
1508 -s "HTTP/1.0 200 OK" \
1509 -C "received HelloRetryRequest message"
1510
1511requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001512requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1515requires_openssl_tls1_3
1516run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1518 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1519 0 \
1520 -s "Protocol is TLSv1.3" \
1521 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1522 -s "received signature algorithm: 0x603" \
1523 -s "got named group: secp384r1(0018)" \
1524 -s "Verifying peer X.509 certificate... ok" \
1525 -s "HTTP/1.0 200 OK" \
1526 -C "received HelloRetryRequest message"
1527
1528requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001529requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1532requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1533requires_openssl_tls1_3
1534run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1535 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1536 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1537 0 \
1538 -s "Protocol is TLSv1.3" \
1539 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1540 -s "received signature algorithm: 0x804" \
1541 -s "got named group: secp384r1(0018)" \
1542 -s "Verifying peer X.509 certificate... ok" \
1543 -s "HTTP/1.0 200 OK" \
1544 -C "received HelloRetryRequest message"
1545
1546requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001547requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1550requires_openssl_tls1_3
1551run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1552 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1553 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1554 0 \
1555 -s "Protocol is TLSv1.3" \
1556 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1557 -s "received signature algorithm: 0x403" \
1558 -s "got named group: secp521r1(0019)" \
1559 -s "Verifying peer X.509 certificate... ok" \
1560 -s "HTTP/1.0 200 OK" \
1561 -C "received HelloRetryRequest message"
1562
1563requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001564requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001565requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1566requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1567requires_openssl_tls1_3
1568run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1570 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1571 0 \
1572 -s "Protocol is TLSv1.3" \
1573 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1574 -s "received signature algorithm: 0x503" \
1575 -s "got named group: secp521r1(0019)" \
1576 -s "Verifying peer X.509 certificate... ok" \
1577 -s "HTTP/1.0 200 OK" \
1578 -C "received HelloRetryRequest message"
1579
1580requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001581requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1584requires_openssl_tls1_3
1585run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1586 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1587 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1588 0 \
1589 -s "Protocol is TLSv1.3" \
1590 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1591 -s "received signature algorithm: 0x603" \
1592 -s "got named group: secp521r1(0019)" \
1593 -s "Verifying peer X.509 certificate... ok" \
1594 -s "HTTP/1.0 200 OK" \
1595 -C "received HelloRetryRequest message"
1596
1597requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001598requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1601requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1602requires_openssl_tls1_3
1603run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1604 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1605 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1606 0 \
1607 -s "Protocol is TLSv1.3" \
1608 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1609 -s "received signature algorithm: 0x804" \
1610 -s "got named group: secp521r1(0019)" \
1611 -s "Verifying peer X.509 certificate... ok" \
1612 -s "HTTP/1.0 200 OK" \
1613 -C "received HelloRetryRequest message"
1614
1615requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001616requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001617requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1619requires_openssl_tls1_3
1620run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
1621 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1622 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1623 0 \
1624 -s "Protocol is TLSv1.3" \
1625 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1626 -s "received signature algorithm: 0x403" \
1627 -s "got named group: x25519(001d)" \
1628 -s "Verifying peer X.509 certificate... ok" \
1629 -s "HTTP/1.0 200 OK" \
1630 -C "received HelloRetryRequest message"
1631
1632requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001633requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001634requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1635requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1636requires_openssl_tls1_3
1637run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
1638 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1639 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1640 0 \
1641 -s "Protocol is TLSv1.3" \
1642 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1643 -s "received signature algorithm: 0x503" \
1644 -s "got named group: x25519(001d)" \
1645 -s "Verifying peer X.509 certificate... ok" \
1646 -s "HTTP/1.0 200 OK" \
1647 -C "received HelloRetryRequest message"
1648
1649requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001650requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1653requires_openssl_tls1_3
1654run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
1655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1656 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1657 0 \
1658 -s "Protocol is TLSv1.3" \
1659 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1660 -s "received signature algorithm: 0x603" \
1661 -s "got named group: x25519(001d)" \
1662 -s "Verifying peer X.509 certificate... ok" \
1663 -s "HTTP/1.0 200 OK" \
1664 -C "received HelloRetryRequest message"
1665
1666requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001667requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1670requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1671requires_openssl_tls1_3
1672run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
1673 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1674 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1675 0 \
1676 -s "Protocol is TLSv1.3" \
1677 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1678 -s "received signature algorithm: 0x804" \
1679 -s "got named group: x25519(001d)" \
1680 -s "Verifying peer X.509 certificate... ok" \
1681 -s "HTTP/1.0 200 OK" \
1682 -C "received HelloRetryRequest message"
1683
1684requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001685requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001686requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1688requires_openssl_tls1_3
1689run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
1690 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1691 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1692 0 \
1693 -s "Protocol is TLSv1.3" \
1694 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1695 -s "received signature algorithm: 0x403" \
1696 -s "got named group: x448(001e)" \
1697 -s "Verifying peer X.509 certificate... ok" \
1698 -s "HTTP/1.0 200 OK" \
1699 -C "received HelloRetryRequest message"
1700
1701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001702requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001703requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1704requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1705requires_openssl_tls1_3
1706run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
1707 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1708 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1709 0 \
1710 -s "Protocol is TLSv1.3" \
1711 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1712 -s "received signature algorithm: 0x503" \
1713 -s "got named group: x448(001e)" \
1714 -s "Verifying peer X.509 certificate... ok" \
1715 -s "HTTP/1.0 200 OK" \
1716 -C "received HelloRetryRequest message"
1717
1718requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001719requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1722requires_openssl_tls1_3
1723run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
1724 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1725 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1726 0 \
1727 -s "Protocol is TLSv1.3" \
1728 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1729 -s "received signature algorithm: 0x603" \
1730 -s "got named group: x448(001e)" \
1731 -s "Verifying peer X.509 certificate... ok" \
1732 -s "HTTP/1.0 200 OK" \
1733 -C "received HelloRetryRequest message"
1734
1735requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001736requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1739requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1740requires_openssl_tls1_3
1741run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
1742 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1743 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1744 0 \
1745 -s "Protocol is TLSv1.3" \
1746 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1747 -s "received signature algorithm: 0x804" \
1748 -s "got named group: x448(001e)" \
1749 -s "Verifying peer X.509 certificate... ok" \
1750 -s "HTTP/1.0 200 OK" \
1751 -C "received HelloRetryRequest message"
1752
1753requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001754requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1757requires_gnutls_tls1_3
1758requires_gnutls_next_no_ticket
1759requires_gnutls_next_disable_tls13_compat
1760run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1761 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001762 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001763 0 \
1764 -s "Protocol is TLSv1.3" \
1765 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1766 -s "received signature algorithm: 0x403" \
1767 -s "got named group: secp256r1(0017)" \
1768 -s "Verifying peer X.509 certificate... ok" \
1769 -c "HTTP/1.0 200 OK" \
1770 -C "received HelloRetryRequest message"
1771
1772requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001773requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1776requires_gnutls_tls1_3
1777requires_gnutls_next_no_ticket
1778requires_gnutls_next_disable_tls13_compat
1779run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1780 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001781 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001782 0 \
1783 -s "Protocol is TLSv1.3" \
1784 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1785 -s "received signature algorithm: 0x503" \
1786 -s "got named group: secp256r1(0017)" \
1787 -s "Verifying peer X.509 certificate... ok" \
1788 -c "HTTP/1.0 200 OK" \
1789 -C "received HelloRetryRequest message"
1790
1791requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001792requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1794requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1795requires_gnutls_tls1_3
1796requires_gnutls_next_no_ticket
1797requires_gnutls_next_disable_tls13_compat
1798run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1799 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001800 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001801 0 \
1802 -s "Protocol is TLSv1.3" \
1803 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1804 -s "received signature algorithm: 0x603" \
1805 -s "got named group: secp256r1(0017)" \
1806 -s "Verifying peer X.509 certificate... ok" \
1807 -c "HTTP/1.0 200 OK" \
1808 -C "received HelloRetryRequest message"
1809
1810requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001811requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1814requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1815requires_gnutls_tls1_3
1816requires_gnutls_next_no_ticket
1817requires_gnutls_next_disable_tls13_compat
1818run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1819 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001820 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001821 0 \
1822 -s "Protocol is TLSv1.3" \
1823 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1824 -s "received signature algorithm: 0x804" \
1825 -s "got named group: secp256r1(0017)" \
1826 -s "Verifying peer X.509 certificate... ok" \
1827 -c "HTTP/1.0 200 OK" \
1828 -C "received HelloRetryRequest message"
1829
1830requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001831requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1834requires_gnutls_tls1_3
1835requires_gnutls_next_no_ticket
1836requires_gnutls_next_disable_tls13_compat
1837run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1838 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001839 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001840 0 \
1841 -s "Protocol is TLSv1.3" \
1842 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1843 -s "received signature algorithm: 0x403" \
1844 -s "got named group: secp384r1(0018)" \
1845 -s "Verifying peer X.509 certificate... ok" \
1846 -c "HTTP/1.0 200 OK" \
1847 -C "received HelloRetryRequest message"
1848
1849requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001850requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1853requires_gnutls_tls1_3
1854requires_gnutls_next_no_ticket
1855requires_gnutls_next_disable_tls13_compat
1856run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1857 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001858 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001859 0 \
1860 -s "Protocol is TLSv1.3" \
1861 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1862 -s "received signature algorithm: 0x503" \
1863 -s "got named group: secp384r1(0018)" \
1864 -s "Verifying peer X.509 certificate... ok" \
1865 -c "HTTP/1.0 200 OK" \
1866 -C "received HelloRetryRequest message"
1867
1868requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001869requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1872requires_gnutls_tls1_3
1873requires_gnutls_next_no_ticket
1874requires_gnutls_next_disable_tls13_compat
1875run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1876 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001877 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001878 0 \
1879 -s "Protocol is TLSv1.3" \
1880 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1881 -s "received signature algorithm: 0x603" \
1882 -s "got named group: secp384r1(0018)" \
1883 -s "Verifying peer X.509 certificate... ok" \
1884 -c "HTTP/1.0 200 OK" \
1885 -C "received HelloRetryRequest message"
1886
1887requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001888requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001889requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1890requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1891requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1892requires_gnutls_tls1_3
1893requires_gnutls_next_no_ticket
1894requires_gnutls_next_disable_tls13_compat
1895run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1896 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001897 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001898 0 \
1899 -s "Protocol is TLSv1.3" \
1900 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1901 -s "received signature algorithm: 0x804" \
1902 -s "got named group: secp384r1(0018)" \
1903 -s "Verifying peer X.509 certificate... ok" \
1904 -c "HTTP/1.0 200 OK" \
1905 -C "received HelloRetryRequest message"
1906
1907requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001908requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1911requires_gnutls_tls1_3
1912requires_gnutls_next_no_ticket
1913requires_gnutls_next_disable_tls13_compat
1914run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1915 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001916 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001917 0 \
1918 -s "Protocol is TLSv1.3" \
1919 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1920 -s "received signature algorithm: 0x403" \
1921 -s "got named group: secp521r1(0019)" \
1922 -s "Verifying peer X.509 certificate... ok" \
1923 -c "HTTP/1.0 200 OK" \
1924 -C "received HelloRetryRequest message"
1925
1926requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001927requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1930requires_gnutls_tls1_3
1931requires_gnutls_next_no_ticket
1932requires_gnutls_next_disable_tls13_compat
1933run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1934 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001935 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001936 0 \
1937 -s "Protocol is TLSv1.3" \
1938 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1939 -s "received signature algorithm: 0x503" \
1940 -s "got named group: secp521r1(0019)" \
1941 -s "Verifying peer X.509 certificate... ok" \
1942 -c "HTTP/1.0 200 OK" \
1943 -C "received HelloRetryRequest message"
1944
1945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001946requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1949requires_gnutls_tls1_3
1950requires_gnutls_next_no_ticket
1951requires_gnutls_next_disable_tls13_compat
1952run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1953 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001954 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001955 0 \
1956 -s "Protocol is TLSv1.3" \
1957 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1958 -s "received signature algorithm: 0x603" \
1959 -s "got named group: secp521r1(0019)" \
1960 -s "Verifying peer X.509 certificate... ok" \
1961 -c "HTTP/1.0 200 OK" \
1962 -C "received HelloRetryRequest message"
1963
1964requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001965requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1968requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1969requires_gnutls_tls1_3
1970requires_gnutls_next_no_ticket
1971requires_gnutls_next_disable_tls13_compat
1972run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1973 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001974 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001975 0 \
1976 -s "Protocol is TLSv1.3" \
1977 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1978 -s "received signature algorithm: 0x804" \
1979 -s "got named group: secp521r1(0019)" \
1980 -s "Verifying peer X.509 certificate... ok" \
1981 -c "HTTP/1.0 200 OK" \
1982 -C "received HelloRetryRequest message"
1983
1984requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001985requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1988requires_gnutls_tls1_3
1989requires_gnutls_next_no_ticket
1990requires_gnutls_next_disable_tls13_compat
1991run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
1992 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001993 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001994 0 \
1995 -s "Protocol is TLSv1.3" \
1996 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1997 -s "received signature algorithm: 0x403" \
1998 -s "got named group: x25519(001d)" \
1999 -s "Verifying peer X.509 certificate... ok" \
2000 -c "HTTP/1.0 200 OK" \
2001 -C "received HelloRetryRequest message"
2002
2003requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002004requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2007requires_gnutls_tls1_3
2008requires_gnutls_next_no_ticket
2009requires_gnutls_next_disable_tls13_compat
2010run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
2011 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002012 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002013 0 \
2014 -s "Protocol is TLSv1.3" \
2015 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2016 -s "received signature algorithm: 0x503" \
2017 -s "got named group: x25519(001d)" \
2018 -s "Verifying peer X.509 certificate... ok" \
2019 -c "HTTP/1.0 200 OK" \
2020 -C "received HelloRetryRequest message"
2021
2022requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002023requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2026requires_gnutls_tls1_3
2027requires_gnutls_next_no_ticket
2028requires_gnutls_next_disable_tls13_compat
2029run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
2030 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002031 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002032 0 \
2033 -s "Protocol is TLSv1.3" \
2034 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2035 -s "received signature algorithm: 0x603" \
2036 -s "got named group: x25519(001d)" \
2037 -s "Verifying peer X.509 certificate... ok" \
2038 -c "HTTP/1.0 200 OK" \
2039 -C "received HelloRetryRequest message"
2040
2041requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002042requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2045requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2046requires_gnutls_tls1_3
2047requires_gnutls_next_no_ticket
2048requires_gnutls_next_disable_tls13_compat
2049run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
2050 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002051 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002052 0 \
2053 -s "Protocol is TLSv1.3" \
2054 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2055 -s "received signature algorithm: 0x804" \
2056 -s "got named group: x25519(001d)" \
2057 -s "Verifying peer X.509 certificate... ok" \
2058 -c "HTTP/1.0 200 OK" \
2059 -C "received HelloRetryRequest message"
2060
2061requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002063requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2065requires_gnutls_tls1_3
2066requires_gnutls_next_no_ticket
2067requires_gnutls_next_disable_tls13_compat
2068run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
2069 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002070 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002071 0 \
2072 -s "Protocol is TLSv1.3" \
2073 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2074 -s "received signature algorithm: 0x403" \
2075 -s "got named group: x448(001e)" \
2076 -s "Verifying peer X.509 certificate... ok" \
2077 -c "HTTP/1.0 200 OK" \
2078 -C "received HelloRetryRequest message"
2079
2080requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002081requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2084requires_gnutls_tls1_3
2085requires_gnutls_next_no_ticket
2086requires_gnutls_next_disable_tls13_compat
2087run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
2088 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002089 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002090 0 \
2091 -s "Protocol is TLSv1.3" \
2092 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2093 -s "received signature algorithm: 0x503" \
2094 -s "got named group: x448(001e)" \
2095 -s "Verifying peer X.509 certificate... ok" \
2096 -c "HTTP/1.0 200 OK" \
2097 -C "received HelloRetryRequest message"
2098
2099requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002100requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002101requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2103requires_gnutls_tls1_3
2104requires_gnutls_next_no_ticket
2105requires_gnutls_next_disable_tls13_compat
2106run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
2107 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002108 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002109 0 \
2110 -s "Protocol is TLSv1.3" \
2111 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2112 -s "received signature algorithm: 0x603" \
2113 -s "got named group: x448(001e)" \
2114 -s "Verifying peer X.509 certificate... ok" \
2115 -c "HTTP/1.0 200 OK" \
2116 -C "received HelloRetryRequest message"
2117
2118requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002119requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2122requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2123requires_gnutls_tls1_3
2124requires_gnutls_next_no_ticket
2125requires_gnutls_next_disable_tls13_compat
2126run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
2127 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002128 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002129 0 \
2130 -s "Protocol is TLSv1.3" \
2131 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2132 -s "received signature algorithm: 0x804" \
2133 -s "got named group: x448(001e)" \
2134 -s "Verifying peer X.509 certificate... ok" \
2135 -c "HTTP/1.0 200 OK" \
2136 -C "received HelloRetryRequest message"
2137
2138requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002139requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2142requires_gnutls_tls1_3
2143requires_gnutls_next_no_ticket
2144requires_gnutls_next_disable_tls13_compat
2145run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
2146 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002147 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002148 0 \
2149 -s "Protocol is TLSv1.3" \
2150 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2151 -s "received signature algorithm: 0x403" \
2152 -s "got named group: secp256r1(0017)" \
2153 -s "Verifying peer X.509 certificate... ok" \
2154 -c "HTTP/1.0 200 OK" \
2155 -C "received HelloRetryRequest message"
2156
2157requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002158requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2161requires_gnutls_tls1_3
2162requires_gnutls_next_no_ticket
2163requires_gnutls_next_disable_tls13_compat
2164run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
2165 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002166 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002167 0 \
2168 -s "Protocol is TLSv1.3" \
2169 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2170 -s "received signature algorithm: 0x503" \
2171 -s "got named group: secp256r1(0017)" \
2172 -s "Verifying peer X.509 certificate... ok" \
2173 -c "HTTP/1.0 200 OK" \
2174 -C "received HelloRetryRequest message"
2175
2176requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002177requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2180requires_gnutls_tls1_3
2181requires_gnutls_next_no_ticket
2182requires_gnutls_next_disable_tls13_compat
2183run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
2184 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002185 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002186 0 \
2187 -s "Protocol is TLSv1.3" \
2188 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2189 -s "received signature algorithm: 0x603" \
2190 -s "got named group: secp256r1(0017)" \
2191 -s "Verifying peer X.509 certificate... ok" \
2192 -c "HTTP/1.0 200 OK" \
2193 -C "received HelloRetryRequest message"
2194
2195requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002196requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2198requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2199requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2200requires_gnutls_tls1_3
2201requires_gnutls_next_no_ticket
2202requires_gnutls_next_disable_tls13_compat
2203run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
2204 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002205 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002206 0 \
2207 -s "Protocol is TLSv1.3" \
2208 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2209 -s "received signature algorithm: 0x804" \
2210 -s "got named group: secp256r1(0017)" \
2211 -s "Verifying peer X.509 certificate... ok" \
2212 -c "HTTP/1.0 200 OK" \
2213 -C "received HelloRetryRequest message"
2214
2215requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002216requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002217requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2218requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2219requires_gnutls_tls1_3
2220requires_gnutls_next_no_ticket
2221requires_gnutls_next_disable_tls13_compat
2222run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
2223 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002224 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002225 0 \
2226 -s "Protocol is TLSv1.3" \
2227 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2228 -s "received signature algorithm: 0x403" \
2229 -s "got named group: secp384r1(0018)" \
2230 -s "Verifying peer X.509 certificate... ok" \
2231 -c "HTTP/1.0 200 OK" \
2232 -C "received HelloRetryRequest message"
2233
2234requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2238requires_gnutls_tls1_3
2239requires_gnutls_next_no_ticket
2240requires_gnutls_next_disable_tls13_compat
2241run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
2242 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002243 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002244 0 \
2245 -s "Protocol is TLSv1.3" \
2246 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2247 -s "received signature algorithm: 0x503" \
2248 -s "got named group: secp384r1(0018)" \
2249 -s "Verifying peer X.509 certificate... ok" \
2250 -c "HTTP/1.0 200 OK" \
2251 -C "received HelloRetryRequest message"
2252
2253requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002254requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2257requires_gnutls_tls1_3
2258requires_gnutls_next_no_ticket
2259requires_gnutls_next_disable_tls13_compat
2260run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
2261 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002262 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002263 0 \
2264 -s "Protocol is TLSv1.3" \
2265 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2266 -s "received signature algorithm: 0x603" \
2267 -s "got named group: secp384r1(0018)" \
2268 -s "Verifying peer X.509 certificate... ok" \
2269 -c "HTTP/1.0 200 OK" \
2270 -C "received HelloRetryRequest message"
2271
2272requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002273requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2276requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2277requires_gnutls_tls1_3
2278requires_gnutls_next_no_ticket
2279requires_gnutls_next_disable_tls13_compat
2280run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
2281 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002282 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002283 0 \
2284 -s "Protocol is TLSv1.3" \
2285 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2286 -s "received signature algorithm: 0x804" \
2287 -s "got named group: secp384r1(0018)" \
2288 -s "Verifying peer X.509 certificate... ok" \
2289 -c "HTTP/1.0 200 OK" \
2290 -C "received HelloRetryRequest message"
2291
2292requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002293requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2296requires_gnutls_tls1_3
2297requires_gnutls_next_no_ticket
2298requires_gnutls_next_disable_tls13_compat
2299run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
2300 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002301 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002302 0 \
2303 -s "Protocol is TLSv1.3" \
2304 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2305 -s "received signature algorithm: 0x403" \
2306 -s "got named group: secp521r1(0019)" \
2307 -s "Verifying peer X.509 certificate... ok" \
2308 -c "HTTP/1.0 200 OK" \
2309 -C "received HelloRetryRequest message"
2310
2311requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002312requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2315requires_gnutls_tls1_3
2316requires_gnutls_next_no_ticket
2317requires_gnutls_next_disable_tls13_compat
2318run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
2319 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002320 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002321 0 \
2322 -s "Protocol is TLSv1.3" \
2323 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2324 -s "received signature algorithm: 0x503" \
2325 -s "got named group: secp521r1(0019)" \
2326 -s "Verifying peer X.509 certificate... ok" \
2327 -c "HTTP/1.0 200 OK" \
2328 -C "received HelloRetryRequest message"
2329
2330requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002331requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2333requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2334requires_gnutls_tls1_3
2335requires_gnutls_next_no_ticket
2336requires_gnutls_next_disable_tls13_compat
2337run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
2338 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002339 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002340 0 \
2341 -s "Protocol is TLSv1.3" \
2342 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2343 -s "received signature algorithm: 0x603" \
2344 -s "got named group: secp521r1(0019)" \
2345 -s "Verifying peer X.509 certificate... ok" \
2346 -c "HTTP/1.0 200 OK" \
2347 -C "received HelloRetryRequest message"
2348
2349requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002350requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2353requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2354requires_gnutls_tls1_3
2355requires_gnutls_next_no_ticket
2356requires_gnutls_next_disable_tls13_compat
2357run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
2358 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002359 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002360 0 \
2361 -s "Protocol is TLSv1.3" \
2362 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2363 -s "received signature algorithm: 0x804" \
2364 -s "got named group: secp521r1(0019)" \
2365 -s "Verifying peer X.509 certificate... ok" \
2366 -c "HTTP/1.0 200 OK" \
2367 -C "received HelloRetryRequest message"
2368
2369requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002370requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2373requires_gnutls_tls1_3
2374requires_gnutls_next_no_ticket
2375requires_gnutls_next_disable_tls13_compat
2376run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
2377 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002378 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002379 0 \
2380 -s "Protocol is TLSv1.3" \
2381 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2382 -s "received signature algorithm: 0x403" \
2383 -s "got named group: x25519(001d)" \
2384 -s "Verifying peer X.509 certificate... ok" \
2385 -c "HTTP/1.0 200 OK" \
2386 -C "received HelloRetryRequest message"
2387
2388requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002389requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002390requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2391requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2392requires_gnutls_tls1_3
2393requires_gnutls_next_no_ticket
2394requires_gnutls_next_disable_tls13_compat
2395run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
2396 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002397 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002398 0 \
2399 -s "Protocol is TLSv1.3" \
2400 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2401 -s "received signature algorithm: 0x503" \
2402 -s "got named group: x25519(001d)" \
2403 -s "Verifying peer X.509 certificate... ok" \
2404 -c "HTTP/1.0 200 OK" \
2405 -C "received HelloRetryRequest message"
2406
2407requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2411requires_gnutls_tls1_3
2412requires_gnutls_next_no_ticket
2413requires_gnutls_next_disable_tls13_compat
2414run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
2415 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002416 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002417 0 \
2418 -s "Protocol is TLSv1.3" \
2419 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2420 -s "received signature algorithm: 0x603" \
2421 -s "got named group: x25519(001d)" \
2422 -s "Verifying peer X.509 certificate... ok" \
2423 -c "HTTP/1.0 200 OK" \
2424 -C "received HelloRetryRequest message"
2425
2426requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002427requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2430requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2431requires_gnutls_tls1_3
2432requires_gnutls_next_no_ticket
2433requires_gnutls_next_disable_tls13_compat
2434run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
2435 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002436 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002437 0 \
2438 -s "Protocol is TLSv1.3" \
2439 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2440 -s "received signature algorithm: 0x804" \
2441 -s "got named group: x25519(001d)" \
2442 -s "Verifying peer X.509 certificate... ok" \
2443 -c "HTTP/1.0 200 OK" \
2444 -C "received HelloRetryRequest message"
2445
2446requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002447requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002448requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2449requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2450requires_gnutls_tls1_3
2451requires_gnutls_next_no_ticket
2452requires_gnutls_next_disable_tls13_compat
2453run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
2454 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002455 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002456 0 \
2457 -s "Protocol is TLSv1.3" \
2458 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2459 -s "received signature algorithm: 0x403" \
2460 -s "got named group: x448(001e)" \
2461 -s "Verifying peer X.509 certificate... ok" \
2462 -c "HTTP/1.0 200 OK" \
2463 -C "received HelloRetryRequest message"
2464
2465requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002466requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002467requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2468requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2469requires_gnutls_tls1_3
2470requires_gnutls_next_no_ticket
2471requires_gnutls_next_disable_tls13_compat
2472run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
2473 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002474 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002475 0 \
2476 -s "Protocol is TLSv1.3" \
2477 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2478 -s "received signature algorithm: 0x503" \
2479 -s "got named group: x448(001e)" \
2480 -s "Verifying peer X.509 certificate... ok" \
2481 -c "HTTP/1.0 200 OK" \
2482 -C "received HelloRetryRequest message"
2483
2484requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002485requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2488requires_gnutls_tls1_3
2489requires_gnutls_next_no_ticket
2490requires_gnutls_next_disable_tls13_compat
2491run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
2492 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002493 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002494 0 \
2495 -s "Protocol is TLSv1.3" \
2496 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2497 -s "received signature algorithm: 0x603" \
2498 -s "got named group: x448(001e)" \
2499 -s "Verifying peer X.509 certificate... ok" \
2500 -c "HTTP/1.0 200 OK" \
2501 -C "received HelloRetryRequest message"
2502
2503requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002504requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2507requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2508requires_gnutls_tls1_3
2509requires_gnutls_next_no_ticket
2510requires_gnutls_next_disable_tls13_compat
2511run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
2512 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002513 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002514 0 \
2515 -s "Protocol is TLSv1.3" \
2516 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2517 -s "received signature algorithm: 0x804" \
2518 -s "got named group: x448(001e)" \
2519 -s "Verifying peer X.509 certificate... ok" \
2520 -c "HTTP/1.0 200 OK" \
2521 -C "received HelloRetryRequest message"
2522
2523requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002524requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002525requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2527requires_gnutls_tls1_3
2528requires_gnutls_next_no_ticket
2529requires_gnutls_next_disable_tls13_compat
2530run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
2531 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002532 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002533 0 \
2534 -s "Protocol is TLSv1.3" \
2535 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2536 -s "received signature algorithm: 0x403" \
2537 -s "got named group: secp256r1(0017)" \
2538 -s "Verifying peer X.509 certificate... ok" \
2539 -c "HTTP/1.0 200 OK" \
2540 -C "received HelloRetryRequest message"
2541
2542requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002543requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002544requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2545requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2546requires_gnutls_tls1_3
2547requires_gnutls_next_no_ticket
2548requires_gnutls_next_disable_tls13_compat
2549run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
2550 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002551 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002552 0 \
2553 -s "Protocol is TLSv1.3" \
2554 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2555 -s "received signature algorithm: 0x503" \
2556 -s "got named group: secp256r1(0017)" \
2557 -s "Verifying peer X.509 certificate... ok" \
2558 -c "HTTP/1.0 200 OK" \
2559 -C "received HelloRetryRequest message"
2560
2561requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2565requires_gnutls_tls1_3
2566requires_gnutls_next_no_ticket
2567requires_gnutls_next_disable_tls13_compat
2568run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
2569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002570 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002571 0 \
2572 -s "Protocol is TLSv1.3" \
2573 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2574 -s "received signature algorithm: 0x603" \
2575 -s "got named group: secp256r1(0017)" \
2576 -s "Verifying peer X.509 certificate... ok" \
2577 -c "HTTP/1.0 200 OK" \
2578 -C "received HelloRetryRequest message"
2579
2580requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002581requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2584requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2585requires_gnutls_tls1_3
2586requires_gnutls_next_no_ticket
2587requires_gnutls_next_disable_tls13_compat
2588run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
2589 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002590 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002591 0 \
2592 -s "Protocol is TLSv1.3" \
2593 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2594 -s "received signature algorithm: 0x804" \
2595 -s "got named group: secp256r1(0017)" \
2596 -s "Verifying peer X.509 certificate... ok" \
2597 -c "HTTP/1.0 200 OK" \
2598 -C "received HelloRetryRequest message"
2599
2600requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002601requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002602requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2604requires_gnutls_tls1_3
2605requires_gnutls_next_no_ticket
2606requires_gnutls_next_disable_tls13_compat
2607run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
2608 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002609 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002610 0 \
2611 -s "Protocol is TLSv1.3" \
2612 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2613 -s "received signature algorithm: 0x403" \
2614 -s "got named group: secp384r1(0018)" \
2615 -s "Verifying peer X.509 certificate... ok" \
2616 -c "HTTP/1.0 200 OK" \
2617 -C "received HelloRetryRequest message"
2618
2619requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002621requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2622requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2623requires_gnutls_tls1_3
2624requires_gnutls_next_no_ticket
2625requires_gnutls_next_disable_tls13_compat
2626run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
2627 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002628 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002629 0 \
2630 -s "Protocol is TLSv1.3" \
2631 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2632 -s "received signature algorithm: 0x503" \
2633 -s "got named group: secp384r1(0018)" \
2634 -s "Verifying peer X.509 certificate... ok" \
2635 -c "HTTP/1.0 200 OK" \
2636 -C "received HelloRetryRequest message"
2637
2638requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002639requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2641requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2642requires_gnutls_tls1_3
2643requires_gnutls_next_no_ticket
2644requires_gnutls_next_disable_tls13_compat
2645run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
2646 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002647 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002648 0 \
2649 -s "Protocol is TLSv1.3" \
2650 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2651 -s "received signature algorithm: 0x603" \
2652 -s "got named group: secp384r1(0018)" \
2653 -s "Verifying peer X.509 certificate... ok" \
2654 -c "HTTP/1.0 200 OK" \
2655 -C "received HelloRetryRequest message"
2656
2657requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002658requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2661requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2662requires_gnutls_tls1_3
2663requires_gnutls_next_no_ticket
2664requires_gnutls_next_disable_tls13_compat
2665run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
2666 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002667 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002668 0 \
2669 -s "Protocol is TLSv1.3" \
2670 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2671 -s "received signature algorithm: 0x804" \
2672 -s "got named group: secp384r1(0018)" \
2673 -s "Verifying peer X.509 certificate... ok" \
2674 -c "HTTP/1.0 200 OK" \
2675 -C "received HelloRetryRequest message"
2676
2677requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002678requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002679requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2680requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2681requires_gnutls_tls1_3
2682requires_gnutls_next_no_ticket
2683requires_gnutls_next_disable_tls13_compat
2684run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
2685 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002686 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002687 0 \
2688 -s "Protocol is TLSv1.3" \
2689 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2690 -s "received signature algorithm: 0x403" \
2691 -s "got named group: secp521r1(0019)" \
2692 -s "Verifying peer X.509 certificate... ok" \
2693 -c "HTTP/1.0 200 OK" \
2694 -C "received HelloRetryRequest message"
2695
2696requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002697requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2700requires_gnutls_tls1_3
2701requires_gnutls_next_no_ticket
2702requires_gnutls_next_disable_tls13_compat
2703run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
2704 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002705 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002706 0 \
2707 -s "Protocol is TLSv1.3" \
2708 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2709 -s "received signature algorithm: 0x503" \
2710 -s "got named group: secp521r1(0019)" \
2711 -s "Verifying peer X.509 certificate... ok" \
2712 -c "HTTP/1.0 200 OK" \
2713 -C "received HelloRetryRequest message"
2714
2715requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002716requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2718requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2719requires_gnutls_tls1_3
2720requires_gnutls_next_no_ticket
2721requires_gnutls_next_disable_tls13_compat
2722run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
2723 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002724 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002725 0 \
2726 -s "Protocol is TLSv1.3" \
2727 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2728 -s "received signature algorithm: 0x603" \
2729 -s "got named group: secp521r1(0019)" \
2730 -s "Verifying peer X.509 certificate... ok" \
2731 -c "HTTP/1.0 200 OK" \
2732 -C "received HelloRetryRequest message"
2733
2734requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002735requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002736requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2738requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2739requires_gnutls_tls1_3
2740requires_gnutls_next_no_ticket
2741requires_gnutls_next_disable_tls13_compat
2742run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
2743 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002744 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002745 0 \
2746 -s "Protocol is TLSv1.3" \
2747 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2748 -s "received signature algorithm: 0x804" \
2749 -s "got named group: secp521r1(0019)" \
2750 -s "Verifying peer X.509 certificate... ok" \
2751 -c "HTTP/1.0 200 OK" \
2752 -C "received HelloRetryRequest message"
2753
2754requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002755requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002756requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2757requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2758requires_gnutls_tls1_3
2759requires_gnutls_next_no_ticket
2760requires_gnutls_next_disable_tls13_compat
2761run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
2762 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002763 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002764 0 \
2765 -s "Protocol is TLSv1.3" \
2766 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2767 -s "received signature algorithm: 0x403" \
2768 -s "got named group: x25519(001d)" \
2769 -s "Verifying peer X.509 certificate... ok" \
2770 -c "HTTP/1.0 200 OK" \
2771 -C "received HelloRetryRequest message"
2772
2773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002774requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002775requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2777requires_gnutls_tls1_3
2778requires_gnutls_next_no_ticket
2779requires_gnutls_next_disable_tls13_compat
2780run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
2781 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002782 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002783 0 \
2784 -s "Protocol is TLSv1.3" \
2785 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2786 -s "received signature algorithm: 0x503" \
2787 -s "got named group: x25519(001d)" \
2788 -s "Verifying peer X.509 certificate... ok" \
2789 -c "HTTP/1.0 200 OK" \
2790 -C "received HelloRetryRequest message"
2791
2792requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002793requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2796requires_gnutls_tls1_3
2797requires_gnutls_next_no_ticket
2798requires_gnutls_next_disable_tls13_compat
2799run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
2800 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002801 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002802 0 \
2803 -s "Protocol is TLSv1.3" \
2804 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2805 -s "received signature algorithm: 0x603" \
2806 -s "got named group: x25519(001d)" \
2807 -s "Verifying peer X.509 certificate... ok" \
2808 -c "HTTP/1.0 200 OK" \
2809 -C "received HelloRetryRequest message"
2810
2811requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002812requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2815requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2816requires_gnutls_tls1_3
2817requires_gnutls_next_no_ticket
2818requires_gnutls_next_disable_tls13_compat
2819run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
2820 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002821 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002822 0 \
2823 -s "Protocol is TLSv1.3" \
2824 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2825 -s "received signature algorithm: 0x804" \
2826 -s "got named group: x25519(001d)" \
2827 -s "Verifying peer X.509 certificate... ok" \
2828 -c "HTTP/1.0 200 OK" \
2829 -C "received HelloRetryRequest message"
2830
2831requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002832requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002833requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2834requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2835requires_gnutls_tls1_3
2836requires_gnutls_next_no_ticket
2837requires_gnutls_next_disable_tls13_compat
2838run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
2839 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002840 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002841 0 \
2842 -s "Protocol is TLSv1.3" \
2843 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2844 -s "received signature algorithm: 0x403" \
2845 -s "got named group: x448(001e)" \
2846 -s "Verifying peer X.509 certificate... ok" \
2847 -c "HTTP/1.0 200 OK" \
2848 -C "received HelloRetryRequest message"
2849
2850requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002851requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2854requires_gnutls_tls1_3
2855requires_gnutls_next_no_ticket
2856requires_gnutls_next_disable_tls13_compat
2857run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
2858 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002859 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002860 0 \
2861 -s "Protocol is TLSv1.3" \
2862 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2863 -s "received signature algorithm: 0x503" \
2864 -s "got named group: x448(001e)" \
2865 -s "Verifying peer X.509 certificate... ok" \
2866 -c "HTTP/1.0 200 OK" \
2867 -C "received HelloRetryRequest message"
2868
2869requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002870requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2873requires_gnutls_tls1_3
2874requires_gnutls_next_no_ticket
2875requires_gnutls_next_disable_tls13_compat
2876run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
2877 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002878 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002879 0 \
2880 -s "Protocol is TLSv1.3" \
2881 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2882 -s "received signature algorithm: 0x603" \
2883 -s "got named group: x448(001e)" \
2884 -s "Verifying peer X.509 certificate... ok" \
2885 -c "HTTP/1.0 200 OK" \
2886 -C "received HelloRetryRequest message"
2887
2888requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002889requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002890requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2892requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2893requires_gnutls_tls1_3
2894requires_gnutls_next_no_ticket
2895requires_gnutls_next_disable_tls13_compat
2896run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
2897 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002898 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002899 0 \
2900 -s "Protocol is TLSv1.3" \
2901 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2902 -s "received signature algorithm: 0x804" \
2903 -s "got named group: x448(001e)" \
2904 -s "Verifying peer X.509 certificate... ok" \
2905 -c "HTTP/1.0 200 OK" \
2906 -C "received HelloRetryRequest message"
2907
2908requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002909requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002910requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2911requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2912requires_gnutls_tls1_3
2913requires_gnutls_next_no_ticket
