blob: 48ba469e9b17bfccccca2755795f5b9db4757957 [file] [log] [blame]
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001#!/bin/sh
2
3# tls13-compat.sh
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19#
20# Purpose
21#
22# List TLS1.3 compat test cases. They are generated by
23# `./tests/scripts/generate_tls13_compat_tests.py -a -o tests/opt-testcases/tls13-compat.sh`.
24#
25# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
26# AND REGENERATE THIS FILE.
27#
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
31requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
32requires_openssl_tls1_3
33run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
34 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
35 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
36 0 \
37 -s "Protocol is TLSv1.3" \
38 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
39 -s "received signature algorithm: 0x403" \
40 -s "got named group: secp256r1(0017)" \
41 -s "Verifying peer X.509 certificate... ok" \
42 -s "HTTP/1.0 200 OK" \
43 -C "received HelloRetryRequest message"
Jerry Yu31018ad2021-11-26 20:36:17 +080044
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000045requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000046requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
48requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
49requires_openssl_tls1_3
50run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
51 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
52 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
53 0 \
54 -s "Protocol is TLSv1.3" \
55 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
56 -s "received signature algorithm: 0x503" \
57 -s "got named group: secp256r1(0017)" \
58 -s "Verifying peer X.509 certificate... ok" \
59 -s "HTTP/1.0 200 OK" \
60 -C "received HelloRetryRequest message"
61
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
65requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
66requires_openssl_tls1_3
67run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
68 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
69 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
70 0 \
71 -s "Protocol is TLSv1.3" \
72 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
73 -s "received signature algorithm: 0x603" \
74 -s "got named group: secp256r1(0017)" \
75 -s "Verifying peer X.509 certificate... ok" \
76 -s "HTTP/1.0 200 OK" \
77 -C "received HelloRetryRequest message"
78
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000079requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000080requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000081requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
82requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
83requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
84requires_openssl_tls1_3
85run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
86 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
87 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
88 0 \
89 -s "Protocol is TLSv1.3" \
90 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
91 -s "received signature algorithm: 0x804" \
92 -s "got named group: secp256r1(0017)" \
93 -s "Verifying peer X.509 certificate... ok" \
94 -s "HTTP/1.0 200 OK" \
95 -C "received HelloRetryRequest message"
96
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000097requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000098requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
101requires_openssl_tls1_3
102run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
103 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
104 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
105 0 \
106 -s "Protocol is TLSv1.3" \
107 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
108 -s "received signature algorithm: 0x403" \
109 -s "got named group: secp384r1(0018)" \
110 -s "Verifying peer X.509 certificate... ok" \
111 -s "HTTP/1.0 200 OK" \
112 -C "received HelloRetryRequest message"
113
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000114requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000115requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
118requires_openssl_tls1_3
119run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
120 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
121 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
122 0 \
123 -s "Protocol is TLSv1.3" \
124 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
125 -s "received signature algorithm: 0x503" \
126 -s "got named group: secp384r1(0018)" \
127 -s "Verifying peer X.509 certificate... ok" \
128 -s "HTTP/1.0 200 OK" \
129 -C "received HelloRetryRequest message"
130
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000131requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000132requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000133requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
134requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
135requires_openssl_tls1_3
136run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
137 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
138 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
139 0 \
140 -s "Protocol is TLSv1.3" \
141 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
142 -s "received signature algorithm: 0x603" \
143 -s "got named group: secp384r1(0018)" \
144 -s "Verifying peer X.509 certificate... ok" \
145 -s "HTTP/1.0 200 OK" \
146 -C "received HelloRetryRequest message"
147
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000148requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000149requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000150requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
151requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
152requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
153requires_openssl_tls1_3
154run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
155 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
156 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
157 0 \
158 -s "Protocol is TLSv1.3" \
159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
160 -s "received signature algorithm: 0x804" \
161 -s "got named group: secp384r1(0018)" \
162 -s "Verifying peer X.509 certificate... ok" \
163 -s "HTTP/1.0 200 OK" \
164 -C "received HelloRetryRequest message"
165
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000166requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000167requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
169requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
170requires_openssl_tls1_3
171run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
172 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
173 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
174 0 \
175 -s "Protocol is TLSv1.3" \
176 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
177 -s "received signature algorithm: 0x403" \
178 -s "got named group: secp521r1(0019)" \
179 -s "Verifying peer X.509 certificate... ok" \
180 -s "HTTP/1.0 200 OK" \
181 -C "received HelloRetryRequest message"
182
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000183requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000184requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
186requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
187requires_openssl_tls1_3
188run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
189 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
190 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
191 0 \
192 -s "Protocol is TLSv1.3" \
193 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
194 -s "received signature algorithm: 0x503" \
195 -s "got named group: secp521r1(0019)" \
196 -s "Verifying peer X.509 certificate... ok" \
197 -s "HTTP/1.0 200 OK" \
198 -C "received HelloRetryRequest message"
199
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000200requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000201requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000202requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
203requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
204requires_openssl_tls1_3
205run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
206 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
207 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
208 0 \
209 -s "Protocol is TLSv1.3" \
210 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
211 -s "received signature algorithm: 0x603" \
212 -s "got named group: secp521r1(0019)" \
213 -s "Verifying peer X.509 certificate... ok" \
214 -s "HTTP/1.0 200 OK" \
215 -C "received HelloRetryRequest message"
216
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000217requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000218requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000219requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
221requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
222requires_openssl_tls1_3
223run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
225 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
226 0 \
227 -s "Protocol is TLSv1.3" \
228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
229 -s "received signature algorithm: 0x804" \
230 -s "got named group: secp521r1(0019)" \
231 -s "Verifying peer X.509 certificate... ok" \
232 -s "HTTP/1.0 200 OK" \
233 -C "received HelloRetryRequest message"
234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
239requires_openssl_tls1_3
240run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
241 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
242 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
243 0 \
244 -s "Protocol is TLSv1.3" \
245 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
246 -s "received signature algorithm: 0x403" \
247 -s "got named group: x25519(001d)" \
248 -s "Verifying peer X.509 certificate... ok" \
249 -s "HTTP/1.0 200 OK" \
250 -C "received HelloRetryRequest message"
251
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000252requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000253requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
255requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
256requires_openssl_tls1_3
257run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
258 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
259 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
260 0 \
261 -s "Protocol is TLSv1.3" \
262 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
263 -s "received signature algorithm: 0x503" \
264 -s "got named group: x25519(001d)" \
265 -s "Verifying peer X.509 certificate... ok" \
266 -s "HTTP/1.0 200 OK" \
267 -C "received HelloRetryRequest message"
268
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000269requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000270requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000271requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
272requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
273requires_openssl_tls1_3
274run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
275 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
276 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
277 0 \
278 -s "Protocol is TLSv1.3" \
279 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
280 -s "received signature algorithm: 0x603" \
281 -s "got named group: x25519(001d)" \
282 -s "Verifying peer X.509 certificate... ok" \
283 -s "HTTP/1.0 200 OK" \
284 -C "received HelloRetryRequest message"
285
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000286requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000287requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000288requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
289requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
290requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
291requires_openssl_tls1_3
292run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
294 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
295 0 \
296 -s "Protocol is TLSv1.3" \
297 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
298 -s "received signature algorithm: 0x804" \
299 -s "got named group: x25519(001d)" \
300 -s "Verifying peer X.509 certificate... ok" \
301 -s "HTTP/1.0 200 OK" \
302 -C "received HelloRetryRequest message"
303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
308requires_openssl_tls1_3
309run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
310 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
311 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
312 0 \
313 -s "Protocol is TLSv1.3" \
314 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
315 -s "received signature algorithm: 0x403" \
316 -s "got named group: x448(001e)" \
317 -s "Verifying peer X.509 certificate... ok" \
318 -s "HTTP/1.0 200 OK" \
319 -C "received HelloRetryRequest message"
320
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000321requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000322requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
324requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
325requires_openssl_tls1_3
326run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
327 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
328 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
329 0 \
330 -s "Protocol is TLSv1.3" \
331 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
332 -s "received signature algorithm: 0x503" \
333 -s "got named group: x448(001e)" \
334 -s "Verifying peer X.509 certificate... ok" \
335 -s "HTTP/1.0 200 OK" \
336 -C "received HelloRetryRequest message"
337
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000338requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000339requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000340requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
341requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
342requires_openssl_tls1_3
343run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
344 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
345 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
346 0 \
347 -s "Protocol is TLSv1.3" \
348 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
349 -s "received signature algorithm: 0x603" \
350 -s "got named group: x448(001e)" \
351 -s "Verifying peer X.509 certificate... ok" \
352 -s "HTTP/1.0 200 OK" \
353 -C "received HelloRetryRequest message"
354
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000355requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000356requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000357requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
358requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
359requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
360requires_openssl_tls1_3
361run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
362 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
363 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
364 0 \
365 -s "Protocol is TLSv1.3" \
366 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
367 -s "received signature algorithm: 0x804" \
368 -s "got named group: x448(001e)" \
369 -s "Verifying peer X.509 certificate... ok" \
370 -s "HTTP/1.0 200 OK" \
371 -C "received HelloRetryRequest message"
372
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000373requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000374requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
376requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
377requires_openssl_tls1_3
378run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
379 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
380 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
381 0 \
382 -s "Protocol is TLSv1.3" \
383 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
384 -s "received signature algorithm: 0x403" \
385 -s "got named group: secp256r1(0017)" \
386 -s "Verifying peer X.509 certificate... ok" \
387 -s "HTTP/1.0 200 OK" \
388 -C "received HelloRetryRequest message"
389
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000390requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
394requires_openssl_tls1_3
395run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
396 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
397 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
398 0 \
399 -s "Protocol is TLSv1.3" \
400 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
401 -s "received signature algorithm: 0x503" \
402 -s "got named group: secp256r1(0017)" \
403 -s "Verifying peer X.509 certificate... ok" \
404 -s "HTTP/1.0 200 OK" \
405 -C "received HelloRetryRequest message"
406
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000407requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
411requires_openssl_tls1_3
412run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
413 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
414 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
415 0 \
416 -s "Protocol is TLSv1.3" \
417 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
418 -s "received signature algorithm: 0x603" \
419 -s "got named group: secp256r1(0017)" \
420 -s "Verifying peer X.509 certificate... ok" \
421 -s "HTTP/1.0 200 OK" \
422 -C "received HelloRetryRequest message"
423
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000424requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000425requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000426requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
427requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
428requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
429requires_openssl_tls1_3
430run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
431 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
432 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
433 0 \
434 -s "Protocol is TLSv1.3" \
435 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
436 -s "received signature algorithm: 0x804" \
437 -s "got named group: secp256r1(0017)" \
438 -s "Verifying peer X.509 certificate... ok" \
439 -s "HTTP/1.0 200 OK" \
440 -C "received HelloRetryRequest message"
441
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000442requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000443requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
446requires_openssl_tls1_3
447run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
448 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
449 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
450 0 \
451 -s "Protocol is TLSv1.3" \
452 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
453 -s "received signature algorithm: 0x403" \
454 -s "got named group: secp384r1(0018)" \
455 -s "Verifying peer X.509 certificate... ok" \
456 -s "HTTP/1.0 200 OK" \
457 -C "received HelloRetryRequest message"
458
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
463requires_openssl_tls1_3
464run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
465 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
466 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
467 0 \
468 -s "Protocol is TLSv1.3" \
469 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
470 -s "received signature algorithm: 0x503" \
471 -s "got named group: secp384r1(0018)" \
472 -s "Verifying peer X.509 certificate... ok" \
473 -s "HTTP/1.0 200 OK" \
474 -C "received HelloRetryRequest message"
475
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000476requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000477requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000478requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
479requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
480requires_openssl_tls1_3
481run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
482 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
483 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
484 0 \
485 -s "Protocol is TLSv1.3" \
486 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
487 -s "received signature algorithm: 0x603" \
488 -s "got named group: secp384r1(0018)" \
489 -s "Verifying peer X.509 certificate... ok" \
490 -s "HTTP/1.0 200 OK" \
491 -C "received HelloRetryRequest message"
492
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000493requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000494requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000495requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
497requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
498requires_openssl_tls1_3
499run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
500 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
501 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
502 0 \
503 -s "Protocol is TLSv1.3" \
504 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
505 -s "received signature algorithm: 0x804" \
506 -s "got named group: secp384r1(0018)" \
507 -s "Verifying peer X.509 certificate... ok" \
508 -s "HTTP/1.0 200 OK" \
509 -C "received HelloRetryRequest message"
510
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000511requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000512requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
515requires_openssl_tls1_3
516run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
518 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
519 0 \
520 -s "Protocol is TLSv1.3" \
521 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
522 -s "received signature algorithm: 0x403" \
523 -s "got named group: secp521r1(0019)" \
524 -s "Verifying peer X.509 certificate... ok" \
525 -s "HTTP/1.0 200 OK" \
526 -C "received HelloRetryRequest message"
527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
532requires_openssl_tls1_3
533run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
534 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
535 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
536 0 \
537 -s "Protocol is TLSv1.3" \
538 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
539 -s "received signature algorithm: 0x503" \
540 -s "got named group: secp521r1(0019)" \
541 -s "Verifying peer X.509 certificate... ok" \
542 -s "HTTP/1.0 200 OK" \
543 -C "received HelloRetryRequest message"
544
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000545requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000546requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000547requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
548requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
549requires_openssl_tls1_3
550run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
551 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
552 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
553 0 \
554 -s "Protocol is TLSv1.3" \
555 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
556 -s "received signature algorithm: 0x603" \
557 -s "got named group: secp521r1(0019)" \
558 -s "Verifying peer X.509 certificate... ok" \
559 -s "HTTP/1.0 200 OK" \
560 -C "received HelloRetryRequest message"
561
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000563requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
566requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
567requires_openssl_tls1_3
568run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
570 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
571 0 \
572 -s "Protocol is TLSv1.3" \
573 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
574 -s "received signature algorithm: 0x804" \
575 -s "got named group: secp521r1(0019)" \
576 -s "Verifying peer X.509 certificate... ok" \
577 -s "HTTP/1.0 200 OK" \
578 -C "received HelloRetryRequest message"
579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
584requires_openssl_tls1_3
585run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
586 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
587 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
588 0 \
589 -s "Protocol is TLSv1.3" \
590 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
591 -s "received signature algorithm: 0x403" \
592 -s "got named group: x25519(001d)" \
593 -s "Verifying peer X.509 certificate... ok" \
594 -s "HTTP/1.0 200 OK" \
595 -C "received HelloRetryRequest message"
596
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000597requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
601requires_openssl_tls1_3
602run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
603 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
604 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
605 0 \
606 -s "Protocol is TLSv1.3" \
607 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
608 -s "received signature algorithm: 0x503" \
609 -s "got named group: x25519(001d)" \
610 -s "Verifying peer X.509 certificate... ok" \
611 -s "HTTP/1.0 200 OK" \
612 -C "received HelloRetryRequest message"
613
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000614requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000615requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000616requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
617requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
618requires_openssl_tls1_3
619run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
620 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
621 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
622 0 \
623 -s "Protocol is TLSv1.3" \
624 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
625 -s "received signature algorithm: 0x603" \
626 -s "got named group: x25519(001d)" \
627 -s "Verifying peer X.509 certificate... ok" \
628 -s "HTTP/1.0 200 OK" \
629 -C "received HelloRetryRequest message"
630
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000631requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000632requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000633requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
634requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
635requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
636requires_openssl_tls1_3
637run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
638 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
639 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
640 0 \
641 -s "Protocol is TLSv1.3" \
642 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
643 -s "received signature algorithm: 0x804" \
644 -s "got named group: x25519(001d)" \
645 -s "Verifying peer X.509 certificate... ok" \
646 -s "HTTP/1.0 200 OK" \
647 -C "received HelloRetryRequest message"
648
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000649requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000650requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
653requires_openssl_tls1_3
654run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
656 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
657 0 \
658 -s "Protocol is TLSv1.3" \
659 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
660 -s "received signature algorithm: 0x403" \
661 -s "got named group: x448(001e)" \
662 -s "Verifying peer X.509 certificate... ok" \
663 -s "HTTP/1.0 200 OK" \
664 -C "received HelloRetryRequest message"
665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
670requires_openssl_tls1_3
671run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
672 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
673 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
674 0 \
675 -s "Protocol is TLSv1.3" \
676 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
677 -s "received signature algorithm: 0x503" \
678 -s "got named group: x448(001e)" \
679 -s "Verifying peer X.509 certificate... ok" \
680 -s "HTTP/1.0 200 OK" \
681 -C "received HelloRetryRequest message"
682
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000683requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000684requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
687requires_openssl_tls1_3
688run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
689 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
690 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
691 0 \
692 -s "Protocol is TLSv1.3" \
693 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
694 -s "received signature algorithm: 0x603" \
695 -s "got named group: x448(001e)" \
696 -s "Verifying peer X.509 certificate... ok" \
697 -s "HTTP/1.0 200 OK" \
698 -C "received HelloRetryRequest message"
699
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000700requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
704requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
705requires_openssl_tls1_3
706run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
707 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
708 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
709 0 \
710 -s "Protocol is TLSv1.3" \
711 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
712 -s "received signature algorithm: 0x804" \
713 -s "got named group: x448(001e)" \
714 -s "Verifying peer X.509 certificate... ok" \
715 -s "HTTP/1.0 200 OK" \
716 -C "received HelloRetryRequest message"
717
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000718requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000719requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
722requires_openssl_tls1_3
723run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
724 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
725 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
726 0 \
727 -s "Protocol is TLSv1.3" \
728 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
729 -s "received signature algorithm: 0x403" \
730 -s "got named group: secp256r1(0017)" \
731 -s "Verifying peer X.509 certificate... ok" \
732 -s "HTTP/1.0 200 OK" \
733 -C "received HelloRetryRequest message"
734
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000735requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000736requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
739requires_openssl_tls1_3
740run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
741 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
742 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
743 0 \
744 -s "Protocol is TLSv1.3" \
745 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
746 -s "received signature algorithm: 0x503" \
747 -s "got named group: secp256r1(0017)" \
748 -s "Verifying peer X.509 certificate... ok" \
749 -s "HTTP/1.0 200 OK" \
750 -C "received HelloRetryRequest message"
751
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000752requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000753requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
756requires_openssl_tls1_3
757run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
758 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
759 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
760 0 \
761 -s "Protocol is TLSv1.3" \
762 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
763 -s "received signature algorithm: 0x603" \
764 -s "got named group: secp256r1(0017)" \
765 -s "Verifying peer X.509 certificate... ok" \
766 -s "HTTP/1.0 200 OK" \
767 -C "received HelloRetryRequest message"
768
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000769requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000770requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000771requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
772requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
773requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
774requires_openssl_tls1_3
775run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
776 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
777 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
778 0 \
779 -s "Protocol is TLSv1.3" \
780 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
781 -s "received signature algorithm: 0x804" \
782 -s "got named group: secp256r1(0017)" \
783 -s "Verifying peer X.509 certificate... ok" \
784 -s "HTTP/1.0 200 OK" \
785 -C "received HelloRetryRequest message"
786
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000787requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000788requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000789requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
790requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
791requires_openssl_tls1_3
792run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
793 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
794 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
795 0 \
796 -s "Protocol is TLSv1.3" \
797 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
798 -s "received signature algorithm: 0x403" \
799 -s "got named group: secp384r1(0018)" \
800 -s "Verifying peer X.509 certificate... ok" \
801 -s "HTTP/1.0 200 OK" \
802 -C "received HelloRetryRequest message"
803
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000804requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000805requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000806requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
807requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
808requires_openssl_tls1_3
809run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
810 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
811 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
812 0 \
813 -s "Protocol is TLSv1.3" \
814 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
815 -s "received signature algorithm: 0x503" \
816 -s "got named group: secp384r1(0018)" \
817 -s "Verifying peer X.509 certificate... ok" \
818 -s "HTTP/1.0 200 OK" \
819 -C "received HelloRetryRequest message"
820
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000821requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000822requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000823requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
824requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
825requires_openssl_tls1_3
826run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
827 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
828 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
829 0 \
830 -s "Protocol is TLSv1.3" \
831 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
832 -s "received signature algorithm: 0x603" \
833 -s "got named group: secp384r1(0018)" \
834 -s "Verifying peer X.509 certificate... ok" \
835 -s "HTTP/1.0 200 OK" \
836 -C "received HelloRetryRequest message"
837
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000838requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000839requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
842requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
843requires_openssl_tls1_3
844run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
845 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
846 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
847 0 \
848 -s "Protocol is TLSv1.3" \
849 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
850 -s "received signature algorithm: 0x804" \
851 -s "got named group: secp384r1(0018)" \
852 -s "Verifying peer X.509 certificate... ok" \
853 -s "HTTP/1.0 200 OK" \
854 -C "received HelloRetryRequest message"
855
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000856requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000857requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000858requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
860requires_openssl_tls1_3
861run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
862 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
863 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
864 0 \
865 -s "Protocol is TLSv1.3" \
866 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
867 -s "received signature algorithm: 0x403" \
868 -s "got named group: secp521r1(0019)" \
869 -s "Verifying peer X.509 certificate... ok" \
870 -s "HTTP/1.0 200 OK" \
871 -C "received HelloRetryRequest message"
872
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000873requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000874requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
877requires_openssl_tls1_3
878run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
879 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
880 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
881 0 \
882 -s "Protocol is TLSv1.3" \
883 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
884 -s "received signature algorithm: 0x503" \
885 -s "got named group: secp521r1(0019)" \
886 -s "Verifying peer X.509 certificate... ok" \
887 -s "HTTP/1.0 200 OK" \
888 -C "received HelloRetryRequest message"
889
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000890requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000891requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
894requires_openssl_tls1_3
895run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
896 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
897 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
898 0 \
899 -s "Protocol is TLSv1.3" \
900 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
901 -s "received signature algorithm: 0x603" \
902 -s "got named group: secp521r1(0019)" \
903 -s "Verifying peer X.509 certificate... ok" \
904 -s "HTTP/1.0 200 OK" \
905 -C "received HelloRetryRequest message"
906
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000907requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000908requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
911requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
912requires_openssl_tls1_3
913run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
914 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
915 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
916 0 \
917 -s "Protocol is TLSv1.3" \
918 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
919 -s "received signature algorithm: 0x804" \
920 -s "got named group: secp521r1(0019)" \
921 -s "Verifying peer X.509 certificate... ok" \
922 -s "HTTP/1.0 200 OK" \
923 -C "received HelloRetryRequest message"
924
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000925requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000926requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
929requires_openssl_tls1_3
930run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
931 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
932 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
933 0 \
934 -s "Protocol is TLSv1.3" \
935 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
936 -s "received signature algorithm: 0x403" \
937 -s "got named group: x25519(001d)" \
938 -s "Verifying peer X.509 certificate... ok" \
939 -s "HTTP/1.0 200 OK" \
940 -C "received HelloRetryRequest message"
941
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000942requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000943requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000944requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
945requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
946requires_openssl_tls1_3
947run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
948 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
949 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
950 0 \
951 -s "Protocol is TLSv1.3" \
952 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
953 -s "received signature algorithm: 0x503" \
954 -s "got named group: x25519(001d)" \
955 -s "Verifying peer X.509 certificate... ok" \
956 -s "HTTP/1.0 200 OK" \
957 -C "received HelloRetryRequest message"
958
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000959requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000960requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000961requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
963requires_openssl_tls1_3
964run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
965 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
966 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
967 0 \
968 -s "Protocol is TLSv1.3" \
969 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
970 -s "received signature algorithm: 0x603" \
971 -s "got named group: x25519(001d)" \
972 -s "Verifying peer X.509 certificate... ok" \
973 -s "HTTP/1.0 200 OK" \
974 -C "received HelloRetryRequest message"
975
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000976requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000977requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000978requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
979requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
980requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
981requires_openssl_tls1_3
982run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
983 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
984 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
985 0 \
986 -s "Protocol is TLSv1.3" \
987 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
988 -s "received signature algorithm: 0x804" \
989 -s "got named group: x25519(001d)" \
990 -s "Verifying peer X.509 certificate... ok" \
991 -s "HTTP/1.0 200 OK" \
992 -C "received HelloRetryRequest message"
993
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000994requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000995requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
998requires_openssl_tls1_3
999run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
1000 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1001 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1002 0 \
1003 -s "Protocol is TLSv1.3" \
1004 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1005 -s "received signature algorithm: 0x403" \
1006 -s "got named group: x448(001e)" \
1007 -s "Verifying peer X.509 certificate... ok" \
1008 -s "HTTP/1.0 200 OK" \
1009 -C "received HelloRetryRequest message"
1010
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001011requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001012requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001013requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1014requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1015requires_openssl_tls1_3
1016run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
1017 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1018 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1019 0 \
1020 -s "Protocol is TLSv1.3" \
1021 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1022 -s "received signature algorithm: 0x503" \
1023 -s "got named group: x448(001e)" \
1024 -s "Verifying peer X.509 certificate... ok" \
1025 -s "HTTP/1.0 200 OK" \
1026 -C "received HelloRetryRequest message"
1027
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1031requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1032requires_openssl_tls1_3
1033run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
1034 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1035 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1036 0 \
1037 -s "Protocol is TLSv1.3" \
1038 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1039 -s "received signature algorithm: 0x603" \
1040 -s "got named group: x448(001e)" \
1041 -s "Verifying peer X.509 certificate... ok" \
1042 -s "HTTP/1.0 200 OK" \
1043 -C "received HelloRetryRequest message"
1044
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001045requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001046requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001047requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1048requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1049requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1050requires_openssl_tls1_3
1051run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
1052 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1053 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1054 0 \
1055 -s "Protocol is TLSv1.3" \
1056 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1057 -s "received signature algorithm: 0x804" \
1058 -s "got named group: x448(001e)" \
1059 -s "Verifying peer X.509 certificate... ok" \
1060 -s "HTTP/1.0 200 OK" \
1061 -C "received HelloRetryRequest message"
1062
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001063requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001064requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1067requires_openssl_tls1_3
1068run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1069 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1070 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1071 0 \
1072 -s "Protocol is TLSv1.3" \
1073 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1074 -s "received signature algorithm: 0x403" \
1075 -s "got named group: secp256r1(0017)" \
1076 -s "Verifying peer X.509 certificate... ok" \
1077 -s "HTTP/1.0 200 OK" \
1078 -C "received HelloRetryRequest message"
1079
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001080requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001081requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1084requires_openssl_tls1_3
1085run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1086 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1087 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1088 0 \
1089 -s "Protocol is TLSv1.3" \
1090 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1091 -s "received signature algorithm: 0x503" \
1092 -s "got named group: secp256r1(0017)" \
1093 -s "Verifying peer X.509 certificate... ok" \
1094 -s "HTTP/1.0 200 OK" \
1095 -C "received HelloRetryRequest message"
1096
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001097requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001098requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1101requires_openssl_tls1_3
1102run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1103 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1104 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1105 0 \
1106 -s "Protocol is TLSv1.3" \
1107 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1108 -s "received signature algorithm: 0x603" \
1109 -s "got named group: secp256r1(0017)" \
1110 -s "Verifying peer X.509 certificate... ok" \
1111 -s "HTTP/1.0 200 OK" \
1112 -C "received HelloRetryRequest message"
1113
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001114requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001115requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1118requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1119requires_openssl_tls1_3
1120run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1121 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1122 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1123 0 \
1124 -s "Protocol is TLSv1.3" \
1125 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1126 -s "received signature algorithm: 0x804" \
1127 -s "got named group: secp256r1(0017)" \
1128 -s "Verifying peer X.509 certificate... ok" \
1129 -s "HTTP/1.0 200 OK" \
1130 -C "received HelloRetryRequest message"
1131
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001132requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1136requires_openssl_tls1_3
1137run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1138 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1139 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1140 0 \
1141 -s "Protocol is TLSv1.3" \
1142 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1143 -s "received signature algorithm: 0x403" \
1144 -s "got named group: secp384r1(0018)" \
1145 -s "Verifying peer X.509 certificate... ok" \
1146 -s "HTTP/1.0 200 OK" \
1147 -C "received HelloRetryRequest message"
1148
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001150requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1153requires_openssl_tls1_3
1154run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1155 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1156 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1157 0 \
1158 -s "Protocol is TLSv1.3" \
1159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1160 -s "received signature algorithm: 0x503" \
1161 -s "got named group: secp384r1(0018)" \
1162 -s "Verifying peer X.509 certificate... ok" \
1163 -s "HTTP/1.0 200 OK" \
1164 -C "received HelloRetryRequest message"
1165
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001166requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001167requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001168requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1169requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1170requires_openssl_tls1_3
1171run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1172 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1173 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1174 0 \
1175 -s "Protocol is TLSv1.3" \
1176 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1177 -s "received signature algorithm: 0x603" \
1178 -s "got named group: secp384r1(0018)" \
1179 -s "Verifying peer X.509 certificate... ok" \
1180 -s "HTTP/1.0 200 OK" \
1181 -C "received HelloRetryRequest message"
1182
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001183requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001184requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001185requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1186requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1187requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1188requires_openssl_tls1_3
1189run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1190 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1191 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1192 0 \
1193 -s "Protocol is TLSv1.3" \
1194 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1195 -s "received signature algorithm: 0x804" \
1196 -s "got named group: secp384r1(0018)" \
1197 -s "Verifying peer X.509 certificate... ok" \
1198 -s "HTTP/1.0 200 OK" \
1199 -C "received HelloRetryRequest message"
1200
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001201requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001202requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1205requires_openssl_tls1_3
1206run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1207 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1208 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1209 0 \
1210 -s "Protocol is TLSv1.3" \
1211 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1212 -s "received signature algorithm: 0x403" \
1213 -s "got named group: secp521r1(0019)" \
1214 -s "Verifying peer X.509 certificate... ok" \
1215 -s "HTTP/1.0 200 OK" \
1216 -C "received HelloRetryRequest message"
1217
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001218requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001219requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1222requires_openssl_tls1_3
1223run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1225 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1226 0 \
1227 -s "Protocol is TLSv1.3" \