2914requires_gnutls_next_disable_tls13_compat
2915run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
2916 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002917 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002918 0 \
2919 -s "Protocol is TLSv1.3" \
2920 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2921 -s "received signature algorithm: 0x403" \
2922 -s "got named group: secp256r1(0017)" \
2923 -s "Verifying peer X.509 certificate... ok" \
2924 -c "HTTP/1.0 200 OK" \
2925 -C "received HelloRetryRequest message"
2926
2927requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002928requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002929requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2931requires_gnutls_tls1_3
2932requires_gnutls_next_no_ticket
2933requires_gnutls_next_disable_tls13_compat
2934run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
2935 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002936 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002937 0 \
2938 -s "Protocol is TLSv1.3" \
2939 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2940 -s "received signature algorithm: 0x503" \
2941 -s "got named group: secp256r1(0017)" \
2942 -s "Verifying peer X.509 certificate... ok" \
2943 -c "HTTP/1.0 200 OK" \
2944 -C "received HelloRetryRequest message"
2945
2946requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002947requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002948requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2950requires_gnutls_tls1_3
2951requires_gnutls_next_no_ticket
2952requires_gnutls_next_disable_tls13_compat
2953run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
2954 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002955 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002956 0 \
2957 -s "Protocol is TLSv1.3" \
2958 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2959 -s "received signature algorithm: 0x603" \
2960 -s "got named group: secp256r1(0017)" \
2961 -s "Verifying peer X.509 certificate... ok" \
2962 -c "HTTP/1.0 200 OK" \
2963 -C "received HelloRetryRequest message"
2964
2965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002966requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002967requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2969requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2970requires_gnutls_tls1_3
2971requires_gnutls_next_no_ticket
2972requires_gnutls_next_disable_tls13_compat
2973run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
2974 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002975 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002976 0 \
2977 -s "Protocol is TLSv1.3" \
2978 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2979 -s "received signature algorithm: 0x804" \
2980 -s "got named group: secp256r1(0017)" \
2981 -s "Verifying peer X.509 certificate... ok" \
2982 -c "HTTP/1.0 200 OK" \
2983 -C "received HelloRetryRequest message"
2984
2985requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002986requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2989requires_gnutls_tls1_3
2990requires_gnutls_next_no_ticket
2991requires_gnutls_next_disable_tls13_compat
2992run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
2993 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002994 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002995 0 \
2996 -s "Protocol is TLSv1.3" \
2997 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2998 -s "received signature algorithm: 0x403" \
2999 -s "got named group: secp384r1(0018)" \
3000 -s "Verifying peer X.509 certificate... ok" \
3001 -c "HTTP/1.0 200 OK" \
3002 -C "received HelloRetryRequest message"
3003
3004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003005requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3007requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3008requires_gnutls_tls1_3
3009requires_gnutls_next_no_ticket
3010requires_gnutls_next_disable_tls13_compat
3011run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3012 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003013 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003014 0 \
3015 -s "Protocol is TLSv1.3" \
3016 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3017 -s "received signature algorithm: 0x503" \
3018 -s "got named group: secp384r1(0018)" \
3019 -s "Verifying peer X.509 certificate... ok" \
3020 -c "HTTP/1.0 200 OK" \
3021 -C "received HelloRetryRequest message"
3022
3023requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003024requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3027requires_gnutls_tls1_3
3028requires_gnutls_next_no_ticket
3029requires_gnutls_next_disable_tls13_compat
3030run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3031 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003032 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003033 0 \
3034 -s "Protocol is TLSv1.3" \
3035 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3036 -s "received signature algorithm: 0x603" \
3037 -s "got named group: secp384r1(0018)" \
3038 -s "Verifying peer X.509 certificate... ok" \
3039 -c "HTTP/1.0 200 OK" \
3040 -C "received HelloRetryRequest message"
3041
3042requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003043requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3046requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3047requires_gnutls_tls1_3
3048requires_gnutls_next_no_ticket
3049requires_gnutls_next_disable_tls13_compat
3050run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3051 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003052 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003053 0 \
3054 -s "Protocol is TLSv1.3" \
3055 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3056 -s "received signature algorithm: 0x804" \
3057 -s "got named group: secp384r1(0018)" \
3058 -s "Verifying peer X.509 certificate... ok" \
3059 -c "HTTP/1.0 200 OK" \
3060 -C "received HelloRetryRequest message"
3061
3062requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003063requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3066requires_gnutls_tls1_3
3067requires_gnutls_next_no_ticket
3068requires_gnutls_next_disable_tls13_compat
3069run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3070 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003071 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003072 0 \
3073 -s "Protocol is TLSv1.3" \
3074 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3075 -s "received signature algorithm: 0x403" \
3076 -s "got named group: secp521r1(0019)" \
3077 -s "Verifying peer X.509 certificate... ok" \
3078 -c "HTTP/1.0 200 OK" \
3079 -C "received HelloRetryRequest message"
3080
3081requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003082requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003083requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3085requires_gnutls_tls1_3
3086requires_gnutls_next_no_ticket
3087requires_gnutls_next_disable_tls13_compat
3088run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3089 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003090 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003091 0 \
3092 -s "Protocol is TLSv1.3" \
3093 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3094 -s "received signature algorithm: 0x503" \
3095 -s "got named group: secp521r1(0019)" \
3096 -s "Verifying peer X.509 certificate... ok" \
3097 -c "HTTP/1.0 200 OK" \
3098 -C "received HelloRetryRequest message"
3099
3100requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003101requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3104requires_gnutls_tls1_3
3105requires_gnutls_next_no_ticket
3106requires_gnutls_next_disable_tls13_compat
3107run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3108 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003109 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003110 0 \
3111 -s "Protocol is TLSv1.3" \
3112 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3113 -s "received signature algorithm: 0x603" \
3114 -s "got named group: secp521r1(0019)" \
3115 -s "Verifying peer X.509 certificate... ok" \
3116 -c "HTTP/1.0 200 OK" \
3117 -C "received HelloRetryRequest message"
3118
3119requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003120requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3123requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3124requires_gnutls_tls1_3
3125requires_gnutls_next_no_ticket
3126requires_gnutls_next_disable_tls13_compat
3127run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3128 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003129 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003130 0 \
3131 -s "Protocol is TLSv1.3" \
3132 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3133 -s "received signature algorithm: 0x804" \
3134 -s "got named group: secp521r1(0019)" \
3135 -s "Verifying peer X.509 certificate... ok" \
3136 -c "HTTP/1.0 200 OK" \
3137 -C "received HelloRetryRequest message"
3138
3139requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003140requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003141requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3142requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3143requires_gnutls_tls1_3
3144requires_gnutls_next_no_ticket
3145requires_gnutls_next_disable_tls13_compat
3146run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
3147 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003148 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003149 0 \
3150 -s "Protocol is TLSv1.3" \
3151 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3152 -s "received signature algorithm: 0x403" \
3153 -s "got named group: x25519(001d)" \
3154 -s "Verifying peer X.509 certificate... ok" \
3155 -c "HTTP/1.0 200 OK" \
3156 -C "received HelloRetryRequest message"
3157
3158requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003159requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003160requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3161requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3162requires_gnutls_tls1_3
3163requires_gnutls_next_no_ticket
3164requires_gnutls_next_disable_tls13_compat
3165run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
3166 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003167 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003168 0 \
3169 -s "Protocol is TLSv1.3" \
3170 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3171 -s "received signature algorithm: 0x503" \
3172 -s "got named group: x25519(001d)" \
3173 -s "Verifying peer X.509 certificate... ok" \
3174 -c "HTTP/1.0 200 OK" \
3175 -C "received HelloRetryRequest message"
3176
3177requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003178requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003179requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3181requires_gnutls_tls1_3
3182requires_gnutls_next_no_ticket
3183requires_gnutls_next_disable_tls13_compat
3184run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
3185 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003186 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003187 0 \
3188 -s "Protocol is TLSv1.3" \
3189 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3190 -s "received signature algorithm: 0x603" \
3191 -s "got named group: x25519(001d)" \
3192 -s "Verifying peer X.509 certificate... ok" \
3193 -c "HTTP/1.0 200 OK" \
3194 -C "received HelloRetryRequest message"
3195
3196requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003197requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3200requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3201requires_gnutls_tls1_3
3202requires_gnutls_next_no_ticket
3203requires_gnutls_next_disable_tls13_compat
3204run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
3205 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003206 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003207 0 \
3208 -s "Protocol is TLSv1.3" \
3209 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3210 -s "received signature algorithm: 0x804" \
3211 -s "got named group: x25519(001d)" \
3212 -s "Verifying peer X.509 certificate... ok" \
3213 -c "HTTP/1.0 200 OK" \
3214 -C "received HelloRetryRequest message"
3215
3216requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003217requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003218requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3219requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3220requires_gnutls_tls1_3
3221requires_gnutls_next_no_ticket
3222requires_gnutls_next_disable_tls13_compat
3223run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
3224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003225 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003226 0 \
3227 -s "Protocol is TLSv1.3" \
3228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3229 -s "received signature algorithm: 0x403" \
3230 -s "got named group: x448(001e)" \
3231 -s "Verifying peer X.509 certificate... ok" \
3232 -c "HTTP/1.0 200 OK" \
3233 -C "received HelloRetryRequest message"
3234
3235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003236requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3239requires_gnutls_tls1_3
3240requires_gnutls_next_no_ticket
3241requires_gnutls_next_disable_tls13_compat
3242run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
3243 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003244 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003245 0 \
3246 -s "Protocol is TLSv1.3" \
3247 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3248 -s "received signature algorithm: 0x503" \
3249 -s "got named group: x448(001e)" \
3250 -s "Verifying peer X.509 certificate... ok" \
3251 -c "HTTP/1.0 200 OK" \
3252 -C "received HelloRetryRequest message"
3253
3254requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003255requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3258requires_gnutls_tls1_3
3259requires_gnutls_next_no_ticket
3260requires_gnutls_next_disable_tls13_compat
3261run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
3262 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003263 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003264 0 \
3265 -s "Protocol is TLSv1.3" \
3266 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3267 -s "received signature algorithm: 0x603" \
3268 -s "got named group: x448(001e)" \
3269 -s "Verifying peer X.509 certificate... ok" \
3270 -c "HTTP/1.0 200 OK" \
3271 -C "received HelloRetryRequest message"
3272
3273requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003274requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3277requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3278requires_gnutls_tls1_3
3279requires_gnutls_next_no_ticket
3280requires_gnutls_next_disable_tls13_compat
3281run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
3282 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003283 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003284 0 \
3285 -s "Protocol is TLSv1.3" \
3286 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3287 -s "received signature algorithm: 0x804" \
3288 -s "got named group: x448(001e)" \
3289 -s "Verifying peer X.509 certificate... ok" \
3290 -c "HTTP/1.0 200 OK" \
3291 -C "received HelloRetryRequest message"
3292
3293requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003294requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003295requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3296requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3297requires_gnutls_tls1_3
3298requires_gnutls_next_no_ticket
3299requires_gnutls_next_disable_tls13_compat
3300run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
3301 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003302 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003303 0 \
3304 -s "Protocol is TLSv1.3" \
3305 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3306 -s "received signature algorithm: 0x403" \
3307 -s "got named group: secp256r1(0017)" \
3308 -s "Verifying peer X.509 certificate... ok" \
3309 -c "HTTP/1.0 200 OK" \
3310 -C "received HelloRetryRequest message"
3311
3312requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003313requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3316requires_gnutls_tls1_3
3317requires_gnutls_next_no_ticket
3318requires_gnutls_next_disable_tls13_compat
3319run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
3320 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003321 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003322 0 \
3323 -s "Protocol is TLSv1.3" \
3324 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3325 -s "received signature algorithm: 0x503" \
3326 -s "got named group: secp256r1(0017)" \
3327 -s "Verifying peer X.509 certificate... ok" \
3328 -c "HTTP/1.0 200 OK" \
3329 -C "received HelloRetryRequest message"
3330
3331requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003332requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003333requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3334requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3335requires_gnutls_tls1_3
3336requires_gnutls_next_no_ticket
3337requires_gnutls_next_disable_tls13_compat
3338run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
3339 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003340 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003341 0 \
3342 -s "Protocol is TLSv1.3" \
3343 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3344 -s "received signature algorithm: 0x603" \
3345 -s "got named group: secp256r1(0017)" \
3346 -s "Verifying peer X.509 certificate... ok" \
3347 -c "HTTP/1.0 200 OK" \
3348 -C "received HelloRetryRequest message"
3349
3350requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003351requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003352requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3353requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3354requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3355requires_gnutls_tls1_3
3356requires_gnutls_next_no_ticket
3357requires_gnutls_next_disable_tls13_compat
3358run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
3359 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003360 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003361 0 \
3362 -s "Protocol is TLSv1.3" \
3363 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3364 -s "received signature algorithm: 0x804" \
3365 -s "got named group: secp256r1(0017)" \
3366 -s "Verifying peer X.509 certificate... ok" \
3367 -c "HTTP/1.0 200 OK" \
3368 -C "received HelloRetryRequest message"
3369
3370requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003371requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003372requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3373requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3374requires_gnutls_tls1_3
3375requires_gnutls_next_no_ticket
3376requires_gnutls_next_disable_tls13_compat
3377run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
3378 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003379 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003380 0 \
3381 -s "Protocol is TLSv1.3" \
3382 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3383 -s "received signature algorithm: 0x403" \
3384 -s "got named group: secp384r1(0018)" \
3385 -s "Verifying peer X.509 certificate... ok" \
3386 -c "HTTP/1.0 200 OK" \
3387 -C "received HelloRetryRequest message"
3388
3389requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003390requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003391requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3393requires_gnutls_tls1_3
3394requires_gnutls_next_no_ticket
3395requires_gnutls_next_disable_tls13_compat
3396run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3397 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003398 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003399 0 \
3400 -s "Protocol is TLSv1.3" \
3401 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3402 -s "received signature algorithm: 0x503" \
3403 -s "got named group: secp384r1(0018)" \
3404 -s "Verifying peer X.509 certificate... ok" \
3405 -c "HTTP/1.0 200 OK" \
3406 -C "received HelloRetryRequest message"
3407
3408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003409requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3412requires_gnutls_tls1_3
3413requires_gnutls_next_no_ticket
3414requires_gnutls_next_disable_tls13_compat
3415run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3416 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003417 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003418 0 \
3419 -s "Protocol is TLSv1.3" \
3420 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3421 -s "received signature algorithm: 0x603" \
3422 -s "got named group: secp384r1(0018)" \
3423 -s "Verifying peer X.509 certificate... ok" \
3424 -c "HTTP/1.0 200 OK" \
3425 -C "received HelloRetryRequest message"
3426
3427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003428requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003429requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3431requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3432requires_gnutls_tls1_3
3433requires_gnutls_next_no_ticket
3434requires_gnutls_next_disable_tls13_compat
3435run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3436 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003437 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003438 0 \
3439 -s "Protocol is TLSv1.3" \
3440 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3441 -s "received signature algorithm: 0x804" \
3442 -s "got named group: secp384r1(0018)" \
3443 -s "Verifying peer X.509 certificate... ok" \
3444 -c "HTTP/1.0 200 OK" \
3445 -C "received HelloRetryRequest message"
3446
3447requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003448requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003449requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3450requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3451requires_gnutls_tls1_3
3452requires_gnutls_next_no_ticket
3453requires_gnutls_next_disable_tls13_compat
3454run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3455 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003456 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003457 0 \
3458 -s "Protocol is TLSv1.3" \
3459 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3460 -s "received signature algorithm: 0x403" \
3461 -s "got named group: secp521r1(0019)" \
3462 -s "Verifying peer X.509 certificate... ok" \
3463 -c "HTTP/1.0 200 OK" \
3464 -C "received HelloRetryRequest message"
3465
3466requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003467requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003468requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3469requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3470requires_gnutls_tls1_3
3471requires_gnutls_next_no_ticket
3472requires_gnutls_next_disable_tls13_compat
3473run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3474 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003475 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003476 0 \
3477 -s "Protocol is TLSv1.3" \
3478 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3479 -s "received signature algorithm: 0x503" \
3480 -s "got named group: secp521r1(0019)" \
3481 -s "Verifying peer X.509 certificate... ok" \
3482 -c "HTTP/1.0 200 OK" \
3483 -C "received HelloRetryRequest message"
3484
3485requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003486requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003487requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3489requires_gnutls_tls1_3
3490requires_gnutls_next_no_ticket
3491requires_gnutls_next_disable_tls13_compat
3492run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3493 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003494 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003495 0 \
3496 -s "Protocol is TLSv1.3" \
3497 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3498 -s "received signature algorithm: 0x603" \
3499 -s "got named group: secp521r1(0019)" \
3500 -s "Verifying peer X.509 certificate... ok" \
3501 -c "HTTP/1.0 200 OK" \
3502 -C "received HelloRetryRequest message"
3503
3504requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003505requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3508requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3509requires_gnutls_tls1_3
3510requires_gnutls_next_no_ticket
3511requires_gnutls_next_disable_tls13_compat
3512run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3513 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003514 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003515 0 \
3516 -s "Protocol is TLSv1.3" \
3517 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3518 -s "received signature algorithm: 0x804" \
3519 -s "got named group: secp521r1(0019)" \
3520 -s "Verifying peer X.509 certificate... ok" \
3521 -c "HTTP/1.0 200 OK" \
3522 -C "received HelloRetryRequest message"
3523
3524requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003525requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3528requires_gnutls_tls1_3
3529requires_gnutls_next_no_ticket
3530requires_gnutls_next_disable_tls13_compat
3531run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
3532 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003533 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003534 0 \
3535 -s "Protocol is TLSv1.3" \
3536 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3537 -s "received signature algorithm: 0x403" \
3538 -s "got named group: x25519(001d)" \
3539 -s "Verifying peer X.509 certificate... ok" \
3540 -c "HTTP/1.0 200 OK" \
3541 -C "received HelloRetryRequest message"
3542
3543requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003544requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003545requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3547requires_gnutls_tls1_3
3548requires_gnutls_next_no_ticket
3549requires_gnutls_next_disable_tls13_compat
3550run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
3551 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003552 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003553 0 \
3554 -s "Protocol is TLSv1.3" \
3555 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3556 -s "received signature algorithm: 0x503" \
3557 -s "got named group: x25519(001d)" \
3558 -s "Verifying peer X.509 certificate... ok" \
3559 -c "HTTP/1.0 200 OK" \
3560 -C "received HelloRetryRequest message"
3561
3562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003563requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3566requires_gnutls_tls1_3
3567requires_gnutls_next_no_ticket
3568requires_gnutls_next_disable_tls13_compat
3569run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
3570 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003571 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003572 0 \
3573 -s "Protocol is TLSv1.3" \
3574 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3575 -s "received signature algorithm: 0x603" \
3576 -s "got named group: x25519(001d)" \
3577 -s "Verifying peer X.509 certificate... ok" \
3578 -c "HTTP/1.0 200 OK" \
3579 -C "received HelloRetryRequest message"
3580
3581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003582requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003583requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3585requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3586requires_gnutls_tls1_3
3587requires_gnutls_next_no_ticket
3588requires_gnutls_next_disable_tls13_compat
3589run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
3590 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003591 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003592 0 \
3593 -s "Protocol is TLSv1.3" \
3594 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3595 -s "received signature algorithm: 0x804" \
3596 -s "got named group: x25519(001d)" \
3597 -s "Verifying peer X.509 certificate... ok" \
3598 -c "HTTP/1.0 200 OK" \
3599 -C "received HelloRetryRequest message"
3600
3601requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003602requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003603requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3605requires_gnutls_tls1_3
3606requires_gnutls_next_no_ticket
3607requires_gnutls_next_disable_tls13_compat
3608run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
3609 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003610 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003611 0 \
3612 -s "Protocol is TLSv1.3" \
3613 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3614 -s "received signature algorithm: 0x403" \
3615 -s "got named group: x448(001e)" \
3616 -s "Verifying peer X.509 certificate... ok" \
3617 -c "HTTP/1.0 200 OK" \
3618 -C "received HelloRetryRequest message"
3619
3620requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003621requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3624requires_gnutls_tls1_3
3625requires_gnutls_next_no_ticket
3626requires_gnutls_next_disable_tls13_compat
3627run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
3628 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003629 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003630 0 \
3631 -s "Protocol is TLSv1.3" \
3632 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3633 -s "received signature algorithm: 0x503" \
3634 -s "got named group: x448(001e)" \
3635 -s "Verifying peer X.509 certificate... ok" \
3636 -c "HTTP/1.0 200 OK" \
3637 -C "received HelloRetryRequest message"
3638
3639requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003640requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003641requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3642requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3643requires_gnutls_tls1_3
3644requires_gnutls_next_no_ticket
3645requires_gnutls_next_disable_tls13_compat
3646run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
3647 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003648 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003649 0 \
3650 -s "Protocol is TLSv1.3" \
3651 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3652 -s "received signature algorithm: 0x603" \
3653 -s "got named group: x448(001e)" \
3654 -s "Verifying peer X.509 certificate... ok" \
3655 -c "HTTP/1.0 200 OK" \
3656 -C "received HelloRetryRequest message"
3657
3658requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003659requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003660requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3661requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3662requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3663requires_gnutls_tls1_3
3664requires_gnutls_next_no_ticket
3665requires_gnutls_next_disable_tls13_compat
3666run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
3667 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003668 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003669 0 \
3670 -s "Protocol is TLSv1.3" \
3671 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3672 -s "received signature algorithm: 0x804" \
3673 -s "got named group: x448(001e)" \
3674 -s "Verifying peer X.509 certificate... ok" \
3675 -c "HTTP/1.0 200 OK" \
3676 -C "received HelloRetryRequest message"
3677
Jerry Yu31018ad2021-11-26 20:36:17 +08003678requires_openssl_tls1_3
3679requires_config_enabled MBEDTLS_DEBUG_C
3680requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003683run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003684 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003685 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003686 0 \
3687 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003688 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003689 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3690 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003691 -c "NamedGroup: secp256r1 ( 17 )" \
3692 -c "Verifying peer X.509 certificate... ok" \
3693 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003694
Jerry Yu31018ad2021-11-26 20:36:17 +08003695requires_openssl_tls1_3
3696requires_config_enabled MBEDTLS_DEBUG_C
3697requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003700run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003701 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003702 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003703 0 \
3704 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003705 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003706 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3707 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003708 -c "NamedGroup: secp256r1 ( 17 )" \
3709 -c "Verifying peer X.509 certificate... ok" \
3710 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003711
Jerry Yu31018ad2021-11-26 20:36:17 +08003712requires_openssl_tls1_3
3713requires_config_enabled MBEDTLS_DEBUG_C
3714requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003715requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003716requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003717run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003718 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003719 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003720 0 \
3721 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003722 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003723 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3724 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003725 -c "NamedGroup: secp256r1 ( 17 )" \
3726 -c "Verifying peer X.509 certificate... ok" \
3727 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003728
Jerry Yu31018ad2021-11-26 20:36:17 +08003729requires_openssl_tls1_3
3730requires_config_enabled MBEDTLS_DEBUG_C
3731requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003732requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003733requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003734requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003735run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003736 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003737 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003738 0 \
3739 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003740 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003741 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3742 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003743 -c "NamedGroup: secp256r1 ( 17 )" \
3744 -c "Verifying peer X.509 certificate... ok" \
3745 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003746
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003747requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003748requires_config_enabled MBEDTLS_DEBUG_C
3749requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003752run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003753 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003755 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003756 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003757 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003758 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003759 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3760 -c "NamedGroup: secp384r1 ( 18 )" \
3761 -c "Verifying peer X.509 certificate... ok" \
3762 -C "received HelloRetryRequest message"
3763
3764requires_openssl_tls1_3
3765requires_config_enabled MBEDTLS_DEBUG_C
3766requires_config_enabled MBEDTLS_SSL_CLI_C
3767requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3769run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003770 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003771 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
3772 0 \
3773 -c "HTTP/1.0 200 ok" \
3774 -c "Protocol is TLSv1.3" \
3775 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3776 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3777 -c "NamedGroup: secp384r1 ( 18 )" \
3778 -c "Verifying peer X.509 certificate... ok" \
3779 -C "received HelloRetryRequest message"
3780
3781requires_openssl_tls1_3
3782requires_config_enabled MBEDTLS_DEBUG_C
3783requires_config_enabled MBEDTLS_SSL_CLI_C
3784requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3785requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3786run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003787 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003788 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
3789 0 \
3790 -c "HTTP/1.0 200 ok" \
3791 -c "Protocol is TLSv1.3" \
3792 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3793 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3794 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003795 -c "Verifying peer X.509 certificate... ok" \
3796 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003797
Jerry Yu31018ad2021-11-26 20:36:17 +08003798requires_openssl_tls1_3
3799requires_config_enabled MBEDTLS_DEBUG_C
3800requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003801requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003803requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003804run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003805 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003806 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003807 0 \
3808 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003809 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003810 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3811 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003812 -c "NamedGroup: secp384r1 ( 18 )" \
3813 -c "Verifying peer X.509 certificate... ok" \
3814 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003815
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003816requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003817requires_config_enabled MBEDTLS_DEBUG_C
3818requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003821run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003822 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003823 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003824 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003825 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003826 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003827 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003828 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3829 -c "NamedGroup: secp521r1 ( 19 )" \
3830 -c "Verifying peer X.509 certificate... ok" \
3831 -C "received HelloRetryRequest message"
3832
3833requires_openssl_tls1_3
3834requires_config_enabled MBEDTLS_DEBUG_C
3835requires_config_enabled MBEDTLS_SSL_CLI_C
3836requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3838run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003839 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003840 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
3841 0 \
3842 -c "HTTP/1.0 200 ok" \
3843 -c "Protocol is TLSv1.3" \
3844 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3845 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3846 -c "NamedGroup: secp521r1 ( 19 )" \
3847 -c "Verifying peer X.509 certificate... ok" \
3848 -C "received HelloRetryRequest message"
3849
3850requires_openssl_tls1_3
3851requires_config_enabled MBEDTLS_DEBUG_C
3852requires_config_enabled MBEDTLS_SSL_CLI_C
3853requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3855run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003856 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003857 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
3858 0 \
3859 -c "HTTP/1.0 200 ok" \
3860 -c "Protocol is TLSv1.3" \
3861 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3862 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3863 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003864 -c "Verifying peer X.509 certificate... ok" \
3865 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003866
Jerry Yu31018ad2021-11-26 20:36:17 +08003867requires_openssl_tls1_3
3868requires_config_enabled MBEDTLS_DEBUG_C
3869requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003872requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003873run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003874 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003876 0 \
3877 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003878 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003879 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3880 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003881 -c "NamedGroup: secp521r1 ( 19 )" \
3882 -c "Verifying peer X.509 certificate... ok" \
3883 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003884
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003885requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003886requires_config_enabled MBEDTLS_DEBUG_C
3887requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003890run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003891 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003892 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003893 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003894 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003895 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003896 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003897 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3898 -c "NamedGroup: x25519 ( 1d )" \
3899 -c "Verifying peer X.509 certificate... ok" \
3900 -C "received HelloRetryRequest message"
3901
3902requires_openssl_tls1_3
3903requires_config_enabled MBEDTLS_DEBUG_C
3904requires_config_enabled MBEDTLS_SSL_CLI_C
3905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3906requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3907run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003908 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003909 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
3910 0 \
3911 -c "HTTP/1.0 200 ok" \
3912 -c "Protocol is TLSv1.3" \
3913 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3914 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3915 -c "NamedGroup: x25519 ( 1d )" \
3916 -c "Verifying peer X.509 certificate... ok" \
3917 -C "received HelloRetryRequest message"
3918
3919requires_openssl_tls1_3
3920requires_config_enabled MBEDTLS_DEBUG_C
3921requires_config_enabled MBEDTLS_SSL_CLI_C
3922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3924run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003925 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003926 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
3927 0 \
3928 -c "HTTP/1.0 200 ok" \
3929 -c "Protocol is TLSv1.3" \
3930 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3931 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3932 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003933 -c "Verifying peer X.509 certificate... ok" \
3934 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003935
Jerry Yu31018ad2021-11-26 20:36:17 +08003936requires_openssl_tls1_3
3937requires_config_enabled MBEDTLS_DEBUG_C
3938requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003939requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003940requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003941requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003942run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003943 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003944 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003945 0 \
3946 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003947 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003948 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3949 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003950 -c "NamedGroup: x25519 ( 1d )" \
3951 -c "Verifying peer X.509 certificate... ok" \
3952 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003953
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003954requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003955requires_config_enabled MBEDTLS_DEBUG_C
3956requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003957requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003959run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003960 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003961 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003962 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003963 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003964 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003965 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003966 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3967 -c "NamedGroup: x448 ( 1e )" \
3968 -c "Verifying peer X.509 certificate... ok" \
3969 -C "received HelloRetryRequest message"
3970
3971requires_openssl_tls1_3
3972requires_config_enabled MBEDTLS_DEBUG_C
3973requires_config_enabled MBEDTLS_SSL_CLI_C
3974requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3976run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003977 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003978 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
3979 0 \
3980 -c "HTTP/1.0 200 ok" \
3981 -c "Protocol is TLSv1.3" \
3982 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3983 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3984 -c "NamedGroup: x448 ( 1e )" \
3985 -c "Verifying peer X.509 certificate... ok" \
3986 -C "received HelloRetryRequest message"
3987
3988requires_openssl_tls1_3
3989requires_config_enabled MBEDTLS_DEBUG_C
3990requires_config_enabled MBEDTLS_SSL_CLI_C
3991requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3992requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3993run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003994 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003995 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
3996 0 \
3997 -c "HTTP/1.0 200 ok" \
3998 -c "Protocol is TLSv1.3" \
3999 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4000 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4001 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004002 -c "Verifying peer X.509 certificate... ok" \
4003 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004004
Jerry Yu31018ad2021-11-26 20:36:17 +08004005requires_openssl_tls1_3
4006requires_config_enabled MBEDTLS_DEBUG_C
4007requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004008requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004009requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004010requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004011run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004012 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004013 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004014 0 \
4015 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004016 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004017 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4018 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004019 -c "NamedGroup: x448 ( 1e )" \
4020 -c "Verifying peer X.509 certificate... ok" \
4021 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004022
Jerry Yu31018ad2021-11-26 20:36:17 +08004023requires_openssl_tls1_3
4024requires_config_enabled MBEDTLS_DEBUG_C
4025requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004026requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004028run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004029 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004030 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004031 0 \
4032 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004033 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004034 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4035 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004036 -c "NamedGroup: secp256r1 ( 17 )" \
4037 -c "Verifying peer X.509 certificate... ok" \
4038 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004039
Jerry Yu31018ad2021-11-26 20:36:17 +08004040requires_openssl_tls1_3
4041requires_config_enabled MBEDTLS_DEBUG_C
4042requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004045run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004046 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004047 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004048 0 \
4049 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004050 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004051 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4052 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004053 -c "NamedGroup: secp256r1 ( 17 )" \
4054 -c "Verifying peer X.509 certificate... ok" \
4055 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004056
Jerry Yu31018ad2021-11-26 20:36:17 +08004057requires_openssl_tls1_3
4058requires_config_enabled MBEDTLS_DEBUG_C
4059requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004062run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004063 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004064 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004065 0 \
4066 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004067 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004068 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4069 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004070 -c "NamedGroup: secp256r1 ( 17 )" \
4071 -c "Verifying peer X.509 certificate... ok" \
4072 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004073
Jerry Yu31018ad2021-11-26 20:36:17 +08004074requires_openssl_tls1_3
4075requires_config_enabled MBEDTLS_DEBUG_C
4076requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004077requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004078requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004079requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004080run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004081 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004082 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004083 0 \
4084 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004085 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004086 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4087 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004088 -c "NamedGroup: secp256r1 ( 17 )" \
4089 -c "Verifying peer X.509 certificate... ok" \
4090 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004091
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004092requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004093requires_config_enabled MBEDTLS_DEBUG_C
4094requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004097run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004098 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004099 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004100 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004101 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004102 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004103 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004104 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4105 -c "NamedGroup: secp384r1 ( 18 )" \
4106 -c "Verifying peer X.509 certificate... ok" \
4107 -C "received HelloRetryRequest message"
4108
4109requires_openssl_tls1_3
4110requires_config_enabled MBEDTLS_DEBUG_C
4111requires_config_enabled MBEDTLS_SSL_CLI_C
4112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4113requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4114run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004115 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004116 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4117 0 \
4118 -c "HTTP/1.0 200 ok" \
4119 -c "Protocol is TLSv1.3" \
4120 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4121 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4122 -c "NamedGroup: secp384r1 ( 18 )" \
4123 -c "Verifying peer X.509 certificate... ok" \
4124 -C "received HelloRetryRequest message"
4125
4126requires_openssl_tls1_3
4127requires_config_enabled MBEDTLS_DEBUG_C
4128requires_config_enabled MBEDTLS_SSL_CLI_C
4129requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4130requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4131run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004132 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004133 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4134 0 \
4135 -c "HTTP/1.0 200 ok" \
4136 -c "Protocol is TLSv1.3" \
4137 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4138 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4139 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004140 -c "Verifying peer X.509 certificate... ok" \
4141 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004142
Jerry Yu31018ad2021-11-26 20:36:17 +08004143requires_openssl_tls1_3
4144requires_config_enabled MBEDTLS_DEBUG_C
4145requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004146requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004148requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004149run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004150 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004151 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004152 0 \
4153 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004154 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004155 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4156 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004157 -c "NamedGroup: secp384r1 ( 18 )" \
4158 -c "Verifying peer X.509 certificate... ok" \
4159 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004160
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004161requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004162requires_config_enabled MBEDTLS_DEBUG_C
4163requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004164requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004166run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004167 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004168 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004169 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004170 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004171 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004172 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004173 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4174 -c "NamedGroup: secp521r1 ( 19 )" \
4175 -c "Verifying peer X.509 certificate... ok" \
4176 -C "received HelloRetryRequest message"
4177
4178requires_openssl_tls1_3
4179requires_config_enabled MBEDTLS_DEBUG_C
4180requires_config_enabled MBEDTLS_SSL_CLI_C
4181requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4183run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004184 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004185 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4186 0 \
4187 -c "HTTP/1.0 200 ok" \
4188 -c "Protocol is TLSv1.3" \
4189 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4190 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4191 -c "NamedGroup: secp521r1 ( 19 )" \
4192 -c "Verifying peer X.509 certificate... ok" \
4193 -C "received HelloRetryRequest message"
4194
4195requires_openssl_tls1_3
4196requires_config_enabled MBEDTLS_DEBUG_C
4197requires_config_enabled MBEDTLS_SSL_CLI_C
4198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4200run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004201 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004202 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4203 0 \
4204 -c "HTTP/1.0 200 ok" \
4205 -c "Protocol is TLSv1.3" \
4206 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4207 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4208 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004209 -c "Verifying peer X.509 certificate... ok" \