1228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1229 -s "received signature algorithm: 0x503" \
1230 -s "got named group: secp521r1(0019)" \
1231 -s "Verifying peer X.509 certificate... ok" \
1232 -s "HTTP/1.0 200 OK" \
1233 -C "received HelloRetryRequest message"
1234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1239requires_openssl_tls1_3
1240run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1241 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1242 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1243 0 \
1244 -s "Protocol is TLSv1.3" \
1245 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1246 -s "received signature algorithm: 0x603" \
1247 -s "got named group: secp521r1(0019)" \
1248 -s "Verifying peer X.509 certificate... ok" \
1249 -s "HTTP/1.0 200 OK" \
1250 -C "received HelloRetryRequest message"
1251
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001252requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001253requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001254requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1255requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1256requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1257requires_openssl_tls1_3
1258run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1259 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1260 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1261 0 \
1262 -s "Protocol is TLSv1.3" \
1263 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1264 -s "received signature algorithm: 0x804" \
1265 -s "got named group: secp521r1(0019)" \
1266 -s "Verifying peer X.509 certificate... ok" \
1267 -s "HTTP/1.0 200 OK" \
1268 -C "received HelloRetryRequest message"
1269
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001270requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001271requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001272requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1273requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1274requires_openssl_tls1_3
1275run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
1276 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1277 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1278 0 \
1279 -s "Protocol is TLSv1.3" \
1280 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1281 -s "received signature algorithm: 0x403" \
1282 -s "got named group: x25519(001d)" \
1283 -s "Verifying peer X.509 certificate... ok" \
1284 -s "HTTP/1.0 200 OK" \
1285 -C "received HelloRetryRequest message"
1286
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001287requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001288requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1291requires_openssl_tls1_3
1292run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
1293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1294 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1295 0 \
1296 -s "Protocol is TLSv1.3" \
1297 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1298 -s "received signature algorithm: 0x503" \
1299 -s "got named group: x25519(001d)" \
1300 -s "Verifying peer X.509 certificate... ok" \
1301 -s "HTTP/1.0 200 OK" \
1302 -C "received HelloRetryRequest message"
1303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1308requires_openssl_tls1_3
1309run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
1310 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1311 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1312 0 \
1313 -s "Protocol is TLSv1.3" \
1314 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1315 -s "received signature algorithm: 0x603" \
1316 -s "got named group: x25519(001d)" \
1317 -s "Verifying peer X.509 certificate... ok" \
1318 -s "HTTP/1.0 200 OK" \
1319 -C "received HelloRetryRequest message"
1320
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001321requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001322requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1324requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1325requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1326requires_openssl_tls1_3
1327run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
1328 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1329 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1330 0 \
1331 -s "Protocol is TLSv1.3" \
1332 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1333 -s "received signature algorithm: 0x804" \
1334 -s "got named group: x25519(001d)" \
1335 -s "Verifying peer X.509 certificate... ok" \
1336 -s "HTTP/1.0 200 OK" \
1337 -C "received HelloRetryRequest message"
1338
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001339requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001340requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001341requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1343requires_openssl_tls1_3
1344run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
1345 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1346 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1347 0 \
1348 -s "Protocol is TLSv1.3" \
1349 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1350 -s "received signature algorithm: 0x403" \
1351 -s "got named group: x448(001e)" \
1352 -s "Verifying peer X.509 certificate... ok" \
1353 -s "HTTP/1.0 200 OK" \
1354 -C "received HelloRetryRequest message"
1355
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1360requires_openssl_tls1_3
1361run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
1362 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1363 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1364 0 \
1365 -s "Protocol is TLSv1.3" \
1366 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1367 -s "received signature algorithm: 0x503" \
1368 -s "got named group: x448(001e)" \
1369 -s "Verifying peer X.509 certificate... ok" \
1370 -s "HTTP/1.0 200 OK" \
1371 -C "received HelloRetryRequest message"
1372
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001373requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001374requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001375requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1376requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1377requires_openssl_tls1_3
1378run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
1379 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1380 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1381 0 \
1382 -s "Protocol is TLSv1.3" \
1383 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1384 -s "received signature algorithm: 0x603" \
1385 -s "got named group: x448(001e)" \
1386 -s "Verifying peer X.509 certificate... ok" \
1387 -s "HTTP/1.0 200 OK" \
1388 -C "received HelloRetryRequest message"
1389
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001390requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1394requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1395requires_openssl_tls1_3
1396run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
1397 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1398 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1399 0 \
1400 -s "Protocol is TLSv1.3" \
1401 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1402 -s "received signature algorithm: 0x804" \
1403 -s "got named group: x448(001e)" \
1404 -s "Verifying peer X.509 certificate... ok" \
1405 -s "HTTP/1.0 200 OK" \
1406 -C "received HelloRetryRequest message"
1407
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001409requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1412requires_openssl_tls1_3
1413run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1414 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1415 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1416 0 \
1417 -s "Protocol is TLSv1.3" \
1418 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1419 -s "received signature algorithm: 0x403" \
1420 -s "got named group: secp256r1(0017)" \
1421 -s "Verifying peer X.509 certificate... ok" \
1422 -s "HTTP/1.0 200 OK" \
1423 -C "received HelloRetryRequest message"
1424
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001425requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001426requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1429requires_openssl_tls1_3
1430run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1431 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1432 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1433 0 \
1434 -s "Protocol is TLSv1.3" \
1435 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1436 -s "received signature algorithm: 0x503" \
1437 -s "got named group: secp256r1(0017)" \
1438 -s "Verifying peer X.509 certificate... ok" \
1439 -s "HTTP/1.0 200 OK" \
1440 -C "received HelloRetryRequest message"
1441
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001442requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001443requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001444requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1446requires_openssl_tls1_3
1447run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1448 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1449 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1450 0 \
1451 -s "Protocol is TLSv1.3" \
1452 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1453 -s "received signature algorithm: 0x603" \
1454 -s "got named group: secp256r1(0017)" \
1455 -s "Verifying peer X.509 certificate... ok" \
1456 -s "HTTP/1.0 200 OK" \
1457 -C "received HelloRetryRequest message"
1458
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1463requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1464requires_openssl_tls1_3
1465run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1466 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1467 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1468 0 \
1469 -s "Protocol is TLSv1.3" \
1470 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1471 -s "received signature algorithm: 0x804" \
1472 -s "got named group: secp256r1(0017)" \
1473 -s "Verifying peer X.509 certificate... ok" \
1474 -s "HTTP/1.0 200 OK" \
1475 -C "received HelloRetryRequest message"
1476
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001477requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001478requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001479requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1480requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1481requires_openssl_tls1_3
1482run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1483 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1484 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1485 0 \
1486 -s "Protocol is TLSv1.3" \
1487 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1488 -s "received signature algorithm: 0x403" \
1489 -s "got named group: secp384r1(0018)" \
1490 -s "Verifying peer X.509 certificate... ok" \
1491 -s "HTTP/1.0 200 OK" \
1492 -C "received HelloRetryRequest message"
1493
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001494requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001495requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001496requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1498requires_openssl_tls1_3
1499run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1500 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1501 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1502 0 \
1503 -s "Protocol is TLSv1.3" \
1504 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1505 -s "received signature algorithm: 0x503" \
1506 -s "got named group: secp384r1(0018)" \
1507 -s "Verifying peer X.509 certificate... ok" \
1508 -s "HTTP/1.0 200 OK" \
1509 -C "received HelloRetryRequest message"
1510
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001511requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001512requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001513requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1515requires_openssl_tls1_3
1516run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1518 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1519 0 \
1520 -s "Protocol is TLSv1.3" \
1521 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1522 -s "received signature algorithm: 0x603" \
1523 -s "got named group: secp384r1(0018)" \
1524 -s "Verifying peer X.509 certificate... ok" \
1525 -s "HTTP/1.0 200 OK" \
1526 -C "received HelloRetryRequest message"
1527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1532requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1533requires_openssl_tls1_3
1534run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1535 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1536 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1537 0 \
1538 -s "Protocol is TLSv1.3" \
1539 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1540 -s "received signature algorithm: 0x804" \
1541 -s "got named group: secp384r1(0018)" \
1542 -s "Verifying peer X.509 certificate... ok" \
1543 -s "HTTP/1.0 200 OK" \
1544 -C "received HelloRetryRequest message"
1545
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001546requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001547requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001548requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1550requires_openssl_tls1_3
1551run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1552 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1553 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1554 0 \
1555 -s "Protocol is TLSv1.3" \
1556 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1557 -s "received signature algorithm: 0x403" \
1558 -s "got named group: secp521r1(0019)" \
1559 -s "Verifying peer X.509 certificate... ok" \
1560 -s "HTTP/1.0 200 OK" \
1561 -C "received HelloRetryRequest message"
1562
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001563requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001564requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001565requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1566requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1567requires_openssl_tls1_3
1568run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1570 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1571 0 \
1572 -s "Protocol is TLSv1.3" \
1573 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1574 -s "received signature algorithm: 0x503" \
1575 -s "got named group: secp521r1(0019)" \
1576 -s "Verifying peer X.509 certificate... ok" \
1577 -s "HTTP/1.0 200 OK" \
1578 -C "received HelloRetryRequest message"
1579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1584requires_openssl_tls1_3
1585run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1586 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1587 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1588 0 \
1589 -s "Protocol is TLSv1.3" \
1590 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1591 -s "received signature algorithm: 0x603" \
1592 -s "got named group: secp521r1(0019)" \
1593 -s "Verifying peer X.509 certificate... ok" \
1594 -s "HTTP/1.0 200 OK" \
1595 -C "received HelloRetryRequest message"
1596
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001597requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1601requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1602requires_openssl_tls1_3
1603run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1604 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1605 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1606 0 \
1607 -s "Protocol is TLSv1.3" \
1608 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1609 -s "received signature algorithm: 0x804" \
1610 -s "got named group: secp521r1(0019)" \
1611 -s "Verifying peer X.509 certificate... ok" \
1612 -s "HTTP/1.0 200 OK" \
1613 -C "received HelloRetryRequest message"
1614
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001615requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001616requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001617requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1619requires_openssl_tls1_3
1620run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
1621 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1622 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1623 0 \
1624 -s "Protocol is TLSv1.3" \
1625 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1626 -s "received signature algorithm: 0x403" \
1627 -s "got named group: x25519(001d)" \
1628 -s "Verifying peer X.509 certificate... ok" \
1629 -s "HTTP/1.0 200 OK" \
1630 -C "received HelloRetryRequest message"
1631
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001632requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001633requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001634requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1635requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1636requires_openssl_tls1_3
1637run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
1638 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1639 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1640 0 \
1641 -s "Protocol is TLSv1.3" \
1642 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1643 -s "received signature algorithm: 0x503" \
1644 -s "got named group: x25519(001d)" \
1645 -s "Verifying peer X.509 certificate... ok" \
1646 -s "HTTP/1.0 200 OK" \
1647 -C "received HelloRetryRequest message"
1648
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001649requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001650requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1653requires_openssl_tls1_3
1654run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
1655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1656 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1657 0 \
1658 -s "Protocol is TLSv1.3" \
1659 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1660 -s "received signature algorithm: 0x603" \
1661 -s "got named group: x25519(001d)" \
1662 -s "Verifying peer X.509 certificate... ok" \
1663 -s "HTTP/1.0 200 OK" \
1664 -C "received HelloRetryRequest message"
1665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1670requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1671requires_openssl_tls1_3
1672run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
1673 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1674 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1675 0 \
1676 -s "Protocol is TLSv1.3" \
1677 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1678 -s "received signature algorithm: 0x804" \
1679 -s "got named group: x25519(001d)" \
1680 -s "Verifying peer X.509 certificate... ok" \
1681 -s "HTTP/1.0 200 OK" \
1682 -C "received HelloRetryRequest message"
1683
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001684requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001685requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001686requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1688requires_openssl_tls1_3
1689run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
1690 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1691 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1692 0 \
1693 -s "Protocol is TLSv1.3" \
1694 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1695 -s "received signature algorithm: 0x403" \
1696 -s "got named group: x448(001e)" \
1697 -s "Verifying peer X.509 certificate... ok" \
1698 -s "HTTP/1.0 200 OK" \
1699 -C "received HelloRetryRequest message"
1700
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001701requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001702requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001703requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1704requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1705requires_openssl_tls1_3
1706run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
1707 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1708 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1709 0 \
1710 -s "Protocol is TLSv1.3" \
1711 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1712 -s "received signature algorithm: 0x503" \
1713 -s "got named group: x448(001e)" \
1714 -s "Verifying peer X.509 certificate... ok" \
1715 -s "HTTP/1.0 200 OK" \
1716 -C "received HelloRetryRequest message"
1717
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001718requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001719requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1722requires_openssl_tls1_3
1723run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
1724 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1725 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
1726 0 \
1727 -s "Protocol is TLSv1.3" \
1728 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1729 -s "received signature algorithm: 0x603" \
1730 -s "got named group: x448(001e)" \
1731 -s "Verifying peer X.509 certificate... ok" \
1732 -s "HTTP/1.0 200 OK" \
1733 -C "received HelloRetryRequest message"
1734
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001735requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001736requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001737requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1739requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1740requires_openssl_tls1_3
1741run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
1742 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1743 "$O_NEXT_CLI_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -CAfile data_files/test-ca_cat12.crt" \
1744 0 \
1745 -s "Protocol is TLSv1.3" \
1746 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1747 -s "received signature algorithm: 0x804" \
1748 -s "got named group: x448(001e)" \
1749 -s "Verifying peer X.509 certificate... ok" \
1750 -s "HTTP/1.0 200 OK" \
1751 -C "received HelloRetryRequest message"
1752
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001753requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001754requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1757requires_gnutls_tls1_3
1758requires_gnutls_next_no_ticket
1759requires_gnutls_next_disable_tls13_compat
1760run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1761 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001762 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001763 0 \
1764 -s "Protocol is TLSv1.3" \
1765 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1766 -s "received signature algorithm: 0x403" \
1767 -s "got named group: secp256r1(0017)" \
1768 -s "Verifying peer X.509 certificate... ok" \
1769 -c "HTTP/1.0 200 OK" \
1770 -C "received HelloRetryRequest message"
1771
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001772requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1776requires_gnutls_tls1_3
1777requires_gnutls_next_no_ticket
1778requires_gnutls_next_disable_tls13_compat
1779run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1780 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001781 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001782 0 \
1783 -s "Protocol is TLSv1.3" \
1784 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1785 -s "received signature algorithm: 0x503" \
1786 -s "got named group: secp256r1(0017)" \
1787 -s "Verifying peer X.509 certificate... ok" \
1788 -c "HTTP/1.0 200 OK" \
1789 -C "received HelloRetryRequest message"
1790
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001791requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001792requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1794requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1795requires_gnutls_tls1_3
1796requires_gnutls_next_no_ticket
1797requires_gnutls_next_disable_tls13_compat
1798run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1799 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001800 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001801 0 \
1802 -s "Protocol is TLSv1.3" \
1803 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1804 -s "received signature algorithm: 0x603" \
1805 -s "got named group: secp256r1(0017)" \
1806 -s "Verifying peer X.509 certificate... ok" \
1807 -c "HTTP/1.0 200 OK" \
1808 -C "received HelloRetryRequest message"
1809
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001810requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001811requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1814requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1815requires_gnutls_tls1_3
1816requires_gnutls_next_no_ticket
1817requires_gnutls_next_disable_tls13_compat
1818run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1819 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001820 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001821 0 \
1822 -s "Protocol is TLSv1.3" \
1823 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1824 -s "received signature algorithm: 0x804" \
1825 -s "got named group: secp256r1(0017)" \
1826 -s "Verifying peer X.509 certificate... ok" \
1827 -c "HTTP/1.0 200 OK" \
1828 -C "received HelloRetryRequest message"
1829
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001830requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001831requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1834requires_gnutls_tls1_3
1835requires_gnutls_next_no_ticket
1836requires_gnutls_next_disable_tls13_compat
1837run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1838 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001839 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001840 0 \
1841 -s "Protocol is TLSv1.3" \
1842 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1843 -s "received signature algorithm: 0x403" \
1844 -s "got named group: secp384r1(0018)" \
1845 -s "Verifying peer X.509 certificate... ok" \
1846 -c "HTTP/1.0 200 OK" \
1847 -C "received HelloRetryRequest message"
1848
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001849requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001850requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1853requires_gnutls_tls1_3
1854requires_gnutls_next_no_ticket
1855requires_gnutls_next_disable_tls13_compat
1856run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1857 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001858 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001859 0 \
1860 -s "Protocol is TLSv1.3" \
1861 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1862 -s "received signature algorithm: 0x503" \
1863 -s "got named group: secp384r1(0018)" \
1864 -s "Verifying peer X.509 certificate... ok" \
1865 -c "HTTP/1.0 200 OK" \
1866 -C "received HelloRetryRequest message"
1867
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001868requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001869requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1872requires_gnutls_tls1_3
1873requires_gnutls_next_no_ticket
1874requires_gnutls_next_disable_tls13_compat
1875run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1876 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001877 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001878 0 \
1879 -s "Protocol is TLSv1.3" \
1880 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1881 -s "received signature algorithm: 0x603" \
1882 -s "got named group: secp384r1(0018)" \
1883 -s "Verifying peer X.509 certificate... ok" \
1884 -c "HTTP/1.0 200 OK" \
1885 -C "received HelloRetryRequest message"
1886
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001887requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001888requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001889requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1890requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1891requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1892requires_gnutls_tls1_3
1893requires_gnutls_next_no_ticket
1894requires_gnutls_next_disable_tls13_compat
1895run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1896 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001897 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001898 0 \
1899 -s "Protocol is TLSv1.3" \
1900 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1901 -s "received signature algorithm: 0x804" \
1902 -s "got named group: secp384r1(0018)" \
1903 -s "Verifying peer X.509 certificate... ok" \
1904 -c "HTTP/1.0 200 OK" \
1905 -C "received HelloRetryRequest message"
1906
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001907requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001908requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1911requires_gnutls_tls1_3
1912requires_gnutls_next_no_ticket
1913requires_gnutls_next_disable_tls13_compat
1914run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1915 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001916 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001917 0 \
1918 -s "Protocol is TLSv1.3" \
1919 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1920 -s "received signature algorithm: 0x403" \
1921 -s "got named group: secp521r1(0019)" \
1922 -s "Verifying peer X.509 certificate... ok" \
1923 -c "HTTP/1.0 200 OK" \
1924 -C "received HelloRetryRequest message"
1925
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001926requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001927requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1930requires_gnutls_tls1_3
1931requires_gnutls_next_no_ticket
1932requires_gnutls_next_disable_tls13_compat
1933run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1934 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001935 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001936 0 \
1937 -s "Protocol is TLSv1.3" \
1938 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1939 -s "received signature algorithm: 0x503" \
1940 -s "got named group: secp521r1(0019)" \
1941 -s "Verifying peer X.509 certificate... ok" \
1942 -c "HTTP/1.0 200 OK" \
1943 -C "received HelloRetryRequest message"
1944
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001945requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001946requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1949requires_gnutls_tls1_3
1950requires_gnutls_next_no_ticket
1951requires_gnutls_next_disable_tls13_compat
1952run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1953 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001954 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001955 0 \
1956 -s "Protocol is TLSv1.3" \
1957 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1958 -s "received signature algorithm: 0x603" \
1959 -s "got named group: secp521r1(0019)" \
1960 -s "Verifying peer X.509 certificate... ok" \
1961 -c "HTTP/1.0 200 OK" \
1962 -C "received HelloRetryRequest message"
1963
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001964requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1968requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1969requires_gnutls_tls1_3
1970requires_gnutls_next_no_ticket
1971requires_gnutls_next_disable_tls13_compat
1972run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1973 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001974 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001975 0 \
1976 -s "Protocol is TLSv1.3" \
1977 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1978 -s "received signature algorithm: 0x804" \
1979 -s "got named group: secp521r1(0019)" \
1980 -s "Verifying peer X.509 certificate... ok" \
1981 -c "HTTP/1.0 200 OK" \
1982 -C "received HelloRetryRequest message"
1983
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001984requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001985requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1988requires_gnutls_tls1_3
1989requires_gnutls_next_no_ticket
1990requires_gnutls_next_disable_tls13_compat
1991run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
1992 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001993 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001994 0 \
1995 -s "Protocol is TLSv1.3" \
1996 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1997 -s "received signature algorithm: 0x403" \
1998 -s "got named group: x25519(001d)" \
1999 -s "Verifying peer X.509 certificate... ok" \
2000 -c "HTTP/1.0 200 OK" \
2001 -C "received HelloRetryRequest message"
2002
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002003requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2007requires_gnutls_tls1_3
2008requires_gnutls_next_no_ticket
2009requires_gnutls_next_disable_tls13_compat
2010run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
2011 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002012 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002013 0 \
2014 -s "Protocol is TLSv1.3" \
2015 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2016 -s "received signature algorithm: 0x503" \
2017 -s "got named group: x25519(001d)" \
2018 -s "Verifying peer X.509 certificate... ok" \
2019 -c "HTTP/1.0 200 OK" \
2020 -C "received HelloRetryRequest message"
2021
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002022requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002023requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2026requires_gnutls_tls1_3
2027requires_gnutls_next_no_ticket
2028requires_gnutls_next_disable_tls13_compat
2029run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
2030 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002031 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002032 0 \
2033 -s "Protocol is TLSv1.3" \
2034 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2035 -s "received signature algorithm: 0x603" \
2036 -s "got named group: x25519(001d)" \
2037 -s "Verifying peer X.509 certificate... ok" \
2038 -c "HTTP/1.0 200 OK" \
2039 -C "received HelloRetryRequest message"
2040
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002041requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002042requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2045requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2046requires_gnutls_tls1_3
2047requires_gnutls_next_no_ticket
2048requires_gnutls_next_disable_tls13_compat
2049run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
2050 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002051 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002052 0 \
2053 -s "Protocol is TLSv1.3" \
2054 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2055 -s "received signature algorithm: 0x804" \
2056 -s "got named group: x25519(001d)" \
2057 -s "Verifying peer X.509 certificate... ok" \
2058 -c "HTTP/1.0 200 OK" \
2059 -C "received HelloRetryRequest message"
2060
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002061requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002062requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002063requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2065requires_gnutls_tls1_3
2066requires_gnutls_next_no_ticket
2067requires_gnutls_next_disable_tls13_compat
2068run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
2069 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002070 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002071 0 \
2072 -s "Protocol is TLSv1.3" \
2073 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2074 -s "received signature algorithm: 0x403" \
2075 -s "got named group: x448(001e)" \
2076 -s "Verifying peer X.509 certificate... ok" \
2077 -c "HTTP/1.0 200 OK" \
2078 -C "received HelloRetryRequest message"
2079
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002080requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002081requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2084requires_gnutls_tls1_3
2085requires_gnutls_next_no_ticket
2086requires_gnutls_next_disable_tls13_compat
2087run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
2088 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002089 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002090 0 \
2091 -s "Protocol is TLSv1.3" \
2092 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2093 -s "received signature algorithm: 0x503" \
2094 -s "got named group: x448(001e)" \
2095 -s "Verifying peer X.509 certificate... ok" \
2096 -c "HTTP/1.0 200 OK" \
2097 -C "received HelloRetryRequest message"
2098
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002099requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002100requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002101requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2103requires_gnutls_tls1_3
2104requires_gnutls_next_no_ticket
2105requires_gnutls_next_disable_tls13_compat
2106run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
2107 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002108 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002109 0 \
2110 -s "Protocol is TLSv1.3" \
2111 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2112 -s "received signature algorithm: 0x603" \
2113 -s "got named group: x448(001e)" \
2114 -s "Verifying peer X.509 certificate... ok" \
2115 -c "HTTP/1.0 200 OK" \
2116 -C "received HelloRetryRequest message"
2117
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002118requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002119requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2122requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2123requires_gnutls_tls1_3
2124requires_gnutls_next_no_ticket
2125requires_gnutls_next_disable_tls13_compat
2126run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
2127 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002128 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002129 0 \
2130 -s "Protocol is TLSv1.3" \
2131 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2132 -s "received signature algorithm: 0x804" \
2133 -s "got named group: x448(001e)" \
2134 -s "Verifying peer X.509 certificate... ok" \
2135 -c "HTTP/1.0 200 OK" \
2136 -C "received HelloRetryRequest message"
2137
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002138requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002139requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2142requires_gnutls_tls1_3
2143requires_gnutls_next_no_ticket
2144requires_gnutls_next_disable_tls13_compat
2145run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
2146 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002147 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002148 0 \
2149 -s "Protocol is TLSv1.3" \
2150 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2151 -s "received signature algorithm: 0x403" \
2152 -s "got named group: secp256r1(0017)" \
2153 -s "Verifying peer X.509 certificate... ok" \
2154 -c "HTTP/1.0 200 OK" \
2155 -C "received HelloRetryRequest message"
2156
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002157requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002158requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2161requires_gnutls_tls1_3
2162requires_gnutls_next_no_ticket
2163requires_gnutls_next_disable_tls13_compat
2164run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
2165 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002166 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002167 0 \
2168 -s "Protocol is TLSv1.3" \
2169 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2170 -s "received signature algorithm: 0x503" \
2171 -s "got named group: secp256r1(0017)" \
2172 -s "Verifying peer X.509 certificate... ok" \
2173 -c "HTTP/1.0 200 OK" \
2174 -C "received HelloRetryRequest message"
2175
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002176requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002177requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2180requires_gnutls_tls1_3
2181requires_gnutls_next_no_ticket
2182requires_gnutls_next_disable_tls13_compat
2183run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
2184 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002185 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002186 0 \
2187 -s "Protocol is TLSv1.3" \
2188 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2189 -s "received signature algorithm: 0x603" \
2190 -s "got named group: secp256r1(0017)" \
2191 -s "Verifying peer X.509 certificate... ok" \
2192 -c "HTTP/1.0 200 OK" \
2193 -C "received HelloRetryRequest message"
2194
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002195requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002196requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2198requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2199requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2200requires_gnutls_tls1_3
2201requires_gnutls_next_no_ticket
2202requires_gnutls_next_disable_tls13_compat
2203run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
2204 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002205 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002206 0 \
2207 -s "Protocol is TLSv1.3" \
2208 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2209 -s "received signature algorithm: 0x804" \
2210 -s "got named group: secp256r1(0017)" \
2211 -s "Verifying peer X.509 certificate... ok" \
2212 -c "HTTP/1.0 200 OK" \
2213 -C "received HelloRetryRequest message"
2214
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002215requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002216requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002217requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2218requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2219requires_gnutls_tls1_3
2220requires_gnutls_next_no_ticket
2221requires_gnutls_next_disable_tls13_compat
2222run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
2223 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002224 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002225 0 \
2226 -s "Protocol is TLSv1.3" \
2227 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2228 -s "received signature algorithm: 0x403" \
2229 -s "got named group: secp384r1(0018)" \
2230 -s "Verifying peer X.509 certificate... ok" \
2231 -c "HTTP/1.0 200 OK" \
2232 -C "received HelloRetryRequest message"
2233
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002234requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2238requires_gnutls_tls1_3
2239requires_gnutls_next_no_ticket
2240requires_gnutls_next_disable_tls13_compat
2241run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
2242 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002243 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002244 0 \
2245 -s "Protocol is TLSv1.3" \
2246 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2247 -s "received signature algorithm: 0x503" \
2248 -s "got named group: secp384r1(0018)" \
2249 -s "Verifying peer X.509 certificate... ok" \
2250 -c "HTTP/1.0 200 OK" \
2251 -C "received HelloRetryRequest message"
2252
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002253requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002254requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2257requires_gnutls_tls1_3
2258requires_gnutls_next_no_ticket
2259requires_gnutls_next_disable_tls13_compat
2260run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
2261 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002262 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002263 0 \
2264 -s "Protocol is TLSv1.3" \
2265 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2266 -s "received signature algorithm: 0x603" \
2267 -s "got named group: secp384r1(0018)" \
2268 -s "Verifying peer X.509 certificate... ok" \
2269 -c "HTTP/1.0 200 OK" \
2270 -C "received HelloRetryRequest message"
2271
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002272requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002273requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2276requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2277requires_gnutls_tls1_3
2278requires_gnutls_next_no_ticket
2279requires_gnutls_next_disable_tls13_compat
2280run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
2281 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002282 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002283 0 \
2284 -s "Protocol is TLSv1.3" \
2285 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2286 -s "received signature algorithm: 0x804" \
2287 -s "got named group: secp384r1(0018)" \
2288 -s "Verifying peer X.509 certificate... ok" \
2289 -c "HTTP/1.0 200 OK" \
2290 -C "received HelloRetryRequest message"
2291
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002292requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002293requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2296requires_gnutls_tls1_3
2297requires_gnutls_next_no_ticket
2298requires_gnutls_next_disable_tls13_compat
2299run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
2300 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002301 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002302 0 \
2303 -s "Protocol is TLSv1.3" \
2304 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2305 -s "received signature algorithm: 0x403" \
2306 -s "got named group: secp521r1(0019)" \
2307 -s "Verifying peer X.509 certificate... ok" \
2308 -c "HTTP/1.0 200 OK" \
2309 -C "received HelloRetryRequest message"
2310
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002311requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002312requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2315requires_gnutls_tls1_3
2316requires_gnutls_next_no_ticket
2317requires_gnutls_next_disable_tls13_compat
2318run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
2319 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002320 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002321 0 \
2322 -s "Protocol is TLSv1.3" \
2323 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2324 -s "received signature algorithm: 0x503" \
2325 -s "got named group: secp521r1(0019)" \
2326 -s "Verifying peer X.509 certificate... ok" \
2327 -c "HTTP/1.0 200 OK" \
2328 -C "received HelloRetryRequest message"
2329
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002330requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002331requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2333requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2334requires_gnutls_tls1_3
2335requires_gnutls_next_no_ticket
2336requires_gnutls_next_disable_tls13_compat
2337run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
2338 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002339 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002340 0 \
2341 -s "Protocol is TLSv1.3" \
2342 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2343 -s "received signature algorithm: 0x603" \
2344 -s "got named group: secp521r1(0019)" \
2345 -s "Verifying peer X.509 certificate... ok" \
2346 -c "HTTP/1.0 200 OK" \
2347 -C "received HelloRetryRequest message"
2348
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002349requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002350requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2353requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2354requires_gnutls_tls1_3
2355requires_gnutls_next_no_ticket
2356requires_gnutls_next_disable_tls13_compat
2357run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
2358 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002359 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002360 0 \
2361 -s "Protocol is TLSv1.3" \
2362 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2363 -s "received signature algorithm: 0x804" \
2364 -s "got named group: secp521r1(0019)" \
2365 -s "Verifying peer X.509 certificate... ok" \
2366 -c "HTTP/1.0 200 OK" \
2367 -C "received HelloRetryRequest message"
2368
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002369requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002370requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2373requires_gnutls_tls1_3
2374requires_gnutls_next_no_ticket
2375requires_gnutls_next_disable_tls13_compat
2376run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
2377 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002378 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002379 0 \
2380 -s "Protocol is TLSv1.3" \
2381 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2382 -s "received signature algorithm: 0x403" \
2383 -s "got named group: x25519(001d)" \
2384 -s "Verifying peer X.509 certificate... ok" \
2385 -c "HTTP/1.0 200 OK" \
2386 -C "received HelloRetryRequest message"
2387
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002388requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002389requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002390requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2391requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2392requires_gnutls_tls1_3
2393requires_gnutls_next_no_ticket
2394requires_gnutls_next_disable_tls13_compat
2395run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
2396 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002397 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002398 0 \
2399 -s "Protocol is TLSv1.3" \
2400 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2401 -s "received signature algorithm: 0x503" \
2402 -s "got named group: x25519(001d)" \
2403 -s "Verifying peer X.509 certificate... ok" \
2404 -c "HTTP/1.0 200 OK" \
2405 -C "received HelloRetryRequest message"
2406
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002407requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002408requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2411requires_gnutls_tls1_3
2412requires_gnutls_next_no_ticket
2413requires_gnutls_next_disable_tls13_compat
2414run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
2415 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002416 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002417 0 \
2418 -s "Protocol is TLSv1.3" \
2419 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2420 -s "received signature algorithm: 0x603" \
2421 -s "got named group: x25519(001d)" \
2422 -s "Verifying peer X.509 certificate... ok" \
2423 -c "HTTP/1.0 200 OK" \
2424 -C "received HelloRetryRequest message"
2425
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2430requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2431requires_gnutls_tls1_3
2432requires_gnutls_next_no_ticket
2433requires_gnutls_next_disable_tls13_compat
2434run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
2435 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002436 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002437 0 \
2438 -s "Protocol is TLSv1.3" \
2439 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2440 -s "received signature algorithm: 0x804" \
2441 -s "got named group: x25519(001d)" \
2442 -s "Verifying peer X.509 certificate... ok" \
2443 -c "HTTP/1.0 200 OK" \
2444 -C "received HelloRetryRequest message"
2445
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002446requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002447requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002448requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2449requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2450requires_gnutls_tls1_3
2451requires_gnutls_next_no_ticket