4210 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004211
Jerry Yu31018ad2021-11-26 20:36:17 +08004212requires_openssl_tls1_3
4213requires_config_enabled MBEDTLS_DEBUG_C
4214requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004215requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004216requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004217requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004218run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004219 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004221 0 \
4222 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004223 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004224 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4225 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004226 -c "NamedGroup: secp521r1 ( 19 )" \
4227 -c "Verifying peer X.509 certificate... ok" \
4228 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004229
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004230requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004231requires_config_enabled MBEDTLS_DEBUG_C
4232requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004233requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004235run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004236 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004237 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004238 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004239 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004240 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004241 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004242 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4243 -c "NamedGroup: x25519 ( 1d )" \
4244 -c "Verifying peer X.509 certificate... ok" \
4245 -C "received HelloRetryRequest message"
4246
4247requires_openssl_tls1_3
4248requires_config_enabled MBEDTLS_DEBUG_C
4249requires_config_enabled MBEDTLS_SSL_CLI_C
4250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4252run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004253 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004254 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4255 0 \
4256 -c "HTTP/1.0 200 ok" \
4257 -c "Protocol is TLSv1.3" \
4258 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4259 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4260 -c "NamedGroup: x25519 ( 1d )" \
4261 -c "Verifying peer X.509 certificate... ok" \
4262 -C "received HelloRetryRequest message"
4263
4264requires_openssl_tls1_3
4265requires_config_enabled MBEDTLS_DEBUG_C
4266requires_config_enabled MBEDTLS_SSL_CLI_C
4267requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4268requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4269run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004270 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004271 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4272 0 \
4273 -c "HTTP/1.0 200 ok" \
4274 -c "Protocol is TLSv1.3" \
4275 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4276 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4277 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004278 -c "Verifying peer X.509 certificate... ok" \
4279 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004280
Jerry Yu31018ad2021-11-26 20:36:17 +08004281requires_openssl_tls1_3
4282requires_config_enabled MBEDTLS_DEBUG_C
4283requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004287run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004288 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004289 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004290 0 \
4291 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004292 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004293 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4294 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004295 -c "NamedGroup: x25519 ( 1d )" \
4296 -c "Verifying peer X.509 certificate... ok" \
4297 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004298
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004299requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004300requires_config_enabled MBEDTLS_DEBUG_C
4301requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004302requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004304run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004305 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004307 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004308 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004309 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004310 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004311 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4312 -c "NamedGroup: x448 ( 1e )" \
4313 -c "Verifying peer X.509 certificate... ok" \
4314 -C "received HelloRetryRequest message"
4315
4316requires_openssl_tls1_3
4317requires_config_enabled MBEDTLS_DEBUG_C
4318requires_config_enabled MBEDTLS_SSL_CLI_C
4319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4321run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004322 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004323 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
4324 0 \
4325 -c "HTTP/1.0 200 ok" \
4326 -c "Protocol is TLSv1.3" \
4327 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4328 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4329 -c "NamedGroup: x448 ( 1e )" \
4330 -c "Verifying peer X.509 certificate... ok" \
4331 -C "received HelloRetryRequest message"
4332
4333requires_openssl_tls1_3
4334requires_config_enabled MBEDTLS_DEBUG_C
4335requires_config_enabled MBEDTLS_SSL_CLI_C
4336requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4337requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4338run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004339 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004340 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
4341 0 \
4342 -c "HTTP/1.0 200 ok" \
4343 -c "Protocol is TLSv1.3" \
4344 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4345 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4346 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004347 -c "Verifying peer X.509 certificate... ok" \
4348 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004349
Jerry Yu31018ad2021-11-26 20:36:17 +08004350requires_openssl_tls1_3
4351requires_config_enabled MBEDTLS_DEBUG_C
4352requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004353requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004354requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004355requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004356run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004357 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004358 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004359 0 \
4360 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004361 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004362 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4363 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004364 -c "NamedGroup: x448 ( 1e )" \
4365 -c "Verifying peer X.509 certificate... ok" \
4366 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004367
Jerry Yu31018ad2021-11-26 20:36:17 +08004368requires_openssl_tls1_3
4369requires_config_enabled MBEDTLS_DEBUG_C
4370requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004373run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004374 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004375 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004376 0 \
4377 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004378 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004379 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4380 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004381 -c "NamedGroup: secp256r1 ( 17 )" \
4382 -c "Verifying peer X.509 certificate... ok" \
4383 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004384
Jerry Yu31018ad2021-11-26 20:36:17 +08004385requires_openssl_tls1_3
4386requires_config_enabled MBEDTLS_DEBUG_C
4387requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004390run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004391 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004392 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004393 0 \
4394 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004395 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004396 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4397 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004398 -c "NamedGroup: secp256r1 ( 17 )" \
4399 -c "Verifying peer X.509 certificate... ok" \
4400 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004401
Jerry Yu31018ad2021-11-26 20:36:17 +08004402requires_openssl_tls1_3
4403requires_config_enabled MBEDTLS_DEBUG_C
4404requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004405requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004406requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004407run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004408 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004409 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004410 0 \
4411 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004412 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004413 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4414 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004415 -c "NamedGroup: secp256r1 ( 17 )" \
4416 -c "Verifying peer X.509 certificate... ok" \
4417 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004418
Jerry Yu31018ad2021-11-26 20:36:17 +08004419requires_openssl_tls1_3
4420requires_config_enabled MBEDTLS_DEBUG_C
4421requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004422requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004423requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004424requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004425run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004426 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004427 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004428 0 \
4429 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004430 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004431 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4432 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004433 -c "NamedGroup: secp256r1 ( 17 )" \
4434 -c "Verifying peer X.509 certificate... ok" \
4435 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004436
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004437requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004438requires_config_enabled MBEDTLS_DEBUG_C
4439requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004440requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004442run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004443 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004444 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004445 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004446 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004447 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004448 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004449 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4450 -c "NamedGroup: secp384r1 ( 18 )" \
4451 -c "Verifying peer X.509 certificate... ok" \
4452 -C "received HelloRetryRequest message"
4453
4454requires_openssl_tls1_3
4455requires_config_enabled MBEDTLS_DEBUG_C
4456requires_config_enabled MBEDTLS_SSL_CLI_C
4457requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4458requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4459run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004460 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004461 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4462 0 \
4463 -c "HTTP/1.0 200 ok" \
4464 -c "Protocol is TLSv1.3" \
4465 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4466 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4467 -c "NamedGroup: secp384r1 ( 18 )" \
4468 -c "Verifying peer X.509 certificate... ok" \
4469 -C "received HelloRetryRequest message"
4470
4471requires_openssl_tls1_3
4472requires_config_enabled MBEDTLS_DEBUG_C
4473requires_config_enabled MBEDTLS_SSL_CLI_C
4474requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4475requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4476run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004477 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004478 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4479 0 \
4480 -c "HTTP/1.0 200 ok" \
4481 -c "Protocol is TLSv1.3" \
4482 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4483 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4484 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004485 -c "Verifying peer X.509 certificate... ok" \
4486 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004487
Jerry Yu31018ad2021-11-26 20:36:17 +08004488requires_openssl_tls1_3
4489requires_config_enabled MBEDTLS_DEBUG_C
4490requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004491requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004492requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004493requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004494run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004495 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004496 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004497 0 \
4498 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004499 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004500 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4501 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004502 -c "NamedGroup: secp384r1 ( 18 )" \
4503 -c "Verifying peer X.509 certificate... ok" \
4504 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004505
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004506requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004507requires_config_enabled MBEDTLS_DEBUG_C
4508requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004509requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004510requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004511run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004512 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004513 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004514 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004515 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004516 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004517 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004518 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4519 -c "NamedGroup: secp521r1 ( 19 )" \
4520 -c "Verifying peer X.509 certificate... ok" \
4521 -C "received HelloRetryRequest message"
4522
4523requires_openssl_tls1_3
4524requires_config_enabled MBEDTLS_DEBUG_C
4525requires_config_enabled MBEDTLS_SSL_CLI_C
4526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4528run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004529 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004530 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4531 0 \
4532 -c "HTTP/1.0 200 ok" \
4533 -c "Protocol is TLSv1.3" \
4534 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4535 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4536 -c "NamedGroup: secp521r1 ( 19 )" \
4537 -c "Verifying peer X.509 certificate... ok" \
4538 -C "received HelloRetryRequest message"
4539
4540requires_openssl_tls1_3
4541requires_config_enabled MBEDTLS_DEBUG_C
4542requires_config_enabled MBEDTLS_SSL_CLI_C
4543requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4544requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4545run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004546 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004547 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4548 0 \
4549 -c "HTTP/1.0 200 ok" \
4550 -c "Protocol is TLSv1.3" \
4551 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4552 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4553 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004554 -c "Verifying peer X.509 certificate... ok" \
4555 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004556
Jerry Yu31018ad2021-11-26 20:36:17 +08004557requires_openssl_tls1_3
4558requires_config_enabled MBEDTLS_DEBUG_C
4559requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004560requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004561requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004562requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004563run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004564 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004565 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004566 0 \
4567 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004568 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004569 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4570 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004571 -c "NamedGroup: secp521r1 ( 19 )" \
4572 -c "Verifying peer X.509 certificate... ok" \
4573 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004574
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004575requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004576requires_config_enabled MBEDTLS_DEBUG_C
4577requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004580run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004581 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004582 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004583 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004584 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004585 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004586 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004587 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4588 -c "NamedGroup: x25519 ( 1d )" \
4589 -c "Verifying peer X.509 certificate... ok" \
4590 -C "received HelloRetryRequest message"
4591
4592requires_openssl_tls1_3
4593requires_config_enabled MBEDTLS_DEBUG_C
4594requires_config_enabled MBEDTLS_SSL_CLI_C
4595requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4596requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4597run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004598 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004599 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4600 0 \
4601 -c "HTTP/1.0 200 ok" \
4602 -c "Protocol is TLSv1.3" \
4603 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4604 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4605 -c "NamedGroup: x25519 ( 1d )" \
4606 -c "Verifying peer X.509 certificate... ok" \
4607 -C "received HelloRetryRequest message"
4608
4609requires_openssl_tls1_3
4610requires_config_enabled MBEDTLS_DEBUG_C
4611requires_config_enabled MBEDTLS_SSL_CLI_C
4612requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4614run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004615 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004616 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4617 0 \
4618 -c "HTTP/1.0 200 ok" \
4619 -c "Protocol is TLSv1.3" \
4620 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4621 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4622 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004623 -c "Verifying peer X.509 certificate... ok" \
4624 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004625
Jerry Yu31018ad2021-11-26 20:36:17 +08004626requires_openssl_tls1_3
4627requires_config_enabled MBEDTLS_DEBUG_C
4628requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004629requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004630requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004631requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004632run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004633 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004634 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004635 0 \
4636 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004637 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004638 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4639 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004640 -c "NamedGroup: x25519 ( 1d )" \
4641 -c "Verifying peer X.509 certificate... ok" \
4642 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004643
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004644requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004645requires_config_enabled MBEDTLS_DEBUG_C
4646requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004648requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004649run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004650 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004651 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004652 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004653 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004654 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004655 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004656 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4657 -c "NamedGroup: x448 ( 1e )" \
4658 -c "Verifying peer X.509 certificate... ok" \
4659 -C "received HelloRetryRequest message"
4660
4661requires_openssl_tls1_3
4662requires_config_enabled MBEDTLS_DEBUG_C
4663requires_config_enabled MBEDTLS_SSL_CLI_C
4664requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4665requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4666run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004667 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004668 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
4669 0 \
4670 -c "HTTP/1.0 200 ok" \
4671 -c "Protocol is TLSv1.3" \
4672 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4673 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4674 -c "NamedGroup: x448 ( 1e )" \
4675 -c "Verifying peer X.509 certificate... ok" \
4676 -C "received HelloRetryRequest message"
4677
4678requires_openssl_tls1_3
4679requires_config_enabled MBEDTLS_DEBUG_C
4680requires_config_enabled MBEDTLS_SSL_CLI_C
4681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4683run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004684 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004685 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
4686 0 \
4687 -c "HTTP/1.0 200 ok" \
4688 -c "Protocol is TLSv1.3" \
4689 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4690 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4691 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004692 -c "Verifying peer X.509 certificate... ok" \
4693 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004694
Jerry Yu31018ad2021-11-26 20:36:17 +08004695requires_openssl_tls1_3
4696requires_config_enabled MBEDTLS_DEBUG_C
4697requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004700requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004701run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004702 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004703 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004704 0 \
4705 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004706 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004707 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4708 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004709 -c "NamedGroup: x448 ( 1e )" \
4710 -c "Verifying peer X.509 certificate... ok" \
4711 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004712
Jerry Yu31018ad2021-11-26 20:36:17 +08004713requires_openssl_tls1_3
4714requires_config_enabled MBEDTLS_DEBUG_C
4715requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004716requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004717requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004718run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004719 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004720 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004721 0 \
4722 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004723 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004724 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4725 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004726 -c "NamedGroup: secp256r1 ( 17 )" \
4727 -c "Verifying peer X.509 certificate... ok" \
4728 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004729
Jerry Yu31018ad2021-11-26 20:36:17 +08004730requires_openssl_tls1_3
4731requires_config_enabled MBEDTLS_DEBUG_C
4732requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004733requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004734requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004735run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004736 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004737 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004738 0 \
4739 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004740 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004741 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4742 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004743 -c "NamedGroup: secp256r1 ( 17 )" \
4744 -c "Verifying peer X.509 certificate... ok" \
4745 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004746
Jerry Yu31018ad2021-11-26 20:36:17 +08004747requires_openssl_tls1_3
4748requires_config_enabled MBEDTLS_DEBUG_C
4749requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004752run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004753 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004755 0 \
4756 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004757 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004758 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4759 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004760 -c "NamedGroup: secp256r1 ( 17 )" \
4761 -c "Verifying peer X.509 certificate... ok" \
4762 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004763
Jerry Yu31018ad2021-11-26 20:36:17 +08004764requires_openssl_tls1_3
4765requires_config_enabled MBEDTLS_DEBUG_C
4766requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004767requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004769requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004770run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004771 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004772 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004773 0 \
4774 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004775 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004776 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4777 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004778 -c "NamedGroup: secp256r1 ( 17 )" \
4779 -c "Verifying peer X.509 certificate... ok" \
4780 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004781
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004782requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004783requires_config_enabled MBEDTLS_DEBUG_C
4784requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004785requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004786requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004787run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004788 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004789 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004790 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004791 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004792 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004793 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004794 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4795 -c "NamedGroup: secp384r1 ( 18 )" \
4796 -c "Verifying peer X.509 certificate... ok" \
4797 -C "received HelloRetryRequest message"
4798
4799requires_openssl_tls1_3
4800requires_config_enabled MBEDTLS_DEBUG_C
4801requires_config_enabled MBEDTLS_SSL_CLI_C
4802requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4803requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4804run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004805 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004806 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4807 0 \
4808 -c "HTTP/1.0 200 ok" \
4809 -c "Protocol is TLSv1.3" \
4810 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4811 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4812 -c "NamedGroup: secp384r1 ( 18 )" \
4813 -c "Verifying peer X.509 certificate... ok" \
4814 -C "received HelloRetryRequest message"
4815
4816requires_openssl_tls1_3
4817requires_config_enabled MBEDTLS_DEBUG_C
4818requires_config_enabled MBEDTLS_SSL_CLI_C
4819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4821run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004822 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004823 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4824 0 \
4825 -c "HTTP/1.0 200 ok" \
4826 -c "Protocol is TLSv1.3" \
4827 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4828 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4829 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004830 -c "Verifying peer X.509 certificate... ok" \
4831 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004832
Jerry Yu31018ad2021-11-26 20:36:17 +08004833requires_openssl_tls1_3
4834requires_config_enabled MBEDTLS_DEBUG_C
4835requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004836requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004838requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004839run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004840 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004841 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004842 0 \
4843 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004844 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004845 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4846 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004847 -c "NamedGroup: secp384r1 ( 18 )" \
4848 -c "Verifying peer X.509 certificate... ok" \
4849 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004850
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004851requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004852requires_config_enabled MBEDTLS_DEBUG_C
4853requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004854requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004855requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004856run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004857 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004858 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004859 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004860 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004861 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004862 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004863 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4864 -c "NamedGroup: secp521r1 ( 19 )" \
4865 -c "Verifying peer X.509 certificate... ok" \
4866 -C "received HelloRetryRequest message"
4867
4868requires_openssl_tls1_3
4869requires_config_enabled MBEDTLS_DEBUG_C
4870requires_config_enabled MBEDTLS_SSL_CLI_C
4871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4873run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004874 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4876 0 \
4877 -c "HTTP/1.0 200 ok" \
4878 -c "Protocol is TLSv1.3" \
4879 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4880 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4881 -c "NamedGroup: secp521r1 ( 19 )" \
4882 -c "Verifying peer X.509 certificate... ok" \
4883 -C "received HelloRetryRequest message"
4884
4885requires_openssl_tls1_3
4886requires_config_enabled MBEDTLS_DEBUG_C
4887requires_config_enabled MBEDTLS_SSL_CLI_C
4888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4890run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004891 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004892 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4893 0 \
4894 -c "HTTP/1.0 200 ok" \
4895 -c "Protocol is TLSv1.3" \
4896 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4897 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4898 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004899 -c "Verifying peer X.509 certificate... ok" \
4900 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004901
Jerry Yu31018ad2021-11-26 20:36:17 +08004902requires_openssl_tls1_3
4903requires_config_enabled MBEDTLS_DEBUG_C
4904requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004906requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004907requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004908run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004909 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004910 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004911 0 \
4912 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004913 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004914 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4915 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004916 -c "NamedGroup: secp521r1 ( 19 )" \
4917 -c "Verifying peer X.509 certificate... ok" \
4918 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004919
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004920requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004921requires_config_enabled MBEDTLS_DEBUG_C
4922requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004923requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004925run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004926 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004927 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004928 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004929 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004930 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004931 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004932 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4933 -c "NamedGroup: x25519 ( 1d )" \
4934 -c "Verifying peer X.509 certificate... ok" \
4935 -C "received HelloRetryRequest message"
4936
4937requires_openssl_tls1_3
4938requires_config_enabled MBEDTLS_DEBUG_C
4939requires_config_enabled MBEDTLS_SSL_CLI_C
4940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4942run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004943 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004944 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4945 0 \
4946 -c "HTTP/1.0 200 ok" \
4947 -c "Protocol is TLSv1.3" \
4948 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4949 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4950 -c "NamedGroup: x25519 ( 1d )" \
4951 -c "Verifying peer X.509 certificate... ok" \
4952 -C "received HelloRetryRequest message"
4953
4954requires_openssl_tls1_3
4955requires_config_enabled MBEDTLS_DEBUG_C
4956requires_config_enabled MBEDTLS_SSL_CLI_C
4957requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4959run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004960 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004961 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4962 0 \
4963 -c "HTTP/1.0 200 ok" \
4964 -c "Protocol is TLSv1.3" \
4965 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4966 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4967 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004968 -c "Verifying peer X.509 certificate... ok" \
4969 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004970
Jerry Yu31018ad2021-11-26 20:36:17 +08004971requires_openssl_tls1_3
4972requires_config_enabled MBEDTLS_DEBUG_C
4973requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004974requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004976requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004977run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004978 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004979 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004980 0 \
4981 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004982 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004983 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4984 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004985 -c "NamedGroup: x25519 ( 1d )" \
4986 -c "Verifying peer X.509 certificate... ok" \
4987 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004988
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004989requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004990requires_config_enabled MBEDTLS_DEBUG_C
4991requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004992requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004994run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004995 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004996 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004997 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004998 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004999 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005000 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005001 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5002 -c "NamedGroup: x448 ( 1e )" \
5003 -c "Verifying peer X.509 certificate... ok" \
5004 -C "received HelloRetryRequest message"
5005
5006requires_openssl_tls1_3
5007requires_config_enabled MBEDTLS_DEBUG_C
5008requires_config_enabled MBEDTLS_SSL_CLI_C
5009requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5010requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5011run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005012 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005013 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
5014 0 \
5015 -c "HTTP/1.0 200 ok" \
5016 -c "Protocol is TLSv1.3" \
5017 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5018 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5019 -c "NamedGroup: x448 ( 1e )" \
5020 -c "Verifying peer X.509 certificate... ok" \
5021 -C "received HelloRetryRequest message"
5022
5023requires_openssl_tls1_3
5024requires_config_enabled MBEDTLS_DEBUG_C
5025requires_config_enabled MBEDTLS_SSL_CLI_C
5026requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5028run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005029 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005030 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
5031 0 \
5032 -c "HTTP/1.0 200 ok" \
5033 -c "Protocol is TLSv1.3" \
5034 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5035 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5036 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005037 -c "Verifying peer X.509 certificate... ok" \
5038 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005039
Jerry Yu31018ad2021-11-26 20:36:17 +08005040requires_openssl_tls1_3
5041requires_config_enabled MBEDTLS_DEBUG_C
5042requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08005045requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02005046run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005047 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005049 0 \
5050 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005051 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005052 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5053 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005054 -c "NamedGroup: x448 ( 1e )" \
5055 -c "Verifying peer X.509 certificate... ok" \
5056 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005057
Jerry Yu31018ad2021-11-26 20:36:17 +08005058requires_openssl_tls1_3
5059requires_config_enabled MBEDTLS_DEBUG_C
5060requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005061requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005063run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005064 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005065 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005066 0 \
5067 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005068 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005069 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5070 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005071 -c "NamedGroup: secp256r1 ( 17 )" \
5072 -c "Verifying peer X.509 certificate... ok" \
5073 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005074
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005075requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005076requires_config_enabled MBEDTLS_DEBUG_C
5077requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005078requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005079requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005080run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005081 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005082 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005083 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005084 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005085 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005086 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005087 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5088 -c "NamedGroup: secp256r1 ( 17 )" \
5089 -c "Verifying peer X.509 certificate... ok" \
5090 -C "received HelloRetryRequest message"
5091
5092requires_openssl_tls1_3
5093requires_config_enabled MBEDTLS_DEBUG_C
5094requires_config_enabled MBEDTLS_SSL_CLI_C
5095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5097run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005098 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005099 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5100 0 \
5101 -c "HTTP/1.0 200 ok" \
5102 -c "Protocol is TLSv1.3" \
5103 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5104 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5105 -c "NamedGroup: secp256r1 ( 17 )" \
5106 -c "Verifying peer X.509 certificate... ok" \
5107 -C "received HelloRetryRequest message"
5108
5109requires_openssl_tls1_3
5110requires_config_enabled MBEDTLS_DEBUG_C
5111requires_config_enabled MBEDTLS_SSL_CLI_C
5112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5113requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5114requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5115run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005116 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005117 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5118 0 \
5119 -c "HTTP/1.0 200 ok" \
5120 -c "Protocol is TLSv1.3" \
5121 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5122 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005123 -c "NamedGroup: secp256r1 ( 17 )" \
5124 -c "Verifying peer X.509 certificate... ok" \
5125 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005126
Jerry Yu31018ad2021-11-26 20:36:17 +08005127requires_openssl_tls1_3
5128requires_config_enabled MBEDTLS_DEBUG_C
5129requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005130requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005131requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005132run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005133 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005134 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005135 0 \
5136 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005137 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005138 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5139 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005140 -c "NamedGroup: secp384r1 ( 18 )" \
5141 -c "Verifying peer X.509 certificate... ok" \
5142 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005143
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005144requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005145requires_config_enabled MBEDTLS_DEBUG_C
5146requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005147requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005148requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005149run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005150 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005151 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005152 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005153 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005154 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005155 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005156 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5157 -c "NamedGroup: secp384r1 ( 18 )" \
5158 -c "Verifying peer X.509 certificate... ok" \
5159 -C "received HelloRetryRequest message"
5160
5161requires_openssl_tls1_3
5162requires_config_enabled MBEDTLS_DEBUG_C
5163requires_config_enabled MBEDTLS_SSL_CLI_C
5164requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5166run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005167 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005168 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5169 0 \
5170 -c "HTTP/1.0 200 ok" \
5171 -c "Protocol is TLSv1.3" \
5172 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5173 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5174 -c "NamedGroup: secp384r1 ( 18 )" \
5175 -c "Verifying peer X.509 certificate... ok" \
5176 -C "received HelloRetryRequest message"
5177
5178requires_openssl_tls1_3
5179requires_config_enabled MBEDTLS_DEBUG_C
5180requires_config_enabled MBEDTLS_SSL_CLI_C
5181requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5183requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5184run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005185 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005186 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5187 0 \
5188 -c "HTTP/1.0 200 ok" \
5189 -c "Protocol is TLSv1.3" \
5190 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5191 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005192 -c "NamedGroup: secp384r1 ( 18 )" \
5193 -c "Verifying peer X.509 certificate... ok" \
5194 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005195
Jerry Yu31018ad2021-11-26 20:36:17 +08005196requires_openssl_tls1_3
5197requires_config_enabled MBEDTLS_DEBUG_C
5198requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005199requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005201run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005202 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005203 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005204 0 \
5205 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005206 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005207 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5208 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005209 -c "NamedGroup: secp521r1 ( 19 )" \
5210 -c "Verifying peer X.509 certificate... ok" \
5211 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005212
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005213requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005214requires_config_enabled MBEDTLS_DEBUG_C
5215requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005218run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005219 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005221 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005222 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005223 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005224 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005225 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5226 -c "NamedGroup: secp521r1 ( 19 )" \
5227 -c "Verifying peer X.509 certificate... ok" \
5228 -C "received HelloRetryRequest message"
5229
5230requires_openssl_tls1_3
5231requires_config_enabled MBEDTLS_DEBUG_C
5232requires_config_enabled MBEDTLS_SSL_CLI_C
5233requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5235run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005236 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005237 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5238 0 \
5239 -c "HTTP/1.0 200 ok" \
5240 -c "Protocol is TLSv1.3" \
5241 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5242 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5243 -c "NamedGroup: secp521r1 ( 19 )" \
5244 -c "Verifying peer X.509 certificate... ok" \
5245 -C "received HelloRetryRequest message"
5246
5247requires_openssl_tls1_3
5248requires_config_enabled MBEDTLS_DEBUG_C
5249requires_config_enabled MBEDTLS_SSL_CLI_C
5250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5252requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5253run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005254 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005255 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
5256 0 \
5257 -c "HTTP/1.0 200 ok" \
5258 -c "Protocol is TLSv1.3" \
5259 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5260 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005261 -c "NamedGroup: secp521r1 ( 19 )" \
5262 -c "Verifying peer X.509 certificate... ok" \
5263 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005264
Jerry Yu31018ad2021-11-26 20:36:17 +08005265requires_openssl_tls1_3
5266requires_config_enabled MBEDTLS_DEBUG_C
5267requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005268requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005269requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005270run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005271 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005272 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005273 0 \
5274 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005275 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005276 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5277 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005278 -c "NamedGroup: x25519 ( 1d )" \
5279 -c "Verifying peer X.509 certificate... ok" \
5280 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005281
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005282requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005283requires_config_enabled MBEDTLS_DEBUG_C
5284requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005285requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005286requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005287run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005288 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005289 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005290 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005291 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005292 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005293 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005294 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5295 -c "NamedGroup: x25519 ( 1d )" \
5296 -c "Verifying peer X.509 certificate... ok" \
5297 -C "received HelloRetryRequest message"
5298
5299requires_openssl_tls1_3
5300requires_config_enabled MBEDTLS_DEBUG_C
5301requires_config_enabled MBEDTLS_SSL_CLI_C
5302requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5304run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005305 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
5307 0 \
5308 -c "HTTP/1.0 200 ok" \
5309 -c "Protocol is TLSv1.3" \
5310 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5311 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5312 -c "NamedGroup: x25519 ( 1d )" \
5313 -c "Verifying peer X.509 certificate... ok" \
5314 -C "received HelloRetryRequest message"
5315
5316requires_openssl_tls1_3
5317requires_config_enabled MBEDTLS_DEBUG_C
5318requires_config_enabled MBEDTLS_SSL_CLI_C
5319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5321requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5322run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005323 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005324 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
5325 0 \
5326 -c "HTTP/1.0 200 ok" \
5327 -c "Protocol is TLSv1.3" \
5328 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5329 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005330 -c "NamedGroup: x25519 ( 1d )" \
5331 -c "Verifying peer X.509 certificate... ok" \
5332 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005333
Jerry Yu31018ad2021-11-26 20:36:17 +08005334requires_openssl_tls1_3
5335requires_config_enabled MBEDTLS_DEBUG_C
5336requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005337requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005338requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005339run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005340 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005341 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005342 0 \
5343 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005344 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005345 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5346 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005347 -c "NamedGroup: x448 ( 1e )" \
5348 -c "Verifying peer X.509 certificate... ok" \
5349 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005350
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005351requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005352requires_config_enabled MBEDTLS_DEBUG_C
5353requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005356run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005357 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005358 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005359 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005360 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005361 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005362 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005363 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005364 -c "NamedGroup: x448 ( 1e )" \
5365 -c "Verifying peer X.509 certificate... ok" \
5366 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005367
Jerry Yu31018ad2021-11-26 20:36:17 +08005368requires_openssl_tls1_3
5369requires_config_enabled MBEDTLS_DEBUG_C
5370requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005373run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005374 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005375 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005376 0 \
5377 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005378 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005379 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005380 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5381 -c "NamedGroup: x448 ( 1e )" \
5382 -c "Verifying peer X.509 certificate... ok" \
5383 -C "received HelloRetryRequest message"
5384
5385requires_openssl_tls1_3
5386requires_config_enabled MBEDTLS_DEBUG_C
5387requires_config_enabled MBEDTLS_SSL_CLI_C
5388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5390requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5391run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005392 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005393 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
5394 0 \
5395 -c "HTTP/1.0 200 ok" \
5396 -c "Protocol is TLSv1.3" \
5397 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5398 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5399 -c "NamedGroup: x448 ( 1e )" \
5400 -c "Verifying peer X.509 certificate... ok" \
5401 -C "received HelloRetryRequest message"
5402
5403requires_gnutls_tls1_3
5404requires_gnutls_next_no_ticket
5405requires_gnutls_next_disable_tls13_compat
5406requires_config_enabled MBEDTLS_DEBUG_C
5407requires_config_enabled MBEDTLS_SSL_CLI_C