2452requires_gnutls_next_disable_tls13_compat
2453run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
2454 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002455 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002456 0 \
2457 -s "Protocol is TLSv1.3" \
2458 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2459 -s "received signature algorithm: 0x403" \
2460 -s "got named group: x448(001e)" \
2461 -s "Verifying peer X.509 certificate... ok" \
2462 -c "HTTP/1.0 200 OK" \
2463 -C "received HelloRetryRequest message"
2464
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002465requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002466requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002467requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2468requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2469requires_gnutls_tls1_3
2470requires_gnutls_next_no_ticket
2471requires_gnutls_next_disable_tls13_compat
2472run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
2473 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002474 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002475 0 \
2476 -s "Protocol is TLSv1.3" \
2477 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2478 -s "received signature algorithm: 0x503" \
2479 -s "got named group: x448(001e)" \
2480 -s "Verifying peer X.509 certificate... ok" \
2481 -c "HTTP/1.0 200 OK" \
2482 -C "received HelloRetryRequest message"
2483
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002484requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002485requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2488requires_gnutls_tls1_3
2489requires_gnutls_next_no_ticket
2490requires_gnutls_next_disable_tls13_compat
2491run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
2492 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002493 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002494 0 \
2495 -s "Protocol is TLSv1.3" \
2496 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2497 -s "received signature algorithm: 0x603" \
2498 -s "got named group: x448(001e)" \
2499 -s "Verifying peer X.509 certificate... ok" \
2500 -c "HTTP/1.0 200 OK" \
2501 -C "received HelloRetryRequest message"
2502
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002503requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002504requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2507requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2508requires_gnutls_tls1_3
2509requires_gnutls_next_no_ticket
2510requires_gnutls_next_disable_tls13_compat
2511run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
2512 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002513 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002514 0 \
2515 -s "Protocol is TLSv1.3" \
2516 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2517 -s "received signature algorithm: 0x804" \
2518 -s "got named group: x448(001e)" \
2519 -s "Verifying peer X.509 certificate... ok" \
2520 -c "HTTP/1.0 200 OK" \
2521 -C "received HelloRetryRequest message"
2522
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002523requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002524requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002525requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2527requires_gnutls_tls1_3
2528requires_gnutls_next_no_ticket
2529requires_gnutls_next_disable_tls13_compat
2530run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
2531 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002532 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002533 0 \
2534 -s "Protocol is TLSv1.3" \
2535 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2536 -s "received signature algorithm: 0x403" \
2537 -s "got named group: secp256r1(0017)" \
2538 -s "Verifying peer X.509 certificate... ok" \
2539 -c "HTTP/1.0 200 OK" \
2540 -C "received HelloRetryRequest message"
2541
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002542requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002543requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002544requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2545requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2546requires_gnutls_tls1_3
2547requires_gnutls_next_no_ticket
2548requires_gnutls_next_disable_tls13_compat
2549run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
2550 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002551 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002552 0 \
2553 -s "Protocol is TLSv1.3" \
2554 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2555 -s "received signature algorithm: 0x503" \
2556 -s "got named group: secp256r1(0017)" \
2557 -s "Verifying peer X.509 certificate... ok" \
2558 -c "HTTP/1.0 200 OK" \
2559 -C "received HelloRetryRequest message"
2560
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002561requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2565requires_gnutls_tls1_3
2566requires_gnutls_next_no_ticket
2567requires_gnutls_next_disable_tls13_compat
2568run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
2569 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002570 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002571 0 \
2572 -s "Protocol is TLSv1.3" \
2573 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2574 -s "received signature algorithm: 0x603" \
2575 -s "got named group: secp256r1(0017)" \
2576 -s "Verifying peer X.509 certificate... ok" \
2577 -c "HTTP/1.0 200 OK" \
2578 -C "received HelloRetryRequest message"
2579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2584requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2585requires_gnutls_tls1_3
2586requires_gnutls_next_no_ticket
2587requires_gnutls_next_disable_tls13_compat
2588run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
2589 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002590 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002591 0 \
2592 -s "Protocol is TLSv1.3" \
2593 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2594 -s "received signature algorithm: 0x804" \
2595 -s "got named group: secp256r1(0017)" \
2596 -s "Verifying peer X.509 certificate... ok" \
2597 -c "HTTP/1.0 200 OK" \
2598 -C "received HelloRetryRequest message"
2599
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002600requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002601requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002602requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2604requires_gnutls_tls1_3
2605requires_gnutls_next_no_ticket
2606requires_gnutls_next_disable_tls13_compat
2607run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
2608 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002609 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002610 0 \
2611 -s "Protocol is TLSv1.3" \
2612 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2613 -s "received signature algorithm: 0x403" \
2614 -s "got named group: secp384r1(0018)" \
2615 -s "Verifying peer X.509 certificate... ok" \
2616 -c "HTTP/1.0 200 OK" \
2617 -C "received HelloRetryRequest message"
2618
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002619requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002620requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002621requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2622requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2623requires_gnutls_tls1_3
2624requires_gnutls_next_no_ticket
2625requires_gnutls_next_disable_tls13_compat
2626run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
2627 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002628 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002629 0 \
2630 -s "Protocol is TLSv1.3" \
2631 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2632 -s "received signature algorithm: 0x503" \
2633 -s "got named group: secp384r1(0018)" \
2634 -s "Verifying peer X.509 certificate... ok" \
2635 -c "HTTP/1.0 200 OK" \
2636 -C "received HelloRetryRequest message"
2637
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002638requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002639requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2641requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2642requires_gnutls_tls1_3
2643requires_gnutls_next_no_ticket
2644requires_gnutls_next_disable_tls13_compat
2645run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
2646 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002647 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002648 0 \
2649 -s "Protocol is TLSv1.3" \
2650 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2651 -s "received signature algorithm: 0x603" \
2652 -s "got named group: secp384r1(0018)" \
2653 -s "Verifying peer X.509 certificate... ok" \
2654 -c "HTTP/1.0 200 OK" \
2655 -C "received HelloRetryRequest message"
2656
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002657requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002658requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2661requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2662requires_gnutls_tls1_3
2663requires_gnutls_next_no_ticket
2664requires_gnutls_next_disable_tls13_compat
2665run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
2666 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002667 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002668 0 \
2669 -s "Protocol is TLSv1.3" \
2670 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2671 -s "received signature algorithm: 0x804" \
2672 -s "got named group: secp384r1(0018)" \
2673 -s "Verifying peer X.509 certificate... ok" \
2674 -c "HTTP/1.0 200 OK" \
2675 -C "received HelloRetryRequest message"
2676
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002677requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002678requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002679requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2680requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2681requires_gnutls_tls1_3
2682requires_gnutls_next_no_ticket
2683requires_gnutls_next_disable_tls13_compat
2684run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
2685 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002686 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002687 0 \
2688 -s "Protocol is TLSv1.3" \
2689 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2690 -s "received signature algorithm: 0x403" \
2691 -s "got named group: secp521r1(0019)" \
2692 -s "Verifying peer X.509 certificate... ok" \
2693 -c "HTTP/1.0 200 OK" \
2694 -C "received HelloRetryRequest message"
2695
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002696requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002697requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2700requires_gnutls_tls1_3
2701requires_gnutls_next_no_ticket
2702requires_gnutls_next_disable_tls13_compat
2703run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
2704 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002705 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002706 0 \
2707 -s "Protocol is TLSv1.3" \
2708 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2709 -s "received signature algorithm: 0x503" \
2710 -s "got named group: secp521r1(0019)" \
2711 -s "Verifying peer X.509 certificate... ok" \
2712 -c "HTTP/1.0 200 OK" \
2713 -C "received HelloRetryRequest message"
2714
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002715requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002716requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2718requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2719requires_gnutls_tls1_3
2720requires_gnutls_next_no_ticket
2721requires_gnutls_next_disable_tls13_compat
2722run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
2723 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002724 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002725 0 \
2726 -s "Protocol is TLSv1.3" \
2727 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2728 -s "received signature algorithm: 0x603" \
2729 -s "got named group: secp521r1(0019)" \
2730 -s "Verifying peer X.509 certificate... ok" \
2731 -c "HTTP/1.0 200 OK" \
2732 -C "received HelloRetryRequest message"
2733
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002734requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002735requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002736requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2738requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2739requires_gnutls_tls1_3
2740requires_gnutls_next_no_ticket
2741requires_gnutls_next_disable_tls13_compat
2742run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
2743 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002744 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002745 0 \
2746 -s "Protocol is TLSv1.3" \
2747 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2748 -s "received signature algorithm: 0x804" \
2749 -s "got named group: secp521r1(0019)" \
2750 -s "Verifying peer X.509 certificate... ok" \
2751 -c "HTTP/1.0 200 OK" \
2752 -C "received HelloRetryRequest message"
2753
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002754requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002755requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002756requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2757requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2758requires_gnutls_tls1_3
2759requires_gnutls_next_no_ticket
2760requires_gnutls_next_disable_tls13_compat
2761run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
2762 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002763 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002764 0 \
2765 -s "Protocol is TLSv1.3" \
2766 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2767 -s "received signature algorithm: 0x403" \
2768 -s "got named group: x25519(001d)" \
2769 -s "Verifying peer X.509 certificate... ok" \
2770 -c "HTTP/1.0 200 OK" \
2771 -C "received HelloRetryRequest message"
2772
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002773requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002774requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002775requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2777requires_gnutls_tls1_3
2778requires_gnutls_next_no_ticket
2779requires_gnutls_next_disable_tls13_compat
2780run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
2781 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002782 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002783 0 \
2784 -s "Protocol is TLSv1.3" \
2785 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2786 -s "received signature algorithm: 0x503" \
2787 -s "got named group: x25519(001d)" \
2788 -s "Verifying peer X.509 certificate... ok" \
2789 -c "HTTP/1.0 200 OK" \
2790 -C "received HelloRetryRequest message"
2791
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002792requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002793requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2796requires_gnutls_tls1_3
2797requires_gnutls_next_no_ticket
2798requires_gnutls_next_disable_tls13_compat
2799run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
2800 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002801 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002802 0 \
2803 -s "Protocol is TLSv1.3" \
2804 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2805 -s "received signature algorithm: 0x603" \
2806 -s "got named group: x25519(001d)" \
2807 -s "Verifying peer X.509 certificate... ok" \
2808 -c "HTTP/1.0 200 OK" \
2809 -C "received HelloRetryRequest message"
2810
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002811requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002812requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2815requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2816requires_gnutls_tls1_3
2817requires_gnutls_next_no_ticket
2818requires_gnutls_next_disable_tls13_compat
2819run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
2820 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002821 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002822 0 \
2823 -s "Protocol is TLSv1.3" \
2824 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2825 -s "received signature algorithm: 0x804" \
2826 -s "got named group: x25519(001d)" \
2827 -s "Verifying peer X.509 certificate... ok" \
2828 -c "HTTP/1.0 200 OK" \
2829 -C "received HelloRetryRequest message"
2830
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002831requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002832requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002833requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2834requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2835requires_gnutls_tls1_3
2836requires_gnutls_next_no_ticket
2837requires_gnutls_next_disable_tls13_compat
2838run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
2839 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002840 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002841 0 \
2842 -s "Protocol is TLSv1.3" \
2843 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2844 -s "received signature algorithm: 0x403" \
2845 -s "got named group: x448(001e)" \
2846 -s "Verifying peer X.509 certificate... ok" \
2847 -c "HTTP/1.0 200 OK" \
2848 -C "received HelloRetryRequest message"
2849
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002850requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002851requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2854requires_gnutls_tls1_3
2855requires_gnutls_next_no_ticket
2856requires_gnutls_next_disable_tls13_compat
2857run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
2858 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002859 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002860 0 \
2861 -s "Protocol is TLSv1.3" \
2862 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2863 -s "received signature algorithm: 0x503" \
2864 -s "got named group: x448(001e)" \
2865 -s "Verifying peer X.509 certificate... ok" \
2866 -c "HTTP/1.0 200 OK" \
2867 -C "received HelloRetryRequest message"
2868
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002869requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002870requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2873requires_gnutls_tls1_3
2874requires_gnutls_next_no_ticket
2875requires_gnutls_next_disable_tls13_compat
2876run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
2877 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002878 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002879 0 \
2880 -s "Protocol is TLSv1.3" \
2881 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2882 -s "received signature algorithm: 0x603" \
2883 -s "got named group: x448(001e)" \
2884 -s "Verifying peer X.509 certificate... ok" \
2885 -c "HTTP/1.0 200 OK" \
2886 -C "received HelloRetryRequest message"
2887
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002888requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002889requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002890requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2892requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2893requires_gnutls_tls1_3
2894requires_gnutls_next_no_ticket
2895requires_gnutls_next_disable_tls13_compat
2896run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
2897 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002898 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002899 0 \
2900 -s "Protocol is TLSv1.3" \
2901 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2902 -s "received signature algorithm: 0x804" \
2903 -s "got named group: x448(001e)" \
2904 -s "Verifying peer X.509 certificate... ok" \
2905 -c "HTTP/1.0 200 OK" \
2906 -C "received HelloRetryRequest message"
2907
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002908requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002909requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002910requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2911requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2912requires_gnutls_tls1_3
2913requires_gnutls_next_no_ticket
2914requires_gnutls_next_disable_tls13_compat
2915run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
2916 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002917 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002918 0 \
2919 -s "Protocol is TLSv1.3" \
2920 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2921 -s "received signature algorithm: 0x403" \
2922 -s "got named group: secp256r1(0017)" \
2923 -s "Verifying peer X.509 certificate... ok" \
2924 -c "HTTP/1.0 200 OK" \
2925 -C "received HelloRetryRequest message"
2926
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002927requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002928requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002929requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2931requires_gnutls_tls1_3
2932requires_gnutls_next_no_ticket
2933requires_gnutls_next_disable_tls13_compat
2934run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
2935 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002936 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002937 0 \
2938 -s "Protocol is TLSv1.3" \
2939 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2940 -s "received signature algorithm: 0x503" \
2941 -s "got named group: secp256r1(0017)" \
2942 -s "Verifying peer X.509 certificate... ok" \
2943 -c "HTTP/1.0 200 OK" \
2944 -C "received HelloRetryRequest message"
2945
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002946requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002947requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002948requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2950requires_gnutls_tls1_3
2951requires_gnutls_next_no_ticket
2952requires_gnutls_next_disable_tls13_compat
2953run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
2954 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002955 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002956 0 \
2957 -s "Protocol is TLSv1.3" \
2958 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2959 -s "received signature algorithm: 0x603" \
2960 -s "got named group: secp256r1(0017)" \
2961 -s "Verifying peer X.509 certificate... ok" \
2962 -c "HTTP/1.0 200 OK" \
2963 -C "received HelloRetryRequest message"
2964
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002965requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002966requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002967requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2969requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2970requires_gnutls_tls1_3
2971requires_gnutls_next_no_ticket
2972requires_gnutls_next_disable_tls13_compat
2973run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
2974 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002975 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002976 0 \
2977 -s "Protocol is TLSv1.3" \
2978 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2979 -s "received signature algorithm: 0x804" \
2980 -s "got named group: secp256r1(0017)" \
2981 -s "Verifying peer X.509 certificate... ok" \
2982 -c "HTTP/1.0 200 OK" \
2983 -C "received HelloRetryRequest message"
2984
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002985requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002986requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2989requires_gnutls_tls1_3
2990requires_gnutls_next_no_ticket
2991requires_gnutls_next_disable_tls13_compat
2992run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
2993 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002994 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002995 0 \
2996 -s "Protocol is TLSv1.3" \
2997 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2998 -s "received signature algorithm: 0x403" \
2999 -s "got named group: secp384r1(0018)" \
3000 -s "Verifying peer X.509 certificate... ok" \
3001 -c "HTTP/1.0 200 OK" \
3002 -C "received HelloRetryRequest message"
3003
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003004requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003005requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3007requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3008requires_gnutls_tls1_3
3009requires_gnutls_next_no_ticket
3010requires_gnutls_next_disable_tls13_compat
3011run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3012 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003013 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003014 0 \
3015 -s "Protocol is TLSv1.3" \
3016 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3017 -s "received signature algorithm: 0x503" \
3018 -s "got named group: secp384r1(0018)" \
3019 -s "Verifying peer X.509 certificate... ok" \
3020 -c "HTTP/1.0 200 OK" \
3021 -C "received HelloRetryRequest message"
3022
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003023requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003024requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3027requires_gnutls_tls1_3
3028requires_gnutls_next_no_ticket
3029requires_gnutls_next_disable_tls13_compat
3030run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3031 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003032 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003033 0 \
3034 -s "Protocol is TLSv1.3" \
3035 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3036 -s "received signature algorithm: 0x603" \
3037 -s "got named group: secp384r1(0018)" \
3038 -s "Verifying peer X.509 certificate... ok" \
3039 -c "HTTP/1.0 200 OK" \
3040 -C "received HelloRetryRequest message"
3041
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003042requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3046requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3047requires_gnutls_tls1_3
3048requires_gnutls_next_no_ticket
3049requires_gnutls_next_disable_tls13_compat
3050run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3051 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003052 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003053 0 \
3054 -s "Protocol is TLSv1.3" \
3055 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3056 -s "received signature algorithm: 0x804" \
3057 -s "got named group: secp384r1(0018)" \
3058 -s "Verifying peer X.509 certificate... ok" \
3059 -c "HTTP/1.0 200 OK" \
3060 -C "received HelloRetryRequest message"
3061
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3066requires_gnutls_tls1_3
3067requires_gnutls_next_no_ticket
3068requires_gnutls_next_disable_tls13_compat
3069run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3070 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003071 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003072 0 \
3073 -s "Protocol is TLSv1.3" \
3074 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3075 -s "received signature algorithm: 0x403" \
3076 -s "got named group: secp521r1(0019)" \
3077 -s "Verifying peer X.509 certificate... ok" \
3078 -c "HTTP/1.0 200 OK" \
3079 -C "received HelloRetryRequest message"
3080
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003081requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003082requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003083requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3085requires_gnutls_tls1_3
3086requires_gnutls_next_no_ticket
3087requires_gnutls_next_disable_tls13_compat
3088run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3089 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003090 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003091 0 \
3092 -s "Protocol is TLSv1.3" \
3093 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3094 -s "received signature algorithm: 0x503" \
3095 -s "got named group: secp521r1(0019)" \
3096 -s "Verifying peer X.509 certificate... ok" \
3097 -c "HTTP/1.0 200 OK" \
3098 -C "received HelloRetryRequest message"
3099
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003100requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003101requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3104requires_gnutls_tls1_3
3105requires_gnutls_next_no_ticket
3106requires_gnutls_next_disable_tls13_compat
3107run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3108 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003109 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003110 0 \
3111 -s "Protocol is TLSv1.3" \
3112 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3113 -s "received signature algorithm: 0x603" \
3114 -s "got named group: secp521r1(0019)" \
3115 -s "Verifying peer X.509 certificate... ok" \
3116 -c "HTTP/1.0 200 OK" \
3117 -C "received HelloRetryRequest message"
3118
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003119requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003120requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3123requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3124requires_gnutls_tls1_3
3125requires_gnutls_next_no_ticket
3126requires_gnutls_next_disable_tls13_compat
3127run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3128 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003129 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003130 0 \
3131 -s "Protocol is TLSv1.3" \
3132 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3133 -s "received signature algorithm: 0x804" \
3134 -s "got named group: secp521r1(0019)" \
3135 -s "Verifying peer X.509 certificate... ok" \
3136 -c "HTTP/1.0 200 OK" \
3137 -C "received HelloRetryRequest message"
3138
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003139requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003140requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003141requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3142requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3143requires_gnutls_tls1_3
3144requires_gnutls_next_no_ticket
3145requires_gnutls_next_disable_tls13_compat
3146run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
3147 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003148 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003149 0 \
3150 -s "Protocol is TLSv1.3" \
3151 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3152 -s "received signature algorithm: 0x403" \
3153 -s "got named group: x25519(001d)" \
3154 -s "Verifying peer X.509 certificate... ok" \
3155 -c "HTTP/1.0 200 OK" \
3156 -C "received HelloRetryRequest message"
3157
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003158requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003159requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003160requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3161requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3162requires_gnutls_tls1_3
3163requires_gnutls_next_no_ticket
3164requires_gnutls_next_disable_tls13_compat
3165run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
3166 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003167 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003168 0 \
3169 -s "Protocol is TLSv1.3" \
3170 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3171 -s "received signature algorithm: 0x503" \
3172 -s "got named group: x25519(001d)" \
3173 -s "Verifying peer X.509 certificate... ok" \
3174 -c "HTTP/1.0 200 OK" \
3175 -C "received HelloRetryRequest message"
3176
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003177requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003178requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003179requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3181requires_gnutls_tls1_3
3182requires_gnutls_next_no_ticket
3183requires_gnutls_next_disable_tls13_compat
3184run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
3185 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003186 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003187 0 \
3188 -s "Protocol is TLSv1.3" \
3189 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3190 -s "received signature algorithm: 0x603" \
3191 -s "got named group: x25519(001d)" \
3192 -s "Verifying peer X.509 certificate... ok" \
3193 -c "HTTP/1.0 200 OK" \
3194 -C "received HelloRetryRequest message"
3195
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003196requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003197requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3200requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3201requires_gnutls_tls1_3
3202requires_gnutls_next_no_ticket
3203requires_gnutls_next_disable_tls13_compat
3204run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
3205 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003206 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003207 0 \
3208 -s "Protocol is TLSv1.3" \
3209 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3210 -s "received signature algorithm: 0x804" \
3211 -s "got named group: x25519(001d)" \
3212 -s "Verifying peer X.509 certificate... ok" \
3213 -c "HTTP/1.0 200 OK" \
3214 -C "received HelloRetryRequest message"
3215
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003216requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003217requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003218requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3219requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3220requires_gnutls_tls1_3
3221requires_gnutls_next_no_ticket
3222requires_gnutls_next_disable_tls13_compat
3223run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
3224 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003225 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003226 0 \
3227 -s "Protocol is TLSv1.3" \
3228 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3229 -s "received signature algorithm: 0x403" \
3230 -s "got named group: x448(001e)" \
3231 -s "Verifying peer X.509 certificate... ok" \
3232 -c "HTTP/1.0 200 OK" \
3233 -C "received HelloRetryRequest message"
3234
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003235requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003236requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003237requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3239requires_gnutls_tls1_3
3240requires_gnutls_next_no_ticket
3241requires_gnutls_next_disable_tls13_compat
3242run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
3243 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003244 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003245 0 \
3246 -s "Protocol is TLSv1.3" \
3247 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3248 -s "received signature algorithm: 0x503" \
3249 -s "got named group: x448(001e)" \
3250 -s "Verifying peer X.509 certificate... ok" \
3251 -c "HTTP/1.0 200 OK" \
3252 -C "received HelloRetryRequest message"
3253
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003254requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003255requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3258requires_gnutls_tls1_3
3259requires_gnutls_next_no_ticket
3260requires_gnutls_next_disable_tls13_compat
3261run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
3262 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003263 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003264 0 \
3265 -s "Protocol is TLSv1.3" \
3266 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3267 -s "received signature algorithm: 0x603" \
3268 -s "got named group: x448(001e)" \
3269 -s "Verifying peer X.509 certificate... ok" \
3270 -c "HTTP/1.0 200 OK" \
3271 -C "received HelloRetryRequest message"
3272
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003273requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003274requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3277requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3278requires_gnutls_tls1_3
3279requires_gnutls_next_no_ticket
3280requires_gnutls_next_disable_tls13_compat
3281run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
3282 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003283 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003284 0 \
3285 -s "Protocol is TLSv1.3" \
3286 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3287 -s "received signature algorithm: 0x804" \
3288 -s "got named group: x448(001e)" \
3289 -s "Verifying peer X.509 certificate... ok" \
3290 -c "HTTP/1.0 200 OK" \
3291 -C "received HelloRetryRequest message"
3292
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003293requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003294requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003295requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3296requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3297requires_gnutls_tls1_3
3298requires_gnutls_next_no_ticket
3299requires_gnutls_next_disable_tls13_compat
3300run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
3301 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003302 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003303 0 \
3304 -s "Protocol is TLSv1.3" \
3305 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3306 -s "received signature algorithm: 0x403" \
3307 -s "got named group: secp256r1(0017)" \
3308 -s "Verifying peer X.509 certificate... ok" \
3309 -c "HTTP/1.0 200 OK" \
3310 -C "received HelloRetryRequest message"
3311
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003312requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3316requires_gnutls_tls1_3
3317requires_gnutls_next_no_ticket
3318requires_gnutls_next_disable_tls13_compat
3319run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
3320 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003321 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003322 0 \
3323 -s "Protocol is TLSv1.3" \
3324 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3325 -s "received signature algorithm: 0x503" \
3326 -s "got named group: secp256r1(0017)" \
3327 -s "Verifying peer X.509 certificate... ok" \
3328 -c "HTTP/1.0 200 OK" \
3329 -C "received HelloRetryRequest message"
3330
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003331requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003332requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003333requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3334requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3335requires_gnutls_tls1_3
3336requires_gnutls_next_no_ticket
3337requires_gnutls_next_disable_tls13_compat
3338run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
3339 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003340 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003341 0 \
3342 -s "Protocol is TLSv1.3" \
3343 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3344 -s "received signature algorithm: 0x603" \
3345 -s "got named group: secp256r1(0017)" \
3346 -s "Verifying peer X.509 certificate... ok" \
3347 -c "HTTP/1.0 200 OK" \
3348 -C "received HelloRetryRequest message"
3349
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003350requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003351requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003352requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3353requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3354requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3355requires_gnutls_tls1_3
3356requires_gnutls_next_no_ticket
3357requires_gnutls_next_disable_tls13_compat
3358run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
3359 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003360 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003361 0 \
3362 -s "Protocol is TLSv1.3" \
3363 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3364 -s "received signature algorithm: 0x804" \
3365 -s "got named group: secp256r1(0017)" \
3366 -s "Verifying peer X.509 certificate... ok" \
3367 -c "HTTP/1.0 200 OK" \
3368 -C "received HelloRetryRequest message"
3369
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003370requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003371requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003372requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3373requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3374requires_gnutls_tls1_3
3375requires_gnutls_next_no_ticket
3376requires_gnutls_next_disable_tls13_compat
3377run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
3378 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003379 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003380 0 \
3381 -s "Protocol is TLSv1.3" \
3382 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3383 -s "received signature algorithm: 0x403" \
3384 -s "got named group: secp384r1(0018)" \
3385 -s "Verifying peer X.509 certificate... ok" \
3386 -c "HTTP/1.0 200 OK" \
3387 -C "received HelloRetryRequest message"
3388
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003389requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003390requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003391requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3393requires_gnutls_tls1_3
3394requires_gnutls_next_no_ticket
3395requires_gnutls_next_disable_tls13_compat
3396run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3397 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003398 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003399 0 \
3400 -s "Protocol is TLSv1.3" \
3401 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3402 -s "received signature algorithm: 0x503" \
3403 -s "got named group: secp384r1(0018)" \
3404 -s "Verifying peer X.509 certificate... ok" \
3405 -c "HTTP/1.0 200 OK" \
3406 -C "received HelloRetryRequest message"
3407
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003408requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003409requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3412requires_gnutls_tls1_3
3413requires_gnutls_next_no_ticket
3414requires_gnutls_next_disable_tls13_compat
3415run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3416 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003417 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003418 0 \
3419 -s "Protocol is TLSv1.3" \
3420 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3421 -s "received signature algorithm: 0x603" \
3422 -s "got named group: secp384r1(0018)" \
3423 -s "Verifying peer X.509 certificate... ok" \
3424 -c "HTTP/1.0 200 OK" \
3425 -C "received HelloRetryRequest message"
3426
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003427requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003428requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003429requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3431requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3432requires_gnutls_tls1_3
3433requires_gnutls_next_no_ticket
3434requires_gnutls_next_disable_tls13_compat
3435run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3436 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003437 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003438 0 \
3439 -s "Protocol is TLSv1.3" \
3440 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3441 -s "received signature algorithm: 0x804" \
3442 -s "got named group: secp384r1(0018)" \
3443 -s "Verifying peer X.509 certificate... ok" \
3444 -c "HTTP/1.0 200 OK" \
3445 -C "received HelloRetryRequest message"
3446
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003447requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003448requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003449requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3450requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3451requires_gnutls_tls1_3
3452requires_gnutls_next_no_ticket
3453requires_gnutls_next_disable_tls13_compat
3454run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3455 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003456 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003457 0 \
3458 -s "Protocol is TLSv1.3" \
3459 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3460 -s "received signature algorithm: 0x403" \
3461 -s "got named group: secp521r1(0019)" \
3462 -s "Verifying peer X.509 certificate... ok" \
3463 -c "HTTP/1.0 200 OK" \
3464 -C "received HelloRetryRequest message"
3465
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003466requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003467requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003468requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3469requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3470requires_gnutls_tls1_3
3471requires_gnutls_next_no_ticket
3472requires_gnutls_next_disable_tls13_compat
3473run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3474 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003475 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003476 0 \
3477 -s "Protocol is TLSv1.3" \
3478 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3479 -s "received signature algorithm: 0x503" \
3480 -s "got named group: secp521r1(0019)" \
3481 -s "Verifying peer X.509 certificate... ok" \
3482 -c "HTTP/1.0 200 OK" \
3483 -C "received HelloRetryRequest message"
3484
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003485requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003486requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003487requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3489requires_gnutls_tls1_3
3490requires_gnutls_next_no_ticket
3491requires_gnutls_next_disable_tls13_compat
3492run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3493 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003494 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003495 0 \
3496 -s "Protocol is TLSv1.3" \
3497 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3498 -s "received signature algorithm: 0x603" \
3499 -s "got named group: secp521r1(0019)" \
3500 -s "Verifying peer X.509 certificate... ok" \
3501 -c "HTTP/1.0 200 OK" \
3502 -C "received HelloRetryRequest message"
3503
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003504requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3508requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3509requires_gnutls_tls1_3
3510requires_gnutls_next_no_ticket
3511requires_gnutls_next_disable_tls13_compat
3512run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3513 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003514 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003515 0 \
3516 -s "Protocol is TLSv1.3" \
3517 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3518 -s "received signature algorithm: 0x804" \
3519 -s "got named group: secp521r1(0019)" \
3520 -s "Verifying peer X.509 certificate... ok" \
3521 -c "HTTP/1.0 200 OK" \
3522 -C "received HelloRetryRequest message"
3523
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003524requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003525requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3528requires_gnutls_tls1_3
3529requires_gnutls_next_no_ticket
3530requires_gnutls_next_disable_tls13_compat
3531run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
3532 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003533 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003534 0 \
3535 -s "Protocol is TLSv1.3" \
3536 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3537 -s "received signature algorithm: 0x403" \
3538 -s "got named group: x25519(001d)" \
3539 -s "Verifying peer X.509 certificate... ok" \
3540 -c "HTTP/1.0 200 OK" \
3541 -C "received HelloRetryRequest message"
3542
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003543requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003544requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003545requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3547requires_gnutls_tls1_3
3548requires_gnutls_next_no_ticket
3549requires_gnutls_next_disable_tls13_compat
3550run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
3551 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003552 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003553 0 \
3554 -s "Protocol is TLSv1.3" \
3555 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3556 -s "received signature algorithm: 0x503" \
3557 -s "got named group: x25519(001d)" \
3558 -s "Verifying peer X.509 certificate... ok" \
3559 -c "HTTP/1.0 200 OK" \
3560 -C "received HelloRetryRequest message"
3561
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003562requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003563requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3566requires_gnutls_tls1_3
3567requires_gnutls_next_no_ticket
3568requires_gnutls_next_disable_tls13_compat
3569run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
3570 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003571 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003572 0 \
3573 -s "Protocol is TLSv1.3" \
3574 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3575 -s "received signature algorithm: 0x603" \
3576 -s "got named group: x25519(001d)" \
3577 -s "Verifying peer X.509 certificate... ok" \
3578 -c "HTTP/1.0 200 OK" \
3579 -C "received HelloRetryRequest message"
3580
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003581requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003582requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003583requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3585requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3586requires_gnutls_tls1_3
3587requires_gnutls_next_no_ticket
3588requires_gnutls_next_disable_tls13_compat
3589run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
3590 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003591 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003592 0 \
3593 -s "Protocol is TLSv1.3" \
3594 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3595 -s "received signature algorithm: 0x804" \
3596 -s "got named group: x25519(001d)" \
3597 -s "Verifying peer X.509 certificate... ok" \
3598 -c "HTTP/1.0 200 OK" \
3599 -C "received HelloRetryRequest message"
3600
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003601requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003602requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003603requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3605requires_gnutls_tls1_3
3606requires_gnutls_next_no_ticket
3607requires_gnutls_next_disable_tls13_compat
3608run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
3609 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003610 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003611 0 \
3612 -s "Protocol is TLSv1.3" \
3613 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3614 -s "received signature algorithm: 0x403" \
3615 -s "got named group: x448(001e)" \
3616 -s "Verifying peer X.509 certificate... ok" \
3617 -c "HTTP/1.0 200 OK" \
3618 -C "received HelloRetryRequest message"
3619
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003621requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3624requires_gnutls_tls1_3
3625requires_gnutls_next_no_ticket
3626requires_gnutls_next_disable_tls13_compat
3627run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