5408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5410run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005411 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005412 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
5413 0 \
5414 -c "HTTP/1.0 200 OK" \
5415 -c "Protocol is TLSv1.3" \
5416 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5417 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5418 -c "NamedGroup: secp256r1 ( 17 )" \
5419 -c "Verifying peer X.509 certificate... ok" \
5420 -C "received HelloRetryRequest message"
5421
5422requires_gnutls_tls1_3
5423requires_gnutls_next_no_ticket
5424requires_gnutls_next_disable_tls13_compat
5425requires_config_enabled MBEDTLS_DEBUG_C
5426requires_config_enabled MBEDTLS_SSL_CLI_C
5427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5429run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005430 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005431 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
5432 0 \
5433 -c "HTTP/1.0 200 OK" \
5434 -c "Protocol is TLSv1.3" \
5435 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005436 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005437 -c "NamedGroup: secp256r1 ( 17 )" \
5438 -c "Verifying peer X.509 certificate... ok" \
5439 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005440
Jerry Yu31018ad2021-11-26 20:36:17 +08005441requires_gnutls_tls1_3
5442requires_gnutls_next_no_ticket
5443requires_gnutls_next_disable_tls13_compat
5444requires_config_enabled MBEDTLS_DEBUG_C
5445requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005446requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005448run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005449 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005450 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5451 0 \
5452 -c "HTTP/1.0 200 OK" \
5453 -c "Protocol is TLSv1.3" \
5454 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5455 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5456 -c "NamedGroup: secp256r1 ( 17 )" \
5457 -c "Verifying peer X.509 certificate... ok" \
5458 -C "received HelloRetryRequest message"
5459
5460requires_gnutls_tls1_3
5461requires_gnutls_next_no_ticket
5462requires_gnutls_next_disable_tls13_compat
5463requires_config_enabled MBEDTLS_DEBUG_C
5464requires_config_enabled MBEDTLS_SSL_CLI_C
5465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5467requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5468run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005469 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005470 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5471 0 \
5472 -c "HTTP/1.0 200 OK" \
5473 -c "Protocol is TLSv1.3" \
5474 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5475 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5476 -c "NamedGroup: secp256r1 ( 17 )" \
5477 -c "Verifying peer X.509 certificate... ok" \
5478 -C "received HelloRetryRequest message"
5479
5480requires_gnutls_tls1_3
5481requires_gnutls_next_no_ticket
5482requires_gnutls_next_disable_tls13_compat
5483requires_config_enabled MBEDTLS_DEBUG_C
5484requires_config_enabled MBEDTLS_SSL_CLI_C
5485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5487run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005488 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005489 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
5490 0 \
5491 -c "HTTP/1.0 200 OK" \
5492 -c "Protocol is TLSv1.3" \
5493 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5494 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5495 -c "NamedGroup: secp384r1 ( 18 )" \
5496 -c "Verifying peer X.509 certificate... ok" \
5497 -C "received HelloRetryRequest message"
5498
5499requires_gnutls_tls1_3
5500requires_gnutls_next_no_ticket
5501requires_gnutls_next_disable_tls13_compat
5502requires_config_enabled MBEDTLS_DEBUG_C
5503requires_config_enabled MBEDTLS_SSL_CLI_C
5504requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5505requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5506run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005507 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005508 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
5509 0 \
5510 -c "HTTP/1.0 200 OK" \
5511 -c "Protocol is TLSv1.3" \
5512 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5513 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5514 -c "NamedGroup: secp384r1 ( 18 )" \
5515 -c "Verifying peer X.509 certificate... ok" \
5516 -C "received HelloRetryRequest message"
5517
5518requires_gnutls_tls1_3
5519requires_gnutls_next_no_ticket
5520requires_gnutls_next_disable_tls13_compat
5521requires_config_enabled MBEDTLS_DEBUG_C
5522requires_config_enabled MBEDTLS_SSL_CLI_C
5523requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5524requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5525run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005526 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005527 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5528 0 \
5529 -c "HTTP/1.0 200 OK" \
5530 -c "Protocol is TLSv1.3" \
5531 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5532 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5533 -c "NamedGroup: secp384r1 ( 18 )" \
5534 -c "Verifying peer X.509 certificate... ok" \
5535 -C "received HelloRetryRequest message"
5536
5537requires_gnutls_tls1_3
5538requires_gnutls_next_no_ticket
5539requires_gnutls_next_disable_tls13_compat
5540requires_config_enabled MBEDTLS_DEBUG_C
5541requires_config_enabled MBEDTLS_SSL_CLI_C
5542requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5543requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5544requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5545run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005546 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005547 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5548 0 \
5549 -c "HTTP/1.0 200 OK" \
5550 -c "Protocol is TLSv1.3" \
5551 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5552 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5553 -c "NamedGroup: secp384r1 ( 18 )" \
5554 -c "Verifying peer X.509 certificate... ok" \
5555 -C "received HelloRetryRequest message"
5556
5557requires_gnutls_tls1_3
5558requires_gnutls_next_no_ticket
5559requires_gnutls_next_disable_tls13_compat
5560requires_config_enabled MBEDTLS_DEBUG_C
5561requires_config_enabled MBEDTLS_SSL_CLI_C
5562requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5564run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005565 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005566 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
5567 0 \
5568 -c "HTTP/1.0 200 OK" \
5569 -c "Protocol is TLSv1.3" \
5570 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5571 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5572 -c "NamedGroup: secp521r1 ( 19 )" \
5573 -c "Verifying peer X.509 certificate... ok" \
5574 -C "received HelloRetryRequest message"
5575
5576requires_gnutls_tls1_3
5577requires_gnutls_next_no_ticket
5578requires_gnutls_next_disable_tls13_compat
5579requires_config_enabled MBEDTLS_DEBUG_C
5580requires_config_enabled MBEDTLS_SSL_CLI_C
5581requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5583run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005584 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005585 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
5586 0 \
5587 -c "HTTP/1.0 200 OK" \
5588 -c "Protocol is TLSv1.3" \
5589 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5590 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5591 -c "NamedGroup: secp521r1 ( 19 )" \
5592 -c "Verifying peer X.509 certificate... ok" \
5593 -C "received HelloRetryRequest message"
5594
5595requires_gnutls_tls1_3
5596requires_gnutls_next_no_ticket
5597requires_gnutls_next_disable_tls13_compat
5598requires_config_enabled MBEDTLS_DEBUG_C
5599requires_config_enabled MBEDTLS_SSL_CLI_C
5600requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5602run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005603 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005604 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5605 0 \
5606 -c "HTTP/1.0 200 OK" \
5607 -c "Protocol is TLSv1.3" \
5608 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5609 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5610 -c "NamedGroup: secp521r1 ( 19 )" \
5611 -c "Verifying peer X.509 certificate... ok" \
5612 -C "received HelloRetryRequest message"
5613
5614requires_gnutls_tls1_3
5615requires_gnutls_next_no_ticket
5616requires_gnutls_next_disable_tls13_compat
5617requires_config_enabled MBEDTLS_DEBUG_C
5618requires_config_enabled MBEDTLS_SSL_CLI_C
5619requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5620requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5621requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5622run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005623 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005624 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
5625 0 \
5626 -c "HTTP/1.0 200 OK" \
5627 -c "Protocol is TLSv1.3" \
5628 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5629 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5630 -c "NamedGroup: secp521r1 ( 19 )" \
5631 -c "Verifying peer X.509 certificate... ok" \
5632 -C "received HelloRetryRequest message"
5633
5634requires_gnutls_tls1_3
5635requires_gnutls_next_no_ticket
5636requires_gnutls_next_disable_tls13_compat
5637requires_config_enabled MBEDTLS_DEBUG_C
5638requires_config_enabled MBEDTLS_SSL_CLI_C
5639requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5640requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5641run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005642 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005643 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
5644 0 \
5645 -c "HTTP/1.0 200 OK" \
5646 -c "Protocol is TLSv1.3" \
5647 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5648 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5649 -c "NamedGroup: x25519 ( 1d )" \
5650 -c "Verifying peer X.509 certificate... ok" \
5651 -C "received HelloRetryRequest message"
5652
5653requires_gnutls_tls1_3
5654requires_gnutls_next_no_ticket
5655requires_gnutls_next_disable_tls13_compat
5656requires_config_enabled MBEDTLS_DEBUG_C
5657requires_config_enabled MBEDTLS_SSL_CLI_C
5658requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5659requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5660run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005661 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005662 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
5663 0 \
5664 -c "HTTP/1.0 200 OK" \
5665 -c "Protocol is TLSv1.3" \
5666 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5667 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5668 -c "NamedGroup: x25519 ( 1d )" \
5669 -c "Verifying peer X.509 certificate... ok" \
5670 -C "received HelloRetryRequest message"
5671
5672requires_gnutls_tls1_3
5673requires_gnutls_next_no_ticket
5674requires_gnutls_next_disable_tls13_compat
5675requires_config_enabled MBEDTLS_DEBUG_C
5676requires_config_enabled MBEDTLS_SSL_CLI_C
5677requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5679run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005680 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005681 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
5682 0 \
5683 -c "HTTP/1.0 200 OK" \
5684 -c "Protocol is TLSv1.3" \
5685 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5686 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5687 -c "NamedGroup: x25519 ( 1d )" \
5688 -c "Verifying peer X.509 certificate... ok" \
5689 -C "received HelloRetryRequest message"
5690
5691requires_gnutls_tls1_3
5692requires_gnutls_next_no_ticket
5693requires_gnutls_next_disable_tls13_compat
5694requires_config_enabled MBEDTLS_DEBUG_C
5695requires_config_enabled MBEDTLS_SSL_CLI_C
5696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5698requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5699run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005700 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005701 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
5702 0 \
5703 -c "HTTP/1.0 200 OK" \
5704 -c "Protocol is TLSv1.3" \
5705 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5706 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5707 -c "NamedGroup: x25519 ( 1d )" \
5708 -c "Verifying peer X.509 certificate... ok" \
5709 -C "received HelloRetryRequest message"
5710
5711requires_gnutls_tls1_3
5712requires_gnutls_next_no_ticket
5713requires_gnutls_next_disable_tls13_compat
5714requires_config_enabled MBEDTLS_DEBUG_C
5715requires_config_enabled MBEDTLS_SSL_CLI_C
5716requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5717requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5718run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005719 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005720 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
5721 0 \
5722 -c "HTTP/1.0 200 OK" \
5723 -c "Protocol is TLSv1.3" \
5724 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5725 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5726 -c "NamedGroup: x448 ( 1e )" \
5727 -c "Verifying peer X.509 certificate... ok" \
5728 -C "received HelloRetryRequest message"
5729
5730requires_gnutls_tls1_3
5731requires_gnutls_next_no_ticket
5732requires_gnutls_next_disable_tls13_compat
5733requires_config_enabled MBEDTLS_DEBUG_C
5734requires_config_enabled MBEDTLS_SSL_CLI_C
5735requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5736requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5737run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005738 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005739 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
5740 0 \
5741 -c "HTTP/1.0 200 OK" \
5742 -c "Protocol is TLSv1.3" \
5743 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5744 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5745 -c "NamedGroup: x448 ( 1e )" \
5746 -c "Verifying peer X.509 certificate... ok" \
5747 -C "received HelloRetryRequest message"
5748
5749requires_gnutls_tls1_3
5750requires_gnutls_next_no_ticket
5751requires_gnutls_next_disable_tls13_compat
5752requires_config_enabled MBEDTLS_DEBUG_C
5753requires_config_enabled MBEDTLS_SSL_CLI_C
5754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5756run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005757 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005758 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
5759 0 \
5760 -c "HTTP/1.0 200 OK" \
5761 -c "Protocol is TLSv1.3" \
5762 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5763 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5764 -c "NamedGroup: x448 ( 1e )" \
5765 -c "Verifying peer X.509 certificate... ok" \
5766 -C "received HelloRetryRequest message"
5767
5768requires_gnutls_tls1_3
5769requires_gnutls_next_no_ticket
5770requires_gnutls_next_disable_tls13_compat
5771requires_config_enabled MBEDTLS_DEBUG_C
5772requires_config_enabled MBEDTLS_SSL_CLI_C
5773requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5774requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5775requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5776run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005777 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005778 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
5779 0 \
5780 -c "HTTP/1.0 200 OK" \
5781 -c "Protocol is TLSv1.3" \
5782 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5783 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5784 -c "NamedGroup: x448 ( 1e )" \
5785 -c "Verifying peer X.509 certificate... ok" \
5786 -C "received HelloRetryRequest message"
5787
5788requires_gnutls_tls1_3
5789requires_gnutls_next_no_ticket
5790requires_gnutls_next_disable_tls13_compat
5791requires_config_enabled MBEDTLS_DEBUG_C
5792requires_config_enabled MBEDTLS_SSL_CLI_C
5793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5794requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5795run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005796 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005797 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
5798 0 \
5799 -c "HTTP/1.0 200 OK" \
5800 -c "Protocol is TLSv1.3" \
5801 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5802 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5803 -c "NamedGroup: secp256r1 ( 17 )" \
5804 -c "Verifying peer X.509 certificate... ok" \
5805 -C "received HelloRetryRequest message"
5806
5807requires_gnutls_tls1_3
5808requires_gnutls_next_no_ticket
5809requires_gnutls_next_disable_tls13_compat
5810requires_config_enabled MBEDTLS_DEBUG_C
5811requires_config_enabled MBEDTLS_SSL_CLI_C
5812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5814run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005815 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005816 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
5817 0 \
5818 -c "HTTP/1.0 200 OK" \
5819 -c "Protocol is TLSv1.3" \
5820 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5821 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5822 -c "NamedGroup: secp256r1 ( 17 )" \
5823 -c "Verifying peer X.509 certificate... ok" \
5824 -C "received HelloRetryRequest message"
5825
5826requires_gnutls_tls1_3
5827requires_gnutls_next_no_ticket
5828requires_gnutls_next_disable_tls13_compat
5829requires_config_enabled MBEDTLS_DEBUG_C
5830requires_config_enabled MBEDTLS_SSL_CLI_C
5831requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5832requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5833run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005834 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005835 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5836 0 \
5837 -c "HTTP/1.0 200 OK" \
5838 -c "Protocol is TLSv1.3" \
5839 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5840 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5841 -c "NamedGroup: secp256r1 ( 17 )" \
5842 -c "Verifying peer X.509 certificate... ok" \
5843 -C "received HelloRetryRequest message"
5844
5845requires_gnutls_tls1_3
5846requires_gnutls_next_no_ticket
5847requires_gnutls_next_disable_tls13_compat
5848requires_config_enabled MBEDTLS_DEBUG_C
5849requires_config_enabled MBEDTLS_SSL_CLI_C
5850requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5851requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5852requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5853run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005854 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005855 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5856 0 \
5857 -c "HTTP/1.0 200 OK" \
5858 -c "Protocol is TLSv1.3" \
5859 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5860 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5861 -c "NamedGroup: secp256r1 ( 17 )" \
5862 -c "Verifying peer X.509 certificate... ok" \
5863 -C "received HelloRetryRequest message"
5864
5865requires_gnutls_tls1_3
5866requires_gnutls_next_no_ticket
5867requires_gnutls_next_disable_tls13_compat
5868requires_config_enabled MBEDTLS_DEBUG_C
5869requires_config_enabled MBEDTLS_SSL_CLI_C
5870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5872run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005873 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005874 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
5875 0 \
5876 -c "HTTP/1.0 200 OK" \
5877 -c "Protocol is TLSv1.3" \
5878 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5879 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5880 -c "NamedGroup: secp384r1 ( 18 )" \
5881 -c "Verifying peer X.509 certificate... ok" \
5882 -C "received HelloRetryRequest message"
5883
5884requires_gnutls_tls1_3
5885requires_gnutls_next_no_ticket
5886requires_gnutls_next_disable_tls13_compat
5887requires_config_enabled MBEDTLS_DEBUG_C
5888requires_config_enabled MBEDTLS_SSL_CLI_C
5889requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5890requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5891run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005892 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005893 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
5894 0 \
5895 -c "HTTP/1.0 200 OK" \
5896 -c "Protocol is TLSv1.3" \
5897 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5898 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5899 -c "NamedGroup: secp384r1 ( 18 )" \
5900 -c "Verifying peer X.509 certificate... ok" \
5901 -C "received HelloRetryRequest message"
5902
5903requires_gnutls_tls1_3
5904requires_gnutls_next_no_ticket
5905requires_gnutls_next_disable_tls13_compat
5906requires_config_enabled MBEDTLS_DEBUG_C
5907requires_config_enabled MBEDTLS_SSL_CLI_C
5908requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5909requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5910run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005911 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005912 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5913 0 \
5914 -c "HTTP/1.0 200 OK" \
5915 -c "Protocol is TLSv1.3" \
5916 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5917 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5918 -c "NamedGroup: secp384r1 ( 18 )" \
5919 -c "Verifying peer X.509 certificate... ok" \
5920 -C "received HelloRetryRequest message"
5921
5922requires_gnutls_tls1_3
5923requires_gnutls_next_no_ticket
5924requires_gnutls_next_disable_tls13_compat
5925requires_config_enabled MBEDTLS_DEBUG_C
5926requires_config_enabled MBEDTLS_SSL_CLI_C
5927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5929requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5930run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005931 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005932 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5933 0 \
5934 -c "HTTP/1.0 200 OK" \
5935 -c "Protocol is TLSv1.3" \
5936 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5937 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5938 -c "NamedGroup: secp384r1 ( 18 )" \
5939 -c "Verifying peer X.509 certificate... ok" \
5940 -C "received HelloRetryRequest message"
5941
5942requires_gnutls_tls1_3
5943requires_gnutls_next_no_ticket
5944requires_gnutls_next_disable_tls13_compat
5945requires_config_enabled MBEDTLS_DEBUG_C
5946requires_config_enabled MBEDTLS_SSL_CLI_C
5947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5949run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005950 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005951 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
5952 0 \
5953 -c "HTTP/1.0 200 OK" \
5954 -c "Protocol is TLSv1.3" \
5955 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5956 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5957 -c "NamedGroup: secp521r1 ( 19 )" \
5958 -c "Verifying peer X.509 certificate... ok" \
5959 -C "received HelloRetryRequest message"
5960
5961requires_gnutls_tls1_3
5962requires_gnutls_next_no_ticket
5963requires_gnutls_next_disable_tls13_compat
5964requires_config_enabled MBEDTLS_DEBUG_C
5965requires_config_enabled MBEDTLS_SSL_CLI_C
5966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5968run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005969 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005970 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
5971 0 \
5972 -c "HTTP/1.0 200 OK" \
5973 -c "Protocol is TLSv1.3" \
5974 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5975 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5976 -c "NamedGroup: secp521r1 ( 19 )" \
5977 -c "Verifying peer X.509 certificate... ok" \
5978 -C "received HelloRetryRequest message"
5979
5980requires_gnutls_tls1_3
5981requires_gnutls_next_no_ticket
5982requires_gnutls_next_disable_tls13_compat
5983requires_config_enabled MBEDTLS_DEBUG_C
5984requires_config_enabled MBEDTLS_SSL_CLI_C
5985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5986requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5987run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005988 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005989 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5990 0 \
5991 -c "HTTP/1.0 200 OK" \
5992 -c "Protocol is TLSv1.3" \
5993 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5994 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5995 -c "NamedGroup: secp521r1 ( 19 )" \
5996 -c "Verifying peer X.509 certificate... ok" \
5997 -C "received HelloRetryRequest message"
5998
5999requires_gnutls_tls1_3
6000requires_gnutls_next_no_ticket
6001requires_gnutls_next_disable_tls13_compat
6002requires_config_enabled MBEDTLS_DEBUG_C
6003requires_config_enabled MBEDTLS_SSL_CLI_C
6004requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6005requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6006requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6007run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006008 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006009 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6010 0 \
6011 -c "HTTP/1.0 200 OK" \
6012 -c "Protocol is TLSv1.3" \
6013 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6014 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6015 -c "NamedGroup: secp521r1 ( 19 )" \
6016 -c "Verifying peer X.509 certificate... ok" \
6017 -C "received HelloRetryRequest message"
6018
6019requires_gnutls_tls1_3
6020requires_gnutls_next_no_ticket
6021requires_gnutls_next_disable_tls13_compat
6022requires_config_enabled MBEDTLS_DEBUG_C
6023requires_config_enabled MBEDTLS_SSL_CLI_C
6024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6026run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006027 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006028 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6029 0 \
6030 -c "HTTP/1.0 200 OK" \
6031 -c "Protocol is TLSv1.3" \
6032 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6033 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6034 -c "NamedGroup: x25519 ( 1d )" \
6035 -c "Verifying peer X.509 certificate... ok" \
6036 -C "received HelloRetryRequest message"
6037
6038requires_gnutls_tls1_3
6039requires_gnutls_next_no_ticket
6040requires_gnutls_next_disable_tls13_compat
6041requires_config_enabled MBEDTLS_DEBUG_C
6042requires_config_enabled MBEDTLS_SSL_CLI_C
6043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6045run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006046 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006047 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6048 0 \
6049 -c "HTTP/1.0 200 OK" \
6050 -c "Protocol is TLSv1.3" \
6051 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6052 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6053 -c "NamedGroup: x25519 ( 1d )" \
6054 -c "Verifying peer X.509 certificate... ok" \
6055 -C "received HelloRetryRequest message"
6056
6057requires_gnutls_tls1_3
6058requires_gnutls_next_no_ticket
6059requires_gnutls_next_disable_tls13_compat
6060requires_config_enabled MBEDTLS_DEBUG_C
6061requires_config_enabled MBEDTLS_SSL_CLI_C
6062requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6063requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6064run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006065 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006066 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6067 0 \
6068 -c "HTTP/1.0 200 OK" \
6069 -c "Protocol is TLSv1.3" \
6070 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6071 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6072 -c "NamedGroup: x25519 ( 1d )" \
6073 -c "Verifying peer X.509 certificate... ok" \
6074 -C "received HelloRetryRequest message"
6075
6076requires_gnutls_tls1_3
6077requires_gnutls_next_no_ticket
6078requires_gnutls_next_disable_tls13_compat
6079requires_config_enabled MBEDTLS_DEBUG_C
6080requires_config_enabled MBEDTLS_SSL_CLI_C
6081requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6082requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6083requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6084run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006085 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006086 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6087 0 \
6088 -c "HTTP/1.0 200 OK" \
6089 -c "Protocol is TLSv1.3" \
6090 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6091 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6092 -c "NamedGroup: x25519 ( 1d )" \
6093 -c "Verifying peer X.509 certificate... ok" \
6094 -C "received HelloRetryRequest message"
6095
6096requires_gnutls_tls1_3
6097requires_gnutls_next_no_ticket
6098requires_gnutls_next_disable_tls13_compat
6099requires_config_enabled MBEDTLS_DEBUG_C
6100requires_config_enabled MBEDTLS_SSL_CLI_C
6101requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6103run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006104 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006105 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6106 0 \
6107 -c "HTTP/1.0 200 OK" \
6108 -c "Protocol is TLSv1.3" \
6109 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6110 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6111 -c "NamedGroup: x448 ( 1e )" \
6112 -c "Verifying peer X.509 certificate... ok" \
6113 -C "received HelloRetryRequest message"
6114
6115requires_gnutls_tls1_3
6116requires_gnutls_next_no_ticket
6117requires_gnutls_next_disable_tls13_compat
6118requires_config_enabled MBEDTLS_DEBUG_C
6119requires_config_enabled MBEDTLS_SSL_CLI_C
6120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6122run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006123 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006124 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6125 0 \
6126 -c "HTTP/1.0 200 OK" \
6127 -c "Protocol is TLSv1.3" \
6128 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6129 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6130 -c "NamedGroup: x448 ( 1e )" \
6131 -c "Verifying peer X.509 certificate... ok" \
6132 -C "received HelloRetryRequest message"
6133
6134requires_gnutls_tls1_3
6135requires_gnutls_next_no_ticket
6136requires_gnutls_next_disable_tls13_compat
6137requires_config_enabled MBEDTLS_DEBUG_C
6138requires_config_enabled MBEDTLS_SSL_CLI_C
6139requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6140requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6141run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006142 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006143 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6144 0 \
6145 -c "HTTP/1.0 200 OK" \
6146 -c "Protocol is TLSv1.3" \
6147 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6148 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6149 -c "NamedGroup: x448 ( 1e )" \
6150 -c "Verifying peer X.509 certificate... ok" \
6151 -C "received HelloRetryRequest message"
6152
6153requires_gnutls_tls1_3
6154requires_gnutls_next_no_ticket
6155requires_gnutls_next_disable_tls13_compat
6156requires_config_enabled MBEDTLS_DEBUG_C
6157requires_config_enabled MBEDTLS_SSL_CLI_C
6158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6160requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6161run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006162 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006163 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6164 0 \
6165 -c "HTTP/1.0 200 OK" \
6166 -c "Protocol is TLSv1.3" \
6167 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6168 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6169 -c "NamedGroup: x448 ( 1e )" \
6170 -c "Verifying peer X.509 certificate... ok" \
6171 -C "received HelloRetryRequest message"
6172
6173requires_gnutls_tls1_3
6174requires_gnutls_next_no_ticket
6175requires_gnutls_next_disable_tls13_compat
6176requires_config_enabled MBEDTLS_DEBUG_C
6177requires_config_enabled MBEDTLS_SSL_CLI_C
6178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6180run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006181 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006182 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6183 0 \
6184 -c "HTTP/1.0 200 OK" \
6185 -c "Protocol is TLSv1.3" \
6186 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6187 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6188 -c "NamedGroup: secp256r1 ( 17 )" \
6189 -c "Verifying peer X.509 certificate... ok" \
6190 -C "received HelloRetryRequest message"
6191
6192requires_gnutls_tls1_3
6193requires_gnutls_next_no_ticket
6194requires_gnutls_next_disable_tls13_compat
6195requires_config_enabled MBEDTLS_DEBUG_C
6196requires_config_enabled MBEDTLS_SSL_CLI_C
6197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6198requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6199run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006200 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006201 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
6202 0 \
6203 -c "HTTP/1.0 200 OK" \
6204 -c "Protocol is TLSv1.3" \
6205 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6206 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6207 -c "NamedGroup: secp256r1 ( 17 )" \
6208 -c "Verifying peer X.509 certificate... ok" \
6209 -C "received HelloRetryRequest message"
6210
6211requires_gnutls_tls1_3
6212requires_gnutls_next_no_ticket
6213requires_gnutls_next_disable_tls13_compat
6214requires_config_enabled MBEDTLS_DEBUG_C
6215requires_config_enabled MBEDTLS_SSL_CLI_C
6216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6218run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006219 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
6221 0 \
6222 -c "HTTP/1.0 200 OK" \
6223 -c "Protocol is TLSv1.3" \
6224 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6225 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6226 -c "NamedGroup: secp256r1 ( 17 )" \
6227 -c "Verifying peer X.509 certificate... ok" \
6228 -C "received HelloRetryRequest message"
6229
6230requires_gnutls_tls1_3
6231requires_gnutls_next_no_ticket
6232requires_gnutls_next_disable_tls13_compat
6233requires_config_enabled MBEDTLS_DEBUG_C
6234requires_config_enabled MBEDTLS_SSL_CLI_C
6235requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6236requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6237requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6238run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006239 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006240 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
6241 0 \
6242 -c "HTTP/1.0 200 OK" \
6243 -c "Protocol is TLSv1.3" \
6244 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6245 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6246 -c "NamedGroup: secp256r1 ( 17 )" \
6247 -c "Verifying peer X.509 certificate... ok" \
6248 -C "received HelloRetryRequest message"
6249
6250requires_gnutls_tls1_3
6251requires_gnutls_next_no_ticket
6252requires_gnutls_next_disable_tls13_compat
6253requires_config_enabled MBEDTLS_DEBUG_C
6254requires_config_enabled MBEDTLS_SSL_CLI_C
6255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6257run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006258 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006259 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
6260 0 \
6261 -c "HTTP/1.0 200 OK" \
6262 -c "Protocol is TLSv1.3" \
6263 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6264 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6265 -c "NamedGroup: secp384r1 ( 18 )" \
6266 -c "Verifying peer X.509 certificate... ok" \
6267 -C "received HelloRetryRequest message"
6268
6269requires_gnutls_tls1_3
6270requires_gnutls_next_no_ticket
6271requires_gnutls_next_disable_tls13_compat
6272requires_config_enabled MBEDTLS_DEBUG_C
6273requires_config_enabled MBEDTLS_SSL_CLI_C
6274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6276run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006277 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006278 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
6279 0 \
6280 -c "HTTP/1.0 200 OK" \
6281 -c "Protocol is TLSv1.3" \
6282 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6283 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6284 -c "NamedGroup: secp384r1 ( 18 )" \
6285 -c "Verifying peer X.509 certificate... ok" \
6286 -C "received HelloRetryRequest message"
6287
6288requires_gnutls_tls1_3
6289requires_gnutls_next_no_ticket
6290requires_gnutls_next_disable_tls13_compat
6291requires_config_enabled MBEDTLS_DEBUG_C
6292requires_config_enabled MBEDTLS_SSL_CLI_C
6293requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6294requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6295run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006296 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006297 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
6298 0 \
6299 -c "HTTP/1.0 200 OK" \
6300 -c "Protocol is TLSv1.3" \
6301 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6302 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6303 -c "NamedGroup: secp384r1 ( 18 )" \
6304 -c "Verifying peer X.509 certificate... ok" \
6305 -C "received HelloRetryRequest message"
6306
6307requires_gnutls_tls1_3
6308requires_gnutls_next_no_ticket
6309requires_gnutls_next_disable_tls13_compat
6310requires_config_enabled MBEDTLS_DEBUG_C
6311requires_config_enabled MBEDTLS_SSL_CLI_C
6312requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6313requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6314requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6315run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006316 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006317 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
6318 0 \
6319 -c "HTTP/1.0 200 OK" \
6320 -c "Protocol is TLSv1.3" \
6321 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6322 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6323 -c "NamedGroup: secp384r1 ( 18 )" \
6324 -c "Verifying peer X.509 certificate... ok" \
6325 -C "received HelloRetryRequest message"
6326
6327requires_gnutls_tls1_3
6328requires_gnutls_next_no_ticket
6329requires_gnutls_next_disable_tls13_compat
6330requires_config_enabled MBEDTLS_DEBUG_C
6331requires_config_enabled MBEDTLS_SSL_CLI_C
6332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6333requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6334run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006335 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006336 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
6337 0 \
6338 -c "HTTP/1.0 200 OK" \
6339 -c "Protocol is TLSv1.3" \
6340 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6341 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6342 -c "NamedGroup: secp521r1 ( 19 )" \
6343 -c "Verifying peer X.509 certificate... ok" \
6344 -C "received HelloRetryRequest message"
6345
6346requires_gnutls_tls1_3
6347requires_gnutls_next_no_ticket
6348requires_gnutls_next_disable_tls13_compat
6349requires_config_enabled MBEDTLS_DEBUG_C
6350requires_config_enabled MBEDTLS_SSL_CLI_C
6351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6353run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006354 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006355 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
6356 0 \
6357 -c "HTTP/1.0 200 OK" \
6358 -c "Protocol is TLSv1.3" \
6359 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6360 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6361 -c "NamedGroup: secp521r1 ( 19 )" \
6362 -c "Verifying peer X.509 certificate... ok" \
6363 -C "received HelloRetryRequest message"
6364
6365requires_gnutls_tls1_3
6366requires_gnutls_next_no_ticket
6367requires_gnutls_next_disable_tls13_compat
6368requires_config_enabled MBEDTLS_DEBUG_C
6369requires_config_enabled MBEDTLS_SSL_CLI_C
6370requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6371requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6372run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006373 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006374 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
6375 0 \
6376 -c "HTTP/1.0 200 OK" \
6377 -c "Protocol is TLSv1.3" \
6378 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6379 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6380 -c "NamedGroup: secp521r1 ( 19 )" \
6381 -c "Verifying peer X.509 certificate... ok" \
6382 -C "received HelloRetryRequest message"
6383
6384requires_gnutls_tls1_3
6385requires_gnutls_next_no_ticket
6386requires_gnutls_next_disable_tls13_compat
6387requires_config_enabled MBEDTLS_DEBUG_C
6388requires_config_enabled MBEDTLS_SSL_CLI_C
6389requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6390requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6391requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6392run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006393 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006394 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6395 0 \
6396 -c "HTTP/1.0 200 OK" \
6397 -c "Protocol is TLSv1.3" \
6398 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6399 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6400 -c "NamedGroup: secp521r1 ( 19 )" \
6401 -c "Verifying peer X.509 certificate... ok" \
6402 -C "received HelloRetryRequest message"
6403
6404requires_gnutls_tls1_3
6405requires_gnutls_next_no_ticket
6406requires_gnutls_next_disable_tls13_compat
6407requires_config_enabled MBEDTLS_DEBUG_C
6408requires_config_enabled MBEDTLS_SSL_CLI_C
6409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6411run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006412 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006413 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6414 0 \
6415 -c "HTTP/1.0 200 OK" \
6416 -c "Protocol is TLSv1.3" \
6417 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6418 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6419 -c "NamedGroup: x25519 ( 1d )" \
6420 -c "Verifying peer X.509 certificate... ok" \
6421 -C "received HelloRetryRequest message"
6422
6423requires_gnutls_tls1_3
6424requires_gnutls_next_no_ticket
6425requires_gnutls_next_disable_tls13_compat
6426requires_config_enabled MBEDTLS_DEBUG_C
6427requires_config_enabled MBEDTLS_SSL_CLI_C
6428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6430run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006431 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006432 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6433 0 \
6434 -c "HTTP/1.0 200 OK" \
6435 -c "Protocol is TLSv1.3" \
6436 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6437 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6438 -c "NamedGroup: x25519 ( 1d )" \
6439 -c "Verifying peer X.509 certificate... ok" \
6440 -C "received HelloRetryRequest message"
6441
6442requires_gnutls_tls1_3
6443requires_gnutls_next_no_ticket
6444requires_gnutls_next_disable_tls13_compat
6445requires_config_enabled MBEDTLS_DEBUG_C
6446requires_config_enabled MBEDTLS_SSL_CLI_C
6447requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6448requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6449run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006450 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006451 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6452 0 \
6453 -c "HTTP/1.0 200 OK" \
6454 -c "Protocol is TLSv1.3" \
6455 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6456 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6457 -c "NamedGroup: x25519 ( 1d )" \
6458 -c "Verifying peer X.509 certificate... ok" \
6459 -C "received HelloRetryRequest message"
6460
6461requires_gnutls_tls1_3
6462requires_gnutls_next_no_ticket
6463requires_gnutls_next_disable_tls13_compat
6464requires_config_enabled MBEDTLS_DEBUG_C
6465requires_config_enabled MBEDTLS_SSL_CLI_C
6466requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6468requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6469run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006470 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006471 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6472 0 \
6473 -c "HTTP/1.0 200 OK" \
6474 -c "Protocol is TLSv1.3" \
6475 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6476 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6477 -c "NamedGroup: x25519 ( 1d )" \
6478 -c "Verifying peer X.509 certificate... ok" \
6479 -C "received HelloRetryRequest message"
6480
6481requires_gnutls_tls1_3
6482requires_gnutls_next_no_ticket
6483requires_gnutls_next_disable_tls13_compat
6484requires_config_enabled MBEDTLS_DEBUG_C
6485requires_config_enabled MBEDTLS_SSL_CLI_C
6486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6488run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006489 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006490 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6491 0 \
6492 -c "HTTP/1.0 200 OK" \
6493 -c "Protocol is TLSv1.3" \
6494 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6495 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6496 -c "NamedGroup: x448 ( 1e )" \
6497 -c "Verifying peer X.509 certificate... ok" \
6498 -C "received HelloRetryRequest message"
6499
6500requires_gnutls_tls1_3
6501requires_gnutls_next_no_ticket
6502requires_gnutls_next_disable_tls13_compat
6503requires_config_enabled MBEDTLS_DEBUG_C
6504requires_config_enabled MBEDTLS_SSL_CLI_C
6505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6507run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006508 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006509 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6510 0 \
6511 -c "HTTP/1.0 200 OK" \
6512 -c "Protocol is TLSv1.3" \
6513 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6514 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6515 -c "NamedGroup: x448 ( 1e )" \
6516 -c "Verifying peer X.509 certificate... ok" \
6517 -C "received HelloRetryRequest message"
6518
6519requires_gnutls_tls1_3
6520requires_gnutls_next_no_ticket
6521requires_gnutls_next_disable_tls13_compat
6522requires_config_enabled MBEDTLS_DEBUG_C
6523requires_config_enabled MBEDTLS_SSL_CLI_C
6524requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6525requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6526run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006527 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006528 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6529 0 \
6530 -c "HTTP/1.0 200 OK" \
6531 -c "Protocol is TLSv1.3" \
6532 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6533 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6534 -c "NamedGroup: x448 ( 1e )" \
6535 -c "Verifying peer X.509 certificate... ok" \
6536 -C "received HelloRetryRequest message"
6537
6538requires_gnutls_tls1_3
6539requires_gnutls_next_no_ticket
6540requires_gnutls_next_disable_tls13_compat
6541requires_config_enabled MBEDTLS_DEBUG_C
6542requires_config_enabled MBEDTLS_SSL_CLI_C
6543requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6544requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6545requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6546run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006547 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006548 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6549 0 \
6550 -c "HTTP/1.0 200 OK" \
6551 -c "Protocol is TLSv1.3" \
6552 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6553 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6554 -c "NamedGroup: x448 ( 1e )" \
6555 -c "Verifying peer X.509 certificate... ok" \
6556 -C "received HelloRetryRequest message"
6557
6558requires_gnutls_tls1_3
6559requires_gnutls_next_no_ticket
6560requires_gnutls_next_disable_tls13_compat
6561requires_config_enabled MBEDTLS_DEBUG_C
6562requires_config_enabled MBEDTLS_SSL_CLI_C
6563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6565run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006566 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006567 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6568 0 \
6569 -c "HTTP/1.0 200 OK" \
6570 -c "Protocol is TLSv1.3" \
6571 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6572 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6573 -c "NamedGroup: secp256r1 ( 17 )" \
6574 -c "Verifying peer X.509 certificate... ok" \
6575 -C "received HelloRetryRequest message"
6576
6577requires_gnutls_tls1_3
6578requires_gnutls_next_no_ticket
6579requires_gnutls_next_disable_tls13_compat
6580requires_config_enabled MBEDTLS_DEBUG_C
6581requires_config_enabled MBEDTLS_SSL_CLI_C
6582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6584run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006585 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006586 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
6587 0 \
6588 -c "HTTP/1.0 200 OK" \
6589 -c "Protocol is TLSv1.3" \
6590 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6591 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6592 -c "NamedGroup: secp256r1 ( 17 )" \
6593 -c "Verifying peer X.509 certificate... ok" \
6594 -C "received HelloRetryRequest message"
6595
6596requires_gnutls_tls1_3
6597requires_gnutls_next_no_ticket
6598requires_gnutls_next_disable_tls13_compat
6599requires_config_enabled MBEDTLS_DEBUG_C
6600requires_config_enabled MBEDTLS_SSL_CLI_C
6601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6602requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6603run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006604 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006605 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
6606 0 \
6607 -c "HTTP/1.0 200 OK" \
6608 -c "Protocol is TLSv1.3" \
6609 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6610 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6611 -c "NamedGroup: secp256r1 ( 17 )" \
6612 -c "Verifying peer X.509 certificate... ok" \
6613 -C "received HelloRetryRequest message"
6614
6615requires_gnutls_tls1_3
6616requires_gnutls_next_no_ticket
6617requires_gnutls_next_disable_tls13_compat
6618requires_config_enabled MBEDTLS_DEBUG_C
6619requires_config_enabled MBEDTLS_SSL_CLI_C
6620requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6621requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6622requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6623run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006624 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006625 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
6626 0 \
6627 -c "HTTP/1.0 200 OK" \
6628 -c "Protocol is TLSv1.3" \
6629 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6630 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6631 -c "NamedGroup: secp256r1 ( 17 )" \
6632 -c "Verifying peer X.509 certificate... ok" \
6633 -C "received HelloRetryRequest message"
6634
6635requires_gnutls_tls1_3
6636requires_gnutls_next_no_ticket
6637requires_gnutls_next_disable_tls13_compat
6638requires_config_enabled MBEDTLS_DEBUG_C
6639requires_config_enabled MBEDTLS_SSL_CLI_C
6640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6641requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6642run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006643 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006644 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
6645 0 \
6646 -c "HTTP/1.0 200 OK" \
6647 -c "Protocol is TLSv1.3" \
6648 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6649 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6650 -c "NamedGroup: secp384r1 ( 18 )" \
6651 -c "Verifying peer X.509 certificate... ok" \
6652 -C "received HelloRetryRequest message"
6653
6654requires_gnutls_tls1_3
6655requires_gnutls_next_no_ticket
6656requires_gnutls_next_disable_tls13_compat
6657requires_config_enabled MBEDTLS_DEBUG_C
6658requires_config_enabled MBEDTLS_SSL_CLI_C
6659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6661run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006662 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006663 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
6664 0 \
6665 -c "HTTP/1.0 200 OK" \
6666 -c "Protocol is TLSv1.3" \
6667 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6668 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6669 -c "NamedGroup: secp384r1 ( 18 )" \
6670 -c "Verifying peer X.509 certificate... ok" \
6671 -C "received HelloRetryRequest message"
6672
6673requires_gnutls_tls1_3
6674requires_gnutls_next_no_ticket
6675requires_gnutls_next_disable_tls13_compat
6676requires_config_enabled MBEDTLS_DEBUG_C
6677requires_config_enabled MBEDTLS_SSL_CLI_C
6678requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6680run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006681 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006682 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
6683 0 \
6684 -c "HTTP/1.0 200 OK" \
6685 -c "Protocol is TLSv1.3" \
6686 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6687 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6688 -c "NamedGroup: secp384r1 ( 18 )" \
6689 -c "Verifying peer X.509 certificate... ok" \
6690 -C "received HelloRetryRequest message"
6691
6692requires_gnutls_tls1_3
6693requires_gnutls_next_no_ticket
6694requires_gnutls_next_disable_tls13_compat
6695requires_config_enabled MBEDTLS_DEBUG_C
6696requires_config_enabled MBEDTLS_SSL_CLI_C
6697requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6698requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6699requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6700run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006701 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006702 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
6703 0 \
6704 -c "HTTP/1.0 200 OK" \
6705 -c "Protocol is TLSv1.3" \
6706 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6707 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6708 -c "NamedGroup: secp384r1 ( 18 )" \
6709 -c "Verifying peer X.509 certificate... ok" \
6710 -C "received HelloRetryRequest message"
6711
6712requires_gnutls_tls1_3
6713requires_gnutls_next_no_ticket
6714requires_gnutls_next_disable_tls13_compat
6715requires_config_enabled MBEDTLS_DEBUG_C
6716requires_config_enabled MBEDTLS_SSL_CLI_C
6717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6718requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6719run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006720 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006721 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
6722 0 \
6723 -c "HTTP/1.0 200 OK" \
6724 -c "Protocol is TLSv1.3" \
6725 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6726 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6727 -c "NamedGroup: secp521r1 ( 19 )" \
6728 -c "Verifying peer X.509 certificate... ok" \
6729 -C "received HelloRetryRequest message"
6730
6731requires_gnutls_tls1_3
6732requires_gnutls_next_no_ticket
6733requires_gnutls_next_disable_tls13_compat
6734requires_config_enabled MBEDTLS_DEBUG_C
6735requires_config_enabled MBEDTLS_SSL_CLI_C
6736requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6738run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006739 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006740 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
6741 0 \
6742 -c "HTTP/1.0 200 OK" \
6743 -c "Protocol is TLSv1.3" \
6744 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6745 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6746 -c "NamedGroup: secp521r1 ( 19 )" \
6747 -c "Verifying peer X.509 certificate... ok" \
6748 -C "received HelloRetryRequest message"
6749
6750requires_gnutls_tls1_3
6751requires_gnutls_next_no_ticket
6752requires_gnutls_next_disable_tls13_compat
6753requires_config_enabled MBEDTLS_DEBUG_C
6754requires_config_enabled MBEDTLS_SSL_CLI_C
6755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6757run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006758 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006759 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