3628 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003629 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003630 0 \
3631 -s "Protocol is TLSv1.3" \
3632 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3633 -s "received signature algorithm: 0x503" \
3634 -s "got named group: x448(001e)" \
3635 -s "Verifying peer X.509 certificate... ok" \
3636 -c "HTTP/1.0 200 OK" \
3637 -C "received HelloRetryRequest message"
3638
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003639requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003640requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003641requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3642requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3643requires_gnutls_tls1_3
3644requires_gnutls_next_no_ticket
3645requires_gnutls_next_disable_tls13_compat
3646run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
3647 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003648 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003649 0 \
3650 -s "Protocol is TLSv1.3" \
3651 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3652 -s "received signature algorithm: 0x603" \
3653 -s "got named group: x448(001e)" \
3654 -s "Verifying peer X.509 certificate... ok" \
3655 -c "HTTP/1.0 200 OK" \
3656 -C "received HelloRetryRequest message"
3657
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003658requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003659requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003660requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3661requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3662requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3663requires_gnutls_tls1_3
3664requires_gnutls_next_no_ticket
3665requires_gnutls_next_disable_tls13_compat
3666run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
3667 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003668 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca_cat12.crt" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003669 0 \
3670 -s "Protocol is TLSv1.3" \
3671 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3672 -s "received signature algorithm: 0x804" \
3673 -s "got named group: x448(001e)" \
3674 -s "Verifying peer X.509 certificate... ok" \
3675 -c "HTTP/1.0 200 OK" \
3676 -C "received HelloRetryRequest message"
3677
Jerry Yu31018ad2021-11-26 20:36:17 +08003678requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003679requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003680requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003683run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003684 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003685 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003686 0 \
3687 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003688 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003689 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3690 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003691 -c "NamedGroup: secp256r1 ( 17 )" \
3692 -c "Verifying peer X.509 certificate... ok" \
3693 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003694
Jerry Yu31018ad2021-11-26 20:36:17 +08003695requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003696requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003697requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003700run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003701 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003702 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003703 0 \
3704 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003705 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003706 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3707 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003708 -c "NamedGroup: secp256r1 ( 17 )" \
3709 -c "Verifying peer X.509 certificate... ok" \
3710 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003711
Jerry Yu31018ad2021-11-26 20:36:17 +08003712requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003713requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003714requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003715requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003716requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003717run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003718 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003719 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003720 0 \
3721 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003722 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003723 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3724 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003725 -c "NamedGroup: secp256r1 ( 17 )" \
3726 -c "Verifying peer X.509 certificate... ok" \
3727 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003728
Jerry Yu31018ad2021-11-26 20:36:17 +08003729requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003730requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003731requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003732requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003733requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003734requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003735run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003736 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003737 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003738 0 \
3739 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003740 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003741 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3742 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003743 -c "NamedGroup: secp256r1 ( 17 )" \
3744 -c "Verifying peer X.509 certificate... ok" \
3745 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003746
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003747requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003748requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003749requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003752run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003753 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003755 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003756 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003757 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003758 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003759 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3760 -c "NamedGroup: secp384r1 ( 18 )" \
3761 -c "Verifying peer X.509 certificate... ok" \
3762 -C "received HelloRetryRequest message"
3763
3764requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003765requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003766requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003767requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3769run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003770 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003771 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
3772 0 \
3773 -c "HTTP/1.0 200 ok" \
3774 -c "Protocol is TLSv1.3" \
3775 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3776 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3777 -c "NamedGroup: secp384r1 ( 18 )" \
3778 -c "Verifying peer X.509 certificate... ok" \
3779 -C "received HelloRetryRequest message"
3780
3781requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003782requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003783requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003784requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3785requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3786run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003787 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003788 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
3789 0 \
3790 -c "HTTP/1.0 200 ok" \
3791 -c "Protocol is TLSv1.3" \
3792 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3793 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3794 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003795 -c "Verifying peer X.509 certificate... ok" \
3796 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003797
Jerry Yu31018ad2021-11-26 20:36:17 +08003798requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003799requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003800requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003801requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003803requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003804run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003805 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003806 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003807 0 \
3808 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003809 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003810 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3811 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003812 -c "NamedGroup: secp384r1 ( 18 )" \
3813 -c "Verifying peer X.509 certificate... ok" \
3814 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003815
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003816requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003817requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003818requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003821run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003822 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003823 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003824 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003825 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003826 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003827 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003828 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3829 -c "NamedGroup: secp521r1 ( 19 )" \
3830 -c "Verifying peer X.509 certificate... ok" \
3831 -C "received HelloRetryRequest message"
3832
3833requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003834requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003835requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003836requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3838run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003839 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003840 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
3841 0 \
3842 -c "HTTP/1.0 200 ok" \
3843 -c "Protocol is TLSv1.3" \
3844 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3845 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3846 -c "NamedGroup: secp521r1 ( 19 )" \
3847 -c "Verifying peer X.509 certificate... ok" \
3848 -C "received HelloRetryRequest message"
3849
3850requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003851requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003852requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003853requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3855run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003856 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003857 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
3858 0 \
3859 -c "HTTP/1.0 200 ok" \
3860 -c "Protocol is TLSv1.3" \
3861 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3862 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3863 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003864 -c "Verifying peer X.509 certificate... ok" \
3865 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003866
Jerry Yu31018ad2021-11-26 20:36:17 +08003867requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003868requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003869requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003872requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003873run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003874 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003876 0 \
3877 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003878 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003879 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3880 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003881 -c "NamedGroup: secp521r1 ( 19 )" \
3882 -c "Verifying peer X.509 certificate... ok" \
3883 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003884
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003885requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003886requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003887requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003890run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003891 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003892 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003893 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003894 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003895 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003896 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003897 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3898 -c "NamedGroup: x25519 ( 1d )" \
3899 -c "Verifying peer X.509 certificate... ok" \
3900 -C "received HelloRetryRequest message"
3901
3902requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003903requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003904requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3906requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3907run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003908 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003909 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
3910 0 \
3911 -c "HTTP/1.0 200 ok" \
3912 -c "Protocol is TLSv1.3" \
3913 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3914 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3915 -c "NamedGroup: x25519 ( 1d )" \
3916 -c "Verifying peer X.509 certificate... ok" \
3917 -C "received HelloRetryRequest message"
3918
3919requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003920requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003921requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3924run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003925 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003926 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
3927 0 \
3928 -c "HTTP/1.0 200 ok" \
3929 -c "Protocol is TLSv1.3" \
3930 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3931 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3932 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003933 -c "Verifying peer X.509 certificate... ok" \
3934 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003935
Jerry Yu31018ad2021-11-26 20:36:17 +08003936requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003937requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003938requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003939requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003940requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003941requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003942run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003943 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003944 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003945 0 \
3946 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003947 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003948 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3949 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003950 -c "NamedGroup: x25519 ( 1d )" \
3951 -c "Verifying peer X.509 certificate... ok" \
3952 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003953
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003954requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003955requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003956requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003957requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003959run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003960 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003961 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003962 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003963 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003964 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003965 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003966 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3967 -c "NamedGroup: x448 ( 1e )" \
3968 -c "Verifying peer X.509 certificate... ok" \
3969 -C "received HelloRetryRequest message"
3970
3971requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003972requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003973requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003974requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3976run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003977 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003978 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
3979 0 \
3980 -c "HTTP/1.0 200 ok" \
3981 -c "Protocol is TLSv1.3" \
3982 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3983 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3984 -c "NamedGroup: x448 ( 1e )" \
3985 -c "Verifying peer X.509 certificate... ok" \
3986 -C "received HelloRetryRequest message"
3987
3988requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003989requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003990requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003991requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3992requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3993run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003994 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003995 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
3996 0 \
3997 -c "HTTP/1.0 200 ok" \
3998 -c "Protocol is TLSv1.3" \
3999 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4000 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4001 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004002 -c "Verifying peer X.509 certificate... ok" \
4003 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004004
Jerry Yu31018ad2021-11-26 20:36:17 +08004005requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004006requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004007requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004008requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004009requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004010requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004011run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004012 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004013 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004014 0 \
4015 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004016 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004017 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4018 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004019 -c "NamedGroup: x448 ( 1e )" \
4020 -c "Verifying peer X.509 certificate... ok" \
4021 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004022
Jerry Yu31018ad2021-11-26 20:36:17 +08004023requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004024requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004025requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004026requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004028run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004029 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004030 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004031 0 \
4032 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004033 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004034 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4035 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004036 -c "NamedGroup: secp256r1 ( 17 )" \
4037 -c "Verifying peer X.509 certificate... ok" \
4038 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004039
Jerry Yu31018ad2021-11-26 20:36:17 +08004040requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004041requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004042requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004045run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004046 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004047 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004048 0 \
4049 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004050 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004051 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4052 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004053 -c "NamedGroup: secp256r1 ( 17 )" \
4054 -c "Verifying peer X.509 certificate... ok" \
4055 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004056
Jerry Yu31018ad2021-11-26 20:36:17 +08004057requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004058requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004059requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004062run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004063 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004064 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004065 0 \
4066 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004067 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004068 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4069 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004070 -c "NamedGroup: secp256r1 ( 17 )" \
4071 -c "Verifying peer X.509 certificate... ok" \
4072 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004073
Jerry Yu31018ad2021-11-26 20:36:17 +08004074requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004075requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004076requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004077requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004078requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004079requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004080run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004081 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004082 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004083 0 \
4084 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004085 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004086 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4087 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004088 -c "NamedGroup: secp256r1 ( 17 )" \
4089 -c "Verifying peer X.509 certificate... ok" \
4090 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004091
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004092requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004093requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004094requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004097run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004098 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004099 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004100 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004101 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004102 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004103 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004104 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4105 -c "NamedGroup: secp384r1 ( 18 )" \
4106 -c "Verifying peer X.509 certificate... ok" \
4107 -C "received HelloRetryRequest message"
4108
4109requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004110requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004111requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4113requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4114run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004115 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004116 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4117 0 \
4118 -c "HTTP/1.0 200 ok" \
4119 -c "Protocol is TLSv1.3" \
4120 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4121 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4122 -c "NamedGroup: secp384r1 ( 18 )" \
4123 -c "Verifying peer X.509 certificate... ok" \
4124 -C "received HelloRetryRequest message"
4125
4126requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004127requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004128requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004129requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4130requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4131run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004132 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004133 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4134 0 \
4135 -c "HTTP/1.0 200 ok" \
4136 -c "Protocol is TLSv1.3" \
4137 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4138 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4139 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004140 -c "Verifying peer X.509 certificate... ok" \
4141 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004142
Jerry Yu31018ad2021-11-26 20:36:17 +08004143requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004144requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004145requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004146requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004148requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004149run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004150 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004151 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004152 0 \
4153 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004154 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004155 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4156 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004157 -c "NamedGroup: secp384r1 ( 18 )" \
4158 -c "Verifying peer X.509 certificate... ok" \
4159 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004160
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004161requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004162requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004163requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004164requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004166run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004167 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004168 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004169 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004170 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004171 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004172 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004173 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4174 -c "NamedGroup: secp521r1 ( 19 )" \
4175 -c "Verifying peer X.509 certificate... ok" \
4176 -C "received HelloRetryRequest message"
4177
4178requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004179requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004180requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004181requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4183run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004184 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004185 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4186 0 \
4187 -c "HTTP/1.0 200 ok" \
4188 -c "Protocol is TLSv1.3" \
4189 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4190 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4191 -c "NamedGroup: secp521r1 ( 19 )" \
4192 -c "Verifying peer X.509 certificate... ok" \
4193 -C "received HelloRetryRequest message"
4194
4195requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004196requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004197requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4200run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004201 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004202 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4203 0 \
4204 -c "HTTP/1.0 200 ok" \
4205 -c "Protocol is TLSv1.3" \
4206 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4207 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4208 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004209 -c "Verifying peer X.509 certificate... ok" \
4210 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004211
Jerry Yu31018ad2021-11-26 20:36:17 +08004212requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004213requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004214requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004215requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004216requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004217requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004218run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004219 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004221 0 \
4222 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004223 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004224 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4225 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004226 -c "NamedGroup: secp521r1 ( 19 )" \
4227 -c "Verifying peer X.509 certificate... ok" \
4228 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004229
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004230requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004231requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004232requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004233requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004235run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004236 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004237 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004238 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004239 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004240 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004241 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004242 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4243 -c "NamedGroup: x25519 ( 1d )" \
4244 -c "Verifying peer X.509 certificate... ok" \
4245 -C "received HelloRetryRequest message"
4246
4247requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004248requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004249requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4252run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004253 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004254 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4255 0 \
4256 -c "HTTP/1.0 200 ok" \
4257 -c "Protocol is TLSv1.3" \
4258 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4259 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4260 -c "NamedGroup: x25519 ( 1d )" \
4261 -c "Verifying peer X.509 certificate... ok" \
4262 -C "received HelloRetryRequest message"
4263
4264requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004265requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004266requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004267requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4268requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4269run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004270 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004271 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4272 0 \
4273 -c "HTTP/1.0 200 ok" \
4274 -c "Protocol is TLSv1.3" \
4275 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4276 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4277 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004278 -c "Verifying peer X.509 certificate... ok" \
4279 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004280
Jerry Yu31018ad2021-11-26 20:36:17 +08004281requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004282requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004283requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004287run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004288 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004289 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004290 0 \
4291 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004292 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004293 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4294 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004295 -c "NamedGroup: x25519 ( 1d )" \
4296 -c "Verifying peer X.509 certificate... ok" \
4297 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004298
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004299requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004300requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004301requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004302requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004304run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004305 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004307 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004308 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004309 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004310 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004311 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4312 -c "NamedGroup: x448 ( 1e )" \
4313 -c "Verifying peer X.509 certificate... ok" \
4314 -C "received HelloRetryRequest message"
4315
4316requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004317requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004318requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4321run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004322 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004323 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
4324 0 \
4325 -c "HTTP/1.0 200 ok" \
4326 -c "Protocol is TLSv1.3" \
4327 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4328 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4329 -c "NamedGroup: x448 ( 1e )" \
4330 -c "Verifying peer X.509 certificate... ok" \
4331 -C "received HelloRetryRequest message"
4332
4333requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004334requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004335requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004336requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4337requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4338run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004339 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004340 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
4341 0 \
4342 -c "HTTP/1.0 200 ok" \
4343 -c "Protocol is TLSv1.3" \
4344 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4345 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4346 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004347 -c "Verifying peer X.509 certificate... ok" \
4348 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004349
Jerry Yu31018ad2021-11-26 20:36:17 +08004350requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004351requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004352requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004353requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004354requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004355requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004356run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004357 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004358 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004359 0 \
4360 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004361 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004362 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4363 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004364 -c "NamedGroup: x448 ( 1e )" \
4365 -c "Verifying peer X.509 certificate... ok" \
4366 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004367
Jerry Yu31018ad2021-11-26 20:36:17 +08004368requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004369requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004370requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004373run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004374 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004375 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004376 0 \
4377 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004378 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004379 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4380 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004381 -c "NamedGroup: secp256r1 ( 17 )" \
4382 -c "Verifying peer X.509 certificate... ok" \
4383 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004384
Jerry Yu31018ad2021-11-26 20:36:17 +08004385requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004386requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004387requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004390run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004391 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004392 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004393 0 \
4394 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004395 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004396 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4397 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004398 -c "NamedGroup: secp256r1 ( 17 )" \
4399 -c "Verifying peer X.509 certificate... ok" \
4400 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004401
Jerry Yu31018ad2021-11-26 20:36:17 +08004402requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004403requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004404requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004405requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004406requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004407run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004408 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004409 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004410 0 \
4411 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004412 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004413 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4414 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004415 -c "NamedGroup: secp256r1 ( 17 )" \
4416 -c "Verifying peer X.509 certificate... ok" \
4417 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004418
Jerry Yu31018ad2021-11-26 20:36:17 +08004419requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004420requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004421requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004422requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004423requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004424requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004425run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004426 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004427 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004428 0 \
4429 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004430 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004431 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4432 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004433 -c "NamedGroup: secp256r1 ( 17 )" \
4434 -c "Verifying peer X.509 certificate... ok" \
4435 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004436
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004437requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004438requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004439requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004440requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004442run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004443 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004444 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004445 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004446 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004447 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004448 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004449 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4450 -c "NamedGroup: secp384r1 ( 18 )" \
4451 -c "Verifying peer X.509 certificate... ok" \
4452 -C "received HelloRetryRequest message"
4453
4454requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004455requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004456requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004457requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4458requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4459run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004460 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004461 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4462 0 \
4463 -c "HTTP/1.0 200 ok" \
4464 -c "Protocol is TLSv1.3" \
4465 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4466 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4467 -c "NamedGroup: secp384r1 ( 18 )" \
4468 -c "Verifying peer X.509 certificate... ok" \
4469 -C "received HelloRetryRequest message"
4470
4471requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004472requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004473requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004474requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4475requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4476run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004477 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004478 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4479 0 \
4480 -c "HTTP/1.0 200 ok" \
4481 -c "Protocol is TLSv1.3" \
4482 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4483 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4484 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004485 -c "Verifying peer X.509 certificate... ok" \
4486 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004487
Jerry Yu31018ad2021-11-26 20:36:17 +08004488requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004489requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004490requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004491requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004492requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004493requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004494run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004495 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004496 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004497 0 \
4498 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004499 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004500 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4501 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004502 -c "NamedGroup: secp384r1 ( 18 )" \
4503 -c "Verifying peer X.509 certificate... ok" \
4504 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004505
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004506requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004507requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004508requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004509requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004510requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004511run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004512 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004513 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004514 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004515 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004516 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004517 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004518 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4519 -c "NamedGroup: secp521r1 ( 19 )" \
4520 -c "Verifying peer X.509 certificate... ok" \
4521 -C "received HelloRetryRequest message"
4522
4523requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004524requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004525requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4528run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004529 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004530 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4531 0 \
4532 -c "HTTP/1.0 200 ok" \
4533 -c "Protocol is TLSv1.3" \
4534 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4535 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4536 -c "NamedGroup: secp521r1 ( 19 )" \
4537 -c "Verifying peer X.509 certificate... ok" \
4538 -C "received HelloRetryRequest message"
4539
4540requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004541requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004542requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004543requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4544requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4545run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004546 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004547 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4548 0 \
4549 -c "HTTP/1.0 200 ok" \
4550 -c "Protocol is TLSv1.3" \
4551 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4552 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4553 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004554 -c "Verifying peer X.509 certificate... ok" \
4555 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004556
Jerry Yu31018ad2021-11-26 20:36:17 +08004557requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004558requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004559requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004560requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004561requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004562requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004563run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004564 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004565 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004566 0 \
4567 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004568 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004569 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4570 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004571 -c "NamedGroup: secp521r1 ( 19 )" \
4572 -c "Verifying peer X.509 certificate... ok" \
4573 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004574
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004575requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004576requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004577requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004580run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004581 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004582 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004583 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004584 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004585 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004586 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004587 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4588 -c "NamedGroup: x25519 ( 1d )" \
4589 -c "Verifying peer X.509 certificate... ok" \
4590 -C "received HelloRetryRequest message"
4591
4592requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004593requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004594requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004595requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4596requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4597run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004598 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004599 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4600 0 \
4601 -c "HTTP/1.0 200 ok" \
4602 -c "Protocol is TLSv1.3" \
4603 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4604 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4605 -c "NamedGroup: x25519 ( 1d )" \
4606 -c "Verifying peer X.509 certificate... ok" \
4607 -C "received HelloRetryRequest message"
4608
4609requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004610requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004611requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004612requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4614run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004615 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004616 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4617 0 \
4618 -c "HTTP/1.0 200 ok" \
4619 -c "Protocol is TLSv1.3" \
4620 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4621 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4622 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004623 -c "Verifying peer X.509 certificate... ok" \
4624 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004625
Jerry Yu31018ad2021-11-26 20:36:17 +08004626requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004627requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004628requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004629requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004630requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004631requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004632run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004633 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004634 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004635 0 \
4636 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004637 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004638 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4639 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004640 -c "NamedGroup: x25519 ( 1d )" \
4641 -c "Verifying peer X.509 certificate... ok" \
4642 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004643
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004644requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004645requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004646requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004648requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004649run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004650 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004651 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004652 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004653 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004654 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004655 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004656 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4657 -c "NamedGroup: x448 ( 1e )" \
4658 -c "Verifying peer X.509 certificate... ok" \
4659 -C "received HelloRetryRequest message"
4660
4661requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004662requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004663requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004664requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4665requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4666run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004667 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004668 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
4669 0 \
4670 -c "HTTP/1.0 200 ok" \
4671 -c "Protocol is TLSv1.3" \
4672 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4673 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4674 -c "NamedGroup: x448 ( 1e )" \
4675 -c "Verifying peer X.509 certificate... ok" \
4676 -C "received HelloRetryRequest message"
4677
4678requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004679requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004680requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4683run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004684 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004685 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
4686 0 \
4687 -c "HTTP/1.0 200 ok" \
4688 -c "Protocol is TLSv1.3" \
4689 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4690 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4691 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004692 -c "Verifying peer X.509 certificate... ok" \
4693 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004694
Jerry Yu31018ad2021-11-26 20:36:17 +08004695requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004696requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004697requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004700requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004701run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004702 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004703 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004704 0 \
4705 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004706 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004707 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4708 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004709 -c "NamedGroup: x448 ( 1e )" \
4710 -c "Verifying peer X.509 certificate... ok" \
4711 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004712
Jerry Yu31018ad2021-11-26 20:36:17 +08004713requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004714requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004715requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004716requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004717requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004718run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004719 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004720 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004721 0 \
4722 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004723 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004724 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4725 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004726 -c "NamedGroup: secp256r1 ( 17 )" \
4727 -c "Verifying peer X.509 certificate... ok" \
4728 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004729
Jerry Yu31018ad2021-11-26 20:36:17 +08004730requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004731requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004732requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004733requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004734requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004735run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004736 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004737 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004738 0 \
4739 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004740 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004741 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4742 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004743 -c "NamedGroup: secp256r1 ( 17 )" \
4744 -c "Verifying peer X.509 certificate... ok" \
4745 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004746
Jerry Yu31018ad2021-11-26 20:36:17 +08004747requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004748requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004749requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004752run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004753 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004755 0 \
4756 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004757 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004758 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4759 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004760 -c "NamedGroup: secp256r1 ( 17 )" \
4761 -c "Verifying peer X.509 certificate... ok" \
4762 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004763
Jerry Yu31018ad2021-11-26 20:36:17 +08004764requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004765requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004766requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004767requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004769requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004770run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004771 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004772 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004773 0 \
4774 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004775 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004776 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4777 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004778 -c "NamedGroup: secp256r1 ( 17 )" \
4779 -c "Verifying peer X.509 certificate... ok" \
4780 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004781
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004782requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004783requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004784requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004785requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004786requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004787run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004788 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004789 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004790 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004791 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004792 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004793 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004794 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4795 -c "NamedGroup: secp384r1 ( 18 )" \
4796 -c "Verifying peer X.509 certificate... ok" \
4797 -C "received HelloRetryRequest message"
4798
4799requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004800requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004801requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004802requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4803requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4804run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004805 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004806 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
4807 0 \
4808 -c "HTTP/1.0 200 ok" \
4809 -c "Protocol is TLSv1.3" \
4810 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4811 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4812 -c "NamedGroup: secp384r1 ( 18 )" \
4813 -c "Verifying peer X.509 certificate... ok" \
4814 -C "received HelloRetryRequest message"
4815
4816requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004817requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004818requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4821run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004822 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004823 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
4824 0 \
4825 -c "HTTP/1.0 200 ok" \
4826 -c "Protocol is TLSv1.3" \
4827 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4828 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4829 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004830 -c "Verifying peer X.509 certificate... ok" \
4831 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004832
Jerry Yu31018ad2021-11-26 20:36:17 +08004833requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004834requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004835requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004836requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004837requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004838requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004839run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004840 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004841 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004842 0 \
4843 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004844 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004845 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4846 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004847 -c "NamedGroup: secp384r1 ( 18 )" \
4848 -c "Verifying peer X.509 certificate... ok" \
4849 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004850
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004851requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004852requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004853requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004854requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004855requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004856run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004857 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004858 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004859 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004860 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004861 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004862 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004863 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4864 -c "NamedGroup: secp521r1 ( 19 )" \
4865 -c "Verifying peer X.509 certificate... ok" \
4866 -C "received HelloRetryRequest message"
4867
4868requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004869requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004870requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4873run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004874 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
4876 0 \
4877 -c "HTTP/1.0 200 ok" \
4878 -c "Protocol is TLSv1.3" \
4879 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4880 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4881 -c "NamedGroup: secp521r1 ( 19 )" \
4882 -c "Verifying peer X.509 certificate... ok" \
4883 -C "received HelloRetryRequest message"
4884
4885requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004886requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004887requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4890run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004891 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004892 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
4893 0 \
4894 -c "HTTP/1.0 200 ok" \
4895 -c "Protocol is TLSv1.3" \
4896 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4897 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4898 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004899 -c "Verifying peer X.509 certificate... ok" \
4900 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004901
Jerry Yu31018ad2021-11-26 20:36:17 +08004902requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004903requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004904requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004906requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004907requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004908run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004909 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004910 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004911 0 \
4912 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004913 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004914 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4915 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004916 -c "NamedGroup: secp521r1 ( 19 )" \
4917 -c "Verifying peer X.509 certificate... ok" \
4918 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004919
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004920requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004921requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004922requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004923requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004925run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004926 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004927 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004928 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004929 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004930 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004931 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004932 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4933 -c "NamedGroup: x25519 ( 1d )" \
4934 -c "Verifying peer X.509 certificate... ok" \
4935 -C "received HelloRetryRequest message"
4936
4937requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004938requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004939requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4942run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004943 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004944 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
4945 0 \
4946 -c "HTTP/1.0 200 ok" \
4947 -c "Protocol is TLSv1.3" \
4948 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4949 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4950 -c "NamedGroup: x25519 ( 1d )" \
4951 -c "Verifying peer X.509 certificate... ok" \
4952 -C "received HelloRetryRequest message"
4953
4954requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004955requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004956requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004957requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4959run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004960 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004961 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
4962 0 \
4963 -c "HTTP/1.0 200 ok" \
4964 -c "Protocol is TLSv1.3" \
4965 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4966 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4967 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004968 -c "Verifying peer X.509 certificate... ok" \
4969 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004970
Jerry Yu31018ad2021-11-26 20:36:17 +08004971requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004972requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004973requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004974requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004976requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004977run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004978 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004979 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004980 0 \
4981 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004982 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004983 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4984 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004985 -c "NamedGroup: x25519 ( 1d )" \
4986 -c "Verifying peer X.509 certificate... ok" \
4987 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004988
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004989requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004990requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004991requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004992requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004994run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00004995 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004996 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004997 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004998 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004999 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005000 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005001 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5002 -c "NamedGroup: x448 ( 1e )" \
5003 -c "Verifying peer X.509 certificate... ok" \
5004 -C "received HelloRetryRequest message"
5005
5006requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005007requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005008requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005009requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5010requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5011run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005012 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005013 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
5014 0 \
5015 -c "HTTP/1.0 200 ok" \
5016 -c "Protocol is TLSv1.3" \
5017 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5018 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5019 -c "NamedGroup: x448 ( 1e )" \
5020 -c "Verifying peer X.509 certificate... ok" \
5021 -C "received HelloRetryRequest message"
5022
5023requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005024requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005025requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005026requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5027requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5028run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005029 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005030 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
5031 0 \
5032 -c "HTTP/1.0 200 ok" \
5033 -c "Protocol is TLSv1.3" \
5034 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5035 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5036 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005037 -c "Verifying peer X.509 certificate... ok" \
5038 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005039
Jerry Yu31018ad2021-11-26 20:36:17 +08005040requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005041requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005042requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08005045requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02005046run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005047 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005049 0 \
5050 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005051 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005052 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5053 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005054 -c "NamedGroup: x448 ( 1e )" \
5055 -c "Verifying peer X.509 certificate... ok" \
5056 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005057
Jerry Yu31018ad2021-11-26 20:36:17 +08005058requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005059requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005060requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005061requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005063run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005064 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005065 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005066 0 \
5067 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005068 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005069 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5070 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005071 -c "NamedGroup: secp256r1 ( 17 )" \
5072 -c "Verifying peer X.509 certificate... ok" \
5073 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005074
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005075requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005076requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005077requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005078requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005079requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005080run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005081 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005082 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005083 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005084 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005085 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005086 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005087 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5088 -c "NamedGroup: secp256r1 ( 17 )" \
5089 -c "Verifying peer X.509 certificate... ok" \
5090 -C "received HelloRetryRequest message"
5091
5092requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005093requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005094requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5097run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005098 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005099 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5100 0 \
5101 -c "HTTP/1.0 200 ok" \
5102 -c "Protocol is TLSv1.3" \
5103 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5104 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5105 -c "NamedGroup: secp256r1 ( 17 )" \
5106 -c "Verifying peer X.509 certificate... ok" \
5107 -C "received HelloRetryRequest message"
5108
5109requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005110requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005111requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5113requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5114requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5115run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005116 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005117 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5118 0 \
5119 -c "HTTP/1.0 200 ok" \
5120 -c "Protocol is TLSv1.3" \
5121 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5122 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005123 -c "NamedGroup: secp256r1 ( 17 )" \
5124 -c "Verifying peer X.509 certificate... ok" \
5125 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005126
Jerry Yu31018ad2021-11-26 20:36:17 +08005127requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005128requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005129requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005130requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005131requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005132run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005133 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005134 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005135 0 \
5136 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005137 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005138 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5139 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005140 -c "NamedGroup: secp384r1 ( 18 )" \
5141 -c "Verifying peer X.509 certificate... ok" \
5142 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005143
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005144requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005145requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005146requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005147requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005148requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005149run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005150 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005151 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005152 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005153 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005154 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005155 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005156 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5157 -c "NamedGroup: secp384r1 ( 18 )" \
5158 -c "Verifying peer X.509 certificate... ok" \
5159 -C "received HelloRetryRequest message"
5160
5161requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005162requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005163requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005164requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5166run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005167 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005168 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5169 0 \
5170 -c "HTTP/1.0 200 ok" \
5171 -c "Protocol is TLSv1.3" \
5172 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5173 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5174 -c "NamedGroup: secp384r1 ( 18 )" \
5175 -c "Verifying peer X.509 certificate... ok" \
5176 -C "received HelloRetryRequest message"
5177
5178requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005179requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005180requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005181requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5183requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5184run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005185 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005186 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5187 0 \
5188 -c "HTTP/1.0 200 ok" \
5189 -c "Protocol is TLSv1.3" \
5190 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5191 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005192 -c "NamedGroup: secp384r1 ( 18 )" \
5193 -c "Verifying peer X.509 certificate... ok" \
5194 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005195
Jerry Yu31018ad2021-11-26 20:36:17 +08005196requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005197requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005198requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005199requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005201run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005202 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005203 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005204 0 \
5205 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005206 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005207 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5208 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005209 -c "NamedGroup: secp521r1 ( 19 )" \
5210 -c "Verifying peer X.509 certificate... ok" \
5211 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005212
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005213requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005214requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005215requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005218run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005219 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005221 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005222 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005223 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005224 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005225 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5226 -c "NamedGroup: secp521r1 ( 19 )" \
5227 -c "Verifying peer X.509 certificate... ok" \
5228 -C "received HelloRetryRequest message"
5229
5230requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005231requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005232requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005233requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5235run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005236 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005237 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5238 0 \
5239 -c "HTTP/1.0 200 ok" \
5240 -c "Protocol is TLSv1.3" \
5241 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5242 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5243 -c "NamedGroup: secp521r1 ( 19 )" \
5244 -c "Verifying peer X.509 certificate... ok" \
5245 -C "received HelloRetryRequest message"
5246
5247requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005248requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005249requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5252requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5253run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005254 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005255 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
5256 0 \
5257 -c "HTTP/1.0 200 ok" \
5258 -c "Protocol is TLSv1.3" \
5259 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5260 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005261 -c "NamedGroup: secp521r1 ( 19 )" \
5262 -c "Verifying peer X.509 certificate... ok" \
5263 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005264
Jerry Yu31018ad2021-11-26 20:36:17 +08005265requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005266requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005267requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005268requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005269requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005270run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005271 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005272 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005273 0 \
5274 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005275 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005276 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5277 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005278 -c "NamedGroup: x25519 ( 1d )" \
5279 -c "Verifying peer X.509 certificate... ok" \
5280 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005281
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005282requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005283requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005284requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005285requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005286requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005287run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005288 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005289 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005290 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005291 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005292 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005293 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005294 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5295 -c "NamedGroup: x25519 ( 1d )" \
5296 -c "Verifying peer X.509 certificate... ok" \
5297 -C "received HelloRetryRequest message"
5298
5299requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005300requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005301requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005302requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5304run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005305 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
5307 0 \
5308 -c "HTTP/1.0 200 ok" \
5309 -c "Protocol is TLSv1.3" \
5310 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5311 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5312 -c "NamedGroup: x25519 ( 1d )" \
5313 -c "Verifying peer X.509 certificate... ok" \
5314 -C "received HelloRetryRequest message"
5315
5316requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005317requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005318requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5321requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5322run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005323 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005324 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
5325 0 \
5326 -c "HTTP/1.0 200 ok" \
5327 -c "Protocol is TLSv1.3" \
5328 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5329 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005330 -c "NamedGroup: x25519 ( 1d )" \
5331 -c "Verifying peer X.509 certificate... ok" \
5332 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005333
Jerry Yu31018ad2021-11-26 20:36:17 +08005334requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005335requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005336requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005337requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005338requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005339run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005340 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005341 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005342 0 \
5343 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005344 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005345 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5346 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005347 -c "NamedGroup: x448 ( 1e )" \
5348 -c "Verifying peer X.509 certificate... ok" \
5349 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005350
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005351requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005352requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005353requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005356run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005357 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005358 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005359 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005360 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005361 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005362 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005363 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005364 -c "NamedGroup: x448 ( 1e )" \
5365 -c "Verifying peer X.509 certificate... ok" \
5366 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005367
Jerry Yu31018ad2021-11-26 20:36:17 +08005368requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005369requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005370requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005373run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005374 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005375 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005376 0 \
5377 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005378 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005379 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005380 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5381 -c "NamedGroup: x448 ( 1e )" \
5382 -c "Verifying peer X.509 certificate... ok" \
5383 -C "received HelloRetryRequest message"
5384
5385requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005386requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005387requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5390requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5391run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianb1847a22022-06-08 07:49:31 +00005392 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005393 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
5394 0 \
5395 -c "HTTP/1.0 200 ok" \
5396 -c "Protocol is TLSv1.3" \
5397 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5398 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5399 -c "NamedGroup: x448 ( 1e )" \
5400 -c "Verifying peer X.509 certificate... ok" \
5401 -C "received HelloRetryRequest message"
5402
5403requires_gnutls_tls1_3
5404requires_gnutls_next_no_ticket
5405requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005406requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005407requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5410run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005411 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005412 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
5413 0 \
5414 -c "HTTP/1.0 200 OK" \
5415 -c "Protocol is TLSv1.3" \
5416 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5417 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5418 -c "NamedGroup: secp256r1 ( 17 )" \
5419 -c "Verifying peer X.509 certificate... ok" \
5420 -C "received HelloRetryRequest message"
5421
5422requires_gnutls_tls1_3
5423requires_gnutls_next_no_ticket
5424requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005425requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005426requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5429run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005430 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005431 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
5432 0 \
5433 -c "HTTP/1.0 200 OK" \
5434 -c "Protocol is TLSv1.3" \
5435 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005436 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005437 -c "NamedGroup: secp256r1 ( 17 )" \
5438 -c "Verifying peer X.509 certificate... ok" \
5439 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005440
Jerry Yu31018ad2021-11-26 20:36:17 +08005441requires_gnutls_tls1_3
5442requires_gnutls_next_no_ticket
5443requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08005444requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005445requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005446requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005448run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005449 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005450 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5451 0 \
5452 -c "HTTP/1.0 200 OK" \
5453 -c "Protocol is TLSv1.3" \
5454 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5455 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5456 -c "NamedGroup: secp256r1 ( 17 )" \
5457 -c "Verifying peer X.509 certificate... ok" \
5458 -C "received HelloRetryRequest message"
5459
5460requires_gnutls_tls1_3
5461requires_gnutls_next_no_ticket
5462requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005463requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005464requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5467requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5468run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005469 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005470 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5471 0 \
5472 -c "HTTP/1.0 200 OK" \
5473 -c "Protocol is TLSv1.3" \
5474 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5475 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5476 -c "NamedGroup: secp256r1 ( 17 )" \
5477 -c "Verifying peer X.509 certificate... ok" \
5478 -C "received HelloRetryRequest message"
5479
5480requires_gnutls_tls1_3
5481requires_gnutls_next_no_ticket
5482requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005483requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005484requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5487run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005488 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005489 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
5490 0 \
5491 -c "HTTP/1.0 200 OK" \
5492 -c "Protocol is TLSv1.3" \
5493 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5494 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5495 -c "NamedGroup: secp384r1 ( 18 )" \
5496 -c "Verifying peer X.509 certificate... ok" \
5497 -C "received HelloRetryRequest message"
5498
5499requires_gnutls_tls1_3
5500requires_gnutls_next_no_ticket
5501requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005502requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005503requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005504requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5505requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5506run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005507 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005508 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
5509 0 \
5510 -c "HTTP/1.0 200 OK" \
5511 -c "Protocol is TLSv1.3" \
5512 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5513 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5514 -c "NamedGroup: secp384r1 ( 18 )" \
5515 -c "Verifying peer X.509 certificate... ok" \
5516 -C "received HelloRetryRequest message"
5517
5518requires_gnutls_tls1_3
5519requires_gnutls_next_no_ticket
5520requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005521requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005522requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005523requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5524requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5525run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005526 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005527 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5528 0 \
5529 -c "HTTP/1.0 200 OK" \
5530 -c "Protocol is TLSv1.3" \
5531 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5532 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5533 -c "NamedGroup: secp384r1 ( 18 )" \
5534 -c "Verifying peer X.509 certificate... ok" \
5535 -C "received HelloRetryRequest message"
5536
5537requires_gnutls_tls1_3
5538requires_gnutls_next_no_ticket
5539requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005540requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005541requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005542requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5543requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5544requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5545run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005546 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005547 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5548 0 \
5549 -c "HTTP/1.0 200 OK" \
5550 -c "Protocol is TLSv1.3" \
5551 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5552 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5553 -c "NamedGroup: secp384r1 ( 18 )" \
5554 -c "Verifying peer X.509 certificate... ok" \
5555 -C "received HelloRetryRequest message"
5556
5557requires_gnutls_tls1_3
5558requires_gnutls_next_no_ticket
5559requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005560requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005561requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005562requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5564run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005565 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005566 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
5567 0 \
5568 -c "HTTP/1.0 200 OK" \
5569 -c "Protocol is TLSv1.3" \
5570 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5571 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5572 -c "NamedGroup: secp521r1 ( 19 )" \
5573 -c "Verifying peer X.509 certificate... ok" \
5574 -C "received HelloRetryRequest message"
5575
5576requires_gnutls_tls1_3
5577requires_gnutls_next_no_ticket
5578requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005579requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005580requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005581requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5583run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005584 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005585 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
5586 0 \
5587 -c "HTTP/1.0 200 OK" \
5588 -c "Protocol is TLSv1.3" \
5589 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5590 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5591 -c "NamedGroup: secp521r1 ( 19 )" \
5592 -c "Verifying peer X.509 certificate... ok" \
5593 -C "received HelloRetryRequest message"
5594
5595requires_gnutls_tls1_3
5596requires_gnutls_next_no_ticket
5597requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005598requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005599requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005600requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5602run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005603 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005604 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5605 0 \
5606 -c "HTTP/1.0 200 OK" \
5607 -c "Protocol is TLSv1.3" \
5608 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5609 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5610 -c "NamedGroup: secp521r1 ( 19 )" \
5611 -c "Verifying peer X.509 certificate... ok" \
5612 -C "received HelloRetryRequest message"
5613
5614requires_gnutls_tls1_3
5615requires_gnutls_next_no_ticket
5616requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005617requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005618requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005619requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5620requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5621requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5622run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005623 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005624 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
5625 0 \
5626 -c "HTTP/1.0 200 OK" \
5627 -c "Protocol is TLSv1.3" \
5628 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5629 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5630 -c "NamedGroup: secp521r1 ( 19 )" \
5631 -c "Verifying peer X.509 certificate... ok" \
5632 -C "received HelloRetryRequest message"
5633
5634requires_gnutls_tls1_3
5635requires_gnutls_next_no_ticket
5636requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005637requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005638requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005639requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5640requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5641run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005642 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005643 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
5644 0 \
5645 -c "HTTP/1.0 200 OK" \
5646 -c "Protocol is TLSv1.3" \
5647 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5648 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5649 -c "NamedGroup: x25519 ( 1d )" \
5650 -c "Verifying peer X.509 certificate... ok" \
5651 -C "received HelloRetryRequest message"
5652
5653requires_gnutls_tls1_3
5654requires_gnutls_next_no_ticket
5655requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005656requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005657requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005658requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5659requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5660run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005661 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005662 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
5663 0 \
5664 -c "HTTP/1.0 200 OK" \
5665 -c "Protocol is TLSv1.3" \
5666 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5667 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5668 -c "NamedGroup: x25519 ( 1d )" \
5669 -c "Verifying peer X.509 certificate... ok" \
5670 -C "received HelloRetryRequest message"
5671
5672requires_gnutls_tls1_3
5673requires_gnutls_next_no_ticket
5674requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005675requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005676requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005677requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5679run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005680 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005681 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
5682 0 \
5683 -c "HTTP/1.0 200 OK" \
5684 -c "Protocol is TLSv1.3" \
5685 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5686 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5687 -c "NamedGroup: x25519 ( 1d )" \
5688 -c "Verifying peer X.509 certificate... ok" \
5689 -C "received HelloRetryRequest message"
5690
5691requires_gnutls_tls1_3
5692requires_gnutls_next_no_ticket
5693requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005694requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005695requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5698requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5699run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005700 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005701 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
5702 0 \
5703 -c "HTTP/1.0 200 OK" \
5704 -c "Protocol is TLSv1.3" \
5705 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5706 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5707 -c "NamedGroup: x25519 ( 1d )" \
5708 -c "Verifying peer X.509 certificate... ok" \
5709 -C "received HelloRetryRequest message"
5710
5711requires_gnutls_tls1_3
5712requires_gnutls_next_no_ticket
5713requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005714requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005715requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005716requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5717requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5718run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005719 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005720 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
5721 0 \
5722 -c "HTTP/1.0 200 OK" \
5723 -c "Protocol is TLSv1.3" \
5724 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5725 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5726 -c "NamedGroup: x448 ( 1e )" \
5727 -c "Verifying peer X.509 certificate... ok" \
5728 -C "received HelloRetryRequest message"
5729
5730requires_gnutls_tls1_3
5731requires_gnutls_next_no_ticket
5732requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005733requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005734requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005735requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5736requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5737run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005738 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005739 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
5740 0 \
5741 -c "HTTP/1.0 200 OK" \
5742 -c "Protocol is TLSv1.3" \
5743 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5744 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5745 -c "NamedGroup: x448 ( 1e )" \
5746 -c "Verifying peer X.509 certificate... ok" \
5747 -C "received HelloRetryRequest message"
5748
5749requires_gnutls_tls1_3
5750requires_gnutls_next_no_ticket