6760 0 \
6761 -c "HTTP/1.0 200 OK" \
6762 -c "Protocol is TLSv1.3" \
6763 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6764 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6765 -c "NamedGroup: secp521r1 ( 19 )" \
6766 -c "Verifying peer X.509 certificate... ok" \
6767 -C "received HelloRetryRequest message"
6768
6769requires_gnutls_tls1_3
6770requires_gnutls_next_no_ticket
6771requires_gnutls_next_disable_tls13_compat
6772requires_config_enabled MBEDTLS_DEBUG_C
6773requires_config_enabled MBEDTLS_SSL_CLI_C
6774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6777run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006778 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006779 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6780 0 \
6781 -c "HTTP/1.0 200 OK" \
6782 -c "Protocol is TLSv1.3" \
6783 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6784 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6785 -c "NamedGroup: secp521r1 ( 19 )" \
6786 -c "Verifying peer X.509 certificate... ok" \
6787 -C "received HelloRetryRequest message"
6788
6789requires_gnutls_tls1_3
6790requires_gnutls_next_no_ticket
6791requires_gnutls_next_disable_tls13_compat
6792requires_config_enabled MBEDTLS_DEBUG_C
6793requires_config_enabled MBEDTLS_SSL_CLI_C
6794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6796run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006797 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006798 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6799 0 \
6800 -c "HTTP/1.0 200 OK" \
6801 -c "Protocol is TLSv1.3" \
6802 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6803 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6804 -c "NamedGroup: x25519 ( 1d )" \
6805 -c "Verifying peer X.509 certificate... ok" \
6806 -C "received HelloRetryRequest message"
6807
6808requires_gnutls_tls1_3
6809requires_gnutls_next_no_ticket
6810requires_gnutls_next_disable_tls13_compat
6811requires_config_enabled MBEDTLS_DEBUG_C
6812requires_config_enabled MBEDTLS_SSL_CLI_C
6813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6815run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006816 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006817 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6818 0 \
6819 -c "HTTP/1.0 200 OK" \
6820 -c "Protocol is TLSv1.3" \
6821 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6822 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6823 -c "NamedGroup: x25519 ( 1d )" \
6824 -c "Verifying peer X.509 certificate... ok" \
6825 -C "received HelloRetryRequest message"
6826
6827requires_gnutls_tls1_3
6828requires_gnutls_next_no_ticket
6829requires_gnutls_next_disable_tls13_compat
6830requires_config_enabled MBEDTLS_DEBUG_C
6831requires_config_enabled MBEDTLS_SSL_CLI_C
6832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6834run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006835 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006836 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6837 0 \
6838 -c "HTTP/1.0 200 OK" \
6839 -c "Protocol is TLSv1.3" \
6840 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6841 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6842 -c "NamedGroup: x25519 ( 1d )" \
6843 -c "Verifying peer X.509 certificate... ok" \
6844 -C "received HelloRetryRequest message"
6845
6846requires_gnutls_tls1_3
6847requires_gnutls_next_no_ticket
6848requires_gnutls_next_disable_tls13_compat
6849requires_config_enabled MBEDTLS_DEBUG_C
6850requires_config_enabled MBEDTLS_SSL_CLI_C
6851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6853requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6854run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006855 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006856 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6857 0 \
6858 -c "HTTP/1.0 200 OK" \
6859 -c "Protocol is TLSv1.3" \
6860 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6861 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6862 -c "NamedGroup: x25519 ( 1d )" \
6863 -c "Verifying peer X.509 certificate... ok" \
6864 -C "received HelloRetryRequest message"
6865
6866requires_gnutls_tls1_3
6867requires_gnutls_next_no_ticket
6868requires_gnutls_next_disable_tls13_compat
6869requires_config_enabled MBEDTLS_DEBUG_C
6870requires_config_enabled MBEDTLS_SSL_CLI_C
6871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6873run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006874 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6876 0 \
6877 -c "HTTP/1.0 200 OK" \
6878 -c "Protocol is TLSv1.3" \
6879 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6880 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6881 -c "NamedGroup: x448 ( 1e )" \
6882 -c "Verifying peer X.509 certificate... ok" \
6883 -C "received HelloRetryRequest message"
6884
6885requires_gnutls_tls1_3
6886requires_gnutls_next_no_ticket
6887requires_gnutls_next_disable_tls13_compat
6888requires_config_enabled MBEDTLS_DEBUG_C
6889requires_config_enabled MBEDTLS_SSL_CLI_C
6890requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6892run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006893 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006894 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6895 0 \
6896 -c "HTTP/1.0 200 OK" \
6897 -c "Protocol is TLSv1.3" \
6898 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6899 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6900 -c "NamedGroup: x448 ( 1e )" \
6901 -c "Verifying peer X.509 certificate... ok" \
6902 -C "received HelloRetryRequest message"
6903
6904requires_gnutls_tls1_3
6905requires_gnutls_next_no_ticket
6906requires_gnutls_next_disable_tls13_compat
6907requires_config_enabled MBEDTLS_DEBUG_C
6908requires_config_enabled MBEDTLS_SSL_CLI_C
6909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6911run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006912 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006913 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6914 0 \
6915 -c "HTTP/1.0 200 OK" \
6916 -c "Protocol is TLSv1.3" \
6917 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6918 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6919 -c "NamedGroup: x448 ( 1e )" \
6920 -c "Verifying peer X.509 certificate... ok" \
6921 -C "received HelloRetryRequest message"
6922
6923requires_gnutls_tls1_3
6924requires_gnutls_next_no_ticket
6925requires_gnutls_next_disable_tls13_compat
6926requires_config_enabled MBEDTLS_DEBUG_C
6927requires_config_enabled MBEDTLS_SSL_CLI_C
6928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6930requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6931run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006932 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006933 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6934 0 \
6935 -c "HTTP/1.0 200 OK" \
6936 -c "Protocol is TLSv1.3" \
6937 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6938 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6939 -c "NamedGroup: x448 ( 1e )" \
6940 -c "Verifying peer X.509 certificate... ok" \
6941 -C "received HelloRetryRequest message"
6942
6943requires_gnutls_tls1_3
6944requires_gnutls_next_no_ticket
6945requires_gnutls_next_disable_tls13_compat
6946requires_config_enabled MBEDTLS_DEBUG_C
6947requires_config_enabled MBEDTLS_SSL_CLI_C
6948requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6950run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006951 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006952 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6953 0 \
6954 -c "HTTP/1.0 200 OK" \
6955 -c "Protocol is TLSv1.3" \
6956 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6957 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6958 -c "NamedGroup: secp256r1 ( 17 )" \
6959 -c "Verifying peer X.509 certificate... ok" \
6960 -C "received HelloRetryRequest message"
6961
6962requires_gnutls_tls1_3
6963requires_gnutls_next_no_ticket
6964requires_gnutls_next_disable_tls13_compat
6965requires_config_enabled MBEDTLS_DEBUG_C
6966requires_config_enabled MBEDTLS_SSL_CLI_C
6967requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006969run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006970 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006971 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006972 0 \
6973 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006974 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006975 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6976 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006977 -c "NamedGroup: secp256r1 ( 17 )" \
6978 -c "Verifying peer X.509 certificate... ok" \
6979 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006980
Jerry Yu31018ad2021-11-26 20:36:17 +08006981requires_gnutls_tls1_3
6982requires_gnutls_next_no_ticket
6983requires_gnutls_next_disable_tls13_compat
6984requires_config_enabled MBEDTLS_DEBUG_C
6985requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006988run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006989 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006990 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006991 0 \
6992 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006993 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006994 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6995 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006996 -c "NamedGroup: secp256r1 ( 17 )" \
6997 -c "Verifying peer X.509 certificate... ok" \
6998 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006999
Jerry Yu31018ad2021-11-26 20:36:17 +08007000requires_gnutls_tls1_3
7001requires_gnutls_next_no_ticket
7002requires_gnutls_next_disable_tls13_compat
7003requires_config_enabled MBEDTLS_DEBUG_C
7004requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007007requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007008run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007009 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007010 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007011 0 \
7012 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007013 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007014 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7015 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007016 -c "NamedGroup: secp256r1 ( 17 )" \
7017 -c "Verifying peer X.509 certificate... ok" \
7018 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007019
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007020requires_gnutls_tls1_3
7021requires_gnutls_next_no_ticket
7022requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007023requires_config_enabled MBEDTLS_DEBUG_C
7024requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007027run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007028 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007029 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007030 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007031 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007032 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007033 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007034 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7035 -c "NamedGroup: secp384r1 ( 18 )" \
7036 -c "Verifying peer X.509 certificate... ok" \
7037 -C "received HelloRetryRequest message"
7038
7039requires_gnutls_tls1_3
7040requires_gnutls_next_no_ticket
7041requires_gnutls_next_disable_tls13_compat
7042requires_config_enabled MBEDTLS_DEBUG_C
7043requires_config_enabled MBEDTLS_SSL_CLI_C
7044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7046run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007047 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7049 0 \
7050 -c "HTTP/1.0 200 OK" \
7051 -c "Protocol is TLSv1.3" \
7052 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7053 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7054 -c "NamedGroup: secp384r1 ( 18 )" \
7055 -c "Verifying peer X.509 certificate... ok" \
7056 -C "received HelloRetryRequest message"
7057
7058requires_gnutls_tls1_3
7059requires_gnutls_next_no_ticket
7060requires_gnutls_next_disable_tls13_compat
7061requires_config_enabled MBEDTLS_DEBUG_C
7062requires_config_enabled MBEDTLS_SSL_CLI_C
7063requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7065run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007066 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007067 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7068 0 \
7069 -c "HTTP/1.0 200 OK" \
7070 -c "Protocol is TLSv1.3" \
7071 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7072 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007073 -c "NamedGroup: secp384r1 ( 18 )" \
7074 -c "Verifying peer X.509 certificate... ok" \
7075 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007076
Jerry Yu31018ad2021-11-26 20:36:17 +08007077requires_gnutls_tls1_3
7078requires_gnutls_next_no_ticket
7079requires_gnutls_next_disable_tls13_compat
7080requires_config_enabled MBEDTLS_DEBUG_C
7081requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007084requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007085run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007086 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007087 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007088 0 \
7089 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007090 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007091 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7092 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007093 -c "NamedGroup: secp384r1 ( 18 )" \
7094 -c "Verifying peer X.509 certificate... ok" \
7095 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007096
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007097requires_gnutls_tls1_3
7098requires_gnutls_next_no_ticket
7099requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007100requires_config_enabled MBEDTLS_DEBUG_C
7101requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007104run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007105 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007106 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007107 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007108 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007109 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007110 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007111 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7112 -c "NamedGroup: secp521r1 ( 19 )" \
7113 -c "Verifying peer X.509 certificate... ok" \
7114 -C "received HelloRetryRequest message"
7115
7116requires_gnutls_tls1_3
7117requires_gnutls_next_no_ticket
7118requires_gnutls_next_disable_tls13_compat
7119requires_config_enabled MBEDTLS_DEBUG_C
7120requires_config_enabled MBEDTLS_SSL_CLI_C
7121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7123run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007124 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007125 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
7126 0 \
7127 -c "HTTP/1.0 200 OK" \
7128 -c "Protocol is TLSv1.3" \
7129 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7130 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7131 -c "NamedGroup: secp521r1 ( 19 )" \
7132 -c "Verifying peer X.509 certificate... ok" \
7133 -C "received HelloRetryRequest message"
7134
7135requires_gnutls_tls1_3
7136requires_gnutls_next_no_ticket
7137requires_gnutls_next_disable_tls13_compat
7138requires_config_enabled MBEDTLS_DEBUG_C
7139requires_config_enabled MBEDTLS_SSL_CLI_C
7140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7142run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007143 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007144 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
7145 0 \
7146 -c "HTTP/1.0 200 OK" \
7147 -c "Protocol is TLSv1.3" \
7148 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7149 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007150 -c "NamedGroup: secp521r1 ( 19 )" \
7151 -c "Verifying peer X.509 certificate... ok" \
7152 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007153
Jerry Yu31018ad2021-11-26 20:36:17 +08007154requires_gnutls_tls1_3
7155requires_gnutls_next_no_ticket
7156requires_gnutls_next_disable_tls13_compat
7157requires_config_enabled MBEDTLS_DEBUG_C
7158requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007161requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007162run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007163 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007164 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007165 0 \
7166 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007167 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007168 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7169 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007170 -c "NamedGroup: secp521r1 ( 19 )" \
7171 -c "Verifying peer X.509 certificate... ok" \
7172 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007173
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007174requires_gnutls_tls1_3
7175requires_gnutls_next_no_ticket
7176requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007177requires_config_enabled MBEDTLS_DEBUG_C
7178requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007179requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007181run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007182 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007183 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007184 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007185 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007186 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007187 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007188 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7189 -c "NamedGroup: x25519 ( 1d )" \
7190 -c "Verifying peer X.509 certificate... ok" \
7191 -C "received HelloRetryRequest message"
7192
7193requires_gnutls_tls1_3
7194requires_gnutls_next_no_ticket
7195requires_gnutls_next_disable_tls13_compat
7196requires_config_enabled MBEDTLS_DEBUG_C
7197requires_config_enabled MBEDTLS_SSL_CLI_C
7198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7200run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007201 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007202 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
7203 0 \
7204 -c "HTTP/1.0 200 OK" \
7205 -c "Protocol is TLSv1.3" \
7206 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7207 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7208 -c "NamedGroup: x25519 ( 1d )" \
7209 -c "Verifying peer X.509 certificate... ok" \
7210 -C "received HelloRetryRequest message"
7211
7212requires_gnutls_tls1_3
7213requires_gnutls_next_no_ticket
7214requires_gnutls_next_disable_tls13_compat
7215requires_config_enabled MBEDTLS_DEBUG_C
7216requires_config_enabled MBEDTLS_SSL_CLI_C
7217requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7218requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7219run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007220 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007221 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
7222 0 \
7223 -c "HTTP/1.0 200 OK" \
7224 -c "Protocol is TLSv1.3" \
7225 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7226 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007227 -c "NamedGroup: x25519 ( 1d )" \
7228 -c "Verifying peer X.509 certificate... ok" \
7229 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007230
Jerry Yu31018ad2021-11-26 20:36:17 +08007231requires_gnutls_tls1_3
7232requires_gnutls_next_no_ticket
7233requires_gnutls_next_disable_tls13_compat
7234requires_config_enabled MBEDTLS_DEBUG_C
7235requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007238requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007239run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007240 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007241 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007242 0 \
7243 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007244 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007245 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7246 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007247 -c "NamedGroup: x25519 ( 1d )" \
7248 -c "Verifying peer X.509 certificate... ok" \
7249 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007250
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007251requires_gnutls_tls1_3
7252requires_gnutls_next_no_ticket
7253requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007254requires_config_enabled MBEDTLS_DEBUG_C
7255requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007258run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007259 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007260 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007261 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007262 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007263 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007264 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007265 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7266 -c "NamedGroup: x448 ( 1e )" \
7267 -c "Verifying peer X.509 certificate... ok" \
7268 -C "received HelloRetryRequest message"
7269
7270requires_gnutls_tls1_3
7271requires_gnutls_next_no_ticket
7272requires_gnutls_next_disable_tls13_compat
7273requires_config_enabled MBEDTLS_DEBUG_C
7274requires_config_enabled MBEDTLS_SSL_CLI_C
7275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7277run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007278 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007279 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
7280 0 \
7281 -c "HTTP/1.0 200 OK" \
7282 -c "Protocol is TLSv1.3" \
7283 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7284 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7285 -c "NamedGroup: x448 ( 1e )" \
7286 -c "Verifying peer X.509 certificate... ok" \
7287 -C "received HelloRetryRequest message"
7288
7289requires_gnutls_tls1_3
7290requires_gnutls_next_no_ticket
7291requires_gnutls_next_disable_tls13_compat
7292requires_config_enabled MBEDTLS_DEBUG_C
7293requires_config_enabled MBEDTLS_SSL_CLI_C
7294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7296run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007297 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
7299 0 \
7300 -c "HTTP/1.0 200 OK" \
7301 -c "Protocol is TLSv1.3" \
7302 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7303 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007304 -c "NamedGroup: x448 ( 1e )" \
7305 -c "Verifying peer X.509 certificate... ok" \
7306 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007307
Jerry Yu31018ad2021-11-26 20:36:17 +08007308requires_gnutls_tls1_3
7309requires_gnutls_next_no_ticket
7310requires_gnutls_next_disable_tls13_compat
7311requires_config_enabled MBEDTLS_DEBUG_C
7312requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007315requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007316run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007317 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007318 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007319 0 \
7320 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007321 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007322 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007323 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007324 -c "NamedGroup: x448 ( 1e )" \
7325 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007326 -C "received HelloRetryRequest message"
XiaokangQian83f81882022-03-17 06:26:36 +00007327
XiaokangQianb1847a22022-06-08 07:49:31 +00007328requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007329requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7332requires_config_enabled MBEDTLS_DEBUG_C
7333requires_config_enabled MBEDTLS_SSL_CLI_C
7334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7336run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
7337 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7338 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
7339 0 \
7340 -s "Protocol is TLSv1.3" \
7341 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7342 -s "received signature algorithm: 0x403" \
7343 -s "got named group: secp256r1(0017)" \
7344 -s "Verifying peer X.509 certificate... ok" \
7345 -c "Protocol is TLSv1.3" \
7346 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7347 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7348 -c "NamedGroup: secp256r1 ( 17 )" \
7349 -c "Verifying peer X.509 certificate... ok" \
7350 -C "received HelloRetryRequest message"
7351
7352requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007353requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7356requires_config_enabled MBEDTLS_DEBUG_C
7357requires_config_enabled MBEDTLS_SSL_CLI_C
7358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7360run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
7361 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7362 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
7363 0 \
7364 -s "Protocol is TLSv1.3" \
7365 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7366 -s "received signature algorithm: 0x503" \
7367 -s "got named group: secp256r1(0017)" \
7368 -s "Verifying peer X.509 certificate... ok" \
7369 -c "Protocol is TLSv1.3" \
7370 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7371 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7372 -c "NamedGroup: secp256r1 ( 17 )" \
7373 -c "Verifying peer X.509 certificate... ok" \
7374 -C "received HelloRetryRequest message"
7375
7376requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007377requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7380requires_config_enabled MBEDTLS_DEBUG_C
7381requires_config_enabled MBEDTLS_SSL_CLI_C
7382requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7383requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7384run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
7385 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7386 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
7387 0 \
7388 -s "Protocol is TLSv1.3" \
7389 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7390 -s "received signature algorithm: 0x603" \
7391 -s "got named group: secp256r1(0017)" \
7392 -s "Verifying peer X.509 certificate... ok" \
7393 -c "Protocol is TLSv1.3" \
7394 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7395 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7396 -c "NamedGroup: secp256r1 ( 17 )" \
7397 -c "Verifying peer X.509 certificate... ok" \
7398 -C "received HelloRetryRequest message"
7399
7400requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007401requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007402requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7403requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7404requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7405requires_config_enabled MBEDTLS_DEBUG_C
7406requires_config_enabled MBEDTLS_SSL_CLI_C
7407requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7409requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7410run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
7411 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7412 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
7413 0 \
7414 -s "Protocol is TLSv1.3" \
7415 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7416 -s "received signature algorithm: 0x804" \
7417 -s "got named group: secp256r1(0017)" \
7418 -s "Verifying peer X.509 certificate... ok" \
7419 -c "Protocol is TLSv1.3" \
7420 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7421 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7422 -c "NamedGroup: secp256r1 ( 17 )" \
7423 -c "Verifying peer X.509 certificate... ok" \
7424 -C "received HelloRetryRequest message"
7425
7426requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007427requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7430requires_config_enabled MBEDTLS_DEBUG_C
7431requires_config_enabled MBEDTLS_SSL_CLI_C
7432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7434run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
7435 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7436 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
7437 0 \
7438 -s "Protocol is TLSv1.3" \
7439 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7440 -s "received signature algorithm: 0x403" \
7441 -s "got named group: secp384r1(0018)" \
7442 -s "Verifying peer X.509 certificate... ok" \
7443 -c "Protocol is TLSv1.3" \
7444 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7445 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7446 -c "NamedGroup: secp384r1 ( 18 )" \
7447 -c "Verifying peer X.509 certificate... ok" \
7448 -C "received HelloRetryRequest message"
7449
7450requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007451requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7454requires_config_enabled MBEDTLS_DEBUG_C
7455requires_config_enabled MBEDTLS_SSL_CLI_C
7456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7458run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
7459 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7460 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7461 0 \
7462 -s "Protocol is TLSv1.3" \
7463 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7464 -s "received signature algorithm: 0x503" \
7465 -s "got named group: secp384r1(0018)" \
7466 -s "Verifying peer X.509 certificate... ok" \
7467 -c "Protocol is TLSv1.3" \
7468 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7469 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7470 -c "NamedGroup: secp384r1 ( 18 )" \
7471 -c "Verifying peer X.509 certificate... ok" \
7472 -C "received HelloRetryRequest message"
7473
7474requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007475requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7478requires_config_enabled MBEDTLS_DEBUG_C
7479requires_config_enabled MBEDTLS_SSL_CLI_C
7480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7481requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7482run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
7483 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7484 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7485 0 \
7486 -s "Protocol is TLSv1.3" \
7487 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7488 -s "received signature algorithm: 0x603" \
7489 -s "got named group: secp384r1(0018)" \
7490 -s "Verifying peer X.509 certificate... ok" \
7491 -c "Protocol is TLSv1.3" \
7492 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7493 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7494 -c "NamedGroup: secp384r1 ( 18 )" \
7495 -c "Verifying peer X.509 certificate... ok" \
7496 -C "received HelloRetryRequest message"
7497
7498requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007499requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007500requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7501requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7502requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7503requires_config_enabled MBEDTLS_DEBUG_C
7504requires_config_enabled MBEDTLS_SSL_CLI_C
7505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7507requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7508run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
7509 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7510 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
7511 0 \
7512 -s "Protocol is TLSv1.3" \
7513 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7514 -s "received signature algorithm: 0x804" \
7515 -s "got named group: secp384r1(0018)" \
7516 -s "Verifying peer X.509 certificate... ok" \
7517 -c "Protocol is TLSv1.3" \
7518 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7519 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7520 -c "NamedGroup: secp384r1 ( 18 )" \
7521 -c "Verifying peer X.509 certificate... ok" \
7522 -C "received HelloRetryRequest message"
7523
7524requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007525requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7528requires_config_enabled MBEDTLS_DEBUG_C
7529requires_config_enabled MBEDTLS_SSL_CLI_C
7530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7532run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
7533 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7534 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
7535 0 \
7536 -s "Protocol is TLSv1.3" \
7537 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7538 -s "received signature algorithm: 0x403" \
7539 -s "got named group: secp521r1(0019)" \
7540 -s "Verifying peer X.509 certificate... ok" \
7541 -c "Protocol is TLSv1.3" \
7542 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7543 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7544 -c "NamedGroup: secp521r1 ( 19 )" \
7545 -c "Verifying peer X.509 certificate... ok" \
7546 -C "received HelloRetryRequest message"
7547
7548requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007549requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7552requires_config_enabled MBEDTLS_DEBUG_C
7553requires_config_enabled MBEDTLS_SSL_CLI_C
7554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7556run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
7557 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7558 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
7559 0 \
7560 -s "Protocol is TLSv1.3" \
7561 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7562 -s "received signature algorithm: 0x503" \
7563 -s "got named group: secp521r1(0019)" \
7564 -s "Verifying peer X.509 certificate... ok" \
7565 -c "Protocol is TLSv1.3" \
7566 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7567 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7568 -c "NamedGroup: secp521r1 ( 19 )" \
7569 -c "Verifying peer X.509 certificate... ok" \
7570 -C "received HelloRetryRequest message"
7571
7572requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007573requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7576requires_config_enabled MBEDTLS_DEBUG_C
7577requires_config_enabled MBEDTLS_SSL_CLI_C
7578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7580run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
7581 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7582 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
7583 0 \
7584 -s "Protocol is TLSv1.3" \
7585 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7586 -s "received signature algorithm: 0x603" \
7587 -s "got named group: secp521r1(0019)" \
7588 -s "Verifying peer X.509 certificate... ok" \
7589 -c "Protocol is TLSv1.3" \
7590 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7591 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7592 -c "NamedGroup: secp521r1 ( 19 )" \
7593 -c "Verifying peer X.509 certificate... ok" \
7594 -C "received HelloRetryRequest message"
7595
7596requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007597requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007598requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7599requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7600requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7601requires_config_enabled MBEDTLS_DEBUG_C
7602requires_config_enabled MBEDTLS_SSL_CLI_C
7603requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7605requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7606run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
7607 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7608 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
7609 0 \
7610 -s "Protocol is TLSv1.3" \
7611 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7612 -s "received signature algorithm: 0x804" \
7613 -s "got named group: secp521r1(0019)" \
7614 -s "Verifying peer X.509 certificate... ok" \
7615 -c "Protocol is TLSv1.3" \
7616 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7617 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7618 -c "NamedGroup: secp521r1 ( 19 )" \
7619 -c "Verifying peer X.509 certificate... ok" \
7620 -C "received HelloRetryRequest message"
7621
7622requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007623requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007624requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7626requires_config_enabled MBEDTLS_DEBUG_C
7627requires_config_enabled MBEDTLS_SSL_CLI_C
7628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7630run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
7631 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7632 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
7633 0 \
7634 -s "Protocol is TLSv1.3" \
7635 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7636 -s "received signature algorithm: 0x403" \
7637 -s "got named group: x25519(001d)" \
7638 -s "Verifying peer X.509 certificate... ok" \
7639 -c "Protocol is TLSv1.3" \
7640 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7641 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7642 -c "NamedGroup: x25519 ( 1d )" \
7643 -c "Verifying peer X.509 certificate... ok" \
7644 -C "received HelloRetryRequest message"
7645
7646requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007647requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007648requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7650requires_config_enabled MBEDTLS_DEBUG_C
7651requires_config_enabled MBEDTLS_SSL_CLI_C
7652requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7654run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
7655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7656 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
7657 0 \
7658 -s "Protocol is TLSv1.3" \
7659 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7660 -s "received signature algorithm: 0x503" \
7661 -s "got named group: x25519(001d)" \
7662 -s "Verifying peer X.509 certificate... ok" \
7663 -c "Protocol is TLSv1.3" \
7664 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7665 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7666 -c "NamedGroup: x25519 ( 1d )" \
7667 -c "Verifying peer X.509 certificate... ok" \
7668 -C "received HelloRetryRequest message"
7669
7670requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007671requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007672requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7674requires_config_enabled MBEDTLS_DEBUG_C
7675requires_config_enabled MBEDTLS_SSL_CLI_C
7676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7678run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
7679 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7680 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
7681 0 \
7682 -s "Protocol is TLSv1.3" \
7683 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7684 -s "received signature algorithm: 0x603" \
7685 -s "got named group: x25519(001d)" \
7686 -s "Verifying peer X.509 certificate... ok" \
7687 -c "Protocol is TLSv1.3" \
7688 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7689 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7690 -c "NamedGroup: x25519 ( 1d )" \
7691 -c "Verifying peer X.509 certificate... ok" \
7692 -C "received HelloRetryRequest message"
7693
7694requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007695requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7698requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7699requires_config_enabled MBEDTLS_DEBUG_C
7700requires_config_enabled MBEDTLS_SSL_CLI_C
7701requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7702requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7703requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7704run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
7705 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7706 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
7707 0 \
7708 -s "Protocol is TLSv1.3" \
7709 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7710 -s "received signature algorithm: 0x804" \
7711 -s "got named group: x25519(001d)" \
7712 -s "Verifying peer X.509 certificate... ok" \
7713 -c "Protocol is TLSv1.3" \
7714 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7715 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7716 -c "NamedGroup: x25519 ( 1d )" \
7717 -c "Verifying peer X.509 certificate... ok" \
7718 -C "received HelloRetryRequest message"
7719
7720requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007721requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7724requires_config_enabled MBEDTLS_DEBUG_C
7725requires_config_enabled MBEDTLS_SSL_CLI_C
7726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7728run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
7729 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7730 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
7731 0 \
7732 -s "Protocol is TLSv1.3" \
7733 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7734 -s "received signature algorithm: 0x403" \
7735 -s "got named group: x448(001e)" \
7736 -s "Verifying peer X.509 certificate... ok" \
7737 -c "Protocol is TLSv1.3" \
7738 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7739 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7740 -c "NamedGroup: x448 ( 1e )" \
7741 -c "Verifying peer X.509 certificate... ok" \
7742 -C "received HelloRetryRequest message"
7743
7744requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007745requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7748requires_config_enabled MBEDTLS_DEBUG_C
7749requires_config_enabled MBEDTLS_SSL_CLI_C
7750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7752run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
7753 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
7755 0 \
7756 -s "Protocol is TLSv1.3" \
7757 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7758 -s "received signature algorithm: 0x503" \
7759 -s "got named group: x448(001e)" \
7760 -s "Verifying peer X.509 certificate... ok" \
7761 -c "Protocol is TLSv1.3" \
7762 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7763 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7764 -c "NamedGroup: x448 ( 1e )" \
7765 -c "Verifying peer X.509 certificate... ok" \
7766 -C "received HelloRetryRequest message"
7767
7768requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007769requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007770requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7772requires_config_enabled MBEDTLS_DEBUG_C
7773requires_config_enabled MBEDTLS_SSL_CLI_C
7774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7776run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
7777 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7778 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
7779 0 \
7780 -s "Protocol is TLSv1.3" \
7781 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7782 -s "received signature algorithm: 0x603" \
7783 -s "got named group: x448(001e)" \
7784 -s "Verifying peer X.509 certificate... ok" \
7785 -c "Protocol is TLSv1.3" \
7786 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7787 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7788 -c "NamedGroup: x448 ( 1e )" \
7789 -c "Verifying peer X.509 certificate... ok" \
7790 -C "received HelloRetryRequest message"
7791
7792requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007793requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7796requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7797requires_config_enabled MBEDTLS_DEBUG_C
7798requires_config_enabled MBEDTLS_SSL_CLI_C
7799requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7800requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7801requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7802run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
7803 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7804 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
7805 0 \
7806 -s "Protocol is TLSv1.3" \
7807 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7808 -s "received signature algorithm: 0x804" \
7809 -s "got named group: x448(001e)" \
7810 -s "Verifying peer X.509 certificate... ok" \
7811 -c "Protocol is TLSv1.3" \
7812 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7813 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7814 -c "NamedGroup: x448 ( 1e )" \
7815 -c "Verifying peer X.509 certificate... ok" \
7816 -C "received HelloRetryRequest message"
7817
7818requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007819requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7821requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7822requires_config_enabled MBEDTLS_DEBUG_C
7823requires_config_enabled MBEDTLS_SSL_CLI_C
7824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7826run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
7827 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7828 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
7829 0 \
7830 -s "Protocol is TLSv1.3" \
7831 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7832 -s "received signature algorithm: 0x403" \
7833 -s "got named group: secp256r1(0017)" \
7834 -s "Verifying peer X.509 certificate... ok" \
7835 -c "Protocol is TLSv1.3" \
7836 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7837 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7838 -c "NamedGroup: secp256r1 ( 17 )" \
7839 -c "Verifying peer X.509 certificate... ok" \
7840 -C "received HelloRetryRequest message"
7841
7842requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007843requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7846requires_config_enabled MBEDTLS_DEBUG_C
7847requires_config_enabled MBEDTLS_SSL_CLI_C
7848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7849requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7850run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
7851 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7852 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
7853 0 \
7854 -s "Protocol is TLSv1.3" \
7855 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7856 -s "received signature algorithm: 0x503" \
7857 -s "got named group: secp256r1(0017)" \
7858 -s "Verifying peer X.509 certificate... ok" \
7859 -c "Protocol is TLSv1.3" \
7860 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7861 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7862 -c "NamedGroup: secp256r1 ( 17 )" \
7863 -c "Verifying peer X.509 certificate... ok" \
7864 -C "received HelloRetryRequest message"
7865
7866requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007867requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007868requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7870requires_config_enabled MBEDTLS_DEBUG_C
7871requires_config_enabled MBEDTLS_SSL_CLI_C
7872requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7873requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7874run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
7875 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7876 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
7877 0 \
7878 -s "Protocol is TLSv1.3" \
7879 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7880 -s "received signature algorithm: 0x603" \
7881 -s "got named group: secp256r1(0017)" \
7882 -s "Verifying peer X.509 certificate... ok" \
7883 -c "Protocol is TLSv1.3" \
7884 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7885 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7886 -c "NamedGroup: secp256r1 ( 17 )" \
7887 -c "Verifying peer X.509 certificate... ok" \
7888 -C "received HelloRetryRequest message"
7889
7890requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007891requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7894requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7895requires_config_enabled MBEDTLS_DEBUG_C
7896requires_config_enabled MBEDTLS_SSL_CLI_C
7897requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7898requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7899requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7900run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
7901 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7902 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
7903 0 \
7904 -s "Protocol is TLSv1.3" \
7905 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7906 -s "received signature algorithm: 0x804" \
7907 -s "got named group: secp256r1(0017)" \
7908 -s "Verifying peer X.509 certificate... ok" \
7909 -c "Protocol is TLSv1.3" \
7910 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7911 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7912 -c "NamedGroup: secp256r1 ( 17 )" \
7913 -c "Verifying peer X.509 certificate... ok" \
7914 -C "received HelloRetryRequest message"
7915
7916requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007917requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7920requires_config_enabled MBEDTLS_DEBUG_C
7921requires_config_enabled MBEDTLS_SSL_CLI_C
7922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7924run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
7925 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7926 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
7927 0 \
7928 -s "Protocol is TLSv1.3" \
7929 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7930 -s "received signature algorithm: 0x403" \
7931 -s "got named group: secp384r1(0018)" \
7932 -s "Verifying peer X.509 certificate... ok" \
7933 -c "Protocol is TLSv1.3" \
7934 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7935 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7936 -c "NamedGroup: secp384r1 ( 18 )" \
7937 -c "Verifying peer X.509 certificate... ok" \
7938 -C "received HelloRetryRequest message"
7939
7940requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007941requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007942requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7944requires_config_enabled MBEDTLS_DEBUG_C
7945requires_config_enabled MBEDTLS_SSL_CLI_C
7946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7948run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
7949 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7950 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7951 0 \
7952 -s "Protocol is TLSv1.3" \
7953 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7954 -s "received signature algorithm: 0x503" \
7955 -s "got named group: secp384r1(0018)" \
7956 -s "Verifying peer X.509 certificate... ok" \
7957 -c "Protocol is TLSv1.3" \
7958 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7959 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7960 -c "NamedGroup: secp384r1 ( 18 )" \
7961 -c "Verifying peer X.509 certificate... ok" \
7962 -C "received HelloRetryRequest message"
7963
7964requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007965requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7968requires_config_enabled MBEDTLS_DEBUG_C
7969requires_config_enabled MBEDTLS_SSL_CLI_C
7970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7972run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
7973 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7974 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7975 0 \
7976 -s "Protocol is TLSv1.3" \
7977 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7978 -s "received signature algorithm: 0x603" \
7979 -s "got named group: secp384r1(0018)" \
7980 -s "Verifying peer X.509 certificate... ok" \
7981 -c "Protocol is TLSv1.3" \
7982 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7983 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7984 -c "NamedGroup: secp384r1 ( 18 )" \
7985 -c "Verifying peer X.509 certificate... ok" \
7986 -C "received HelloRetryRequest message"
7987
7988requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007989requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007990requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7991requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7992requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7993requires_config_enabled MBEDTLS_DEBUG_C
7994requires_config_enabled MBEDTLS_SSL_CLI_C
7995requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7997requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7998run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
7999 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8000 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8001 0 \
8002 -s "Protocol is TLSv1.3" \
8003 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8004 -s "received signature algorithm: 0x804" \
8005 -s "got named group: secp384r1(0018)" \
8006 -s "Verifying peer X.509 certificate... ok" \
8007 -c "Protocol is TLSv1.3" \
8008 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8009 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8010 -c "NamedGroup: secp384r1 ( 18 )" \
8011 -c "Verifying peer X.509 certificate... ok" \
8012 -C "received HelloRetryRequest message"
8013
8014requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008015requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8018requires_config_enabled MBEDTLS_DEBUG_C
8019requires_config_enabled MBEDTLS_SSL_CLI_C
8020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8022run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
8023 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8024 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
8025 0 \
8026 -s "Protocol is TLSv1.3" \
8027 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8028 -s "received signature algorithm: 0x403" \
8029 -s "got named group: secp521r1(0019)" \
8030 -s "Verifying peer X.509 certificate... ok" \
8031 -c "Protocol is TLSv1.3" \
8032 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8033 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8034 -c "NamedGroup: secp521r1 ( 19 )" \
8035 -c "Verifying peer X.509 certificate... ok" \
8036 -C "received HelloRetryRequest message"
8037
8038requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008039requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008040requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8042requires_config_enabled MBEDTLS_DEBUG_C
8043requires_config_enabled MBEDTLS_SSL_CLI_C
8044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8046run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
8047 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
8049 0 \
8050 -s "Protocol is TLSv1.3" \
8051 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8052 -s "received signature algorithm: 0x503" \
8053 -s "got named group: secp521r1(0019)" \
8054 -s "Verifying peer X.509 certificate... ok" \
8055 -c "Protocol is TLSv1.3" \
8056 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8057 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8058 -c "NamedGroup: secp521r1 ( 19 )" \
8059 -c "Verifying peer X.509 certificate... ok" \
8060 -C "received HelloRetryRequest message"
8061
8062requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008063requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8066requires_config_enabled MBEDTLS_DEBUG_C
8067requires_config_enabled MBEDTLS_SSL_CLI_C
8068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8070run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
8071 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8072 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
8073 0 \
8074 -s "Protocol is TLSv1.3" \
8075 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8076 -s "received signature algorithm: 0x603" \
8077 -s "got named group: secp521r1(0019)" \
8078 -s "Verifying peer X.509 certificate... ok" \
8079 -c "Protocol is TLSv1.3" \
8080 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8081 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8082 -c "NamedGroup: secp521r1 ( 19 )" \