5751requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005752requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005753requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5756run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005757 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005758 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
5759 0 \
5760 -c "HTTP/1.0 200 OK" \
5761 -c "Protocol is TLSv1.3" \
5762 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5763 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5764 -c "NamedGroup: x448 ( 1e )" \
5765 -c "Verifying peer X.509 certificate... ok" \
5766 -C "received HelloRetryRequest message"
5767
5768requires_gnutls_tls1_3
5769requires_gnutls_next_no_ticket
5770requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005771requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005772requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005773requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5774requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5775requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5776run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005777 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005778 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
5779 0 \
5780 -c "HTTP/1.0 200 OK" \
5781 -c "Protocol is TLSv1.3" \
5782 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5783 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5784 -c "NamedGroup: x448 ( 1e )" \
5785 -c "Verifying peer X.509 certificate... ok" \
5786 -C "received HelloRetryRequest message"
5787
5788requires_gnutls_tls1_3
5789requires_gnutls_next_no_ticket
5790requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005791requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005792requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5794requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5795run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005796 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005797 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
5798 0 \
5799 -c "HTTP/1.0 200 OK" \
5800 -c "Protocol is TLSv1.3" \
5801 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5802 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5803 -c "NamedGroup: secp256r1 ( 17 )" \
5804 -c "Verifying peer X.509 certificate... ok" \
5805 -C "received HelloRetryRequest message"
5806
5807requires_gnutls_tls1_3
5808requires_gnutls_next_no_ticket
5809requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005810requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005811requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005812requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5814run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005815 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005816 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
5817 0 \
5818 -c "HTTP/1.0 200 OK" \
5819 -c "Protocol is TLSv1.3" \
5820 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5821 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5822 -c "NamedGroup: secp256r1 ( 17 )" \
5823 -c "Verifying peer X.509 certificate... ok" \
5824 -C "received HelloRetryRequest message"
5825
5826requires_gnutls_tls1_3
5827requires_gnutls_next_no_ticket
5828requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005829requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005830requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005831requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5832requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5833run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005834 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005835 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
5836 0 \
5837 -c "HTTP/1.0 200 OK" \
5838 -c "Protocol is TLSv1.3" \
5839 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5840 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5841 -c "NamedGroup: secp256r1 ( 17 )" \
5842 -c "Verifying peer X.509 certificate... ok" \
5843 -C "received HelloRetryRequest message"
5844
5845requires_gnutls_tls1_3
5846requires_gnutls_next_no_ticket
5847requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005848requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005849requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005850requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5851requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5852requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5853run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005854 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005855 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
5856 0 \
5857 -c "HTTP/1.0 200 OK" \
5858 -c "Protocol is TLSv1.3" \
5859 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5860 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5861 -c "NamedGroup: secp256r1 ( 17 )" \
5862 -c "Verifying peer X.509 certificate... ok" \
5863 -C "received HelloRetryRequest message"
5864
5865requires_gnutls_tls1_3
5866requires_gnutls_next_no_ticket
5867requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005868requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005869requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5872run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005873 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005874 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
5875 0 \
5876 -c "HTTP/1.0 200 OK" \
5877 -c "Protocol is TLSv1.3" \
5878 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5879 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5880 -c "NamedGroup: secp384r1 ( 18 )" \
5881 -c "Verifying peer X.509 certificate... ok" \
5882 -C "received HelloRetryRequest message"
5883
5884requires_gnutls_tls1_3
5885requires_gnutls_next_no_ticket
5886requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005887requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005888requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005889requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5890requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5891run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005892 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005893 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
5894 0 \
5895 -c "HTTP/1.0 200 OK" \
5896 -c "Protocol is TLSv1.3" \
5897 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5898 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5899 -c "NamedGroup: secp384r1 ( 18 )" \
5900 -c "Verifying peer X.509 certificate... ok" \
5901 -C "received HelloRetryRequest message"
5902
5903requires_gnutls_tls1_3
5904requires_gnutls_next_no_ticket
5905requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005906requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005907requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005908requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5909requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5910run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005911 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005912 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
5913 0 \
5914 -c "HTTP/1.0 200 OK" \
5915 -c "Protocol is TLSv1.3" \
5916 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5917 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5918 -c "NamedGroup: secp384r1 ( 18 )" \
5919 -c "Verifying peer X.509 certificate... ok" \
5920 -C "received HelloRetryRequest message"
5921
5922requires_gnutls_tls1_3
5923requires_gnutls_next_no_ticket
5924requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005925requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005926requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5929requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5930run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005931 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005932 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
5933 0 \
5934 -c "HTTP/1.0 200 OK" \
5935 -c "Protocol is TLSv1.3" \
5936 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5937 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5938 -c "NamedGroup: secp384r1 ( 18 )" \
5939 -c "Verifying peer X.509 certificate... ok" \
5940 -C "received HelloRetryRequest message"
5941
5942requires_gnutls_tls1_3
5943requires_gnutls_next_no_ticket
5944requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005945requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005946requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5949run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005950 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005951 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
5952 0 \
5953 -c "HTTP/1.0 200 OK" \
5954 -c "Protocol is TLSv1.3" \
5955 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5956 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5957 -c "NamedGroup: secp521r1 ( 19 )" \
5958 -c "Verifying peer X.509 certificate... ok" \
5959 -C "received HelloRetryRequest message"
5960
5961requires_gnutls_tls1_3
5962requires_gnutls_next_no_ticket
5963requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005964requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005965requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5968run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005969 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005970 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
5971 0 \
5972 -c "HTTP/1.0 200 OK" \
5973 -c "Protocol is TLSv1.3" \
5974 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5975 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5976 -c "NamedGroup: secp521r1 ( 19 )" \
5977 -c "Verifying peer X.509 certificate... ok" \
5978 -C "received HelloRetryRequest message"
5979
5980requires_gnutls_tls1_3
5981requires_gnutls_next_no_ticket
5982requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005983requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005984requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005985requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5986requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5987run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005988 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005989 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
5990 0 \
5991 -c "HTTP/1.0 200 OK" \
5992 -c "Protocol is TLSv1.3" \
5993 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5994 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5995 -c "NamedGroup: secp521r1 ( 19 )" \
5996 -c "Verifying peer X.509 certificate... ok" \
5997 -C "received HelloRetryRequest message"
5998
5999requires_gnutls_tls1_3
6000requires_gnutls_next_no_ticket
6001requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006002requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006003requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006004requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6005requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6006requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6007run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006008 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006009 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6010 0 \
6011 -c "HTTP/1.0 200 OK" \
6012 -c "Protocol is TLSv1.3" \
6013 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6014 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6015 -c "NamedGroup: secp521r1 ( 19 )" \
6016 -c "Verifying peer X.509 certificate... ok" \
6017 -C "received HelloRetryRequest message"
6018
6019requires_gnutls_tls1_3
6020requires_gnutls_next_no_ticket
6021requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006022requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006023requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6026run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006027 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006028 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6029 0 \
6030 -c "HTTP/1.0 200 OK" \
6031 -c "Protocol is TLSv1.3" \
6032 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6033 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6034 -c "NamedGroup: x25519 ( 1d )" \
6035 -c "Verifying peer X.509 certificate... ok" \
6036 -C "received HelloRetryRequest message"
6037
6038requires_gnutls_tls1_3
6039requires_gnutls_next_no_ticket
6040requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006041requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006042requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006043requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6044requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6045run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006046 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006047 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6048 0 \
6049 -c "HTTP/1.0 200 OK" \
6050 -c "Protocol is TLSv1.3" \
6051 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6052 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6053 -c "NamedGroup: x25519 ( 1d )" \
6054 -c "Verifying peer X.509 certificate... ok" \
6055 -C "received HelloRetryRequest message"
6056
6057requires_gnutls_tls1_3
6058requires_gnutls_next_no_ticket
6059requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006060requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006061requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006062requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6063requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6064run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006065 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006066 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6067 0 \
6068 -c "HTTP/1.0 200 OK" \
6069 -c "Protocol is TLSv1.3" \
6070 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6071 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6072 -c "NamedGroup: x25519 ( 1d )" \
6073 -c "Verifying peer X.509 certificate... ok" \
6074 -C "received HelloRetryRequest message"
6075
6076requires_gnutls_tls1_3
6077requires_gnutls_next_no_ticket
6078requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006079requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006080requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006081requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6082requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6083requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6084run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006085 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006086 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6087 0 \
6088 -c "HTTP/1.0 200 OK" \
6089 -c "Protocol is TLSv1.3" \
6090 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6091 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6092 -c "NamedGroup: x25519 ( 1d )" \
6093 -c "Verifying peer X.509 certificate... ok" \
6094 -C "received HelloRetryRequest message"
6095
6096requires_gnutls_tls1_3
6097requires_gnutls_next_no_ticket
6098requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006099requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006100requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006101requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6103run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006104 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006105 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6106 0 \
6107 -c "HTTP/1.0 200 OK" \
6108 -c "Protocol is TLSv1.3" \
6109 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6110 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6111 -c "NamedGroup: x448 ( 1e )" \
6112 -c "Verifying peer X.509 certificate... ok" \
6113 -C "received HelloRetryRequest message"
6114
6115requires_gnutls_tls1_3
6116requires_gnutls_next_no_ticket
6117requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006118requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006119requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006120requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6122run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006123 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006124 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6125 0 \
6126 -c "HTTP/1.0 200 OK" \
6127 -c "Protocol is TLSv1.3" \
6128 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6129 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6130 -c "NamedGroup: x448 ( 1e )" \
6131 -c "Verifying peer X.509 certificate... ok" \
6132 -C "received HelloRetryRequest message"
6133
6134requires_gnutls_tls1_3
6135requires_gnutls_next_no_ticket
6136requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006137requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006138requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006139requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6140requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6141run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006142 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006143 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6144 0 \
6145 -c "HTTP/1.0 200 OK" \
6146 -c "Protocol is TLSv1.3" \
6147 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6148 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6149 -c "NamedGroup: x448 ( 1e )" \
6150 -c "Verifying peer X.509 certificate... ok" \
6151 -C "received HelloRetryRequest message"
6152
6153requires_gnutls_tls1_3
6154requires_gnutls_next_no_ticket
6155requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006156requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006157requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6160requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6161run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006162 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006163 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6164 0 \
6165 -c "HTTP/1.0 200 OK" \
6166 -c "Protocol is TLSv1.3" \
6167 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
6168 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6169 -c "NamedGroup: x448 ( 1e )" \
6170 -c "Verifying peer X.509 certificate... ok" \
6171 -C "received HelloRetryRequest message"
6172
6173requires_gnutls_tls1_3
6174requires_gnutls_next_no_ticket
6175requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006176requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006177requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6180run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006181 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006182 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6183 0 \
6184 -c "HTTP/1.0 200 OK" \
6185 -c "Protocol is TLSv1.3" \
6186 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6187 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6188 -c "NamedGroup: secp256r1 ( 17 )" \
6189 -c "Verifying peer X.509 certificate... ok" \
6190 -C "received HelloRetryRequest message"
6191
6192requires_gnutls_tls1_3
6193requires_gnutls_next_no_ticket
6194requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006195requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006196requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006197requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6198requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6199run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006200 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006201 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
6202 0 \
6203 -c "HTTP/1.0 200 OK" \
6204 -c "Protocol is TLSv1.3" \
6205 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6206 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6207 -c "NamedGroup: secp256r1 ( 17 )" \
6208 -c "Verifying peer X.509 certificate... ok" \
6209 -C "received HelloRetryRequest message"
6210
6211requires_gnutls_tls1_3
6212requires_gnutls_next_no_ticket
6213requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006214requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006215requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6218run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006219 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
6221 0 \
6222 -c "HTTP/1.0 200 OK" \
6223 -c "Protocol is TLSv1.3" \
6224 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6225 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6226 -c "NamedGroup: secp256r1 ( 17 )" \
6227 -c "Verifying peer X.509 certificate... ok" \
6228 -C "received HelloRetryRequest message"
6229
6230requires_gnutls_tls1_3
6231requires_gnutls_next_no_ticket
6232requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006233requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006234requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006235requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6236requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6237requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6238run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006239 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006240 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
6241 0 \
6242 -c "HTTP/1.0 200 OK" \
6243 -c "Protocol is TLSv1.3" \
6244 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6245 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6246 -c "NamedGroup: secp256r1 ( 17 )" \
6247 -c "Verifying peer X.509 certificate... ok" \
6248 -C "received HelloRetryRequest message"
6249
6250requires_gnutls_tls1_3
6251requires_gnutls_next_no_ticket
6252requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006253requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006254requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6257run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006258 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006259 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
6260 0 \
6261 -c "HTTP/1.0 200 OK" \
6262 -c "Protocol is TLSv1.3" \
6263 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6264 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6265 -c "NamedGroup: secp384r1 ( 18 )" \
6266 -c "Verifying peer X.509 certificate... ok" \
6267 -C "received HelloRetryRequest message"
6268
6269requires_gnutls_tls1_3
6270requires_gnutls_next_no_ticket
6271requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006272requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006273requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6276run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006277 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006278 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
6279 0 \
6280 -c "HTTP/1.0 200 OK" \
6281 -c "Protocol is TLSv1.3" \
6282 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6283 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6284 -c "NamedGroup: secp384r1 ( 18 )" \
6285 -c "Verifying peer X.509 certificate... ok" \
6286 -C "received HelloRetryRequest message"
6287
6288requires_gnutls_tls1_3
6289requires_gnutls_next_no_ticket
6290requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006291requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006292requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006293requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6294requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6295run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006296 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006297 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
6298 0 \
6299 -c "HTTP/1.0 200 OK" \
6300 -c "Protocol is TLSv1.3" \
6301 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6302 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6303 -c "NamedGroup: secp384r1 ( 18 )" \
6304 -c "Verifying peer X.509 certificate... ok" \
6305 -C "received HelloRetryRequest message"
6306
6307requires_gnutls_tls1_3
6308requires_gnutls_next_no_ticket
6309requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006310requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006311requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006312requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6313requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6314requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6315run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006316 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006317 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
6318 0 \
6319 -c "HTTP/1.0 200 OK" \
6320 -c "Protocol is TLSv1.3" \
6321 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6322 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6323 -c "NamedGroup: secp384r1 ( 18 )" \
6324 -c "Verifying peer X.509 certificate... ok" \
6325 -C "received HelloRetryRequest message"
6326
6327requires_gnutls_tls1_3
6328requires_gnutls_next_no_ticket
6329requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006330requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006331requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006332requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6333requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6334run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006335 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006336 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
6337 0 \
6338 -c "HTTP/1.0 200 OK" \
6339 -c "Protocol is TLSv1.3" \
6340 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6341 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6342 -c "NamedGroup: secp521r1 ( 19 )" \
6343 -c "Verifying peer X.509 certificate... ok" \
6344 -C "received HelloRetryRequest message"
6345
6346requires_gnutls_tls1_3
6347requires_gnutls_next_no_ticket
6348requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006349requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006350requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6353run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006354 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006355 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
6356 0 \
6357 -c "HTTP/1.0 200 OK" \
6358 -c "Protocol is TLSv1.3" \
6359 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6360 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6361 -c "NamedGroup: secp521r1 ( 19 )" \
6362 -c "Verifying peer X.509 certificate... ok" \
6363 -C "received HelloRetryRequest message"
6364
6365requires_gnutls_tls1_3
6366requires_gnutls_next_no_ticket
6367requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006368requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006369requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006370requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6371requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6372run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006373 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006374 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
6375 0 \
6376 -c "HTTP/1.0 200 OK" \
6377 -c "Protocol is TLSv1.3" \
6378 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6379 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6380 -c "NamedGroup: secp521r1 ( 19 )" \
6381 -c "Verifying peer X.509 certificate... ok" \
6382 -C "received HelloRetryRequest message"
6383
6384requires_gnutls_tls1_3
6385requires_gnutls_next_no_ticket
6386requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006387requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006388requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006389requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6390requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6391requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6392run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006393 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006394 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6395 0 \
6396 -c "HTTP/1.0 200 OK" \
6397 -c "Protocol is TLSv1.3" \
6398 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6399 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6400 -c "NamedGroup: secp521r1 ( 19 )" \
6401 -c "Verifying peer X.509 certificate... ok" \
6402 -C "received HelloRetryRequest message"
6403
6404requires_gnutls_tls1_3
6405requires_gnutls_next_no_ticket
6406requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006407requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006408requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006409requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6411run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006412 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006413 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6414 0 \
6415 -c "HTTP/1.0 200 OK" \
6416 -c "Protocol is TLSv1.3" \
6417 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6418 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6419 -c "NamedGroup: x25519 ( 1d )" \
6420 -c "Verifying peer X.509 certificate... ok" \
6421 -C "received HelloRetryRequest message"
6422
6423requires_gnutls_tls1_3
6424requires_gnutls_next_no_ticket
6425requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006426requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006427requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6430run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006431 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006432 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6433 0 \
6434 -c "HTTP/1.0 200 OK" \
6435 -c "Protocol is TLSv1.3" \
6436 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6437 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6438 -c "NamedGroup: x25519 ( 1d )" \
6439 -c "Verifying peer X.509 certificate... ok" \
6440 -C "received HelloRetryRequest message"
6441
6442requires_gnutls_tls1_3
6443requires_gnutls_next_no_ticket
6444requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006445requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006446requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006447requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6448requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6449run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006450 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006451 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6452 0 \
6453 -c "HTTP/1.0 200 OK" \
6454 -c "Protocol is TLSv1.3" \
6455 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6456 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6457 -c "NamedGroup: x25519 ( 1d )" \
6458 -c "Verifying peer X.509 certificate... ok" \
6459 -C "received HelloRetryRequest message"
6460
6461requires_gnutls_tls1_3
6462requires_gnutls_next_no_ticket
6463requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006464requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006465requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006466requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6468requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6469run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006470 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006471 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6472 0 \
6473 -c "HTTP/1.0 200 OK" \
6474 -c "Protocol is TLSv1.3" \
6475 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6476 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6477 -c "NamedGroup: x25519 ( 1d )" \
6478 -c "Verifying peer X.509 certificate... ok" \
6479 -C "received HelloRetryRequest message"
6480
6481requires_gnutls_tls1_3
6482requires_gnutls_next_no_ticket
6483requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006484requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006485requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6488run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006489 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006490 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6491 0 \
6492 -c "HTTP/1.0 200 OK" \
6493 -c "Protocol is TLSv1.3" \
6494 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6495 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6496 -c "NamedGroup: x448 ( 1e )" \
6497 -c "Verifying peer X.509 certificate... ok" \
6498 -C "received HelloRetryRequest message"
6499
6500requires_gnutls_tls1_3
6501requires_gnutls_next_no_ticket
6502requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006503requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006504requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6507run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006508 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006509 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6510 0 \
6511 -c "HTTP/1.0 200 OK" \
6512 -c "Protocol is TLSv1.3" \
6513 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6514 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6515 -c "NamedGroup: x448 ( 1e )" \
6516 -c "Verifying peer X.509 certificate... ok" \
6517 -C "received HelloRetryRequest message"
6518
6519requires_gnutls_tls1_3
6520requires_gnutls_next_no_ticket
6521requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006522requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006523requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006524requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6525requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6526run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006527 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006528 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6529 0 \
6530 -c "HTTP/1.0 200 OK" \
6531 -c "Protocol is TLSv1.3" \
6532 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6533 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6534 -c "NamedGroup: x448 ( 1e )" \
6535 -c "Verifying peer X.509 certificate... ok" \
6536 -C "received HelloRetryRequest message"
6537
6538requires_gnutls_tls1_3
6539requires_gnutls_next_no_ticket
6540requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006541requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006542requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006543requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6544requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6545requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6546run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006547 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006548 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6549 0 \
6550 -c "HTTP/1.0 200 OK" \
6551 -c "Protocol is TLSv1.3" \
6552 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6553 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6554 -c "NamedGroup: x448 ( 1e )" \
6555 -c "Verifying peer X.509 certificate... ok" \
6556 -C "received HelloRetryRequest message"
6557
6558requires_gnutls_tls1_3
6559requires_gnutls_next_no_ticket
6560requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006561requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006562requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6565run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006566 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006567 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6568 0 \
6569 -c "HTTP/1.0 200 OK" \
6570 -c "Protocol is TLSv1.3" \
6571 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6572 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6573 -c "NamedGroup: secp256r1 ( 17 )" \
6574 -c "Verifying peer X.509 certificate... ok" \
6575 -C "received HelloRetryRequest message"
6576
6577requires_gnutls_tls1_3
6578requires_gnutls_next_no_ticket
6579requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006580requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006581requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6584run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006585 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006586 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
6587 0 \
6588 -c "HTTP/1.0 200 OK" \
6589 -c "Protocol is TLSv1.3" \
6590 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6591 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6592 -c "NamedGroup: secp256r1 ( 17 )" \
6593 -c "Verifying peer X.509 certificate... ok" \
6594 -C "received HelloRetryRequest message"
6595
6596requires_gnutls_tls1_3
6597requires_gnutls_next_no_ticket
6598requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006599requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006600requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6602requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6603run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006604 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006605 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
6606 0 \
6607 -c "HTTP/1.0 200 OK" \
6608 -c "Protocol is TLSv1.3" \
6609 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6610 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6611 -c "NamedGroup: secp256r1 ( 17 )" \
6612 -c "Verifying peer X.509 certificate... ok" \
6613 -C "received HelloRetryRequest message"
6614
6615requires_gnutls_tls1_3
6616requires_gnutls_next_no_ticket
6617requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006618requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006619requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006620requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6621requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6622requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6623run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006624 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006625 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
6626 0 \
6627 -c "HTTP/1.0 200 OK" \
6628 -c "Protocol is TLSv1.3" \
6629 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6630 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6631 -c "NamedGroup: secp256r1 ( 17 )" \
6632 -c "Verifying peer X.509 certificate... ok" \
6633 -C "received HelloRetryRequest message"
6634
6635requires_gnutls_tls1_3
6636requires_gnutls_next_no_ticket
6637requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006638requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006639requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6641requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6642run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006643 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006644 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
6645 0 \
6646 -c "HTTP/1.0 200 OK" \
6647 -c "Protocol is TLSv1.3" \
6648 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6649 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6650 -c "NamedGroup: secp384r1 ( 18 )" \
6651 -c "Verifying peer X.509 certificate... ok" \
6652 -C "received HelloRetryRequest message"
6653
6654requires_gnutls_tls1_3
6655requires_gnutls_next_no_ticket
6656requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006657requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006658requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6661run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006662 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006663 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
6664 0 \
6665 -c "HTTP/1.0 200 OK" \
6666 -c "Protocol is TLSv1.3" \
6667 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6668 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6669 -c "NamedGroup: secp384r1 ( 18 )" \
6670 -c "Verifying peer X.509 certificate... ok" \
6671 -C "received HelloRetryRequest message"
6672
6673requires_gnutls_tls1_3
6674requires_gnutls_next_no_ticket
6675requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006676requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006677requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006678requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6680run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006681 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006682 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
6683 0 \
6684 -c "HTTP/1.0 200 OK" \
6685 -c "Protocol is TLSv1.3" \
6686 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6687 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6688 -c "NamedGroup: secp384r1 ( 18 )" \
6689 -c "Verifying peer X.509 certificate... ok" \
6690 -C "received HelloRetryRequest message"
6691
6692requires_gnutls_tls1_3
6693requires_gnutls_next_no_ticket
6694requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006695requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006696requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006697requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6698requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6699requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6700run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006701 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006702 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
6703 0 \
6704 -c "HTTP/1.0 200 OK" \
6705 -c "Protocol is TLSv1.3" \
6706 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6707 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6708 -c "NamedGroup: secp384r1 ( 18 )" \
6709 -c "Verifying peer X.509 certificate... ok" \
6710 -C "received HelloRetryRequest message"
6711
6712requires_gnutls_tls1_3
6713requires_gnutls_next_no_ticket
6714requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006715requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006716requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006717requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6718requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6719run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006720 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006721 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
6722 0 \
6723 -c "HTTP/1.0 200 OK" \
6724 -c "Protocol is TLSv1.3" \
6725 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6726 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6727 -c "NamedGroup: secp521r1 ( 19 )" \
6728 -c "Verifying peer X.509 certificate... ok" \
6729 -C "received HelloRetryRequest message"
6730
6731requires_gnutls_tls1_3
6732requires_gnutls_next_no_ticket
6733requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006734requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006735requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006736requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6737requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6738run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006739 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006740 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
6741 0 \
6742 -c "HTTP/1.0 200 OK" \
6743 -c "Protocol is TLSv1.3" \
6744 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6745 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6746 -c "NamedGroup: secp521r1 ( 19 )" \
6747 -c "Verifying peer X.509 certificate... ok" \
6748 -C "received HelloRetryRequest message"
6749
6750requires_gnutls_tls1_3
6751requires_gnutls_next_no_ticket
6752requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006753requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006754requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006755requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6756requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6757run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006758 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006759 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
6760 0 \
6761 -c "HTTP/1.0 200 OK" \
6762 -c "Protocol is TLSv1.3" \
6763 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6764 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6765 -c "NamedGroup: secp521r1 ( 19 )" \
6766 -c "Verifying peer X.509 certificate... ok" \
6767 -C "received HelloRetryRequest message"
6768
6769requires_gnutls_tls1_3
6770requires_gnutls_next_no_ticket
6771requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006772requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006773requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6777run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006778 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006779 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
6780 0 \
6781 -c "HTTP/1.0 200 OK" \
6782 -c "Protocol is TLSv1.3" \
6783 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6784 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6785 -c "NamedGroup: secp521r1 ( 19 )" \
6786 -c "Verifying peer X.509 certificate... ok" \
6787 -C "received HelloRetryRequest message"
6788
6789requires_gnutls_tls1_3
6790requires_gnutls_next_no_ticket
6791requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006792requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006793requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6796run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006797 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006798 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
6799 0 \
6800 -c "HTTP/1.0 200 OK" \
6801 -c "Protocol is TLSv1.3" \
6802 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6803 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6804 -c "NamedGroup: x25519 ( 1d )" \
6805 -c "Verifying peer X.509 certificate... ok" \
6806 -C "received HelloRetryRequest message"
6807
6808requires_gnutls_tls1_3
6809requires_gnutls_next_no_ticket
6810requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006811requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006812requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006813requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6815run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006816 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006817 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
6818 0 \
6819 -c "HTTP/1.0 200 OK" \
6820 -c "Protocol is TLSv1.3" \
6821 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6822 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6823 -c "NamedGroup: x25519 ( 1d )" \
6824 -c "Verifying peer X.509 certificate... ok" \
6825 -C "received HelloRetryRequest message"
6826
6827requires_gnutls_tls1_3
6828requires_gnutls_next_no_ticket
6829requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006830requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006831requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6834run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006835 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006836 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
6837 0 \
6838 -c "HTTP/1.0 200 OK" \
6839 -c "Protocol is TLSv1.3" \
6840 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6841 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6842 -c "NamedGroup: x25519 ( 1d )" \
6843 -c "Verifying peer X.509 certificate... ok" \
6844 -C "received HelloRetryRequest message"
6845
6846requires_gnutls_tls1_3
6847requires_gnutls_next_no_ticket
6848requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006849requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006850requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6853requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6854run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006855 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006856 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
6857 0 \
6858 -c "HTTP/1.0 200 OK" \
6859 -c "Protocol is TLSv1.3" \
6860 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6861 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6862 -c "NamedGroup: x25519 ( 1d )" \
6863 -c "Verifying peer X.509 certificate... ok" \
6864 -C "received HelloRetryRequest message"
6865
6866requires_gnutls_tls1_3
6867requires_gnutls_next_no_ticket
6868requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006869requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006870requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006871requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6872requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6873run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006874 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006875 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
6876 0 \
6877 -c "HTTP/1.0 200 OK" \
6878 -c "Protocol is TLSv1.3" \
6879 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6880 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6881 -c "NamedGroup: x448 ( 1e )" \
6882 -c "Verifying peer X.509 certificate... ok" \
6883 -C "received HelloRetryRequest message"
6884
6885requires_gnutls_tls1_3
6886requires_gnutls_next_no_ticket
6887requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006888requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006889requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006890requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6892run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006893 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006894 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
6895 0 \
6896 -c "HTTP/1.0 200 OK" \
6897 -c "Protocol is TLSv1.3" \
6898 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6899 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6900 -c "NamedGroup: x448 ( 1e )" \
6901 -c "Verifying peer X.509 certificate... ok" \
6902 -C "received HelloRetryRequest message"
6903
6904requires_gnutls_tls1_3
6905requires_gnutls_next_no_ticket
6906requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006907requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006908requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006909requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6911run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006912 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006913 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
6914 0 \
6915 -c "HTTP/1.0 200 OK" \
6916 -c "Protocol is TLSv1.3" \
6917 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6918 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6919 -c "NamedGroup: x448 ( 1e )" \
6920 -c "Verifying peer X.509 certificate... ok" \
6921 -C "received HelloRetryRequest message"
6922
6923requires_gnutls_tls1_3
6924requires_gnutls_next_no_ticket
6925requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006926requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006927requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6930requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6931run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006932 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006933 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
6934 0 \
6935 -c "HTTP/1.0 200 OK" \
6936 -c "Protocol is TLSv1.3" \
6937 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6938 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6939 -c "NamedGroup: x448 ( 1e )" \
6940 -c "Verifying peer X.509 certificate... ok" \
6941 -C "received HelloRetryRequest message"
6942
6943requires_gnutls_tls1_3
6944requires_gnutls_next_no_ticket