8083 -c "Verifying peer X.509 certificate... ok" \
8084 -C "received HelloRetryRequest message"
8085
8086requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008087requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008088requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8090requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8091requires_config_enabled MBEDTLS_DEBUG_C
8092requires_config_enabled MBEDTLS_SSL_CLI_C
8093requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8095requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8096run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
8097 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8098 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
8099 0 \
8100 -s "Protocol is TLSv1.3" \
8101 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8102 -s "received signature algorithm: 0x804" \
8103 -s "got named group: secp521r1(0019)" \
8104 -s "Verifying peer X.509 certificate... ok" \
8105 -c "Protocol is TLSv1.3" \
8106 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8107 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8108 -c "NamedGroup: secp521r1 ( 19 )" \
8109 -c "Verifying peer X.509 certificate... ok" \
8110 -C "received HelloRetryRequest message"
8111
8112requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008113requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8116requires_config_enabled MBEDTLS_DEBUG_C
8117requires_config_enabled MBEDTLS_SSL_CLI_C
8118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8120run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
8121 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8122 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
8123 0 \
8124 -s "Protocol is TLSv1.3" \
8125 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8126 -s "received signature algorithm: 0x403" \
8127 -s "got named group: x25519(001d)" \
8128 -s "Verifying peer X.509 certificate... ok" \
8129 -c "Protocol is TLSv1.3" \
8130 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8131 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8132 -c "NamedGroup: x25519 ( 1d )" \
8133 -c "Verifying peer X.509 certificate... ok" \
8134 -C "received HelloRetryRequest message"
8135
8136requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008137requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008138requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8140requires_config_enabled MBEDTLS_DEBUG_C
8141requires_config_enabled MBEDTLS_SSL_CLI_C
8142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8144run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
8145 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8146 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
8147 0 \
8148 -s "Protocol is TLSv1.3" \
8149 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8150 -s "received signature algorithm: 0x503" \
8151 -s "got named group: x25519(001d)" \
8152 -s "Verifying peer X.509 certificate... ok" \
8153 -c "Protocol is TLSv1.3" \
8154 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8155 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8156 -c "NamedGroup: x25519 ( 1d )" \
8157 -c "Verifying peer X.509 certificate... ok" \
8158 -C "received HelloRetryRequest message"
8159
8160requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008161requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008162requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8163requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8164requires_config_enabled MBEDTLS_DEBUG_C
8165requires_config_enabled MBEDTLS_SSL_CLI_C
8166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8168run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
8169 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8170 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
8171 0 \
8172 -s "Protocol is TLSv1.3" \
8173 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8174 -s "received signature algorithm: 0x603" \
8175 -s "got named group: x25519(001d)" \
8176 -s "Verifying peer X.509 certificate... ok" \
8177 -c "Protocol is TLSv1.3" \
8178 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8179 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8180 -c "NamedGroup: x25519 ( 1d )" \
8181 -c "Verifying peer X.509 certificate... ok" \
8182 -C "received HelloRetryRequest message"
8183
8184requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008185requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008186requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8188requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8189requires_config_enabled MBEDTLS_DEBUG_C
8190requires_config_enabled MBEDTLS_SSL_CLI_C
8191requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8192requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8193requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8194run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
8195 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8196 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
8197 0 \
8198 -s "Protocol is TLSv1.3" \
8199 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8200 -s "received signature algorithm: 0x804" \
8201 -s "got named group: x25519(001d)" \
8202 -s "Verifying peer X.509 certificate... ok" \
8203 -c "Protocol is TLSv1.3" \
8204 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8205 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8206 -c "NamedGroup: x25519 ( 1d )" \
8207 -c "Verifying peer X.509 certificate... ok" \
8208 -C "received HelloRetryRequest message"
8209
8210requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008211requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008212requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8214requires_config_enabled MBEDTLS_DEBUG_C
8215requires_config_enabled MBEDTLS_SSL_CLI_C
8216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8218run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
8219 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
8221 0 \
8222 -s "Protocol is TLSv1.3" \
8223 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8224 -s "received signature algorithm: 0x403" \
8225 -s "got named group: x448(001e)" \
8226 -s "Verifying peer X.509 certificate... ok" \
8227 -c "Protocol is TLSv1.3" \
8228 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8229 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8230 -c "NamedGroup: x448 ( 1e )" \
8231 -c "Verifying peer X.509 certificate... ok" \
8232 -C "received HelloRetryRequest message"
8233
8234requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8238requires_config_enabled MBEDTLS_DEBUG_C
8239requires_config_enabled MBEDTLS_SSL_CLI_C
8240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8242run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
8243 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8244 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
8245 0 \
8246 -s "Protocol is TLSv1.3" \
8247 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8248 -s "received signature algorithm: 0x503" \
8249 -s "got named group: x448(001e)" \
8250 -s "Verifying peer X.509 certificate... ok" \
8251 -c "Protocol is TLSv1.3" \
8252 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8253 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8254 -c "NamedGroup: x448 ( 1e )" \
8255 -c "Verifying peer X.509 certificate... ok" \
8256 -C "received HelloRetryRequest message"
8257
8258requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008259requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008260requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8261requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8262requires_config_enabled MBEDTLS_DEBUG_C
8263requires_config_enabled MBEDTLS_SSL_CLI_C
8264requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8266run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
8267 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8268 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
8269 0 \
8270 -s "Protocol is TLSv1.3" \
8271 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8272 -s "received signature algorithm: 0x603" \
8273 -s "got named group: x448(001e)" \
8274 -s "Verifying peer X.509 certificate... ok" \
8275 -c "Protocol is TLSv1.3" \
8276 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8277 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8278 -c "NamedGroup: x448 ( 1e )" \
8279 -c "Verifying peer X.509 certificate... ok" \
8280 -C "received HelloRetryRequest message"
8281
8282requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008283requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8287requires_config_enabled MBEDTLS_DEBUG_C
8288requires_config_enabled MBEDTLS_SSL_CLI_C
8289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8291requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8292run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
8293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8294 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
8295 0 \
8296 -s "Protocol is TLSv1.3" \
8297 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8298 -s "received signature algorithm: 0x804" \
8299 -s "got named group: x448(001e)" \
8300 -s "Verifying peer X.509 certificate... ok" \
8301 -c "Protocol is TLSv1.3" \
8302 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8303 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8304 -c "NamedGroup: x448 ( 1e )" \
8305 -c "Verifying peer X.509 certificate... ok" \
8306 -C "received HelloRetryRequest message"
8307
8308requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008309requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8311requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8312requires_config_enabled MBEDTLS_DEBUG_C
8313requires_config_enabled MBEDTLS_SSL_CLI_C
8314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8316run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8317 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8318 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
8319 0 \
8320 -s "Protocol is TLSv1.3" \
8321 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8322 -s "received signature algorithm: 0x403" \
8323 -s "got named group: secp256r1(0017)" \
8324 -s "Verifying peer X.509 certificate... ok" \
8325 -c "Protocol is TLSv1.3" \
8326 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8327 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8328 -c "NamedGroup: secp256r1 ( 17 )" \
8329 -c "Verifying peer X.509 certificate... ok" \
8330 -C "received HelloRetryRequest message"
8331
8332requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008333requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8336requires_config_enabled MBEDTLS_DEBUG_C
8337requires_config_enabled MBEDTLS_SSL_CLI_C
8338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8340run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8341 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8342 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
8343 0 \
8344 -s "Protocol is TLSv1.3" \
8345 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8346 -s "received signature algorithm: 0x503" \
8347 -s "got named group: secp256r1(0017)" \
8348 -s "Verifying peer X.509 certificate... ok" \
8349 -c "Protocol is TLSv1.3" \
8350 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8351 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8352 -c "NamedGroup: secp256r1 ( 17 )" \
8353 -c "Verifying peer X.509 certificate... ok" \
8354 -C "received HelloRetryRequest message"
8355
8356requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008357requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8360requires_config_enabled MBEDTLS_DEBUG_C
8361requires_config_enabled MBEDTLS_SSL_CLI_C
8362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8364run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8365 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8366 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
8367 0 \
8368 -s "Protocol is TLSv1.3" \
8369 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8370 -s "received signature algorithm: 0x603" \
8371 -s "got named group: secp256r1(0017)" \
8372 -s "Verifying peer X.509 certificate... ok" \
8373 -c "Protocol is TLSv1.3" \
8374 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8375 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8376 -c "NamedGroup: secp256r1 ( 17 )" \
8377 -c "Verifying peer X.509 certificate... ok" \
8378 -C "received HelloRetryRequest message"
8379
8380requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008381requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008382requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8383requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8384requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8385requires_config_enabled MBEDTLS_DEBUG_C
8386requires_config_enabled MBEDTLS_SSL_CLI_C
8387requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8388requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8389requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8390run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8391 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8392 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
8393 0 \
8394 -s "Protocol is TLSv1.3" \
8395 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8396 -s "received signature algorithm: 0x804" \
8397 -s "got named group: secp256r1(0017)" \
8398 -s "Verifying peer X.509 certificate... ok" \
8399 -c "Protocol is TLSv1.3" \
8400 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8401 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8402 -c "NamedGroup: secp256r1 ( 17 )" \
8403 -c "Verifying peer X.509 certificate... ok" \
8404 -C "received HelloRetryRequest message"
8405
8406requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008407requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8410requires_config_enabled MBEDTLS_DEBUG_C
8411requires_config_enabled MBEDTLS_SSL_CLI_C
8412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8414run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8415 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8416 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
8417 0 \
8418 -s "Protocol is TLSv1.3" \
8419 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8420 -s "received signature algorithm: 0x403" \
8421 -s "got named group: secp384r1(0018)" \
8422 -s "Verifying peer X.509 certificate... ok" \
8423 -c "Protocol is TLSv1.3" \
8424 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8425 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8426 -c "NamedGroup: secp384r1 ( 18 )" \
8427 -c "Verifying peer X.509 certificate... ok" \
8428 -C "received HelloRetryRequest message"
8429
8430requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008431requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8434requires_config_enabled MBEDTLS_DEBUG_C
8435requires_config_enabled MBEDTLS_SSL_CLI_C
8436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8438run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8439 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8440 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
8441 0 \
8442 -s "Protocol is TLSv1.3" \
8443 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8444 -s "received signature algorithm: 0x503" \
8445 -s "got named group: secp384r1(0018)" \
8446 -s "Verifying peer X.509 certificate... ok" \
8447 -c "Protocol is TLSv1.3" \
8448 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8449 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8450 -c "NamedGroup: secp384r1 ( 18 )" \
8451 -c "Verifying peer X.509 certificate... ok" \
8452 -C "received HelloRetryRequest message"
8453
8454requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008455requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8458requires_config_enabled MBEDTLS_DEBUG_C
8459requires_config_enabled MBEDTLS_SSL_CLI_C
8460requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8462run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8463 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8464 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
8465 0 \
8466 -s "Protocol is TLSv1.3" \
8467 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8468 -s "received signature algorithm: 0x603" \
8469 -s "got named group: secp384r1(0018)" \
8470 -s "Verifying peer X.509 certificate... ok" \
8471 -c "Protocol is TLSv1.3" \
8472 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8473 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8474 -c "NamedGroup: secp384r1 ( 18 )" \
8475 -c "Verifying peer X.509 certificate... ok" \
8476 -C "received HelloRetryRequest message"
8477
8478requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008479requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8481requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8482requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8483requires_config_enabled MBEDTLS_DEBUG_C
8484requires_config_enabled MBEDTLS_SSL_CLI_C
8485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8487requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8488run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8489 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8490 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8491 0 \
8492 -s "Protocol is TLSv1.3" \
8493 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8494 -s "received signature algorithm: 0x804" \
8495 -s "got named group: secp384r1(0018)" \
8496 -s "Verifying peer X.509 certificate... ok" \
8497 -c "Protocol is TLSv1.3" \
8498 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8499 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8500 -c "NamedGroup: secp384r1 ( 18 )" \
8501 -c "Verifying peer X.509 certificate... ok" \
8502 -C "received HelloRetryRequest message"
8503
8504requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008505requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8508requires_config_enabled MBEDTLS_DEBUG_C
8509requires_config_enabled MBEDTLS_SSL_CLI_C
8510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8512run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
8513 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8514 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
8515 0 \
8516 -s "Protocol is TLSv1.3" \
8517 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8518 -s "received signature algorithm: 0x403" \
8519 -s "got named group: secp521r1(0019)" \
8520 -s "Verifying peer X.509 certificate... ok" \
8521 -c "Protocol is TLSv1.3" \
8522 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8523 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8524 -c "NamedGroup: secp521r1 ( 19 )" \
8525 -c "Verifying peer X.509 certificate... ok" \
8526 -C "received HelloRetryRequest message"
8527
8528requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008529requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8532requires_config_enabled MBEDTLS_DEBUG_C
8533requires_config_enabled MBEDTLS_SSL_CLI_C
8534requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8536run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
8537 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8538 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
8539 0 \
8540 -s "Protocol is TLSv1.3" \
8541 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8542 -s "received signature algorithm: 0x503" \
8543 -s "got named group: secp521r1(0019)" \
8544 -s "Verifying peer X.509 certificate... ok" \
8545 -c "Protocol is TLSv1.3" \
8546 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8547 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8548 -c "NamedGroup: secp521r1 ( 19 )" \
8549 -c "Verifying peer X.509 certificate... ok" \
8550 -C "received HelloRetryRequest message"
8551
8552requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008553requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8556requires_config_enabled MBEDTLS_DEBUG_C
8557requires_config_enabled MBEDTLS_SSL_CLI_C
8558requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8560run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
8561 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8562 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
8563 0 \
8564 -s "Protocol is TLSv1.3" \
8565 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8566 -s "received signature algorithm: 0x603" \
8567 -s "got named group: secp521r1(0019)" \
8568 -s "Verifying peer X.509 certificate... ok" \
8569 -c "Protocol is TLSv1.3" \
8570 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8571 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8572 -c "NamedGroup: secp521r1 ( 19 )" \
8573 -c "Verifying peer X.509 certificate... ok" \
8574 -C "received HelloRetryRequest message"
8575
8576requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008577requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8580requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8581requires_config_enabled MBEDTLS_DEBUG_C
8582requires_config_enabled MBEDTLS_SSL_CLI_C
8583requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8585requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8586run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
8587 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8588 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
8589 0 \
8590 -s "Protocol is TLSv1.3" \
8591 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8592 -s "received signature algorithm: 0x804" \
8593 -s "got named group: secp521r1(0019)" \
8594 -s "Verifying peer X.509 certificate... ok" \
8595 -c "Protocol is TLSv1.3" \
8596 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8597 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8598 -c "NamedGroup: secp521r1 ( 19 )" \
8599 -c "Verifying peer X.509 certificate... ok" \
8600 -C "received HelloRetryRequest message"
8601
8602requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008603requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008604requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8606requires_config_enabled MBEDTLS_DEBUG_C
8607requires_config_enabled MBEDTLS_SSL_CLI_C
8608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8610run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
8611 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8612 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
8613 0 \
8614 -s "Protocol is TLSv1.3" \
8615 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8616 -s "received signature algorithm: 0x403" \
8617 -s "got named group: x25519(001d)" \
8618 -s "Verifying peer X.509 certificate... ok" \
8619 -c "Protocol is TLSv1.3" \
8620 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8621 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8622 -c "NamedGroup: x25519 ( 1d )" \
8623 -c "Verifying peer X.509 certificate... ok" \
8624 -C "received HelloRetryRequest message"
8625
8626requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008627requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8630requires_config_enabled MBEDTLS_DEBUG_C
8631requires_config_enabled MBEDTLS_SSL_CLI_C
8632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8634run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
8635 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8636 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
8637 0 \
8638 -s "Protocol is TLSv1.3" \
8639 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8640 -s "received signature algorithm: 0x503" \
8641 -s "got named group: x25519(001d)" \
8642 -s "Verifying peer X.509 certificate... ok" \
8643 -c "Protocol is TLSv1.3" \
8644 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8645 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8646 -c "NamedGroup: x25519 ( 1d )" \
8647 -c "Verifying peer X.509 certificate... ok" \
8648 -C "received HelloRetryRequest message"
8649
8650requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008651requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008652requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8654requires_config_enabled MBEDTLS_DEBUG_C
8655requires_config_enabled MBEDTLS_SSL_CLI_C
8656requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8658run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
8659 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8660 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
8661 0 \
8662 -s "Protocol is TLSv1.3" \
8663 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8664 -s "received signature algorithm: 0x603" \
8665 -s "got named group: x25519(001d)" \
8666 -s "Verifying peer X.509 certificate... ok" \
8667 -c "Protocol is TLSv1.3" \
8668 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8669 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8670 -c "NamedGroup: x25519 ( 1d )" \
8671 -c "Verifying peer X.509 certificate... ok" \
8672 -C "received HelloRetryRequest message"
8673
8674requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008675requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8678requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8679requires_config_enabled MBEDTLS_DEBUG_C
8680requires_config_enabled MBEDTLS_SSL_CLI_C
8681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8683requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8684run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
8685 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8686 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
8687 0 \
8688 -s "Protocol is TLSv1.3" \
8689 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8690 -s "received signature algorithm: 0x804" \
8691 -s "got named group: x25519(001d)" \
8692 -s "Verifying peer X.509 certificate... ok" \
8693 -c "Protocol is TLSv1.3" \
8694 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8695 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8696 -c "NamedGroup: x25519 ( 1d )" \
8697 -c "Verifying peer X.509 certificate... ok" \
8698 -C "received HelloRetryRequest message"
8699
8700requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008701requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8704requires_config_enabled MBEDTLS_DEBUG_C
8705requires_config_enabled MBEDTLS_SSL_CLI_C
8706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8708run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
8709 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8710 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
8711 0 \
8712 -s "Protocol is TLSv1.3" \
8713 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8714 -s "received signature algorithm: 0x403" \
8715 -s "got named group: x448(001e)" \
8716 -s "Verifying peer X.509 certificate... ok" \
8717 -c "Protocol is TLSv1.3" \
8718 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8719 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8720 -c "NamedGroup: x448 ( 1e )" \
8721 -c "Verifying peer X.509 certificate... ok" \
8722 -C "received HelloRetryRequest message"
8723
8724requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008725requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8728requires_config_enabled MBEDTLS_DEBUG_C
8729requires_config_enabled MBEDTLS_SSL_CLI_C
8730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8732run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
8733 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8734 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
8735 0 \
8736 -s "Protocol is TLSv1.3" \
8737 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8738 -s "received signature algorithm: 0x503" \
8739 -s "got named group: x448(001e)" \
8740 -s "Verifying peer X.509 certificate... ok" \
8741 -c "Protocol is TLSv1.3" \
8742 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8743 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8744 -c "NamedGroup: x448 ( 1e )" \
8745 -c "Verifying peer X.509 certificate... ok" \
8746 -C "received HelloRetryRequest message"
8747
8748requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008749requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8752requires_config_enabled MBEDTLS_DEBUG_C
8753requires_config_enabled MBEDTLS_SSL_CLI_C
8754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8756run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
8757 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8758 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
8759 0 \
8760 -s "Protocol is TLSv1.3" \
8761 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8762 -s "received signature algorithm: 0x603" \
8763 -s "got named group: x448(001e)" \
8764 -s "Verifying peer X.509 certificate... ok" \
8765 -c "Protocol is TLSv1.3" \
8766 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8767 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8768 -c "NamedGroup: x448 ( 1e )" \
8769 -c "Verifying peer X.509 certificate... ok" \
8770 -C "received HelloRetryRequest message"
8771
8772requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008773requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8777requires_config_enabled MBEDTLS_DEBUG_C
8778requires_config_enabled MBEDTLS_SSL_CLI_C
8779requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8780requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8781requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8782run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
8783 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8784 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
8785 0 \
8786 -s "Protocol is TLSv1.3" \
8787 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8788 -s "received signature algorithm: 0x804" \
8789 -s "got named group: x448(001e)" \
8790 -s "Verifying peer X.509 certificate... ok" \
8791 -c "Protocol is TLSv1.3" \
8792 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8793 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8794 -c "NamedGroup: x448 ( 1e )" \
8795 -c "Verifying peer X.509 certificate... ok" \
8796 -C "received HelloRetryRequest message"
8797
8798requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008799requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008800requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8801requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8802requires_config_enabled MBEDTLS_DEBUG_C
8803requires_config_enabled MBEDTLS_SSL_CLI_C
8804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8806run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8807 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8808 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
8809 0 \
8810 -s "Protocol is TLSv1.3" \
8811 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8812 -s "received signature algorithm: 0x403" \
8813 -s "got named group: secp256r1(0017)" \
8814 -s "Verifying peer X.509 certificate... ok" \
8815 -c "Protocol is TLSv1.3" \
8816 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8817 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8818 -c "NamedGroup: secp256r1 ( 17 )" \
8819 -c "Verifying peer X.509 certificate... ok" \
8820 -C "received HelloRetryRequest message"
8821
8822requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008823requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8826requires_config_enabled MBEDTLS_DEBUG_C
8827requires_config_enabled MBEDTLS_SSL_CLI_C
8828requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8829requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8830run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8831 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8832 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
8833 0 \
8834 -s "Protocol is TLSv1.3" \
8835 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8836 -s "received signature algorithm: 0x503" \
8837 -s "got named group: secp256r1(0017)" \
8838 -s "Verifying peer X.509 certificate... ok" \
8839 -c "Protocol is TLSv1.3" \
8840 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8841 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8842 -c "NamedGroup: secp256r1 ( 17 )" \
8843 -c "Verifying peer X.509 certificate... ok" \
8844 -C "received HelloRetryRequest message"
8845
8846requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008847requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8849requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8850requires_config_enabled MBEDTLS_DEBUG_C
8851requires_config_enabled MBEDTLS_SSL_CLI_C
8852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8854run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8855 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8856 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
8857 0 \
8858 -s "Protocol is TLSv1.3" \
8859 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8860 -s "received signature algorithm: 0x603" \
8861 -s "got named group: secp256r1(0017)" \
8862 -s "Verifying peer X.509 certificate... ok" \
8863 -c "Protocol is TLSv1.3" \
8864 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8865 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8866 -c "NamedGroup: secp256r1 ( 17 )" \
8867 -c "Verifying peer X.509 certificate... ok" \
8868 -C "received HelloRetryRequest message"
8869
8870requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008871requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008872requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8873requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8874requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8875requires_config_enabled MBEDTLS_DEBUG_C
8876requires_config_enabled MBEDTLS_SSL_CLI_C
8877requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8878requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8879requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8880run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8881 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8882 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
8883 0 \
8884 -s "Protocol is TLSv1.3" \
8885 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8886 -s "received signature algorithm: 0x804" \
8887 -s "got named group: secp256r1(0017)" \
8888 -s "Verifying peer X.509 certificate... ok" \
8889 -c "Protocol is TLSv1.3" \
8890 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8891 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8892 -c "NamedGroup: secp256r1 ( 17 )" \
8893 -c "Verifying peer X.509 certificate... ok" \
8894 -C "received HelloRetryRequest message"
8895
8896requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008897requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008898requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8899requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8900requires_config_enabled MBEDTLS_DEBUG_C
8901requires_config_enabled MBEDTLS_SSL_CLI_C
8902requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8903requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8904run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8905 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8906 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
8907 0 \
8908 -s "Protocol is TLSv1.3" \
8909 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8910 -s "received signature algorithm: 0x403" \
8911 -s "got named group: secp384r1(0018)" \
8912 -s "Verifying peer X.509 certificate... ok" \
8913 -c "Protocol is TLSv1.3" \
8914 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8915 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8916 -c "NamedGroup: secp384r1 ( 18 )" \
8917 -c "Verifying peer X.509 certificate... ok" \
8918 -C "received HelloRetryRequest message"
8919
8920requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008921requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8924requires_config_enabled MBEDTLS_DEBUG_C
8925requires_config_enabled MBEDTLS_SSL_CLI_C
8926requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8927requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8928run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8929 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8930 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
8931 0 \
8932 -s "Protocol is TLSv1.3" \
8933 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8934 -s "received signature algorithm: 0x503" \
8935 -s "got named group: secp384r1(0018)" \
8936 -s "Verifying peer X.509 certificate... ok" \
8937 -c "Protocol is TLSv1.3" \
8938 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8939 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8940 -c "NamedGroup: secp384r1 ( 18 )" \
8941 -c "Verifying peer X.509 certificate... ok" \
8942 -C "received HelloRetryRequest message"
8943
8944requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008945requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8948requires_config_enabled MBEDTLS_DEBUG_C
8949requires_config_enabled MBEDTLS_SSL_CLI_C
8950requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8951requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8952run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8953 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8954 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
8955 0 \
8956 -s "Protocol is TLSv1.3" \
8957 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8958 -s "received signature algorithm: 0x603" \
8959 -s "got named group: secp384r1(0018)" \
8960 -s "Verifying peer X.509 certificate... ok" \
8961 -c "Protocol is TLSv1.3" \
8962 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8963 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8964 -c "NamedGroup: secp384r1 ( 18 )" \
8965 -c "Verifying peer X.509 certificate... ok" \
8966 -C "received HelloRetryRequest message"
8967
8968requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008969requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8972requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8973requires_config_enabled MBEDTLS_DEBUG_C
8974requires_config_enabled MBEDTLS_SSL_CLI_C
8975requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8976requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8977requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8978run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8979 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8980 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8981 0 \
8982 -s "Protocol is TLSv1.3" \
8983 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8984 -s "received signature algorithm: 0x804" \
8985 -s "got named group: secp384r1(0018)" \
8986 -s "Verifying peer X.509 certificate... ok" \
8987 -c "Protocol is TLSv1.3" \
8988 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8989 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8990 -c "NamedGroup: secp384r1 ( 18 )" \
8991 -c "Verifying peer X.509 certificate... ok" \
8992 -C "received HelloRetryRequest message"
8993
8994requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008995requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8998requires_config_enabled MBEDTLS_DEBUG_C
8999requires_config_enabled MBEDTLS_SSL_CLI_C
9000requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9001requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9002run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
9003 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9004 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
9005 0 \
9006 -s "Protocol is TLSv1.3" \
9007 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9008 -s "received signature algorithm: 0x403" \
9009 -s "got named group: secp521r1(0019)" \
9010 -s "Verifying peer X.509 certificate... ok" \
9011 -c "Protocol is TLSv1.3" \
9012 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9013 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9014 -c "NamedGroup: secp521r1 ( 19 )" \
9015 -c "Verifying peer X.509 certificate... ok" \
9016 -C "received HelloRetryRequest message"
9017
9018requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009019requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9022requires_config_enabled MBEDTLS_DEBUG_C
9023requires_config_enabled MBEDTLS_SSL_CLI_C
9024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9026run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
9027 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9028 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
9029 0 \
9030 -s "Protocol is TLSv1.3" \
9031 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9032 -s "received signature algorithm: 0x503" \
9033 -s "got named group: secp521r1(0019)" \
9034 -s "Verifying peer X.509 certificate... ok" \
9035 -c "Protocol is TLSv1.3" \
9036 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9037 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9038 -c "NamedGroup: secp521r1 ( 19 )" \
9039 -c "Verifying peer X.509 certificate... ok" \
9040 -C "received HelloRetryRequest message"
9041
9042requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009043requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9046requires_config_enabled MBEDTLS_DEBUG_C
9047requires_config_enabled MBEDTLS_SSL_CLI_C
9048requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9050run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
9051 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9052 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
9053 0 \
9054 -s "Protocol is TLSv1.3" \
9055 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9056 -s "received signature algorithm: 0x603" \
9057 -s "got named group: secp521r1(0019)" \
9058 -s "Verifying peer X.509 certificate... ok" \
9059 -c "Protocol is TLSv1.3" \
9060 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9061 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9062 -c "NamedGroup: secp521r1 ( 19 )" \
9063 -c "Verifying peer X.509 certificate... ok" \
9064 -C "received HelloRetryRequest message"
9065
9066requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009067requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9070requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9071requires_config_enabled MBEDTLS_DEBUG_C
9072requires_config_enabled MBEDTLS_SSL_CLI_C
9073requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9074requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9075requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9076run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
9077 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9078 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
9079 0 \
9080 -s "Protocol is TLSv1.3" \
9081 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9082 -s "received signature algorithm: 0x804" \
9083 -s "got named group: secp521r1(0019)" \
9084 -s "Verifying peer X.509 certificate... ok" \
9085 -c "Protocol is TLSv1.3" \
9086 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9087 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9088 -c "NamedGroup: secp521r1 ( 19 )" \
9089 -c "Verifying peer X.509 certificate... ok" \
9090 -C "received HelloRetryRequest message"
9091
9092requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009093requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009094requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9095requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9096requires_config_enabled MBEDTLS_DEBUG_C
9097requires_config_enabled MBEDTLS_SSL_CLI_C
9098requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9099requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9100run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
9101 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9102 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
9103 0 \
9104 -s "Protocol is TLSv1.3" \
9105 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9106 -s "received signature algorithm: 0x403" \
9107 -s "got named group: x25519(001d)" \
9108 -s "Verifying peer X.509 certificate... ok" \
9109 -c "Protocol is TLSv1.3" \
9110 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9111 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9112 -c "NamedGroup: x25519 ( 1d )" \
9113 -c "Verifying peer X.509 certificate... ok" \
9114 -C "received HelloRetryRequest message"
9115
9116requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009117requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9120requires_config_enabled MBEDTLS_DEBUG_C
9121requires_config_enabled MBEDTLS_SSL_CLI_C
9122requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9123requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9124run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
9125 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9126 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
9127 0 \
9128 -s "Protocol is TLSv1.3" \
9129 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9130 -s "received signature algorithm: 0x503" \
9131 -s "got named group: x25519(001d)" \
9132 -s "Verifying peer X.509 certificate... ok" \
9133 -c "Protocol is TLSv1.3" \
9134 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9135 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9136 -c "NamedGroup: x25519 ( 1d )" \
9137 -c "Verifying peer X.509 certificate... ok" \
9138 -C "received HelloRetryRequest message"
9139
9140requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009141requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9144requires_config_enabled MBEDTLS_DEBUG_C
9145requires_config_enabled MBEDTLS_SSL_CLI_C
9146requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9148run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
9149 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9150 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
9151 0 \
9152 -s "Protocol is TLSv1.3" \
9153 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9154 -s "received signature algorithm: 0x603" \
9155 -s "got named group: x25519(001d)" \
9156 -s "Verifying peer X.509 certificate... ok" \
9157 -c "Protocol is TLSv1.3" \
9158 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9159 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9160 -c "NamedGroup: x25519 ( 1d )" \
9161 -c "Verifying peer X.509 certificate... ok" \
9162 -C "received HelloRetryRequest message"
9163
9164requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009165requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9168requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9169requires_config_enabled MBEDTLS_DEBUG_C
9170requires_config_enabled MBEDTLS_SSL_CLI_C
9171requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9172requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9173requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9174run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
9175 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9176 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
9177 0 \
9178 -s "Protocol is TLSv1.3" \
9179 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9180 -s "received signature algorithm: 0x804" \
9181 -s "got named group: x25519(001d)" \
9182 -s "Verifying peer X.509 certificate... ok" \
9183 -c "Protocol is TLSv1.3" \
9184 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9185 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9186 -c "NamedGroup: x25519 ( 1d )" \
9187 -c "Verifying peer X.509 certificate... ok" \
9188 -C "received HelloRetryRequest message"
9189
9190requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009191requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9193requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9194requires_config_enabled MBEDTLS_DEBUG_C
9195requires_config_enabled MBEDTLS_SSL_CLI_C
9196requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9198run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
9199 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9200 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
9201 0 \
9202 -s "Protocol is TLSv1.3" \
9203 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9204 -s "received signature algorithm: 0x403" \
9205 -s "got named group: x448(001e)" \
9206 -s "Verifying peer X.509 certificate... ok" \
9207 -c "Protocol is TLSv1.3" \
9208 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9209 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9210 -c "NamedGroup: x448 ( 1e )" \
9211 -c "Verifying peer X.509 certificate... ok" \
9212 -C "received HelloRetryRequest message"
9213
9214requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009215requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9218requires_config_enabled MBEDTLS_DEBUG_C
9219requires_config_enabled MBEDTLS_SSL_CLI_C
9220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9222run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
9223 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9224 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
9225 0 \
9226 -s "Protocol is TLSv1.3" \
9227 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9228 -s "received signature algorithm: 0x503" \
9229 -s "got named group: x448(001e)" \
9230 -s "Verifying peer X.509 certificate... ok" \
9231 -c "Protocol is TLSv1.3" \
9232 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9233 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9234 -c "NamedGroup: x448 ( 1e )" \
9235 -c "Verifying peer X.509 certificate... ok" \
9236 -C "received HelloRetryRequest message"
9237
9238requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009239requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9242requires_config_enabled MBEDTLS_DEBUG_C
9243requires_config_enabled MBEDTLS_SSL_CLI_C
9244requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9246run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
9247 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9248 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
9249 0 \
9250 -s "Protocol is TLSv1.3" \
9251 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9252 -s "received signature algorithm: 0x603" \
9253 -s "got named group: x448(001e)" \
9254 -s "Verifying peer X.509 certificate... ok" \
9255 -c "Protocol is TLSv1.3" \
9256 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9257 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9258 -c "NamedGroup: x448 ( 1e )" \
9259 -c "Verifying peer X.509 certificate... ok" \
9260 -C "received HelloRetryRequest message"
9261
9262requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009263requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009264requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9266requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9267requires_config_enabled MBEDTLS_DEBUG_C
9268requires_config_enabled MBEDTLS_SSL_CLI_C
9269requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9270requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9271requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9272run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
9273 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9274 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
9275 0 \
9276 -s "Protocol is TLSv1.3" \
9277 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9278 -s "received signature algorithm: 0x804" \
9279 -s "got named group: x448(001e)" \
9280 -s "Verifying peer X.509 certificate... ok" \
9281 -c "Protocol is TLSv1.3" \
9282 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9283 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9284 -c "NamedGroup: x448 ( 1e )" \
9285 -c "Verifying peer X.509 certificate... ok" \
9286 -C "received HelloRetryRequest message"
9287
9288requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009289requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9292requires_config_enabled MBEDTLS_DEBUG_C
9293requires_config_enabled MBEDTLS_SSL_CLI_C
9294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9296run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
9297 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
9299 0 \
9300 -s "Protocol is TLSv1.3" \
9301 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9302 -s "received signature algorithm: 0x403" \
9303 -s "got named group: secp256r1(0017)" \
9304 -s "Verifying peer X.509 certificate... ok" \
9305 -c "Protocol is TLSv1.3" \
9306 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9307 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9308 -c "NamedGroup: secp256r1 ( 17 )" \
9309 -c "Verifying peer X.509 certificate... ok" \
9310 -C "received HelloRetryRequest message"
9311
9312requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009313requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9316requires_config_enabled MBEDTLS_DEBUG_C
9317requires_config_enabled MBEDTLS_SSL_CLI_C
9318requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9319requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9320run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
9321 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9322 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
9323 0 \
9324 -s "Protocol is TLSv1.3" \
9325 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9326 -s "received signature algorithm: 0x503" \
9327 -s "got named group: secp256r1(0017)" \
9328 -s "Verifying peer X.509 certificate... ok" \
9329 -c "Protocol is TLSv1.3" \
9330 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9331 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9332 -c "NamedGroup: secp256r1 ( 17 )" \
9333 -c "Verifying peer X.509 certificate... ok" \
9334 -C "received HelloRetryRequest message"
9335
9336requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009337requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9340requires_config_enabled MBEDTLS_DEBUG_C
9341requires_config_enabled MBEDTLS_SSL_CLI_C
9342requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9344run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
9345 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9346 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
9347 0 \
9348 -s "Protocol is TLSv1.3" \
9349 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9350 -s "received signature algorithm: 0x603" \
9351 -s "got named group: secp256r1(0017)" \
9352 -s "Verifying peer X.509 certificate... ok" \
9353 -c "Protocol is TLSv1.3" \
9354 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9355 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9356 -c "NamedGroup: secp256r1 ( 17 )" \
9357 -c "Verifying peer X.509 certificate... ok" \
9358 -C "received HelloRetryRequest message"
9359
9360requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009361requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9364requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9365requires_config_enabled MBEDTLS_DEBUG_C
9366requires_config_enabled MBEDTLS_SSL_CLI_C
9367requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9368requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9369requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9370run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
9371 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9372 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
9373 0 \
9374 -s "Protocol is TLSv1.3" \
9375 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9376 -s "received signature algorithm: 0x804" \
9377 -s "got named group: secp256r1(0017)" \
9378 -s "Verifying peer X.509 certificate... ok" \
9379 -c "Protocol is TLSv1.3" \
9380 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9381 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9382 -c "NamedGroup: secp256r1 ( 17 )" \
9383 -c "Verifying peer X.509 certificate... ok" \
9384 -C "received HelloRetryRequest message"
9385
9386requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009387requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9390requires_config_enabled MBEDTLS_DEBUG_C
9391requires_config_enabled MBEDTLS_SSL_CLI_C
9392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9394run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
9395 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9396 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
9397 0 \
9398 -s "Protocol is TLSv1.3" \
9399 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9400 -s "received signature algorithm: 0x403" \
9401 -s "got named group: secp384r1(0018)" \
9402 -s "Verifying peer X.509 certificate... ok" \
9403 -c "Protocol is TLSv1.3" \
9404 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9405 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9406 -c "NamedGroup: secp384r1 ( 18 )" \
9407 -c "Verifying peer X.509 certificate... ok" \
9408 -C "received HelloRetryRequest message"
9409
9410requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009411requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9414requires_config_enabled MBEDTLS_DEBUG_C
9415requires_config_enabled MBEDTLS_SSL_CLI_C
9416requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9417requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9418run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
9419 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9420 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
9421 0 \
9422 -s "Protocol is TLSv1.3" \
9423 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9424 -s "received signature algorithm: 0x503" \
9425 -s "got named group: secp384r1(0018)" \
9426 -s "Verifying peer X.509 certificate... ok" \
9427 -c "Protocol is TLSv1.3" \
9428 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9429 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9430 -c "NamedGroup: secp384r1 ( 18 )" \
9431 -c "Verifying peer X.509 certificate... ok" \
9432 -C "received HelloRetryRequest message"
9433
9434requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009435requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9438requires_config_enabled MBEDTLS_DEBUG_C
9439requires_config_enabled MBEDTLS_SSL_CLI_C
9440requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9442run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
9443 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9444 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
9445 0 \
9446 -s "Protocol is TLSv1.3" \
9447 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9448 -s "received signature algorithm: 0x603" \
9449 -s "got named group: secp384r1(0018)" \
9450 -s "Verifying peer X.509 certificate... ok" \
9451 -c "Protocol is TLSv1.3" \
9452 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9453 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9454 -c "NamedGroup: secp384r1 ( 18 )" \
9455 -c "Verifying peer X.509 certificate... ok" \
9456 -C "received HelloRetryRequest message"
9457
9458requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009460requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9462requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9463requires_config_enabled MBEDTLS_DEBUG_C
9464requires_config_enabled MBEDTLS_SSL_CLI_C
9465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9467requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9468run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
9469 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9470 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
9471 0 \
9472 -s "Protocol is TLSv1.3" \
9473 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9474 -s "received signature algorithm: 0x804" \
9475 -s "got named group: secp384r1(0018)" \
9476 -s "Verifying peer X.509 certificate... ok" \
9477 -c "Protocol is TLSv1.3" \
9478 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9479 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9480 -c "NamedGroup: secp384r1 ( 18 )" \
9481 -c "Verifying peer X.509 certificate... ok" \
9482 -C "received HelloRetryRequest message"
9483
9484requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009485requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9488requires_config_enabled MBEDTLS_DEBUG_C
9489requires_config_enabled MBEDTLS_SSL_CLI_C
9490requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9491requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9492run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
9493 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9494 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
9495 0 \
9496 -s "Protocol is TLSv1.3" \
9497 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9498 -s "received signature algorithm: 0x403" \
9499 -s "got named group: secp521r1(0019)" \
9500 -s "Verifying peer X.509 certificate... ok" \
9501 -c "Protocol is TLSv1.3" \
9502 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9503 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9504 -c "NamedGroup: secp521r1 ( 19 )" \
9505 -c "Verifying peer X.509 certificate... ok" \
9506 -C "received HelloRetryRequest message"
9507
9508requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009509requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9512requires_config_enabled MBEDTLS_DEBUG_C
9513requires_config_enabled MBEDTLS_SSL_CLI_C
9514requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9515requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9516run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
9517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9518 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
9519 0 \
9520 -s "Protocol is TLSv1.3" \
9521 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9522 -s "received signature algorithm: 0x503" \
9523 -s "got named group: secp521r1(0019)" \
9524 -s "Verifying peer X.509 certificate... ok" \
9525 -c "Protocol is TLSv1.3" \
9526 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9527 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9528 -c "NamedGroup: secp521r1 ( 19 )" \
9529 -c "Verifying peer X.509 certificate... ok" \
9530 -C "received HelloRetryRequest message"
9531
9532requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009533requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009534requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9536requires_config_enabled MBEDTLS_DEBUG_C
9537requires_config_enabled MBEDTLS_SSL_CLI_C
9538requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9539requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9540run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
9541 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9542 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
9543 0 \
9544 -s "Protocol is TLSv1.3" \
9545 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9546 -s "received signature algorithm: 0x603" \
9547 -s "got named group: secp521r1(0019)" \
9548 -s "Verifying peer X.509 certificate... ok" \
9549 -c "Protocol is TLSv1.3" \
9550 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9551 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9552 -c "NamedGroup: secp521r1 ( 19 )" \
9553 -c "Verifying peer X.509 certificate... ok" \
9554 -C "received HelloRetryRequest message"
9555
9556requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009557requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009558requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9560requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9561requires_config_enabled MBEDTLS_DEBUG_C
9562requires_config_enabled MBEDTLS_SSL_CLI_C
9563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9565requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9566run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
9567 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9568 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
9569 0 \
9570 -s "Protocol is TLSv1.3" \
9571 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9572 -s "received signature algorithm: 0x804" \
9573 -s "got named group: secp521r1(0019)" \
9574 -s "Verifying peer X.509 certificate... ok" \
9575 -c "Protocol is TLSv1.3" \
9576 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9577 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9578 -c "NamedGroup: secp521r1 ( 19 )" \
9579 -c "Verifying peer X.509 certificate... ok" \
9580 -C "received HelloRetryRequest message"
9581
9582requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009583requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009584requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9586requires_config_enabled MBEDTLS_DEBUG_C
9587requires_config_enabled MBEDTLS_SSL_CLI_C
9588requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9589requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9590run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
9591 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9592 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
9593 0 \
9594 -s "Protocol is TLSv1.3" \
9595 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9596 -s "received signature algorithm: 0x403" \
9597 -s "got named group: x25519(001d)" \
9598 -s "Verifying peer X.509 certificate... ok" \
9599 -c "Protocol is TLSv1.3" \
9600 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9601 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9602 -c "NamedGroup: x25519 ( 1d )" \
9603 -c "Verifying peer X.509 certificate... ok" \
9604 -C "received HelloRetryRequest message"
9605
9606requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009607requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9610requires_config_enabled MBEDTLS_DEBUG_C
9611requires_config_enabled MBEDTLS_SSL_CLI_C
9612requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9614run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
9615 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9616 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
9617 0 \
9618 -s "Protocol is TLSv1.3" \
9619 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9620 -s "received signature algorithm: 0x503" \
9621 -s "got named group: x25519(001d)" \
9622 -s "Verifying peer X.509 certificate... ok" \
9623 -c "Protocol is TLSv1.3" \
9624 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9625 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9626 -c "NamedGroup: x25519 ( 1d )" \
9627 -c "Verifying peer X.509 certificate... ok" \
9628 -C "received HelloRetryRequest message"
9629
9630requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009631requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9634requires_config_enabled MBEDTLS_DEBUG_C
9635requires_config_enabled MBEDTLS_SSL_CLI_C
9636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9638run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
9639 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9640 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
9641 0 \
9642 -s "Protocol is TLSv1.3" \
9643 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9644 -s "received signature algorithm: 0x603" \
9645 -s "got named group: x25519(001d)" \
9646 -s "Verifying peer X.509 certificate... ok" \
9647 -c "Protocol is TLSv1.3" \
9648 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9649 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9650 -c "NamedGroup: x25519 ( 1d )" \
9651 -c "Verifying peer X.509 certificate... ok" \
9652 -C "received HelloRetryRequest message"
9653
9654requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009655requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009656requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9658requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9659requires_config_enabled MBEDTLS_DEBUG_C
9660requires_config_enabled MBEDTLS_SSL_CLI_C
9661requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9662requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9663requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9664run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
9665 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9666 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
9667 0 \
9668 -s "Protocol is TLSv1.3" \
9669 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9670 -s "received signature algorithm: 0x804" \
9671 -s "got named group: x25519(001d)" \
9672 -s "Verifying peer X.509 certificate... ok" \
9673 -c "Protocol is TLSv1.3" \
9674 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9675 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9676 -c "NamedGroup: x25519 ( 1d )" \
9677 -c "Verifying peer X.509 certificate... ok" \
9678 -C "received HelloRetryRequest message"
9679
9680requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009681requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009682requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9683requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9684requires_config_enabled MBEDTLS_DEBUG_C
9685requires_config_enabled MBEDTLS_SSL_CLI_C
9686requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9688run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
9689 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9690 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
9691 0 \
9692 -s "Protocol is TLSv1.3" \
9693 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9694 -s "received signature algorithm: 0x403" \
9695 -s "got named group: x448(001e)" \
9696 -s "Verifying peer X.509 certificate... ok" \
9697 -c "Protocol is TLSv1.3" \
9698 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9699 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9700 -c "NamedGroup: x448 ( 1e )" \
9701 -c "Verifying peer X.509 certificate... ok" \
9702 -C "received HelloRetryRequest message"
9703
9704requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009705requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9708requires_config_enabled MBEDTLS_DEBUG_C
9709requires_config_enabled MBEDTLS_SSL_CLI_C
9710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9711requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9712run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
9713 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9714 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
9715 0 \
9716 -s "Protocol is TLSv1.3" \
9717 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9718 -s "received signature algorithm: 0x503" \
9719 -s "got named group: x448(001e)" \
9720 -s "Verifying peer X.509 certificate... ok" \
9721 -c "Protocol is TLSv1.3" \
9722 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9723 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9724 -c "NamedGroup: x448 ( 1e )" \
9725 -c "Verifying peer X.509 certificate... ok" \
9726 -C "received HelloRetryRequest message"
9727
9728requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009729requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9732requires_config_enabled MBEDTLS_DEBUG_C
9733requires_config_enabled MBEDTLS_SSL_CLI_C
9734requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9736run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
9737 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9738 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
9739 0 \
9740 -s "Protocol is TLSv1.3" \
9741 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9742 -s "received signature algorithm: 0x603" \
9743 -s "got named group: x448(001e)" \
9744 -s "Verifying peer X.509 certificate... ok" \
9745 -c "Protocol is TLSv1.3" \
9746 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9747 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9748 -c "NamedGroup: x448 ( 1e )" \
9749 -c "Verifying peer X.509 certificate... ok" \
9750 -C "received HelloRetryRequest message"
9751
9752requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009753requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9756requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9757requires_config_enabled MBEDTLS_DEBUG_C
9758requires_config_enabled MBEDTLS_SSL_CLI_C
9759requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9760requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9761requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9762run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
9763 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9764 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
9765 0 \
9766 -s "Protocol is TLSv1.3" \
9767 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9768 -s "received signature algorithm: 0x804" \
9769 -s "got named group: x448(001e)" \
9770 -s "Verifying peer X.509 certificate... ok" \
9771 -c "Protocol is TLSv1.3" \
9772 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9773 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9774 -c "NamedGroup: x448 ( 1e )" \
9775 -c "Verifying peer X.509 certificate... ok" \
9776 -C "received HelloRetryRequest message"
9777
XiaokangQian83f81882022-03-17 06:26:36 +00009778requires_openssl_tls1_3
9779requires_config_enabled MBEDTLS_DEBUG_C
9780requires_config_enabled MBEDTLS_SSL_CLI_C
9781requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9782requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQiana1931442022-03-25 11:58:22 +00009783run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009784 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009785 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQiana1931442022-03-25 11:58:22 +00009786 0 \
9787 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009788 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00009789 -c "NamedGroup: secp256r1 ( 17 )" \
9790 -c "NamedGroup: secp384r1 ( 18 )" \
9791 -c "Verifying peer X.509 certificate... ok" \
9792 -c "received HelloRetryRequest message" \
9793 -c "selected_group ( 24 )"
XiaokangQian83f81882022-03-17 06:26:36 +00009794
XiaokangQian83f81882022-03-17 06:26:36 +00009795requires_openssl_tls1_3
9796requires_config_enabled MBEDTLS_DEBUG_C
9797requires_config_enabled MBEDTLS_SSL_CLI_C
9798requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9799requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00009800run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009801 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009802 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian83f81882022-03-17 06:26:36 +00009803 0 \
9804 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009805 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00009806 -c "NamedGroup: secp256r1 ( 17 )" \
9807 -c "NamedGroup: secp521r1 ( 19 )" \
9808 -c "Verifying peer X.509 certificate... ok" \
9809 -c "received HelloRetryRequest message" \
9810 -c "selected_group ( 25 )"
XiaokangQian83f81882022-03-17 06:26:36 +00009811
XiaokangQian83f81882022-03-17 06:26:36 +00009812requires_openssl_tls1_3
9813requires_config_enabled MBEDTLS_DEBUG_C
9814requires_config_enabled MBEDTLS_SSL_CLI_C
9815requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00009817run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009818 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009819 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian83f81882022-03-17 06:26:36 +00009820 0 \
9821 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009822 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00009823 -c "NamedGroup: secp256r1 ( 17 )" \
9824 -c "NamedGroup: x25519 ( 1d )" \
9825 -c "Verifying peer X.509 certificate... ok" \
9826 -c "received HelloRetryRequest message" \
9827 -c "selected_group ( 29 )"
XiaokangQian83f81882022-03-17 06:26:36 +00009828
XiaokangQian83f81882022-03-17 06:26:36 +00009829requires_openssl_tls1_3
9830requires_config_enabled MBEDTLS_DEBUG_C
9831requires_config_enabled MBEDTLS_SSL_CLI_C
9832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00009834run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009835 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009836 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +00009837 0 \
9838 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009839 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00009840 -c "NamedGroup: secp256r1 ( 17 )" \
9841 -c "NamedGroup: x448 ( 1e )" \
9842 -c "Verifying peer X.509 certificate... ok" \
9843 -c "received HelloRetryRequest message" \
9844 -c "selected_group ( 30 )"
XiaokangQian83f81882022-03-17 06:26:36 +00009845
XiaokangQian2e17fb82022-03-28 03:30:05 +00009846requires_openssl_tls1_3
9847requires_config_enabled MBEDTLS_DEBUG_C
9848requires_config_enabled MBEDTLS_SSL_CLI_C
9849requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9850requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9851run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009852 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009853 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009854 0 \
9855 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009856 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009857 -c "NamedGroup: secp384r1 ( 18 )" \
9858 -c "NamedGroup: secp256r1 ( 17 )" \
9859 -c "Verifying peer X.509 certificate... ok" \
9860 -c "received HelloRetryRequest message" \
9861 -c "selected_group ( 23 )"
9862
9863requires_openssl_tls1_3
9864requires_config_enabled MBEDTLS_DEBUG_C
9865requires_config_enabled MBEDTLS_SSL_CLI_C
9866requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9867requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9868run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009869 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009870 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009871 0 \
9872 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009873 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009874 -c "NamedGroup: secp384r1 ( 18 )" \
9875 -c "NamedGroup: secp521r1 ( 19 )" \
9876 -c "Verifying peer X.509 certificate... ok" \
9877 -c "received HelloRetryRequest message" \
9878 -c "selected_group ( 25 )"
9879
9880requires_openssl_tls1_3
9881requires_config_enabled MBEDTLS_DEBUG_C
9882requires_config_enabled MBEDTLS_SSL_CLI_C
9883requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9884requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9885run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009886 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009887 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009888 0 \
9889 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009890 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009891 -c "NamedGroup: secp384r1 ( 18 )" \
9892 -c "NamedGroup: x25519 ( 1d )" \
9893 -c "Verifying peer X.509 certificate... ok" \
9894 -c "received HelloRetryRequest message" \
9895 -c "selected_group ( 29 )"
9896
9897requires_openssl_tls1_3
9898requires_config_enabled MBEDTLS_DEBUG_C
9899requires_config_enabled MBEDTLS_SSL_CLI_C
9900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9901requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9902run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009903 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009904 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009905 0 \
9906 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009907 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009908 -c "NamedGroup: secp384r1 ( 18 )" \
9909 -c "NamedGroup: x448 ( 1e )" \
9910 -c "Verifying peer X.509 certificate... ok" \
9911 -c "received HelloRetryRequest message" \
9912 -c "selected_group ( 30 )"
9913
9914requires_openssl_tls1_3
9915requires_config_enabled MBEDTLS_DEBUG_C
9916requires_config_enabled MBEDTLS_SSL_CLI_C
9917requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9918requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9919run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009920 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009921 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009922 0 \
9923 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009924 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009925 -c "NamedGroup: secp521r1 ( 19 )" \
9926 -c "NamedGroup: secp256r1 ( 17 )" \
9927 -c "Verifying peer X.509 certificate... ok" \
9928 -c "received HelloRetryRequest message" \
9929 -c "selected_group ( 23 )"
9930
9931requires_openssl_tls1_3
9932requires_config_enabled MBEDTLS_DEBUG_C
9933requires_config_enabled MBEDTLS_SSL_CLI_C
9934requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9935requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9936run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009937 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009938 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009939 0 \
9940 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009941 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009942 -c "NamedGroup: secp521r1 ( 19 )" \
9943 -c "NamedGroup: secp384r1 ( 18 )" \
9944 -c "Verifying peer X.509 certificate... ok" \
9945 -c "received HelloRetryRequest message" \
9946 -c "selected_group ( 24 )"
9947
9948requires_openssl_tls1_3
9949requires_config_enabled MBEDTLS_DEBUG_C
9950requires_config_enabled MBEDTLS_SSL_CLI_C
9951requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9952requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9953run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009954 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009955 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009956 0 \
9957 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009958 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009959 -c "NamedGroup: secp521r1 ( 19 )" \
9960 -c "NamedGroup: x25519 ( 1d )" \
9961 -c "Verifying peer X.509 certificate... ok" \
9962 -c "received HelloRetryRequest message" \
9963 -c "selected_group ( 29 )"
9964
9965requires_openssl_tls1_3
9966requires_config_enabled MBEDTLS_DEBUG_C
9967requires_config_enabled MBEDTLS_SSL_CLI_C
9968requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9969requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9970run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009971 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009972 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009973 0 \
9974 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009975 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009976 -c "NamedGroup: secp521r1 ( 19 )" \
9977 -c "NamedGroup: x448 ( 1e )" \
9978 -c "Verifying peer X.509 certificate... ok" \
9979 -c "received HelloRetryRequest message" \
9980 -c "selected_group ( 30 )"
9981
9982requires_openssl_tls1_3
9983requires_config_enabled MBEDTLS_DEBUG_C
9984requires_config_enabled MBEDTLS_SSL_CLI_C
9985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9986requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9987run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009988 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009989 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009990 0 \
9991 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02009992 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00009993 -c "NamedGroup: x25519 ( 1d )" \
9994 -c "NamedGroup: secp256r1 ( 17 )" \
9995 -c "Verifying peer X.509 certificate... ok" \
9996 -c "received HelloRetryRequest message" \
9997 -c "selected_group ( 23 )"
9998
9999requires_openssl_tls1_3
10000requires_config_enabled MBEDTLS_DEBUG_C
10001requires_config_enabled MBEDTLS_SSL_CLI_C
10002requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10003requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10004run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010005 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010006 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010007 0 \
10008 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010009 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010010 -c "NamedGroup: x25519 ( 1d )" \
10011 -c "NamedGroup: secp384r1 ( 18 )" \
10012 -c "Verifying peer X.509 certificate... ok" \
10013 -c "received HelloRetryRequest message" \
10014 -c "selected_group ( 24 )"
10015
10016requires_openssl_tls1_3
10017requires_config_enabled MBEDTLS_DEBUG_C
10018requires_config_enabled MBEDTLS_SSL_CLI_C
10019requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10020requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10021run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010022 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010023 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010024 0 \
10025 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010026 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010027 -c "NamedGroup: x25519 ( 1d )" \
10028 -c "NamedGroup: secp521r1 ( 19 )" \
10029 -c "Verifying peer X.509 certificate... ok" \
10030 -c "received HelloRetryRequest message" \
10031 -c "selected_group ( 25 )"
10032
10033requires_openssl_tls1_3
10034requires_config_enabled MBEDTLS_DEBUG_C
10035requires_config_enabled MBEDTLS_SSL_CLI_C
10036requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10037requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10038run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010039 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010040 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010041 0 \
10042 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010043 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010044 -c "NamedGroup: x25519 ( 1d )" \
10045 -c "NamedGroup: x448 ( 1e )" \
10046 -c "Verifying peer X.509 certificate... ok" \
10047 -c "received HelloRetryRequest message" \
10048 -c "selected_group ( 30 )"
10049
10050requires_openssl_tls1_3
10051requires_config_enabled MBEDTLS_DEBUG_C
10052requires_config_enabled MBEDTLS_SSL_CLI_C
10053requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10054requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10055run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010056 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010057 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010058 0 \
10059 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010060 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010061 -c "NamedGroup: x448 ( 1e )" \
10062 -c "NamedGroup: secp256r1 ( 17 )" \
10063 -c "Verifying peer X.509 certificate... ok" \
10064 -c "received HelloRetryRequest message" \
10065 -c "selected_group ( 23 )"
10066
10067requires_openssl_tls1_3
10068requires_config_enabled MBEDTLS_DEBUG_C
10069requires_config_enabled MBEDTLS_SSL_CLI_C
10070requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10071requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10072run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010073 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010074 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010075 0 \
10076 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010077 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010078 -c "NamedGroup: x448 ( 1e )" \
10079 -c "NamedGroup: secp384r1 ( 18 )" \
10080 -c "Verifying peer X.509 certificate... ok" \
10081 -c "received HelloRetryRequest message" \
10082 -c "selected_group ( 24 )"
10083
10084requires_openssl_tls1_3
10085requires_config_enabled MBEDTLS_DEBUG_C
10086requires_config_enabled MBEDTLS_SSL_CLI_C
10087requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10088requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10089run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010090 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010091 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010092 0 \
10093 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010094 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010095 -c "NamedGroup: x448 ( 1e )" \
10096 -c "NamedGroup: secp521r1 ( 19 )" \
10097 -c "Verifying peer X.509 certificate... ok" \
10098 -c "received HelloRetryRequest message" \
10099 -c "selected_group ( 25 )"
10100
10101requires_openssl_tls1_3
10102requires_config_enabled MBEDTLS_DEBUG_C
10103requires_config_enabled MBEDTLS_SSL_CLI_C
10104requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10105requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10106run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010107 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010108 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010109 0 \
10110 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010111 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010112 -c "NamedGroup: x448 ( 1e )" \
10113 -c "NamedGroup: x25519 ( 1d )" \
10114 -c "Verifying peer X.509 certificate... ok" \
10115 -c "received HelloRetryRequest message" \
10116 -c "selected_group ( 29 )"
10117
10118requires_gnutls_tls1_3
10119requires_gnutls_next_no_ticket
10120requires_gnutls_next_disable_tls13_compat
10121requires_config_enabled MBEDTLS_DEBUG_C
10122requires_config_enabled MBEDTLS_SSL_CLI_C
10123requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10124requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10125run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010126 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010127 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010128 0 \
10129 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010130 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010131 -c "NamedGroup: secp256r1 ( 17 )" \
10132 -c "NamedGroup: secp384r1 ( 18 )" \
10133 -c "Verifying peer X.509 certificate... ok" \
10134 -c "received HelloRetryRequest message" \
10135 -c "selected_group ( 24 )"
10136
10137requires_gnutls_tls1_3
10138requires_gnutls_next_no_ticket
10139requires_gnutls_next_disable_tls13_compat
10140requires_config_enabled MBEDTLS_DEBUG_C
10141requires_config_enabled MBEDTLS_SSL_CLI_C
10142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10144run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010145 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010146 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010147 0 \
10148 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010149 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010150 -c "NamedGroup: secp256r1 ( 17 )" \
10151 -c "NamedGroup: secp521r1 ( 19 )" \
10152 -c "Verifying peer X.509 certificate... ok" \
10153 -c "received HelloRetryRequest message" \
10154 -c "selected_group ( 25 )"
10155
10156requires_gnutls_tls1_3
10157requires_gnutls_next_no_ticket
10158requires_gnutls_next_disable_tls13_compat
10159requires_config_enabled MBEDTLS_DEBUG_C
10160requires_config_enabled MBEDTLS_SSL_CLI_C
10161requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10162requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10163run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010164 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010165 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010166 0 \
10167 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010168 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010169 -c "NamedGroup: secp256r1 ( 17 )" \
10170 -c "NamedGroup: x25519 ( 1d )" \
10171 -c "Verifying peer X.509 certificate... ok" \
10172 -c "received HelloRetryRequest message" \
10173 -c "selected_group ( 29 )"
10174
XiaokangQian83f81882022-03-17 06:26:36 +000010175requires_gnutls_tls1_3
10176requires_gnutls_next_no_ticket
10177requires_gnutls_next_disable_tls13_compat
10178requires_config_enabled MBEDTLS_DEBUG_C
10179requires_config_enabled MBEDTLS_SSL_CLI_C
10180requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10181requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010182run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010183 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010184 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +000010185 0 \
10186 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010187 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010188 -c "NamedGroup: secp256r1 ( 17 )" \
10189 -c "NamedGroup: x448 ( 1e )" \
10190 -c "Verifying peer X.509 certificate... ok" \
10191 -c "received HelloRetryRequest message" \
10192 -c "selected_group ( 30 )"
XiaokangQian2e17fb82022-03-28 03:30:05 +000010193
10194requires_gnutls_tls1_3
10195requires_gnutls_next_no_ticket
10196requires_gnutls_next_disable_tls13_compat
10197requires_config_enabled MBEDTLS_DEBUG_C
10198requires_config_enabled MBEDTLS_SSL_CLI_C
10199requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10201run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010202 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010203 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010204 0 \
10205 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010206 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010207 -c "NamedGroup: secp384r1 ( 18 )" \
10208 -c "NamedGroup: secp256r1 ( 17 )" \
10209 -c "Verifying peer X.509 certificate... ok" \
10210 -c "received HelloRetryRequest message" \
10211 -c "selected_group ( 23 )"
10212
10213requires_gnutls_tls1_3
10214requires_gnutls_next_no_ticket
10215requires_gnutls_next_disable_tls13_compat
10216requires_config_enabled MBEDTLS_DEBUG_C
10217requires_config_enabled MBEDTLS_SSL_CLI_C
10218requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10219requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10220run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010221 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010222 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010223 0 \
10224 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010225 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010226 -c "NamedGroup: secp384r1 ( 18 )" \
10227 -c "NamedGroup: secp521r1 ( 19 )" \
10228 -c "Verifying peer X.509 certificate... ok" \
10229 -c "received HelloRetryRequest message" \
10230 -c "selected_group ( 25 )"
10231
10232requires_gnutls_tls1_3
10233requires_gnutls_next_no_ticket
10234requires_gnutls_next_disable_tls13_compat
10235requires_config_enabled MBEDTLS_DEBUG_C
10236requires_config_enabled MBEDTLS_SSL_CLI_C
10237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10239run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010240 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010241 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010242 0 \
10243 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010244 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010245 -c "NamedGroup: secp384r1 ( 18 )" \
10246 -c "NamedGroup: x25519 ( 1d )" \
10247 -c "Verifying peer X.509 certificate... ok" \
10248 -c "received HelloRetryRequest message" \
10249 -c "selected_group ( 29 )"
10250
10251requires_gnutls_tls1_3
10252requires_gnutls_next_no_ticket
10253requires_gnutls_next_disable_tls13_compat
10254requires_config_enabled MBEDTLS_DEBUG_C
10255requires_config_enabled MBEDTLS_SSL_CLI_C
10256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10258run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010259 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010260 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010261 0 \
10262 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010263 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010264 -c "NamedGroup: secp384r1 ( 18 )" \
10265 -c "NamedGroup: x448 ( 1e )" \
10266 -c "Verifying peer X.509 certificate... ok" \
10267 -c "received HelloRetryRequest message" \
10268 -c "selected_group ( 30 )"
10269
10270requires_gnutls_tls1_3
10271requires_gnutls_next_no_ticket
10272requires_gnutls_next_disable_tls13_compat
10273requires_config_enabled MBEDTLS_DEBUG_C
10274requires_config_enabled MBEDTLS_SSL_CLI_C
10275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10277run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010278 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010279 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010280 0 \
10281 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010282 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010283 -c "NamedGroup: secp521r1 ( 19 )" \
10284 -c "NamedGroup: secp256r1 ( 17 )" \
10285 -c "Verifying peer X.509 certificate... ok" \
10286 -c "received HelloRetryRequest message" \
10287 -c "selected_group ( 23 )"
10288
10289requires_gnutls_tls1_3
10290requires_gnutls_next_no_ticket
10291requires_gnutls_next_disable_tls13_compat
10292requires_config_enabled MBEDTLS_DEBUG_C
10293requires_config_enabled MBEDTLS_SSL_CLI_C
10294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10296run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010297 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010299 0 \
10300 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010301 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010302 -c "NamedGroup: secp521r1 ( 19 )" \
10303 -c "NamedGroup: secp384r1 ( 18 )" \
10304 -c "Verifying peer X.509 certificate... ok" \
10305 -c "received HelloRetryRequest message" \
10306 -c "selected_group ( 24 )"
10307
10308requires_gnutls_tls1_3
10309requires_gnutls_next_no_ticket
10310requires_gnutls_next_disable_tls13_compat
10311requires_config_enabled MBEDTLS_DEBUG_C
10312requires_config_enabled MBEDTLS_SSL_CLI_C
10313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10315run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010316 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010317 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010318 0 \
10319 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010320 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010321 -c "NamedGroup: secp521r1 ( 19 )" \
10322 -c "NamedGroup: x25519 ( 1d )" \
10323 -c "Verifying peer X.509 certificate... ok" \
10324 -c "received HelloRetryRequest message" \
10325 -c "selected_group ( 29 )"
10326
10327requires_gnutls_tls1_3
10328requires_gnutls_next_no_ticket
10329requires_gnutls_next_disable_tls13_compat
10330requires_config_enabled MBEDTLS_DEBUG_C
10331requires_config_enabled MBEDTLS_SSL_CLI_C
10332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10333requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10334run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010335 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010336 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010337 0 \
10338 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010339 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010340 -c "NamedGroup: secp521r1 ( 19 )" \
10341 -c "NamedGroup: x448 ( 1e )" \
10342 -c "Verifying peer X.509 certificate... ok" \
10343 -c "received HelloRetryRequest message" \
10344 -c "selected_group ( 30 )"
10345
10346requires_gnutls_tls1_3
10347requires_gnutls_next_no_ticket
10348requires_gnutls_next_disable_tls13_compat
10349requires_config_enabled MBEDTLS_DEBUG_C
10350requires_config_enabled MBEDTLS_SSL_CLI_C
10351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10353run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010354 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010355 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010356 0 \
10357 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010358 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010359 -c "NamedGroup: x25519 ( 1d )" \
10360 -c "NamedGroup: secp256r1 ( 17 )" \
10361 -c "Verifying peer X.509 certificate... ok" \
10362 -c "received HelloRetryRequest message" \
10363 -c "selected_group ( 23 )"
10364
10365requires_gnutls_tls1_3
10366requires_gnutls_next_no_ticket
10367requires_gnutls_next_disable_tls13_compat
10368requires_config_enabled MBEDTLS_DEBUG_C
10369requires_config_enabled MBEDTLS_SSL_CLI_C
10370requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10371requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10372run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010373 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010374 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010375 0 \
10376 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010377 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010378 -c "NamedGroup: x25519 ( 1d )" \
10379 -c "NamedGroup: secp384r1 ( 18 )" \
10380 -c "Verifying peer X.509 certificate... ok" \
10381 -c "received HelloRetryRequest message" \
10382 -c "selected_group ( 24 )"
10383
10384requires_gnutls_tls1_3
10385requires_gnutls_next_no_ticket
10386requires_gnutls_next_disable_tls13_compat
10387requires_config_enabled MBEDTLS_DEBUG_C
10388requires_config_enabled MBEDTLS_SSL_CLI_C
10389requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10390requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10391run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010392 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010393 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010394 0 \
10395 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010396 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010397 -c "NamedGroup: x25519 ( 1d )" \
10398 -c "NamedGroup: secp521r1 ( 19 )" \
10399 -c "Verifying peer X.509 certificate... ok" \
10400 -c "received HelloRetryRequest message" \
10401 -c "selected_group ( 25 )"
10402
10403requires_gnutls_tls1_3
10404requires_gnutls_next_no_ticket
10405requires_gnutls_next_disable_tls13_compat
10406requires_config_enabled MBEDTLS_DEBUG_C
10407requires_config_enabled MBEDTLS_SSL_CLI_C
10408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10410run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010411 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010412 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010413 0 \
10414 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010415 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010416 -c "NamedGroup: x25519 ( 1d )" \
10417 -c "NamedGroup: x448 ( 1e )" \
10418 -c "Verifying peer X.509 certificate... ok" \
10419 -c "received HelloRetryRequest message" \
10420 -c "selected_group ( 30 )"
10421
10422requires_gnutls_tls1_3
10423requires_gnutls_next_no_ticket
10424requires_gnutls_next_disable_tls13_compat
10425requires_config_enabled MBEDTLS_DEBUG_C
10426requires_config_enabled MBEDTLS_SSL_CLI_C
10427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10429run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010430 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010431 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010432 0 \
10433 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010434 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010435 -c "NamedGroup: x448 ( 1e )" \
10436 -c "NamedGroup: secp256r1 ( 17 )" \
10437 -c "Verifying peer X.509 certificate... ok" \
10438 -c "received HelloRetryRequest message" \
10439 -c "selected_group ( 23 )"
10440
10441requires_gnutls_tls1_3
10442requires_gnutls_next_no_ticket
10443requires_gnutls_next_disable_tls13_compat
10444requires_config_enabled MBEDTLS_DEBUG_C
10445requires_config_enabled MBEDTLS_SSL_CLI_C
10446requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10448run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010449 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010450 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010451 0 \
10452 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010453 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010454 -c "NamedGroup: x448 ( 1e )" \
10455 -c "NamedGroup: secp384r1 ( 18 )" \
10456 -c "Verifying peer X.509 certificate... ok" \
10457 -c "received HelloRetryRequest message" \
10458 -c "selected_group ( 24 )"
10459
10460requires_gnutls_tls1_3
10461requires_gnutls_next_no_ticket
10462requires_gnutls_next_disable_tls13_compat
10463requires_config_enabled MBEDTLS_DEBUG_C
10464requires_config_enabled MBEDTLS_SSL_CLI_C
10465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10467run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010468 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010469 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010470 0 \
10471 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010472 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010473 -c "NamedGroup: x448 ( 1e )" \
10474 -c "NamedGroup: secp521r1 ( 19 )" \
10475 -c "Verifying peer X.509 certificate... ok" \
10476 -c "received HelloRetryRequest message" \
10477 -c "selected_group ( 25 )"
10478
10479requires_gnutls_tls1_3
10480requires_gnutls_next_no_ticket
10481requires_gnutls_next_disable_tls13_compat
10482requires_config_enabled MBEDTLS_DEBUG_C
10483requires_config_enabled MBEDTLS_SSL_CLI_C
10484requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10485requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10486run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010487 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010488 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010489 0 \
10490 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010491 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010492 -c "NamedGroup: x448 ( 1e )" \
10493 -c "NamedGroup: x25519 ( 1d )" \
10494 -c "Verifying peer X.509 certificate... ok" \
10495 -c "received HelloRetryRequest message" \
10496 -c "selected_group ( 29 )"
XiaokangQianb1847a22022-06-08 07:49:31 +000010497
10498requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010499requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010500requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10501requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10502requires_config_enabled MBEDTLS_DEBUG_C
10503requires_config_enabled MBEDTLS_SSL_CLI_C
10504requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10505requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10506run_test "TLS 1.3 m->m: HRR secp256r1 -> secp384r1" \
10507 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10508 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
10509 0 \
10510 -s "Protocol is TLSv1.3" \
10511 -s "got named group: secp384r1(0018)" \
10512 -s "Verifying peer X.509 certificate... ok" \
10513 -c "Protocol is TLSv1.3" \
10514 -c "NamedGroup: secp256r1 ( 17 )" \
10515 -c "NamedGroup: secp384r1 ( 18 )" \
10516 -c "Verifying peer X.509 certificate... ok" \
10517 -c "received HelloRetryRequest message" \
10518 -c "selected_group ( 24 )"
10519
10520requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010521requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010522requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10523requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10524requires_config_enabled MBEDTLS_DEBUG_C
10525requires_config_enabled MBEDTLS_SSL_CLI_C
10526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10528run_test "TLS 1.3 m->m: HRR secp256r1 -> secp521r1" \
10529 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10530 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
10531 0 \
10532 -s "Protocol is TLSv1.3" \
10533 -s "got named group: secp521r1(0019)" \
10534 -s "Verifying peer X.509 certificate... ok" \
10535 -c "Protocol is TLSv1.3" \
10536 -c "NamedGroup: secp256r1 ( 17 )" \
10537 -c "NamedGroup: secp521r1 ( 19 )" \
10538 -c "Verifying peer X.509 certificate... ok" \
10539 -c "received HelloRetryRequest message" \
10540 -c "selected_group ( 25 )"
10541
10542requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010543requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010544requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10545requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10546requires_config_enabled MBEDTLS_DEBUG_C
10547requires_config_enabled MBEDTLS_SSL_CLI_C
10548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10550run_test "TLS 1.3 m->m: HRR secp256r1 -> x25519" \
10551 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10552 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
10553 0 \
10554 -s "Protocol is TLSv1.3" \
10555 -s "got named group: x25519(001d)" \
10556 -s "Verifying peer X.509 certificate... ok" \
10557 -c "Protocol is TLSv1.3" \
10558 -c "NamedGroup: secp256r1 ( 17 )" \
10559 -c "NamedGroup: x25519 ( 1d )" \
10560 -c "Verifying peer X.509 certificate... ok" \
10561 -c "received HelloRetryRequest message" \
10562 -c "selected_group ( 29 )"
10563
10564requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010565requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010566requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10567requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10568requires_config_enabled MBEDTLS_DEBUG_C
10569requires_config_enabled MBEDTLS_SSL_CLI_C
10570requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10571requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10572run_test "TLS 1.3 m->m: HRR secp256r1 -> x448" \
10573 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10574 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
10575 0 \
10576 -s "Protocol is TLSv1.3" \
10577 -s "got named group: x448(001e)" \
10578 -s "Verifying peer X.509 certificate... ok" \
10579 -c "Protocol is TLSv1.3" \
10580 -c "NamedGroup: secp256r1 ( 17 )" \
10581 -c "NamedGroup: x448 ( 1e )" \
10582 -c "Verifying peer X.509 certificate... ok" \
10583 -c "received HelloRetryRequest message" \
10584 -c "selected_group ( 30 )"
10585
10586requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010587requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010588requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10589requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10590requires_config_enabled MBEDTLS_DEBUG_C
10591requires_config_enabled MBEDTLS_SSL_CLI_C
10592requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10593requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10594run_test "TLS 1.3 m->m: HRR secp384r1 -> secp256r1" \
10595 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10596 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
10597 0 \
10598 -s "Protocol is TLSv1.3" \
10599 -s "got named group: secp256r1(0017)" \
10600 -s "Verifying peer X.509 certificate... ok" \
10601 -c "Protocol is TLSv1.3" \
10602 -c "NamedGroup: secp384r1 ( 18 )" \
10603 -c "NamedGroup: secp256r1 ( 17 )" \
10604 -c "Verifying peer X.509 certificate... ok" \
10605 -c "received HelloRetryRequest message" \
10606 -c "selected_group ( 23 )"
10607
10608requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010609requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010610requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10611requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10612requires_config_enabled MBEDTLS_DEBUG_C
10613requires_config_enabled MBEDTLS_SSL_CLI_C
10614requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10615requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10616run_test "TLS 1.3 m->m: HRR secp384r1 -> secp521r1" \
10617 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10618 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
10619 0 \
10620 -s "Protocol is TLSv1.3" \
10621 -s "got named group: secp521r1(0019)" \
10622 -s "Verifying peer X.509 certificate... ok" \
10623 -c "Protocol is TLSv1.3" \
10624 -c "NamedGroup: secp384r1 ( 18 )" \
10625 -c "NamedGroup: secp521r1 ( 19 )" \
10626 -c "Verifying peer X.509 certificate... ok" \
10627 -c "received HelloRetryRequest message" \
10628 -c "selected_group ( 25 )"
10629
10630requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010631requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10634requires_config_enabled MBEDTLS_DEBUG_C
10635requires_config_enabled MBEDTLS_SSL_CLI_C
10636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10638run_test "TLS 1.3 m->m: HRR secp384r1 -> x25519" \
10639 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10640 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
10641 0 \
10642 -s "Protocol is TLSv1.3" \
10643 -s "got named group: x25519(001d)" \
10644 -s "Verifying peer X.509 certificate... ok" \
10645 -c "Protocol is TLSv1.3" \
10646 -c "NamedGroup: secp384r1 ( 18 )" \
10647 -c "NamedGroup: x25519 ( 1d )" \
10648 -c "Verifying peer X.509 certificate... ok" \
10649 -c "received HelloRetryRequest message" \
10650 -c "selected_group ( 29 )"
10651
10652requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010653requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010654requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10655requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10656requires_config_enabled MBEDTLS_DEBUG_C
10657requires_config_enabled MBEDTLS_SSL_CLI_C
10658requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10659requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10660run_test "TLS 1.3 m->m: HRR secp384r1 -> x448" \
10661 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10662 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
10663 0 \
10664 -s "Protocol is TLSv1.3" \
10665 -s "got named group: x448(001e)" \
10666 -s "Verifying peer X.509 certificate... ok" \
10667 -c "Protocol is TLSv1.3" \
10668 -c "NamedGroup: secp384r1 ( 18 )" \