6945requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006946requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006947requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006948requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6949requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6950run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006951 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006952 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
6953 0 \
6954 -c "HTTP/1.0 200 OK" \
6955 -c "Protocol is TLSv1.3" \
6956 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6957 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6958 -c "NamedGroup: secp256r1 ( 17 )" \
6959 -c "Verifying peer X.509 certificate... ok" \
6960 -C "received HelloRetryRequest message"
6961
6962requires_gnutls_tls1_3
6963requires_gnutls_next_no_ticket
6964requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006965requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006966requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006967requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006969run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006970 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006971 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006972 0 \
6973 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006974 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006975 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6976 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006977 -c "NamedGroup: secp256r1 ( 17 )" \
6978 -c "Verifying peer X.509 certificate... ok" \
6979 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006980
Jerry Yu31018ad2021-11-26 20:36:17 +08006981requires_gnutls_tls1_3
6982requires_gnutls_next_no_ticket
6983requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006984requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006985requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006988run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006989 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006990 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006991 0 \
6992 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006993 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006994 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6995 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006996 -c "NamedGroup: secp256r1 ( 17 )" \
6997 -c "Verifying peer X.509 certificate... ok" \
6998 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006999
Jerry Yu31018ad2021-11-26 20:36:17 +08007000requires_gnutls_tls1_3
7001requires_gnutls_next_no_ticket
7002requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007003requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007004requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007007requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007008run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007009 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007010 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007011 0 \
7012 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007013 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007014 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7015 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007016 -c "NamedGroup: secp256r1 ( 17 )" \
7017 -c "Verifying peer X.509 certificate... ok" \
7018 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007019
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007020requires_gnutls_tls1_3
7021requires_gnutls_next_no_ticket
7022requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007023requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007024requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007025requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007027run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007028 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007029 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007030 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007031 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007032 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007033 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007034 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7035 -c "NamedGroup: secp384r1 ( 18 )" \
7036 -c "Verifying peer X.509 certificate... ok" \
7037 -C "received HelloRetryRequest message"
7038
7039requires_gnutls_tls1_3
7040requires_gnutls_next_no_ticket
7041requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007042requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007043requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7046run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007047 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7049 0 \
7050 -c "HTTP/1.0 200 OK" \
7051 -c "Protocol is TLSv1.3" \
7052 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7053 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7054 -c "NamedGroup: secp384r1 ( 18 )" \
7055 -c "Verifying peer X.509 certificate... ok" \
7056 -C "received HelloRetryRequest message"
7057
7058requires_gnutls_tls1_3
7059requires_gnutls_next_no_ticket
7060requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007061requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007062requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007063requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7065run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007066 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007067 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7068 0 \
7069 -c "HTTP/1.0 200 OK" \
7070 -c "Protocol is TLSv1.3" \
7071 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7072 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007073 -c "NamedGroup: secp384r1 ( 18 )" \
7074 -c "Verifying peer X.509 certificate... ok" \
7075 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007076
Jerry Yu31018ad2021-11-26 20:36:17 +08007077requires_gnutls_tls1_3
7078requires_gnutls_next_no_ticket
7079requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007080requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007081requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007082requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007084requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007085run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007086 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007087 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007088 0 \
7089 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007090 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007091 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7092 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007093 -c "NamedGroup: secp384r1 ( 18 )" \
7094 -c "Verifying peer X.509 certificate... ok" \
7095 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007096
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007097requires_gnutls_tls1_3
7098requires_gnutls_next_no_ticket
7099requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007100requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007101requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007104run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007105 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007106 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007107 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007108 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007109 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007110 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007111 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7112 -c "NamedGroup: secp521r1 ( 19 )" \
7113 -c "Verifying peer X.509 certificate... ok" \
7114 -C "received HelloRetryRequest message"
7115
7116requires_gnutls_tls1_3
7117requires_gnutls_next_no_ticket
7118requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007119requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007120requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7123run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007124 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007125 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
7126 0 \
7127 -c "HTTP/1.0 200 OK" \
7128 -c "Protocol is TLSv1.3" \
7129 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7130 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7131 -c "NamedGroup: secp521r1 ( 19 )" \
7132 -c "Verifying peer X.509 certificate... ok" \
7133 -C "received HelloRetryRequest message"
7134
7135requires_gnutls_tls1_3
7136requires_gnutls_next_no_ticket
7137requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007138requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007139requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7142run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007143 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007144 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
7145 0 \
7146 -c "HTTP/1.0 200 OK" \
7147 -c "Protocol is TLSv1.3" \
7148 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7149 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007150 -c "NamedGroup: secp521r1 ( 19 )" \
7151 -c "Verifying peer X.509 certificate... ok" \
7152 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007153
Jerry Yu31018ad2021-11-26 20:36:17 +08007154requires_gnutls_tls1_3
7155requires_gnutls_next_no_ticket
7156requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007157requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007158requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007159requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007161requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007162run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007163 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007164 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007165 0 \
7166 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007167 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007168 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7169 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007170 -c "NamedGroup: secp521r1 ( 19 )" \
7171 -c "Verifying peer X.509 certificate... ok" \
7172 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007173
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007174requires_gnutls_tls1_3
7175requires_gnutls_next_no_ticket
7176requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007177requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007178requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007179requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007181run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007182 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007183 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007184 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007185 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007186 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007187 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007188 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7189 -c "NamedGroup: x25519 ( 1d )" \
7190 -c "Verifying peer X.509 certificate... ok" \
7191 -C "received HelloRetryRequest message"
7192
7193requires_gnutls_tls1_3
7194requires_gnutls_next_no_ticket
7195requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007196requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007197requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7200run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007201 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007202 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
7203 0 \
7204 -c "HTTP/1.0 200 OK" \
7205 -c "Protocol is TLSv1.3" \
7206 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7207 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7208 -c "NamedGroup: x25519 ( 1d )" \
7209 -c "Verifying peer X.509 certificate... ok" \
7210 -C "received HelloRetryRequest message"
7211
7212requires_gnutls_tls1_3
7213requires_gnutls_next_no_ticket
7214requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007215requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007216requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007217requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7218requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7219run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007220 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007221 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
7222 0 \
7223 -c "HTTP/1.0 200 OK" \
7224 -c "Protocol is TLSv1.3" \
7225 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7226 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007227 -c "NamedGroup: x25519 ( 1d )" \
7228 -c "Verifying peer X.509 certificate... ok" \
7229 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007230
Jerry Yu31018ad2021-11-26 20:36:17 +08007231requires_gnutls_tls1_3
7232requires_gnutls_next_no_ticket
7233requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007234requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007235requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007238requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007239run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007240 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007241 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007242 0 \
7243 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007244 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007245 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7246 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007247 -c "NamedGroup: x25519 ( 1d )" \
7248 -c "Verifying peer X.509 certificate... ok" \
7249 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007250
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007251requires_gnutls_tls1_3
7252requires_gnutls_next_no_ticket
7253requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007254requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007255requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007258run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007259 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007260 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007261 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007262 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007263 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007264 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007265 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7266 -c "NamedGroup: x448 ( 1e )" \
7267 -c "Verifying peer X.509 certificate... ok" \
7268 -C "received HelloRetryRequest message"
7269
7270requires_gnutls_tls1_3
7271requires_gnutls_next_no_ticket
7272requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007273requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007274requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7277run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007278 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007279 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
7280 0 \
7281 -c "HTTP/1.0 200 OK" \
7282 -c "Protocol is TLSv1.3" \
7283 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7284 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7285 -c "NamedGroup: x448 ( 1e )" \
7286 -c "Verifying peer X.509 certificate... ok" \
7287 -C "received HelloRetryRequest message"
7288
7289requires_gnutls_tls1_3
7290requires_gnutls_next_no_ticket
7291requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007292requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007293requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7296run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007297 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
7299 0 \
7300 -c "HTTP/1.0 200 OK" \
7301 -c "Protocol is TLSv1.3" \
7302 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7303 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007304 -c "NamedGroup: x448 ( 1e )" \
7305 -c "Verifying peer X.509 certificate... ok" \
7306 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007307
Jerry Yu31018ad2021-11-26 20:36:17 +08007308requires_gnutls_tls1_3
7309requires_gnutls_next_no_ticket
7310requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007311requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007312requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007315requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007316run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007317 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007318 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007319 0 \
7320 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007321 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007322 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007323 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007324 -c "NamedGroup: x448 ( 1e )" \
7325 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007326 -C "received HelloRetryRequest message"
XiaokangQian83f81882022-03-17 06:26:36 +00007327
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007328requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007329requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007332requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7336run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
7337 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7338 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
7339 0 \
7340 -s "Protocol is TLSv1.3" \
7341 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7342 -s "received signature algorithm: 0x403" \
7343 -s "got named group: secp256r1(0017)" \
7344 -s "Verifying peer X.509 certificate... ok" \
7345 -c "Protocol is TLSv1.3" \
7346 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7347 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7348 -c "NamedGroup: secp256r1 ( 17 )" \
7349 -c "Verifying peer X.509 certificate... ok" \
7350 -C "received HelloRetryRequest message"
7351
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007352requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007353requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007356requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7360run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
7361 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7362 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
7363 0 \
7364 -s "Protocol is TLSv1.3" \
7365 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7366 -s "received signature algorithm: 0x503" \
7367 -s "got named group: secp256r1(0017)" \
7368 -s "Verifying peer X.509 certificate... ok" \
7369 -c "Protocol is TLSv1.3" \
7370 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7371 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7372 -c "NamedGroup: secp256r1 ( 17 )" \
7373 -c "Verifying peer X.509 certificate... ok" \
7374 -C "received HelloRetryRequest message"
7375
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007376requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007377requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007380requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007381requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007382requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7383requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7384run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
7385 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7386 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
7387 0 \
7388 -s "Protocol is TLSv1.3" \
7389 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7390 -s "received signature algorithm: 0x603" \
7391 -s "got named group: secp256r1(0017)" \
7392 -s "Verifying peer X.509 certificate... ok" \
7393 -c "Protocol is TLSv1.3" \
7394 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7395 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7396 -c "NamedGroup: secp256r1 ( 17 )" \
7397 -c "Verifying peer X.509 certificate... ok" \
7398 -C "received HelloRetryRequest message"
7399
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007400requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007401requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007402requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7403requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7404requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007405requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007406requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007407requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7409requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7410run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
7411 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7412 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
7413 0 \
7414 -s "Protocol is TLSv1.3" \
7415 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7416 -s "received signature algorithm: 0x804" \
7417 -s "got named group: secp256r1(0017)" \
7418 -s "Verifying peer X.509 certificate... ok" \
7419 -c "Protocol is TLSv1.3" \
7420 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7421 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7422 -c "NamedGroup: secp256r1 ( 17 )" \
7423 -c "Verifying peer X.509 certificate... ok" \
7424 -C "received HelloRetryRequest message"
7425
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007430requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007431requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7434run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
7435 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7436 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
7437 0 \
7438 -s "Protocol is TLSv1.3" \
7439 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7440 -s "received signature algorithm: 0x403" \
7441 -s "got named group: secp384r1(0018)" \
7442 -s "Verifying peer X.509 certificate... ok" \
7443 -c "Protocol is TLSv1.3" \
7444 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7445 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7446 -c "NamedGroup: secp384r1 ( 18 )" \
7447 -c "Verifying peer X.509 certificate... ok" \
7448 -C "received HelloRetryRequest message"
7449
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007450requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007451requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007454requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007455requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7458run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
7459 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7460 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7461 0 \
7462 -s "Protocol is TLSv1.3" \
7463 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7464 -s "received signature algorithm: 0x503" \
7465 -s "got named group: secp384r1(0018)" \
7466 -s "Verifying peer X.509 certificate... ok" \
7467 -c "Protocol is TLSv1.3" \
7468 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7469 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7470 -c "NamedGroup: secp384r1 ( 18 )" \
7471 -c "Verifying peer X.509 certificate... ok" \
7472 -C "received HelloRetryRequest message"
7473
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007474requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007475requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007478requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007479requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7481requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7482run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
7483 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7484 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7485 0 \
7486 -s "Protocol is TLSv1.3" \
7487 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7488 -s "received signature algorithm: 0x603" \
7489 -s "got named group: secp384r1(0018)" \
7490 -s "Verifying peer X.509 certificate... ok" \
7491 -c "Protocol is TLSv1.3" \
7492 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7493 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7494 -c "NamedGroup: secp384r1 ( 18 )" \
7495 -c "Verifying peer X.509 certificate... ok" \
7496 -C "received HelloRetryRequest message"
7497
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007498requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007499requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007500requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7501requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7502requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007503requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007504requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007505requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7506requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7507requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7508run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
7509 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7510 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
7511 0 \
7512 -s "Protocol is TLSv1.3" \
7513 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7514 -s "received signature algorithm: 0x804" \
7515 -s "got named group: secp384r1(0018)" \
7516 -s "Verifying peer X.509 certificate... ok" \
7517 -c "Protocol is TLSv1.3" \
7518 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7519 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7520 -c "NamedGroup: secp384r1 ( 18 )" \
7521 -c "Verifying peer X.509 certificate... ok" \
7522 -C "received HelloRetryRequest message"
7523
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007524requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007525requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007528requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7532run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
7533 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7534 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
7535 0 \
7536 -s "Protocol is TLSv1.3" \
7537 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7538 -s "received signature algorithm: 0x403" \
7539 -s "got named group: secp521r1(0019)" \
7540 -s "Verifying peer X.509 certificate... ok" \
7541 -c "Protocol is TLSv1.3" \
7542 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7543 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7544 -c "NamedGroup: secp521r1 ( 19 )" \
7545 -c "Verifying peer X.509 certificate... ok" \
7546 -C "received HelloRetryRequest message"
7547
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007548requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007549requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007552requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007553requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7556run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
7557 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7558 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
7559 0 \
7560 -s "Protocol is TLSv1.3" \
7561 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7562 -s "received signature algorithm: 0x503" \
7563 -s "got named group: secp521r1(0019)" \
7564 -s "Verifying peer X.509 certificate... ok" \
7565 -c "Protocol is TLSv1.3" \
7566 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7567 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7568 -c "NamedGroup: secp521r1 ( 19 )" \
7569 -c "Verifying peer X.509 certificate... ok" \
7570 -C "received HelloRetryRequest message"
7571
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007572requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007573requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007576requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007577requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7580run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
7581 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7582 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
7583 0 \
7584 -s "Protocol is TLSv1.3" \
7585 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7586 -s "received signature algorithm: 0x603" \
7587 -s "got named group: secp521r1(0019)" \
7588 -s "Verifying peer X.509 certificate... ok" \
7589 -c "Protocol is TLSv1.3" \
7590 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7591 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7592 -c "NamedGroup: secp521r1 ( 19 )" \
7593 -c "Verifying peer X.509 certificate... ok" \
7594 -C "received HelloRetryRequest message"
7595
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007596requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007597requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007598requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7599requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7600requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007601requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007602requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007603requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7605requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7606run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
7607 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7608 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
7609 0 \
7610 -s "Protocol is TLSv1.3" \
7611 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7612 -s "received signature algorithm: 0x804" \
7613 -s "got named group: secp521r1(0019)" \
7614 -s "Verifying peer X.509 certificate... ok" \
7615 -c "Protocol is TLSv1.3" \
7616 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7617 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7618 -c "NamedGroup: secp521r1 ( 19 )" \
7619 -c "Verifying peer X.509 certificate... ok" \
7620 -C "received HelloRetryRequest message"
7621
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007622requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007623requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007624requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007626requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007627requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7630run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
7631 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7632 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
7633 0 \
7634 -s "Protocol is TLSv1.3" \
7635 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7636 -s "received signature algorithm: 0x403" \
7637 -s "got named group: x25519(001d)" \
7638 -s "Verifying peer X.509 certificate... ok" \
7639 -c "Protocol is TLSv1.3" \
7640 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7641 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7642 -c "NamedGroup: x25519 ( 1d )" \
7643 -c "Verifying peer X.509 certificate... ok" \
7644 -C "received HelloRetryRequest message"
7645
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007646requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007647requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007648requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007650requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007651requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007652requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7654run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
7655 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7656 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
7657 0 \
7658 -s "Protocol is TLSv1.3" \
7659 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7660 -s "received signature algorithm: 0x503" \
7661 -s "got named group: x25519(001d)" \
7662 -s "Verifying peer X.509 certificate... ok" \
7663 -c "Protocol is TLSv1.3" \
7664 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7665 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7666 -c "NamedGroup: x25519 ( 1d )" \
7667 -c "Verifying peer X.509 certificate... ok" \
7668 -C "received HelloRetryRequest message"
7669
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007670requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007671requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007672requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007674requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007675requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7678run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
7679 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7680 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
7681 0 \
7682 -s "Protocol is TLSv1.3" \
7683 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7684 -s "received signature algorithm: 0x603" \
7685 -s "got named group: x25519(001d)" \
7686 -s "Verifying peer X.509 certificate... ok" \
7687 -c "Protocol is TLSv1.3" \
7688 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7689 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7690 -c "NamedGroup: x25519 ( 1d )" \
7691 -c "Verifying peer X.509 certificate... ok" \
7692 -C "received HelloRetryRequest message"
7693
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007694requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007695requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7698requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007699requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007700requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007701requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7702requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7703requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7704run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
7705 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7706 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
7707 0 \
7708 -s "Protocol is TLSv1.3" \
7709 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7710 -s "received signature algorithm: 0x804" \
7711 -s "got named group: x25519(001d)" \
7712 -s "Verifying peer X.509 certificate... ok" \
7713 -c "Protocol is TLSv1.3" \
7714 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7715 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7716 -c "NamedGroup: x25519 ( 1d )" \
7717 -c "Verifying peer X.509 certificate... ok" \
7718 -C "received HelloRetryRequest message"
7719
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007720requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007721requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007724requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007725requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7728run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
7729 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7730 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
7731 0 \
7732 -s "Protocol is TLSv1.3" \
7733 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7734 -s "received signature algorithm: 0x403" \
7735 -s "got named group: x448(001e)" \
7736 -s "Verifying peer X.509 certificate... ok" \
7737 -c "Protocol is TLSv1.3" \
7738 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7739 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7740 -c "NamedGroup: x448 ( 1e )" \
7741 -c "Verifying peer X.509 certificate... ok" \
7742 -C "received HelloRetryRequest message"
7743
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007744requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007745requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007748requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007749requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7752run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
7753 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7754 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
7755 0 \
7756 -s "Protocol is TLSv1.3" \
7757 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7758 -s "received signature algorithm: 0x503" \
7759 -s "got named group: x448(001e)" \
7760 -s "Verifying peer X.509 certificate... ok" \
7761 -c "Protocol is TLSv1.3" \
7762 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7763 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7764 -c "NamedGroup: x448 ( 1e )" \
7765 -c "Verifying peer X.509 certificate... ok" \
7766 -C "received HelloRetryRequest message"
7767
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007768requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007769requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007770requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007772requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7776run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
7777 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7778 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
7779 0 \
7780 -s "Protocol is TLSv1.3" \
7781 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7782 -s "received signature algorithm: 0x603" \
7783 -s "got named group: x448(001e)" \
7784 -s "Verifying peer X.509 certificate... ok" \
7785 -c "Protocol is TLSv1.3" \
7786 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7787 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7788 -c "NamedGroup: x448 ( 1e )" \
7789 -c "Verifying peer X.509 certificate... ok" \
7790 -C "received HelloRetryRequest message"
7791
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007792requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007793requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007794requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7796requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007797requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007798requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007799requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7800requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7801requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7802run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
7803 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7804 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
7805 0 \
7806 -s "Protocol is TLSv1.3" \
7807 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7808 -s "received signature algorithm: 0x804" \
7809 -s "got named group: x448(001e)" \
7810 -s "Verifying peer X.509 certificate... ok" \
7811 -c "Protocol is TLSv1.3" \
7812 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7813 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7814 -c "NamedGroup: x448 ( 1e )" \
7815 -c "Verifying peer X.509 certificate... ok" \
7816 -C "received HelloRetryRequest message"
7817
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007818requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007819requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7821requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007822requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007823requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7826run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
7827 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7828 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
7829 0 \
7830 -s "Protocol is TLSv1.3" \
7831 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7832 -s "received signature algorithm: 0x403" \
7833 -s "got named group: secp256r1(0017)" \
7834 -s "Verifying peer X.509 certificate... ok" \
7835 -c "Protocol is TLSv1.3" \
7836 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7837 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7838 -c "NamedGroup: secp256r1 ( 17 )" \
7839 -c "Verifying peer X.509 certificate... ok" \
7840 -C "received HelloRetryRequest message"
7841
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007842requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007843requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007846requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007847requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7849requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7850run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
7851 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7852 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
7853 0 \
7854 -s "Protocol is TLSv1.3" \
7855 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7856 -s "received signature algorithm: 0x503" \
7857 -s "got named group: secp256r1(0017)" \
7858 -s "Verifying peer X.509 certificate... ok" \
7859 -c "Protocol is TLSv1.3" \
7860 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7861 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7862 -c "NamedGroup: secp256r1 ( 17 )" \
7863 -c "Verifying peer X.509 certificate... ok" \
7864 -C "received HelloRetryRequest message"
7865
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007866requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007867requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007868requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007870requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007871requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007872requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7873requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7874run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
7875 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7876 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
7877 0 \
7878 -s "Protocol is TLSv1.3" \
7879 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7880 -s "received signature algorithm: 0x603" \
7881 -s "got named group: secp256r1(0017)" \
7882 -s "Verifying peer X.509 certificate... ok" \
7883 -c "Protocol is TLSv1.3" \
7884 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7885 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7886 -c "NamedGroup: secp256r1 ( 17 )" \
7887 -c "Verifying peer X.509 certificate... ok" \
7888 -C "received HelloRetryRequest message"
7889
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007890requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007891requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7894requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007895requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007896requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007897requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7898requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7899requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7900run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
7901 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7902 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
7903 0 \
7904 -s "Protocol is TLSv1.3" \
7905 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7906 -s "received signature algorithm: 0x804" \
7907 -s "got named group: secp256r1(0017)" \
7908 -s "Verifying peer X.509 certificate... ok" \
7909 -c "Protocol is TLSv1.3" \
7910 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7911 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7912 -c "NamedGroup: secp256r1 ( 17 )" \
7913 -c "Verifying peer X.509 certificate... ok" \
7914 -C "received HelloRetryRequest message"
7915
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007916requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007917requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007920requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007921requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7924run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
7925 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7926 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
7927 0 \
7928 -s "Protocol is TLSv1.3" \
7929 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7930 -s "received signature algorithm: 0x403" \
7931 -s "got named group: secp384r1(0018)" \
7932 -s "Verifying peer X.509 certificate... ok" \
7933 -c "Protocol is TLSv1.3" \
7934 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7935 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7936 -c "NamedGroup: secp384r1 ( 18 )" \
7937 -c "Verifying peer X.509 certificate... ok" \
7938 -C "received HelloRetryRequest message"
7939
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007940requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007941requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007942requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007944requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7948run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
7949 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7950 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
7951 0 \
7952 -s "Protocol is TLSv1.3" \
7953 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7954 -s "received signature algorithm: 0x503" \
7955 -s "got named group: secp384r1(0018)" \
7956 -s "Verifying peer X.509 certificate... ok" \
7957 -c "Protocol is TLSv1.3" \
7958 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7959 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7960 -c "NamedGroup: secp384r1 ( 18 )" \
7961 -c "Verifying peer X.509 certificate... ok" \
7962 -C "received HelloRetryRequest message"
7963
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007964requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007968requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007969requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7972run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
7973 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7974 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
7975 0 \
7976 -s "Protocol is TLSv1.3" \
7977 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7978 -s "received signature algorithm: 0x603" \
7979 -s "got named group: secp384r1(0018)" \
7980 -s "Verifying peer X.509 certificate... ok" \
7981 -c "Protocol is TLSv1.3" \
7982 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7983 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7984 -c "NamedGroup: secp384r1 ( 18 )" \
7985 -c "Verifying peer X.509 certificate... ok" \
7986 -C "received HelloRetryRequest message"
7987
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007988requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007989requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007990requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7991requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7992requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007993requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007994requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007995requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7997requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7998run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
7999 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8000 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8001 0 \
8002 -s "Protocol is TLSv1.3" \
8003 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8004 -s "received signature algorithm: 0x804" \
8005 -s "got named group: secp384r1(0018)" \
8006 -s "Verifying peer X.509 certificate... ok" \
8007 -c "Protocol is TLSv1.3" \
8008 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8009 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8010 -c "NamedGroup: secp384r1 ( 18 )" \
8011 -c "Verifying peer X.509 certificate... ok" \
8012 -C "received HelloRetryRequest message"
8013
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008014requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008015requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008018requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008019requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8022run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
8023 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8024 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
8025 0 \
8026 -s "Protocol is TLSv1.3" \
8027 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8028 -s "received signature algorithm: 0x403" \
8029 -s "got named group: secp521r1(0019)" \
8030 -s "Verifying peer X.509 certificate... ok" \
8031 -c "Protocol is TLSv1.3" \
8032 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8033 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8034 -c "NamedGroup: secp521r1 ( 19 )" \
8035 -c "Verifying peer X.509 certificate... ok" \
8036 -C "received HelloRetryRequest message"
8037
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008038requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008039requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008040requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008042requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8046run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
8047 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8048 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
8049 0 \
8050 -s "Protocol is TLSv1.3" \
8051 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8052 -s "received signature algorithm: 0x503" \
8053 -s "got named group: secp521r1(0019)" \
8054 -s "Verifying peer X.509 certificate... ok" \
8055 -c "Protocol is TLSv1.3" \
8056 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8057 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8058 -c "NamedGroup: secp521r1 ( 19 )" \
8059 -c "Verifying peer X.509 certificate... ok" \
8060 -C "received HelloRetryRequest message"
8061
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008066requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008067requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8070run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
8071 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8072 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
8073 0 \
8074 -s "Protocol is TLSv1.3" \
8075 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8076 -s "received signature algorithm: 0x603" \
8077 -s "got named group: secp521r1(0019)" \
8078 -s "Verifying peer X.509 certificate... ok" \
8079 -c "Protocol is TLSv1.3" \
8080 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8081 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8082 -c "NamedGroup: secp521r1 ( 19 )" \
8083 -c "Verifying peer X.509 certificate... ok" \
8084 -C "received HelloRetryRequest message"
8085
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008086requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008087requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008088requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8090requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008091requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008092requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008093requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8095requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8096run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