10669 -c "NamedGroup: x448 ( 1e )" \
10670 -c "Verifying peer X.509 certificate... ok" \
10671 -c "received HelloRetryRequest message" \
10672 -c "selected_group ( 30 )"
10673
10674requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010675requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10678requires_config_enabled MBEDTLS_DEBUG_C
10679requires_config_enabled MBEDTLS_SSL_CLI_C
10680requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10681requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10682run_test "TLS 1.3 m->m: HRR secp521r1 -> secp256r1" \
10683 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10684 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
10685 0 \
10686 -s "Protocol is TLSv1.3" \
10687 -s "got named group: secp256r1(0017)" \
10688 -s "Verifying peer X.509 certificate... ok" \
10689 -c "Protocol is TLSv1.3" \
10690 -c "NamedGroup: secp521r1 ( 19 )" \
10691 -c "NamedGroup: secp256r1 ( 17 )" \
10692 -c "Verifying peer X.509 certificate... ok" \
10693 -c "received HelloRetryRequest message" \
10694 -c "selected_group ( 23 )"
10695
10696requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010697requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10700requires_config_enabled MBEDTLS_DEBUG_C
10701requires_config_enabled MBEDTLS_SSL_CLI_C
10702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10704run_test "TLS 1.3 m->m: HRR secp521r1 -> secp384r1" \
10705 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10706 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
10707 0 \
10708 -s "Protocol is TLSv1.3" \
10709 -s "got named group: secp384r1(0018)" \
10710 -s "Verifying peer X.509 certificate... ok" \
10711 -c "Protocol is TLSv1.3" \
10712 -c "NamedGroup: secp521r1 ( 19 )" \
10713 -c "NamedGroup: secp384r1 ( 18 )" \
10714 -c "Verifying peer X.509 certificate... ok" \
10715 -c "received HelloRetryRequest message" \
10716 -c "selected_group ( 24 )"
10717
10718requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010719requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10722requires_config_enabled MBEDTLS_DEBUG_C
10723requires_config_enabled MBEDTLS_SSL_CLI_C
10724requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10725requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10726run_test "TLS 1.3 m->m: HRR secp521r1 -> x25519" \
10727 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10728 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
10729 0 \
10730 -s "Protocol is TLSv1.3" \
10731 -s "got named group: x25519(001d)" \
10732 -s "Verifying peer X.509 certificate... ok" \
10733 -c "Protocol is TLSv1.3" \
10734 -c "NamedGroup: secp521r1 ( 19 )" \
10735 -c "NamedGroup: x25519 ( 1d )" \
10736 -c "Verifying peer X.509 certificate... ok" \
10737 -c "received HelloRetryRequest message" \
10738 -c "selected_group ( 29 )"
10739
10740requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010741requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010742requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10743requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10744requires_config_enabled MBEDTLS_DEBUG_C
10745requires_config_enabled MBEDTLS_SSL_CLI_C
10746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10748run_test "TLS 1.3 m->m: HRR secp521r1 -> x448" \
10749 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10750 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
10751 0 \
10752 -s "Protocol is TLSv1.3" \
10753 -s "got named group: x448(001e)" \
10754 -s "Verifying peer X.509 certificate... ok" \
10755 -c "Protocol is TLSv1.3" \
10756 -c "NamedGroup: secp521r1 ( 19 )" \
10757 -c "NamedGroup: x448 ( 1e )" \
10758 -c "Verifying peer X.509 certificate... ok" \
10759 -c "received HelloRetryRequest message" \
10760 -c "selected_group ( 30 )"
10761
10762requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010763requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010764requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10765requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10766requires_config_enabled MBEDTLS_DEBUG_C
10767requires_config_enabled MBEDTLS_SSL_CLI_C
10768requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10769requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10770run_test "TLS 1.3 m->m: HRR x25519 -> secp256r1" \
10771 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10772 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
10773 0 \
10774 -s "Protocol is TLSv1.3" \
10775 -s "got named group: secp256r1(0017)" \
10776 -s "Verifying peer X.509 certificate... ok" \
10777 -c "Protocol is TLSv1.3" \
10778 -c "NamedGroup: x25519 ( 1d )" \
10779 -c "NamedGroup: secp256r1 ( 17 )" \
10780 -c "Verifying peer X.509 certificate... ok" \
10781 -c "received HelloRetryRequest message" \
10782 -c "selected_group ( 23 )"
10783
10784requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010785requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010786requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10787requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10788requires_config_enabled MBEDTLS_DEBUG_C
10789requires_config_enabled MBEDTLS_SSL_CLI_C
10790requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10792run_test "TLS 1.3 m->m: HRR x25519 -> secp384r1" \
10793 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10794 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
10795 0 \
10796 -s "Protocol is TLSv1.3" \
10797 -s "got named group: secp384r1(0018)" \
10798 -s "Verifying peer X.509 certificate... ok" \
10799 -c "Protocol is TLSv1.3" \
10800 -c "NamedGroup: x25519 ( 1d )" \
10801 -c "NamedGroup: secp384r1 ( 18 )" \
10802 -c "Verifying peer X.509 certificate... ok" \
10803 -c "received HelloRetryRequest message" \
10804 -c "selected_group ( 24 )"
10805
10806requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010807requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010808requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10809requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10810requires_config_enabled MBEDTLS_DEBUG_C
10811requires_config_enabled MBEDTLS_SSL_CLI_C
10812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10814run_test "TLS 1.3 m->m: HRR x25519 -> secp521r1" \
10815 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10816 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
10817 0 \
10818 -s "Protocol is TLSv1.3" \
10819 -s "got named group: secp521r1(0019)" \
10820 -s "Verifying peer X.509 certificate... ok" \
10821 -c "Protocol is TLSv1.3" \
10822 -c "NamedGroup: x25519 ( 1d )" \
10823 -c "NamedGroup: secp521r1 ( 19 )" \
10824 -c "Verifying peer X.509 certificate... ok" \
10825 -c "received HelloRetryRequest message" \
10826 -c "selected_group ( 25 )"
10827
10828requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010829requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010830requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10831requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10832requires_config_enabled MBEDTLS_DEBUG_C
10833requires_config_enabled MBEDTLS_SSL_CLI_C
10834requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10836run_test "TLS 1.3 m->m: HRR x25519 -> x448" \
10837 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10838 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
10839 0 \
10840 -s "Protocol is TLSv1.3" \
10841 -s "got named group: x448(001e)" \
10842 -s "Verifying peer X.509 certificate... ok" \
10843 -c "Protocol is TLSv1.3" \
10844 -c "NamedGroup: x25519 ( 1d )" \
10845 -c "NamedGroup: x448 ( 1e )" \
10846 -c "Verifying peer X.509 certificate... ok" \
10847 -c "received HelloRetryRequest message" \
10848 -c "selected_group ( 30 )"
10849
10850requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010851requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10854requires_config_enabled MBEDTLS_DEBUG_C
10855requires_config_enabled MBEDTLS_SSL_CLI_C
10856requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10857requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10858run_test "TLS 1.3 m->m: HRR x448 -> secp256r1" \
10859 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10860 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
10861 0 \
10862 -s "Protocol is TLSv1.3" \
10863 -s "got named group: secp256r1(0017)" \
10864 -s "Verifying peer X.509 certificate... ok" \
10865 -c "Protocol is TLSv1.3" \
10866 -c "NamedGroup: x448 ( 1e )" \
10867 -c "NamedGroup: secp256r1 ( 17 )" \
10868 -c "Verifying peer X.509 certificate... ok" \
10869 -c "received HelloRetryRequest message" \
10870 -c "selected_group ( 23 )"
10871
10872requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010873requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010874requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10875requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10876requires_config_enabled MBEDTLS_DEBUG_C
10877requires_config_enabled MBEDTLS_SSL_CLI_C
10878requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10879requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10880run_test "TLS 1.3 m->m: HRR x448 -> secp384r1" \
10881 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10882 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
10883 0 \
10884 -s "Protocol is TLSv1.3" \
10885 -s "got named group: secp384r1(0018)" \
10886 -s "Verifying peer X.509 certificate... ok" \
10887 -c "Protocol is TLSv1.3" \
10888 -c "NamedGroup: x448 ( 1e )" \
10889 -c "NamedGroup: secp384r1 ( 18 )" \
10890 -c "Verifying peer X.509 certificate... ok" \
10891 -c "received HelloRetryRequest message" \
10892 -c "selected_group ( 24 )"
10893
10894requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010895requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010896requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10898requires_config_enabled MBEDTLS_DEBUG_C
10899requires_config_enabled MBEDTLS_SSL_CLI_C
10900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10901requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10902run_test "TLS 1.3 m->m: HRR x448 -> secp521r1" \
10903 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10904 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
10905 0 \
10906 -s "Protocol is TLSv1.3" \
10907 -s "got named group: secp521r1(0019)" \
10908 -s "Verifying peer X.509 certificate... ok" \
10909 -c "Protocol is TLSv1.3" \
10910 -c "NamedGroup: x448 ( 1e )" \
10911 -c "NamedGroup: secp521r1 ( 19 )" \
10912 -c "Verifying peer X.509 certificate... ok" \
10913 -c "received HelloRetryRequest message" \
10914 -c "selected_group ( 25 )"
10915
10916requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010917requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10920requires_config_enabled MBEDTLS_DEBUG_C
10921requires_config_enabled MBEDTLS_SSL_CLI_C
10922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10924run_test "TLS 1.3 m->m: HRR x448 -> x25519" \
10925 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10926 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
10927 0 \
10928 -s "Protocol is TLSv1.3" \
10929 -s "got named group: x25519(001d)" \
10930 -s "Verifying peer X.509 certificate... ok" \
10931 -c "Protocol is TLSv1.3" \
10932 -c "NamedGroup: x448 ( 1e )" \
10933 -c "NamedGroup: x25519 ( 1d )" \
10934 -c "Verifying peer X.509 certificate... ok" \
10935 -c "received HelloRetryRequest message" \
10936 -c "selected_group ( 29 )"
10937
10938requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010939requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10942requires_openssl_tls1_3
10943run_test "TLS 1.3 O->m: Server HRR secp256r1 -> secp384r1" \
10944 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10945 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10946 0 \
10947 -s "Protocol is TLSv1.3" \
10948 -s "got named group: secp384r1(0018)" \
10949 -s "Verifying peer X.509 certificate... ok" \
10950 -s "HTTP/1.0 200 OK" \
10951 -s "HRR selected_group: secp384r1"
10952
10953requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010954requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010955requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10956requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10957requires_openssl_tls1_3
10958run_test "TLS 1.3 O->m: Server HRR secp256r1 -> secp521r1" \
10959 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10960 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10961 0 \
10962 -s "Protocol is TLSv1.3" \
10963 -s "got named group: secp521r1(0019)" \
10964 -s "Verifying peer X.509 certificate... ok" \
10965 -s "HTTP/1.0 200 OK" \
10966 -s "HRR selected_group: secp521r1"
10967
10968requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010969requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10972requires_openssl_tls1_3
10973run_test "TLS 1.3 O->m: Server HRR secp256r1 -> x25519" \
10974 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10975 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10976 0 \
10977 -s "Protocol is TLSv1.3" \
10978 -s "got named group: x25519(001d)" \
10979 -s "Verifying peer X.509 certificate... ok" \
10980 -s "HTTP/1.0 200 OK" \
10981 -s "HRR selected_group: x25519"
10982
10983requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010984requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10986requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10987requires_openssl_tls1_3
10988run_test "TLS 1.3 O->m: Server HRR secp256r1 -> x448" \
10989 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10990 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10991 0 \
10992 -s "Protocol is TLSv1.3" \
10993 -s "got named group: x448(001e)" \
10994 -s "Verifying peer X.509 certificate... ok" \
10995 -s "HTTP/1.0 200 OK" \
10996 -s "HRR selected_group: x448"
10997
10998requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010999requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011000requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11001requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11002requires_openssl_tls1_3
11003run_test "TLS 1.3 O->m: Server HRR secp384r1 -> secp256r1" \
11004 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11005 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11006 0 \
11007 -s "Protocol is TLSv1.3" \
11008 -s "got named group: secp256r1(0017)" \
11009 -s "Verifying peer X.509 certificate... ok" \
11010 -s "HTTP/1.0 200 OK" \
11011 -s "HRR selected_group: secp256r1"
11012
11013requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011014requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011015requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11017requires_openssl_tls1_3
11018run_test "TLS 1.3 O->m: Server HRR secp384r1 -> secp521r1" \
11019 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11020 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11021 0 \
11022 -s "Protocol is TLSv1.3" \
11023 -s "got named group: secp521r1(0019)" \
11024 -s "Verifying peer X.509 certificate... ok" \
11025 -s "HTTP/1.0 200 OK" \
11026 -s "HRR selected_group: secp521r1"
11027
11028requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011029requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11031requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11032requires_openssl_tls1_3
11033run_test "TLS 1.3 O->m: Server HRR secp384r1 -> x25519" \
11034 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11035 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11036 0 \
11037 -s "Protocol is TLSv1.3" \
11038 -s "got named group: x25519(001d)" \
11039 -s "Verifying peer X.509 certificate... ok" \
11040 -s "HTTP/1.0 200 OK" \
11041 -s "HRR selected_group: x25519"
11042
11043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011044requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011045requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11046requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11047requires_openssl_tls1_3
11048run_test "TLS 1.3 O->m: Server HRR secp384r1 -> x448" \
11049 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11050 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11051 0 \
11052 -s "Protocol is TLSv1.3" \
11053 -s "got named group: x448(001e)" \
11054 -s "Verifying peer X.509 certificate... ok" \
11055 -s "HTTP/1.0 200 OK" \
11056 -s "HRR selected_group: x448"
11057
11058requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011059requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11062requires_openssl_tls1_3
11063run_test "TLS 1.3 O->m: Server HRR secp521r1 -> secp256r1" \
11064 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11065 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11066 0 \
11067 -s "Protocol is TLSv1.3" \
11068 -s "got named group: secp256r1(0017)" \
11069 -s "Verifying peer X.509 certificate... ok" \
11070 -s "HTTP/1.0 200 OK" \
11071 -s "HRR selected_group: secp256r1"
11072
11073requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011074requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011075requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11076requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11077requires_openssl_tls1_3
11078run_test "TLS 1.3 O->m: Server HRR secp521r1 -> secp384r1" \
11079 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11080 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11081 0 \
11082 -s "Protocol is TLSv1.3" \
11083 -s "got named group: secp384r1(0018)" \
11084 -s "Verifying peer X.509 certificate... ok" \
11085 -s "HTTP/1.0 200 OK" \
11086 -s "HRR selected_group: secp384r1"
11087
11088requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011089requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011090requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11091requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11092requires_openssl_tls1_3
11093run_test "TLS 1.3 O->m: Server HRR secp521r1 -> x25519" \
11094 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11095 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11096 0 \
11097 -s "Protocol is TLSv1.3" \
11098 -s "got named group: x25519(001d)" \
11099 -s "Verifying peer X.509 certificate... ok" \
11100 -s "HTTP/1.0 200 OK" \
11101 -s "HRR selected_group: x25519"
11102
11103requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011104requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011105requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11106requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11107requires_openssl_tls1_3
11108run_test "TLS 1.3 O->m: Server HRR secp521r1 -> x448" \
11109 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11110 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11111 0 \
11112 -s "Protocol is TLSv1.3" \
11113 -s "got named group: x448(001e)" \
11114 -s "Verifying peer X.509 certificate... ok" \
11115 -s "HTTP/1.0 200 OK" \
11116 -s "HRR selected_group: x448"
11117
11118requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011119requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11122requires_openssl_tls1_3
11123run_test "TLS 1.3 O->m: Server HRR x25519 -> secp256r1" \
11124 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11125 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11126 0 \
11127 -s "Protocol is TLSv1.3" \
11128 -s "got named group: secp256r1(0017)" \
11129 -s "Verifying peer X.509 certificate... ok" \
11130 -s "HTTP/1.0 200 OK" \
11131 -s "HRR selected_group: secp256r1"
11132
11133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011134requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011135requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11136requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11137requires_openssl_tls1_3
11138run_test "TLS 1.3 O->m: Server HRR x25519 -> secp384r1" \
11139 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11140 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11141 0 \
11142 -s "Protocol is TLSv1.3" \
11143 -s "got named group: secp384r1(0018)" \
11144 -s "Verifying peer X.509 certificate... ok" \
11145 -s "HTTP/1.0 200 OK" \
11146 -s "HRR selected_group: secp384r1"
11147
11148requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011150requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11151requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11152requires_openssl_tls1_3
11153run_test "TLS 1.3 O->m: Server HRR x25519 -> secp521r1" \
11154 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11155 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11156 0 \
11157 -s "Protocol is TLSv1.3" \
11158 -s "got named group: secp521r1(0019)" \
11159 -s "Verifying peer X.509 certificate... ok" \
11160 -s "HTTP/1.0 200 OK" \
11161 -s "HRR selected_group: secp521r1"
11162
11163requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011164requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011165requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11166requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11167requires_openssl_tls1_3
11168run_test "TLS 1.3 O->m: Server HRR x25519 -> x448" \
11169 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11170 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11171 0 \
11172 -s "Protocol is TLSv1.3" \
11173 -s "got named group: x448(001e)" \
11174 -s "Verifying peer X.509 certificate... ok" \
11175 -s "HTTP/1.0 200 OK" \
11176 -s "HRR selected_group: x448"
11177
11178requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011179requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011180requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11181requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11182requires_openssl_tls1_3
11183run_test "TLS 1.3 O->m: Server HRR x448 -> secp256r1" \
11184 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11185 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11186 0 \
11187 -s "Protocol is TLSv1.3" \
11188 -s "got named group: secp256r1(0017)" \
11189 -s "Verifying peer X.509 certificate... ok" \
11190 -s "HTTP/1.0 200 OK" \
11191 -s "HRR selected_group: secp256r1"
11192
11193requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011194requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011195requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11196requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11197requires_openssl_tls1_3
11198run_test "TLS 1.3 O->m: Server HRR x448 -> secp384r1" \
11199 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11200 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11201 0 \
11202 -s "Protocol is TLSv1.3" \
11203 -s "got named group: secp384r1(0018)" \
11204 -s "Verifying peer X.509 certificate... ok" \
11205 -s "HTTP/1.0 200 OK" \
11206 -s "HRR selected_group: secp384r1"
11207
11208requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011209requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011210requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11211requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11212requires_openssl_tls1_3
11213run_test "TLS 1.3 O->m: Server HRR x448 -> secp521r1" \
11214 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11215 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11216 0 \
11217 -s "Protocol is TLSv1.3" \
11218 -s "got named group: secp521r1(0019)" \
11219 -s "Verifying peer X.509 certificate... ok" \
11220 -s "HTTP/1.0 200 OK" \
11221 -s "HRR selected_group: secp521r1"
11222
11223requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011224requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011225requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11226requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11227requires_openssl_tls1_3
11228run_test "TLS 1.3 O->m: Server HRR x448 -> x25519" \
11229 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11230 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
11231 0 \
11232 -s "Protocol is TLSv1.3" \
11233 -s "got named group: x25519(001d)" \
11234 -s "Verifying peer X.509 certificate... ok" \
11235 -s "HTTP/1.0 200 OK" \
11236 -s "HRR selected_group: x25519"
11237
11238requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011239requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11242requires_gnutls_tls1_3
11243requires_gnutls_next_no_ticket
11244requires_gnutls_next_disable_tls13_compat
11245run_test "TLS 1.3 G->m: Server HRR secp256r1 -> secp384r1" \
11246 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011247 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011248 0 \
11249 -s "Protocol is TLSv1.3" \
11250 -s "got named group: secp384r1(0018)" \
11251 -s "Verifying peer X.509 certificate... ok" \
11252 -c "HTTP/1.0 200 OK" \
11253 -s "HRR selected_group: secp384r1"
11254
11255requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011256requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11259requires_gnutls_tls1_3
11260requires_gnutls_next_no_ticket
11261requires_gnutls_next_disable_tls13_compat
11262run_test "TLS 1.3 G->m: Server HRR secp256r1 -> secp521r1" \
11263 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011264 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011265 0 \
11266 -s "Protocol is TLSv1.3" \
11267 -s "got named group: secp521r1(0019)" \
11268 -s "Verifying peer X.509 certificate... ok" \
11269 -c "HTTP/1.0 200 OK" \
11270 -s "HRR selected_group: secp521r1"
11271
11272requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011273requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11276requires_gnutls_tls1_3
11277requires_gnutls_next_no_ticket
11278requires_gnutls_next_disable_tls13_compat
11279run_test "TLS 1.3 G->m: Server HRR secp256r1 -> x25519" \
11280 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011281 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011282 0 \
11283 -s "Protocol is TLSv1.3" \
11284 -s "got named group: x25519(001d)" \
11285 -s "Verifying peer X.509 certificate... ok" \
11286 -c "HTTP/1.0 200 OK" \
11287 -s "HRR selected_group: x25519"
11288
11289requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011290requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011291requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11293requires_gnutls_tls1_3
11294requires_gnutls_next_no_ticket
11295requires_gnutls_next_disable_tls13_compat
11296run_test "TLS 1.3 G->m: Server HRR secp256r1 -> x448" \
11297 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011298 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011299 0 \
11300 -s "Protocol is TLSv1.3" \
11301 -s "got named group: x448(001e)" \
11302 -s "Verifying peer X.509 certificate... ok" \
11303 -c "HTTP/1.0 200 OK" \
11304 -s "HRR selected_group: x448"
11305
11306requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011307requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011308requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11309requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11310requires_gnutls_tls1_3
11311requires_gnutls_next_no_ticket
11312requires_gnutls_next_disable_tls13_compat
11313run_test "TLS 1.3 G->m: Server HRR secp384r1 -> secp256r1" \
11314 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011315 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011316 0 \
11317 -s "Protocol is TLSv1.3" \
11318 -s "got named group: secp256r1(0017)" \
11319 -s "Verifying peer X.509 certificate... ok" \
11320 -c "HTTP/1.0 200 OK" \
11321 -s "HRR selected_group: secp256r1"
11322
11323requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011324requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011325requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11327requires_gnutls_tls1_3
11328requires_gnutls_next_no_ticket
11329requires_gnutls_next_disable_tls13_compat
11330run_test "TLS 1.3 G->m: Server HRR secp384r1 -> secp521r1" \
11331 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011332 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011333 0 \
11334 -s "Protocol is TLSv1.3" \
11335 -s "got named group: secp521r1(0019)" \
11336 -s "Verifying peer X.509 certificate... ok" \
11337 -c "HTTP/1.0 200 OK" \
11338 -s "HRR selected_group: secp521r1"
11339
11340requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011341requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011342requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11344requires_gnutls_tls1_3
11345requires_gnutls_next_no_ticket
11346requires_gnutls_next_disable_tls13_compat
11347run_test "TLS 1.3 G->m: Server HRR secp384r1 -> x25519" \
11348 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011349 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011350 0 \
11351 -s "Protocol is TLSv1.3" \
11352 -s "got named group: x25519(001d)" \
11353 -s "Verifying peer X.509 certificate... ok" \
11354 -c "HTTP/1.0 200 OK" \
11355 -s "HRR selected_group: x25519"
11356
11357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011358requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011359requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11361requires_gnutls_tls1_3
11362requires_gnutls_next_no_ticket
11363requires_gnutls_next_disable_tls13_compat
11364run_test "TLS 1.3 G->m: Server HRR secp384r1 -> x448" \
11365 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011366 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011367 0 \
11368 -s "Protocol is TLSv1.3" \
11369 -s "got named group: x448(001e)" \
11370 -s "Verifying peer X.509 certificate... ok" \
11371 -c "HTTP/1.0 200 OK" \
11372 -s "HRR selected_group: x448"
11373
11374requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011375requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011376requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11377requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11378requires_gnutls_tls1_3
11379requires_gnutls_next_no_ticket
11380requires_gnutls_next_disable_tls13_compat
11381run_test "TLS 1.3 G->m: Server HRR secp521r1 -> secp256r1" \
11382 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011383 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011384 0 \
11385 -s "Protocol is TLSv1.3" \
11386 -s "got named group: secp256r1(0017)" \
11387 -s "Verifying peer X.509 certificate... ok" \
11388 -c "HTTP/1.0 200 OK" \
11389 -s "HRR selected_group: secp256r1"
11390
11391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011392requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011393requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11395requires_gnutls_tls1_3
11396requires_gnutls_next_no_ticket
11397requires_gnutls_next_disable_tls13_compat
11398run_test "TLS 1.3 G->m: Server HRR secp521r1 -> secp384r1" \
11399 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011400 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011401 0 \
11402 -s "Protocol is TLSv1.3" \
11403 -s "got named group: secp384r1(0018)" \
11404 -s "Verifying peer X.509 certificate... ok" \
11405 -c "HTTP/1.0 200 OK" \
11406 -s "HRR selected_group: secp384r1"
11407
11408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011409requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11412requires_gnutls_tls1_3
11413requires_gnutls_next_no_ticket
11414requires_gnutls_next_disable_tls13_compat
11415run_test "TLS 1.3 G->m: Server HRR secp521r1 -> x25519" \
11416 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011417 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011418 0 \
11419 -s "Protocol is TLSv1.3" \
11420 -s "got named group: x25519(001d)" \
11421 -s "Verifying peer X.509 certificate... ok" \
11422 -c "HTTP/1.0 200 OK" \
11423 -s "HRR selected_group: x25519"
11424
11425requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11429requires_gnutls_tls1_3
11430requires_gnutls_next_no_ticket
11431requires_gnutls_next_disable_tls13_compat
11432run_test "TLS 1.3 G->m: Server HRR secp521r1 -> x448" \
11433 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011434 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011435 0 \
11436 -s "Protocol is TLSv1.3" \
11437 -s "got named group: x448(001e)" \
11438 -s "Verifying peer X.509 certificate... ok" \
11439 -c "HTTP/1.0 200 OK" \
11440 -s "HRR selected_group: x448"
11441
11442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011443requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11446requires_gnutls_tls1_3
11447requires_gnutls_next_no_ticket
11448requires_gnutls_next_disable_tls13_compat
11449run_test "TLS 1.3 G->m: Server HRR x25519 -> secp256r1" \
11450 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011451 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011452 0 \
11453 -s "Protocol is TLSv1.3" \
11454 -s "got named group: secp256r1(0017)" \
11455 -s "Verifying peer X.509 certificate... ok" \
11456 -c "HTTP/1.0 200 OK" \
11457 -s "HRR selected_group: secp256r1"
11458
11459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011460requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11463requires_gnutls_tls1_3
11464requires_gnutls_next_no_ticket
11465requires_gnutls_next_disable_tls13_compat
11466run_test "TLS 1.3 G->m: Server HRR x25519 -> secp384r1" \
11467 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011468 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011469 0 \
11470 -s "Protocol is TLSv1.3" \
11471 -s "got named group: secp384r1(0018)" \
11472 -s "Verifying peer X.509 certificate... ok" \
11473 -c "HTTP/1.0 200 OK" \
11474 -s "HRR selected_group: secp384r1"
11475
11476requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011477requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011478requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11479requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11480requires_gnutls_tls1_3
11481requires_gnutls_next_no_ticket
11482requires_gnutls_next_disable_tls13_compat
11483run_test "TLS 1.3 G->m: Server HRR x25519 -> secp521r1" \
11484 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011485 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011486 0 \
11487 -s "Protocol is TLSv1.3" \
11488 -s "got named group: secp521r1(0019)" \
11489 -s "Verifying peer X.509 certificate... ok" \
11490 -c "HTTP/1.0 200 OK" \
11491 -s "HRR selected_group: secp521r1"
11492
11493requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011494requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011495requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11497requires_gnutls_tls1_3
11498requires_gnutls_next_no_ticket
11499requires_gnutls_next_disable_tls13_compat
11500run_test "TLS 1.3 G->m: Server HRR x25519 -> x448" \
11501 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011502 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011503 0 \
11504 -s "Protocol is TLSv1.3" \
11505 -s "got named group: x448(001e)" \
11506 -s "Verifying peer X.509 certificate... ok" \
11507 -c "HTTP/1.0 200 OK" \
11508 -s "HRR selected_group: x448"
11509
11510requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011511requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011512requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11513requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11514requires_gnutls_tls1_3
11515requires_gnutls_next_no_ticket
11516requires_gnutls_next_disable_tls13_compat
11517run_test "TLS 1.3 G->m: Server HRR x448 -> secp256r1" \
11518 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011519 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011520 0 \
11521 -s "Protocol is TLSv1.3" \
11522 -s "got named group: secp256r1(0017)" \
11523 -s "Verifying peer X.509 certificate... ok" \
11524 -c "HTTP/1.0 200 OK" \
11525 -s "HRR selected_group: secp256r1"
11526
11527requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011529requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11530requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11531requires_gnutls_tls1_3
11532requires_gnutls_next_no_ticket
11533requires_gnutls_next_disable_tls13_compat
11534run_test "TLS 1.3 G->m: Server HRR x448 -> secp384r1" \
11535 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011536 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011537 0 \
11538 -s "Protocol is TLSv1.3" \
11539 -s "got named group: secp384r1(0018)" \
11540 -s "Verifying peer X.509 certificate... ok" \
11541 -c "HTTP/1.0 200 OK" \
11542 -s "HRR selected_group: secp384r1"
11543
11544requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011545requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011546requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11548requires_gnutls_tls1_3
11549requires_gnutls_next_no_ticket
11550requires_gnutls_next_disable_tls13_compat
11551run_test "TLS 1.3 G->m: Server HRR x448 -> secp521r1" \
11552 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011553 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011554 0 \
11555 -s "Protocol is TLSv1.3" \
11556 -s "got named group: secp521r1(0019)" \
11557 -s "Verifying peer X.509 certificate... ok" \
11558 -c "HTTP/1.0 200 OK" \
11559 -s "HRR selected_group: secp521r1"
11560
11561requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11565requires_gnutls_tls1_3
11566requires_gnutls_next_no_ticket
11567requires_gnutls_next_disable_tls13_compat
11568run_test "TLS 1.3 G->m: Server HRR x448 -> x25519" \
11569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011570 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011571 0 \
11572 -s "Protocol is TLSv1.3" \
11573 -s "got named group: x25519(001d)" \
11574 -s "Verifying peer X.509 certificate... ok" \
11575 -c "HTTP/1.0 200 OK" \
11576 -s "HRR selected_group: x25519"
11577
11578requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011579requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011580requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11581requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11582requires_config_enabled MBEDTLS_DEBUG_C
11583requires_config_enabled MBEDTLS_SSL_CLI_C
11584requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11586run_test "TLS 1.3 m->m: Server HRR secp256r1 -> secp384r1" \
11587 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11588 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
11589 0 \
11590 -s "Protocol is TLSv1.3" \
11591 -s "got named group: secp384r1(0018)" \
11592 -s "Verifying peer X.509 certificate... ok" \
11593 -c "Protocol is TLSv1.3" \
11594 -c "NamedGroup: secp256r1 ( 17 )" \
11595 -c "NamedGroup: secp384r1 ( 18 )" \
11596 -c "Verifying peer X.509 certificate... ok" \
11597 -s "HRR selected_group: secp384r1"
11598
11599requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011600requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11602requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11603requires_config_enabled MBEDTLS_DEBUG_C
11604requires_config_enabled MBEDTLS_SSL_CLI_C
11605requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11606requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11607run_test "TLS 1.3 m->m: Server HRR secp256r1 -> secp521r1" \
11608 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11609 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
11610 0 \
11611 -s "Protocol is TLSv1.3" \
11612 -s "got named group: secp521r1(0019)" \
11613 -s "Verifying peer X.509 certificate... ok" \
11614 -c "Protocol is TLSv1.3" \
11615 -c "NamedGroup: secp256r1 ( 17 )" \
11616 -c "NamedGroup: secp521r1 ( 19 )" \
11617 -c "Verifying peer X.509 certificate... ok" \
11618 -s "HRR selected_group: secp521r1"
11619
11620requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011621requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11624requires_config_enabled MBEDTLS_DEBUG_C
11625requires_config_enabled MBEDTLS_SSL_CLI_C
11626requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11627requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11628run_test "TLS 1.3 m->m: Server HRR secp256r1 -> x25519" \
11629 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11630 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
11631 0 \
11632 -s "Protocol is TLSv1.3" \
11633 -s "got named group: x25519(001d)" \
11634 -s "Verifying peer X.509 certificate... ok" \
11635 -c "Protocol is TLSv1.3" \
11636 -c "NamedGroup: secp256r1 ( 17 )" \
11637 -c "NamedGroup: x25519 ( 1d )" \
11638 -c "Verifying peer X.509 certificate... ok" \
11639 -s "HRR selected_group: x25519"
11640
11641requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011642requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011643requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11644requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11645requires_config_enabled MBEDTLS_DEBUG_C
11646requires_config_enabled MBEDTLS_SSL_CLI_C
11647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11648requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11649run_test "TLS 1.3 m->m: Server HRR secp256r1 -> x448" \
11650 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11651 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
11652 0 \
11653 -s "Protocol is TLSv1.3" \
11654 -s "got named group: x448(001e)" \
11655 -s "Verifying peer X.509 certificate... ok" \
11656 -c "Protocol is TLSv1.3" \
11657 -c "NamedGroup: secp256r1 ( 17 )" \
11658 -c "NamedGroup: x448 ( 1e )" \
11659 -c "Verifying peer X.509 certificate... ok" \
11660 -s "HRR selected_group: x448"
11661
11662requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011663requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011664requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11665requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11666requires_config_enabled MBEDTLS_DEBUG_C
11667requires_config_enabled MBEDTLS_SSL_CLI_C
11668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11670run_test "TLS 1.3 m->m: Server HRR secp384r1 -> secp256r1" \
11671 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11672 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
11673 0 \
11674 -s "Protocol is TLSv1.3" \
11675 -s "got named group: secp256r1(0017)" \
11676 -s "Verifying peer X.509 certificate... ok" \
11677 -c "Protocol is TLSv1.3" \
11678 -c "NamedGroup: secp384r1 ( 18 )" \
11679 -c "NamedGroup: secp256r1 ( 17 )" \
11680 -c "Verifying peer X.509 certificate... ok" \
11681 -s "HRR selected_group: secp256r1"
11682
11683requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011684requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11687requires_config_enabled MBEDTLS_DEBUG_C
11688requires_config_enabled MBEDTLS_SSL_CLI_C
11689requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11690requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11691run_test "TLS 1.3 m->m: Server HRR secp384r1 -> secp521r1" \
11692 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11693 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
11694 0 \
11695 -s "Protocol is TLSv1.3" \
11696 -s "got named group: secp521r1(0019)" \
11697 -s "Verifying peer X.509 certificate... ok" \
11698 -c "Protocol is TLSv1.3" \
11699 -c "NamedGroup: secp384r1 ( 18 )" \
11700 -c "NamedGroup: secp521r1 ( 19 )" \
11701 -c "Verifying peer X.509 certificate... ok" \
11702 -s "HRR selected_group: secp521r1"
11703
11704requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011705requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11708requires_config_enabled MBEDTLS_DEBUG_C
11709requires_config_enabled MBEDTLS_SSL_CLI_C
11710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11711requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11712run_test "TLS 1.3 m->m: Server HRR secp384r1 -> x25519" \
11713 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11714 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
11715 0 \
11716 -s "Protocol is TLSv1.3" \
11717 -s "got named group: x25519(001d)" \
11718 -s "Verifying peer X.509 certificate... ok" \
11719 -c "Protocol is TLSv1.3" \
11720 -c "NamedGroup: secp384r1 ( 18 )" \
11721 -c "NamedGroup: x25519 ( 1d )" \
11722 -c "Verifying peer X.509 certificate... ok" \
11723 -s "HRR selected_group: x25519"
11724
11725requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011726requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011727requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11728requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11729requires_config_enabled MBEDTLS_DEBUG_C
11730requires_config_enabled MBEDTLS_SSL_CLI_C
11731requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11733run_test "TLS 1.3 m->m: Server HRR secp384r1 -> x448" \
11734 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11735 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
11736 0 \
11737 -s "Protocol is TLSv1.3" \
11738 -s "got named group: x448(001e)" \
11739 -s "Verifying peer X.509 certificate... ok" \
11740 -c "Protocol is TLSv1.3" \
11741 -c "NamedGroup: secp384r1 ( 18 )" \
11742 -c "NamedGroup: x448 ( 1e )" \
11743 -c "Verifying peer X.509 certificate... ok" \
11744 -s "HRR selected_group: x448"
11745
11746requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011747requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011748requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11749requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11750requires_config_enabled MBEDTLS_DEBUG_C
11751requires_config_enabled MBEDTLS_SSL_CLI_C
11752requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11753requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11754run_test "TLS 1.3 m->m: Server HRR secp521r1 -> secp256r1" \
11755 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11756 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
11757 0 \
11758 -s "Protocol is TLSv1.3" \
11759 -s "got named group: secp256r1(0017)" \
11760 -s "Verifying peer X.509 certificate... ok" \
11761 -c "Protocol is TLSv1.3" \
11762 -c "NamedGroup: secp521r1 ( 19 )" \
11763 -c "NamedGroup: secp256r1 ( 17 )" \
11764 -c "Verifying peer X.509 certificate... ok" \
11765 -s "HRR selected_group: secp256r1"
11766
11767requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011768requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011769requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11770requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11771requires_config_enabled MBEDTLS_DEBUG_C
11772requires_config_enabled MBEDTLS_SSL_CLI_C
11773requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11774requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11775run_test "TLS 1.3 m->m: Server HRR secp521r1 -> secp384r1" \
11776 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11777 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
11778 0 \
11779 -s "Protocol is TLSv1.3" \
11780 -s "got named group: secp384r1(0018)" \
11781 -s "Verifying peer X.509 certificate... ok" \
11782 -c "Protocol is TLSv1.3" \
11783 -c "NamedGroup: secp521r1 ( 19 )" \
11784 -c "NamedGroup: secp384r1 ( 18 )" \
11785 -c "Verifying peer X.509 certificate... ok" \
11786 -s "HRR selected_group: secp384r1"
11787
11788requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011789requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011790requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11792requires_config_enabled MBEDTLS_DEBUG_C
11793requires_config_enabled MBEDTLS_SSL_CLI_C
11794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11796run_test "TLS 1.3 m->m: Server HRR secp521r1 -> x25519" \
11797 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11798 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
11799 0 \
11800 -s "Protocol is TLSv1.3" \
11801 -s "got named group: x25519(001d)" \
11802 -s "Verifying peer X.509 certificate... ok" \
11803 -c "Protocol is TLSv1.3" \
11804 -c "NamedGroup: secp521r1 ( 19 )" \
11805 -c "NamedGroup: x25519 ( 1d )" \
11806 -c "Verifying peer X.509 certificate... ok" \
11807 -s "HRR selected_group: x25519"
11808
11809requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011810requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011811requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11812requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11813requires_config_enabled MBEDTLS_DEBUG_C
11814requires_config_enabled MBEDTLS_SSL_CLI_C
11815requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11817run_test "TLS 1.3 m->m: Server HRR secp521r1 -> x448" \
11818 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11819 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
11820 0 \
11821 -s "Protocol is TLSv1.3" \
11822 -s "got named group: x448(001e)" \
11823 -s "Verifying peer X.509 certificate... ok" \
11824 -c "Protocol is TLSv1.3" \
11825 -c "NamedGroup: secp521r1 ( 19 )" \
11826 -c "NamedGroup: x448 ( 1e )" \
11827 -c "Verifying peer X.509 certificate... ok" \
11828 -s "HRR selected_group: x448"
11829
11830requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011831requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11834requires_config_enabled MBEDTLS_DEBUG_C
11835requires_config_enabled MBEDTLS_SSL_CLI_C
11836requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11838run_test "TLS 1.3 m->m: Server HRR x25519 -> secp256r1" \
11839 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11840 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
11841 0 \
11842 -s "Protocol is TLSv1.3" \
11843 -s "got named group: secp256r1(0017)" \
11844 -s "Verifying peer X.509 certificate... ok" \
11845 -c "Protocol is TLSv1.3" \
11846 -c "NamedGroup: x25519 ( 1d )" \
11847 -c "NamedGroup: secp256r1 ( 17 )" \
11848 -c "Verifying peer X.509 certificate... ok" \
11849 -s "HRR selected_group: secp256r1"
11850
11851requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011852requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011853requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11855requires_config_enabled MBEDTLS_DEBUG_C
11856requires_config_enabled MBEDTLS_SSL_CLI_C
11857requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11858requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11859run_test "TLS 1.3 m->m: Server HRR x25519 -> secp384r1" \
11860 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11861 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
11862 0 \
11863 -s "Protocol is TLSv1.3" \
11864 -s "got named group: secp384r1(0018)" \
11865 -s "Verifying peer X.509 certificate... ok" \
11866 -c "Protocol is TLSv1.3" \
11867 -c "NamedGroup: x25519 ( 1d )" \
11868 -c "NamedGroup: secp384r1 ( 18 )" \
11869 -c "Verifying peer X.509 certificate... ok" \
11870 -s "HRR selected_group: secp384r1"
11871
11872requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011873requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011874requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11875requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11876requires_config_enabled MBEDTLS_DEBUG_C
11877requires_config_enabled MBEDTLS_SSL_CLI_C
11878requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11879requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11880run_test "TLS 1.3 m->m: Server HRR x25519 -> secp521r1" \
11881 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11882 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
11883 0 \
11884 -s "Protocol is TLSv1.3" \
11885 -s "got named group: secp521r1(0019)" \
11886 -s "Verifying peer X.509 certificate... ok" \
11887 -c "Protocol is TLSv1.3" \
11888 -c "NamedGroup: x25519 ( 1d )" \
11889 -c "NamedGroup: secp521r1 ( 19 )" \
11890 -c "Verifying peer X.509 certificate... ok" \
11891 -s "HRR selected_group: secp521r1"
11892
11893requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011894requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011895requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11896requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11897requires_config_enabled MBEDTLS_DEBUG_C
11898requires_config_enabled MBEDTLS_SSL_CLI_C
11899requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11900requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11901run_test "TLS 1.3 m->m: Server HRR x25519 -> x448" \
11902 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11903 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
11904 0 \
11905 -s "Protocol is TLSv1.3" \
11906 -s "got named group: x448(001e)" \
11907 -s "Verifying peer X.509 certificate... ok" \
11908 -c "Protocol is TLSv1.3" \
11909 -c "NamedGroup: x25519 ( 1d )" \
11910 -c "NamedGroup: x448 ( 1e )" \
11911 -c "Verifying peer X.509 certificate... ok" \
11912 -s "HRR selected_group: x448"
11913
11914requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011915requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011916requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11917requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11918requires_config_enabled MBEDTLS_DEBUG_C
11919requires_config_enabled MBEDTLS_SSL_CLI_C
11920requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11921requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11922run_test "TLS 1.3 m->m: Server HRR x448 -> secp256r1" \
11923 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11924 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
11925 0 \
11926 -s "Protocol is TLSv1.3" \
11927 -s "got named group: secp256r1(0017)" \
11928 -s "Verifying peer X.509 certificate... ok" \
11929 -c "Protocol is TLSv1.3" \
11930 -c "NamedGroup: x448 ( 1e )" \
11931 -c "NamedGroup: secp256r1 ( 17 )" \
11932 -c "Verifying peer X.509 certificate... ok" \
11933 -s "HRR selected_group: secp256r1"
11934
11935requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011936requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011937requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11938requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11939requires_config_enabled MBEDTLS_DEBUG_C
11940requires_config_enabled MBEDTLS_SSL_CLI_C
11941requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11942requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11943run_test "TLS 1.3 m->m: Server HRR x448 -> secp384r1" \
11944 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11945 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
11946 0 \
11947 -s "Protocol is TLSv1.3" \
11948 -s "got named group: secp384r1(0018)" \
11949 -s "Verifying peer X.509 certificate... ok" \
11950 -c "Protocol is TLSv1.3" \
11951 -c "NamedGroup: x448 ( 1e )" \
11952 -c "NamedGroup: secp384r1 ( 18 )" \
11953 -c "Verifying peer X.509 certificate... ok" \
11954 -s "HRR selected_group: secp384r1"
11955
11956requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011957requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011958requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11959requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11960requires_config_enabled MBEDTLS_DEBUG_C
11961requires_config_enabled MBEDTLS_SSL_CLI_C
11962requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11963requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11964run_test "TLS 1.3 m->m: Server HRR x448 -> secp521r1" \
11965 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11966 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
11967 0 \
11968 -s "Protocol is TLSv1.3" \
11969 -s "got named group: secp521r1(0019)" \
11970 -s "Verifying peer X.509 certificate... ok" \
11971 -c "Protocol is TLSv1.3" \
11972 -c "NamedGroup: x448 ( 1e )" \
11973 -c "NamedGroup: secp521r1 ( 19 )" \
11974 -c "Verifying peer X.509 certificate... ok" \
11975 -s "HRR selected_group: secp521r1"
11976
11977requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011978requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011979requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11980requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11981requires_config_enabled MBEDTLS_DEBUG_C
11982requires_config_enabled MBEDTLS_SSL_CLI_C
11983requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11984requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11985run_test "TLS 1.3 m->m: Server HRR x448 -> x25519" \
11986 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11987 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
11988 0 \
11989 -s "Protocol is TLSv1.3" \
11990 -s "got named group: x25519(001d)" \
11991 -s "Verifying peer X.509 certificate... ok" \
11992 -c "Protocol is TLSv1.3" \
11993 -c "NamedGroup: x448 ( 1e )" \
11994 -c "NamedGroup: x25519 ( 1d )" \
11995 -c "Verifying peer X.509 certificate... ok" \
11996 -s "HRR selected_group: x25519"