8097 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8098 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
8099 0 \
8100 -s "Protocol is TLSv1.3" \
8101 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8102 -s "received signature algorithm: 0x804" \
8103 -s "got named group: secp521r1(0019)" \
8104 -s "Verifying peer X.509 certificate... ok" \
8105 -c "Protocol is TLSv1.3" \
8106 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8107 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8108 -c "NamedGroup: secp521r1 ( 19 )" \
8109 -c "Verifying peer X.509 certificate... ok" \
8110 -C "received HelloRetryRequest message"
8111
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008112requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008113requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008116requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008117requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8120run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
8121 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8122 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
8123 0 \
8124 -s "Protocol is TLSv1.3" \
8125 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8126 -s "received signature algorithm: 0x403" \
8127 -s "got named group: x25519(001d)" \
8128 -s "Verifying peer X.509 certificate... ok" \
8129 -c "Protocol is TLSv1.3" \
8130 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8131 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8132 -c "NamedGroup: x25519 ( 1d )" \
8133 -c "Verifying peer X.509 certificate... ok" \
8134 -C "received HelloRetryRequest message"
8135
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008136requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008137requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008138requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008140requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008141requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8144run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
8145 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8146 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
8147 0 \
8148 -s "Protocol is TLSv1.3" \
8149 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8150 -s "received signature algorithm: 0x503" \
8151 -s "got named group: x25519(001d)" \
8152 -s "Verifying peer X.509 certificate... ok" \
8153 -c "Protocol is TLSv1.3" \
8154 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8155 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8156 -c "NamedGroup: x25519 ( 1d )" \
8157 -c "Verifying peer X.509 certificate... ok" \
8158 -C "received HelloRetryRequest message"
8159
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008160requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008161requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008162requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8163requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008164requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008165requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8168run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
8169 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8170 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
8171 0 \
8172 -s "Protocol is TLSv1.3" \
8173 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8174 -s "received signature algorithm: 0x603" \
8175 -s "got named group: x25519(001d)" \
8176 -s "Verifying peer X.509 certificate... ok" \
8177 -c "Protocol is TLSv1.3" \
8178 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8179 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8180 -c "NamedGroup: x25519 ( 1d )" \
8181 -c "Verifying peer X.509 certificate... ok" \
8182 -C "received HelloRetryRequest message"
8183
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008184requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008185requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008186requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8188requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008189requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008190requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008191requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8192requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8193requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8194run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
8195 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8196 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
8197 0 \
8198 -s "Protocol is TLSv1.3" \
8199 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8200 -s "received signature algorithm: 0x804" \
8201 -s "got named group: x25519(001d)" \
8202 -s "Verifying peer X.509 certificate... ok" \
8203 -c "Protocol is TLSv1.3" \
8204 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8205 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8206 -c "NamedGroup: x25519 ( 1d )" \
8207 -c "Verifying peer X.509 certificate... ok" \
8208 -C "received HelloRetryRequest message"
8209
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008210requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008211requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008212requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008214requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008215requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8218run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
8219 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8220 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
8221 0 \
8222 -s "Protocol is TLSv1.3" \
8223 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8224 -s "received signature algorithm: 0x403" \
8225 -s "got named group: x448(001e)" \
8226 -s "Verifying peer X.509 certificate... ok" \
8227 -c "Protocol is TLSv1.3" \
8228 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8229 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8230 -c "NamedGroup: x448 ( 1e )" \
8231 -c "Verifying peer X.509 certificate... ok" \
8232 -C "received HelloRetryRequest message"
8233
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008234requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008238requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008239requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8242run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
8243 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8244 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
8245 0 \
8246 -s "Protocol is TLSv1.3" \
8247 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8248 -s "received signature algorithm: 0x503" \
8249 -s "got named group: x448(001e)" \
8250 -s "Verifying peer X.509 certificate... ok" \
8251 -c "Protocol is TLSv1.3" \
8252 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8253 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8254 -c "NamedGroup: x448 ( 1e )" \
8255 -c "Verifying peer X.509 certificate... ok" \
8256 -C "received HelloRetryRequest message"
8257
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008258requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008259requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008260requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8261requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008262requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008263requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008264requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8266run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
8267 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8268 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
8269 0 \
8270 -s "Protocol is TLSv1.3" \
8271 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8272 -s "received signature algorithm: 0x603" \
8273 -s "got named group: x448(001e)" \
8274 -s "Verifying peer X.509 certificate... ok" \
8275 -c "Protocol is TLSv1.3" \
8276 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8277 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8278 -c "NamedGroup: x448 ( 1e )" \
8279 -c "Verifying peer X.509 certificate... ok" \
8280 -C "received HelloRetryRequest message"
8281
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008282requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008283requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008287requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008288requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8291requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8292run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
8293 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8294 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
8295 0 \
8296 -s "Protocol is TLSv1.3" \
8297 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8298 -s "received signature algorithm: 0x804" \
8299 -s "got named group: x448(001e)" \
8300 -s "Verifying peer X.509 certificate... ok" \
8301 -c "Protocol is TLSv1.3" \
8302 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8303 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8304 -c "NamedGroup: x448 ( 1e )" \
8305 -c "Verifying peer X.509 certificate... ok" \
8306 -C "received HelloRetryRequest message"
8307
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008308requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008309requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8311requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008312requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8316run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8317 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8318 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
8319 0 \
8320 -s "Protocol is TLSv1.3" \
8321 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8322 -s "received signature algorithm: 0x403" \
8323 -s "got named group: secp256r1(0017)" \
8324 -s "Verifying peer X.509 certificate... ok" \
8325 -c "Protocol is TLSv1.3" \
8326 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8327 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8328 -c "NamedGroup: secp256r1 ( 17 )" \
8329 -c "Verifying peer X.509 certificate... ok" \
8330 -C "received HelloRetryRequest message"
8331
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008332requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008336requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008337requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8340run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8341 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8342 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
8343 0 \
8344 -s "Protocol is TLSv1.3" \
8345 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8346 -s "received signature algorithm: 0x503" \
8347 -s "got named group: secp256r1(0017)" \
8348 -s "Verifying peer X.509 certificate... ok" \
8349 -c "Protocol is TLSv1.3" \
8350 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8351 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8352 -c "NamedGroup: secp256r1 ( 17 )" \
8353 -c "Verifying peer X.509 certificate... ok" \
8354 -C "received HelloRetryRequest message"
8355
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008360requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008361requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8364run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8365 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8366 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
8367 0 \
8368 -s "Protocol is TLSv1.3" \
8369 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8370 -s "received signature algorithm: 0x603" \
8371 -s "got named group: secp256r1(0017)" \
8372 -s "Verifying peer X.509 certificate... ok" \
8373 -c "Protocol is TLSv1.3" \
8374 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8375 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8376 -c "NamedGroup: secp256r1 ( 17 )" \
8377 -c "Verifying peer X.509 certificate... ok" \
8378 -C "received HelloRetryRequest message"
8379
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008380requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008381requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008382requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8383requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8384requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008385requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008386requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008387requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8388requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8389requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8390run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8391 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8392 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
8393 0 \
8394 -s "Protocol is TLSv1.3" \
8395 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8396 -s "received signature algorithm: 0x804" \
8397 -s "got named group: secp256r1(0017)" \
8398 -s "Verifying peer X.509 certificate... ok" \
8399 -c "Protocol is TLSv1.3" \
8400 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8401 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8402 -c "NamedGroup: secp256r1 ( 17 )" \
8403 -c "Verifying peer X.509 certificate... ok" \
8404 -C "received HelloRetryRequest message"
8405
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008406requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008407requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008410requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008411requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8414run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8415 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8416 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
8417 0 \
8418 -s "Protocol is TLSv1.3" \
8419 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8420 -s "received signature algorithm: 0x403" \
8421 -s "got named group: secp384r1(0018)" \
8422 -s "Verifying peer X.509 certificate... ok" \
8423 -c "Protocol is TLSv1.3" \
8424 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8425 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8426 -c "NamedGroup: secp384r1 ( 18 )" \
8427 -c "Verifying peer X.509 certificate... ok" \
8428 -C "received HelloRetryRequest message"
8429
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008430requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008431requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008434requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008435requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8438run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8439 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8440 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
8441 0 \
8442 -s "Protocol is TLSv1.3" \
8443 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8444 -s "received signature algorithm: 0x503" \
8445 -s "got named group: secp384r1(0018)" \
8446 -s "Verifying peer X.509 certificate... ok" \
8447 -c "Protocol is TLSv1.3" \
8448 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8449 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8450 -c "NamedGroup: secp384r1 ( 18 )" \
8451 -c "Verifying peer X.509 certificate... ok" \
8452 -C "received HelloRetryRequest message"
8453
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008454requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008455requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008458requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008460requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8462run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8463 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8464 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
8465 0 \
8466 -s "Protocol is TLSv1.3" \
8467 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8468 -s "received signature algorithm: 0x603" \
8469 -s "got named group: secp384r1(0018)" \
8470 -s "Verifying peer X.509 certificate... ok" \
8471 -c "Protocol is TLSv1.3" \
8472 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8473 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8474 -c "NamedGroup: secp384r1 ( 18 )" \
8475 -c "Verifying peer X.509 certificate... ok" \
8476 -C "received HelloRetryRequest message"
8477
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008478requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008479requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008480requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8481requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8482requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008483requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008484requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8487requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8488run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8489 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8490 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8491 0 \
8492 -s "Protocol is TLSv1.3" \
8493 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8494 -s "received signature algorithm: 0x804" \
8495 -s "got named group: secp384r1(0018)" \
8496 -s "Verifying peer X.509 certificate... ok" \
8497 -c "Protocol is TLSv1.3" \
8498 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8499 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8500 -c "NamedGroup: secp384r1 ( 18 )" \
8501 -c "Verifying peer X.509 certificate... ok" \
8502 -C "received HelloRetryRequest message"
8503
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008504requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008508requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008509requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8512run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
8513 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8514 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
8515 0 \
8516 -s "Protocol is TLSv1.3" \
8517 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8518 -s "received signature algorithm: 0x403" \
8519 -s "got named group: secp521r1(0019)" \
8520 -s "Verifying peer X.509 certificate... ok" \
8521 -c "Protocol is TLSv1.3" \
8522 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8523 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8524 -c "NamedGroup: secp521r1 ( 19 )" \
8525 -c "Verifying peer X.509 certificate... ok" \
8526 -C "received HelloRetryRequest message"
8527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008532requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008533requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008534requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8536run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
8537 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8538 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
8539 0 \
8540 -s "Protocol is TLSv1.3" \
8541 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8542 -s "received signature algorithm: 0x503" \
8543 -s "got named group: secp521r1(0019)" \
8544 -s "Verifying peer X.509 certificate... ok" \
8545 -c "Protocol is TLSv1.3" \
8546 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8547 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8548 -c "NamedGroup: secp521r1 ( 19 )" \
8549 -c "Verifying peer X.509 certificate... ok" \
8550 -C "received HelloRetryRequest message"
8551
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008552requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008553requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008556requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008557requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008558requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8560run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
8561 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8562 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
8563 0 \
8564 -s "Protocol is TLSv1.3" \
8565 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8566 -s "received signature algorithm: 0x603" \
8567 -s "got named group: secp521r1(0019)" \
8568 -s "Verifying peer X.509 certificate... ok" \
8569 -c "Protocol is TLSv1.3" \
8570 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8571 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8572 -c "NamedGroup: secp521r1 ( 19 )" \
8573 -c "Verifying peer X.509 certificate... ok" \
8574 -C "received HelloRetryRequest message"
8575
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008576requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008577requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008578requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8580requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008581requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008582requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008583requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8584requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8585requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8586run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
8587 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8588 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
8589 0 \
8590 -s "Protocol is TLSv1.3" \
8591 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8592 -s "received signature algorithm: 0x804" \
8593 -s "got named group: secp521r1(0019)" \
8594 -s "Verifying peer X.509 certificate... ok" \
8595 -c "Protocol is TLSv1.3" \
8596 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8597 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8598 -c "NamedGroup: secp521r1 ( 19 )" \
8599 -c "Verifying peer X.509 certificate... ok" \
8600 -C "received HelloRetryRequest message"
8601
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008602requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008603requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008604requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008606requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008607requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8610run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
8611 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8612 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
8613 0 \
8614 -s "Protocol is TLSv1.3" \
8615 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8616 -s "received signature algorithm: 0x403" \
8617 -s "got named group: x25519(001d)" \
8618 -s "Verifying peer X.509 certificate... ok" \
8619 -c "Protocol is TLSv1.3" \
8620 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8621 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8622 -c "NamedGroup: x25519 ( 1d )" \
8623 -c "Verifying peer X.509 certificate... ok" \
8624 -C "received HelloRetryRequest message"
8625
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008626requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008627requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008630requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008631requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8634run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
8635 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8636 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
8637 0 \
8638 -s "Protocol is TLSv1.3" \
8639 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8640 -s "received signature algorithm: 0x503" \
8641 -s "got named group: x25519(001d)" \
8642 -s "Verifying peer X.509 certificate... ok" \
8643 -c "Protocol is TLSv1.3" \
8644 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8645 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8646 -c "NamedGroup: x25519 ( 1d )" \
8647 -c "Verifying peer X.509 certificate... ok" \
8648 -C "received HelloRetryRequest message"
8649
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008650requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008651requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008652requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008654requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008655requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008656requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8658run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
8659 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8660 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
8661 0 \
8662 -s "Protocol is TLSv1.3" \
8663 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8664 -s "received signature algorithm: 0x603" \
8665 -s "got named group: x25519(001d)" \
8666 -s "Verifying peer X.509 certificate... ok" \
8667 -c "Protocol is TLSv1.3" \
8668 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8669 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8670 -c "NamedGroup: x25519 ( 1d )" \
8671 -c "Verifying peer X.509 certificate... ok" \
8672 -C "received HelloRetryRequest message"
8673
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008674requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008675requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8678requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008679requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008680requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8683requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8684run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
8685 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8686 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
8687 0 \
8688 -s "Protocol is TLSv1.3" \
8689 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8690 -s "received signature algorithm: 0x804" \
8691 -s "got named group: x25519(001d)" \
8692 -s "Verifying peer X.509 certificate... ok" \
8693 -c "Protocol is TLSv1.3" \
8694 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8695 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8696 -c "NamedGroup: x25519 ( 1d )" \
8697 -c "Verifying peer X.509 certificate... ok" \
8698 -C "received HelloRetryRequest message"
8699
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008700requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008704requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008705requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8708run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
8709 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8710 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
8711 0 \
8712 -s "Protocol is TLSv1.3" \
8713 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8714 -s "received signature algorithm: 0x403" \
8715 -s "got named group: x448(001e)" \
8716 -s "Verifying peer X.509 certificate... ok" \
8717 -c "Protocol is TLSv1.3" \
8718 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8719 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8720 -c "NamedGroup: x448 ( 1e )" \
8721 -c "Verifying peer X.509 certificate... ok" \
8722 -C "received HelloRetryRequest message"
8723
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008724requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008725requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008728requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008729requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8732run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
8733 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8734 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
8735 0 \
8736 -s "Protocol is TLSv1.3" \
8737 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8738 -s "received signature algorithm: 0x503" \
8739 -s "got named group: x448(001e)" \
8740 -s "Verifying peer X.509 certificate... ok" \
8741 -c "Protocol is TLSv1.3" \
8742 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8743 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8744 -c "NamedGroup: x448 ( 1e )" \
8745 -c "Verifying peer X.509 certificate... ok" \
8746 -C "received HelloRetryRequest message"
8747
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008748requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008749requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008752requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008753requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8756run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
8757 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8758 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
8759 0 \
8760 -s "Protocol is TLSv1.3" \
8761 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8762 -s "received signature algorithm: 0x603" \
8763 -s "got named group: x448(001e)" \
8764 -s "Verifying peer X.509 certificate... ok" \
8765 -c "Protocol is TLSv1.3" \
8766 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8767 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8768 -c "NamedGroup: x448 ( 1e )" \
8769 -c "Verifying peer X.509 certificate... ok" \
8770 -C "received HelloRetryRequest message"
8771
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008772requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008773requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008777requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008778requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008779requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8780requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8781requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8782run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
8783 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8784 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
8785 0 \
8786 -s "Protocol is TLSv1.3" \
8787 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8788 -s "received signature algorithm: 0x804" \
8789 -s "got named group: x448(001e)" \
8790 -s "Verifying peer X.509 certificate... ok" \
8791 -c "Protocol is TLSv1.3" \
8792 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8793 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8794 -c "NamedGroup: x448 ( 1e )" \
8795 -c "Verifying peer X.509 certificate... ok" \
8796 -C "received HelloRetryRequest message"
8797
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008798requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008799requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008800requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8801requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008802requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008803requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8806run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8807 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8808 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
8809 0 \
8810 -s "Protocol is TLSv1.3" \
8811 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8812 -s "received signature algorithm: 0x403" \
8813 -s "got named group: secp256r1(0017)" \
8814 -s "Verifying peer X.509 certificate... ok" \
8815 -c "Protocol is TLSv1.3" \
8816 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8817 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8818 -c "NamedGroup: secp256r1 ( 17 )" \
8819 -c "Verifying peer X.509 certificate... ok" \
8820 -C "received HelloRetryRequest message"
8821
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008822requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008823requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008826requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008827requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008828requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8829requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8830run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8831 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8832 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
8833 0 \
8834 -s "Protocol is TLSv1.3" \
8835 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8836 -s "received signature algorithm: 0x503" \
8837 -s "got named group: secp256r1(0017)" \
8838 -s "Verifying peer X.509 certificate... ok" \
8839 -c "Protocol is TLSv1.3" \
8840 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8841 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8842 -c "NamedGroup: secp256r1 ( 17 )" \
8843 -c "Verifying peer X.509 certificate... ok" \
8844 -C "received HelloRetryRequest message"
8845
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008846requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008847requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8849requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008850requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008851requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8854run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8855 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8856 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
8857 0 \
8858 -s "Protocol is TLSv1.3" \
8859 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8860 -s "received signature algorithm: 0x603" \
8861 -s "got named group: secp256r1(0017)" \
8862 -s "Verifying peer X.509 certificate... ok" \
8863 -c "Protocol is TLSv1.3" \
8864 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8865 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8866 -c "NamedGroup: secp256r1 ( 17 )" \
8867 -c "Verifying peer X.509 certificate... ok" \
8868 -C "received HelloRetryRequest message"
8869
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008870requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008871requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008872requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8873requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8874requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008875requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008876requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008877requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8878requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8879requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8880run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8881 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8882 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
8883 0 \
8884 -s "Protocol is TLSv1.3" \
8885 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8886 -s "received signature algorithm: 0x804" \
8887 -s "got named group: secp256r1(0017)" \
8888 -s "Verifying peer X.509 certificate... ok" \
8889 -c "Protocol is TLSv1.3" \
8890 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8891 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8892 -c "NamedGroup: secp256r1 ( 17 )" \
8893 -c "Verifying peer X.509 certificate... ok" \
8894 -C "received HelloRetryRequest message"
8895
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008896requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008897requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008898requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8899requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008900requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008901requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008902requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8903requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8904run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8905 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8906 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
8907 0 \
8908 -s "Protocol is TLSv1.3" \
8909 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8910 -s "received signature algorithm: 0x403" \
8911 -s "got named group: secp384r1(0018)" \
8912 -s "Verifying peer X.509 certificate... ok" \
8913 -c "Protocol is TLSv1.3" \
8914 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8915 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8916 -c "NamedGroup: secp384r1 ( 18 )" \
8917 -c "Verifying peer X.509 certificate... ok" \
8918 -C "received HelloRetryRequest message"
8919
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008920requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008921requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008924requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008925requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008926requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8927requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8928run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8929 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8930 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
8931 0 \
8932 -s "Protocol is TLSv1.3" \
8933 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8934 -s "received signature algorithm: 0x503" \
8935 -s "got named group: secp384r1(0018)" \
8936 -s "Verifying peer X.509 certificate... ok" \
8937 -c "Protocol is TLSv1.3" \
8938 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8939 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8940 -c "NamedGroup: secp384r1 ( 18 )" \
8941 -c "Verifying peer X.509 certificate... ok" \
8942 -C "received HelloRetryRequest message"
8943
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008944requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008948requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008949requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008950requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8951requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8952run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8953 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8954 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
8955 0 \
8956 -s "Protocol is TLSv1.3" \
8957 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8958 -s "received signature algorithm: 0x603" \
8959 -s "got named group: secp384r1(0018)" \
8960 -s "Verifying peer X.509 certificate... ok" \
8961 -c "Protocol is TLSv1.3" \
8962 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8963 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8964 -c "NamedGroup: secp384r1 ( 18 )" \
8965 -c "Verifying peer X.509 certificate... ok" \
8966 -C "received HelloRetryRequest message"
8967
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008968requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008969requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8972requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008973requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008974requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008975requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8976requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8977requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8978run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8979 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8980 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
8981 0 \
8982 -s "Protocol is TLSv1.3" \
8983 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8984 -s "received signature algorithm: 0x804" \
8985 -s "got named group: secp384r1(0018)" \
8986 -s "Verifying peer X.509 certificate... ok" \
8987 -c "Protocol is TLSv1.3" \
8988 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8989 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8990 -c "NamedGroup: secp384r1 ( 18 )" \
8991 -c "Verifying peer X.509 certificate... ok" \
8992 -C "received HelloRetryRequest message"
8993
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008994requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008995requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008998requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008999requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009000requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9001requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9002run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
9003 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9004 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
9005 0 \
9006 -s "Protocol is TLSv1.3" \
9007 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9008 -s "received signature algorithm: 0x403" \
9009 -s "got named group: secp521r1(0019)" \
9010 -s "Verifying peer X.509 certificate... ok" \
9011 -c "Protocol is TLSv1.3" \
9012 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9013 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9014 -c "NamedGroup: secp521r1 ( 19 )" \
9015 -c "Verifying peer X.509 certificate... ok" \
9016 -C "received HelloRetryRequest message"
9017
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009018requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009019requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009022requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009023requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009024requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9025requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9026run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
9027 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9028 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
9029 0 \
9030 -s "Protocol is TLSv1.3" \
9031 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9032 -s "received signature algorithm: 0x503" \
9033 -s "got named group: secp521r1(0019)" \
9034 -s "Verifying peer X.509 certificate... ok" \
9035 -c "Protocol is TLSv1.3" \
9036 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9037 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9038 -c "NamedGroup: secp521r1 ( 19 )" \
9039 -c "Verifying peer X.509 certificate... ok" \
9040 -C "received HelloRetryRequest message"
9041
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009042requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009046requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009047requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009048requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9050run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
9051 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9052 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
9053 0 \
9054 -s "Protocol is TLSv1.3" \
9055 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9056 -s "received signature algorithm: 0x603" \
9057 -s "got named group: secp521r1(0019)" \
9058 -s "Verifying peer X.509 certificate... ok" \
9059 -c "Protocol is TLSv1.3" \
9060 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9061 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9062 -c "NamedGroup: secp521r1 ( 19 )" \
9063 -c "Verifying peer X.509 certificate... ok" \
9064 -C "received HelloRetryRequest message"
9065
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009066requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009067requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9070requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009071requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009072requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009073requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9074requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9075requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9076run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
9077 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9078 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
9079 0 \
9080 -s "Protocol is TLSv1.3" \
9081 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9082 -s "received signature algorithm: 0x804" \
9083 -s "got named group: secp521r1(0019)" \
9084 -s "Verifying peer X.509 certificate... ok" \
9085 -c "Protocol is TLSv1.3" \
9086 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9087 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9088 -c "NamedGroup: secp521r1 ( 19 )" \
9089 -c "Verifying peer X.509 certificate... ok" \
9090 -C "received HelloRetryRequest message"
9091
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009092requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009093requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009094requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9095requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009096requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009097requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009098requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9099requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9100run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
9101 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9102 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
9103 0 \
9104 -s "Protocol is TLSv1.3" \
9105 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9106 -s "received signature algorithm: 0x403" \
9107 -s "got named group: x25519(001d)" \
9108 -s "Verifying peer X.509 certificate... ok" \
9109 -c "Protocol is TLSv1.3" \
9110 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9111 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9112 -c "NamedGroup: x25519 ( 1d )" \
9113 -c "Verifying peer X.509 certificate... ok" \
9114 -C "received HelloRetryRequest message"
9115
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009116requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009117requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009120requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009121requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009122requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9123requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9124run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
9125 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9126 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
9127 0 \
9128 -s "Protocol is TLSv1.3" \
9129 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9130 -s "received signature algorithm: 0x503" \
9131 -s "got named group: x25519(001d)" \
9132 -s "Verifying peer X.509 certificate... ok" \
9133 -c "Protocol is TLSv1.3" \
9134 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9135 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9136 -c "NamedGroup: x25519 ( 1d )" \
9137 -c "Verifying peer X.509 certificate... ok" \
9138 -C "received HelloRetryRequest message"
9139
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009140requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009141requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009144requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009145requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009146requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9148run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
9149 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9150 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
9151 0 \
9152 -s "Protocol is TLSv1.3" \
9153 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9154 -s "received signature algorithm: 0x603" \
9155 -s "got named group: x25519(001d)" \
9156 -s "Verifying peer X.509 certificate... ok" \
9157 -c "Protocol is TLSv1.3" \
9158 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9159 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9160 -c "NamedGroup: x25519 ( 1d )" \
9161 -c "Verifying peer X.509 certificate... ok" \
9162 -C "received HelloRetryRequest message"
9163
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009164requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009165requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9168requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009169requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009170requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009171requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9172requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9173requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9174run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
9175 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9176 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
9177 0 \
9178 -s "Protocol is TLSv1.3" \
9179 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9180 -s "received signature algorithm: 0x804" \
9181 -s "got named group: x25519(001d)" \
9182 -s "Verifying peer X.509 certificate... ok" \
9183 -c "Protocol is TLSv1.3" \
9184 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9185 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9186 -c "NamedGroup: x25519 ( 1d )" \
9187 -c "Verifying peer X.509 certificate... ok" \
9188 -C "received HelloRetryRequest message"
9189
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009190requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009191requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9193requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009194requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009195requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009196requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9198run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
9199 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9200 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
9201 0 \
9202 -s "Protocol is TLSv1.3" \
9203 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9204 -s "received signature algorithm: 0x403" \
9205 -s "got named group: x448(001e)" \
9206 -s "Verifying peer X.509 certificate... ok" \
9207 -c "Protocol is TLSv1.3" \
9208 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9209 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9210 -c "NamedGroup: x448 ( 1e )" \
9211 -c "Verifying peer X.509 certificate... ok" \
9212 -C "received HelloRetryRequest message"
9213
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009214requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009215requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009218requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009219requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9222run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
9223 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9224 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
9225 0 \
9226 -s "Protocol is TLSv1.3" \
9227 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9228 -s "received signature algorithm: 0x503" \
9229 -s "got named group: x448(001e)" \
9230 -s "Verifying peer X.509 certificate... ok" \
9231 -c "Protocol is TLSv1.3" \
9232 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9233 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9234 -c "NamedGroup: x448 ( 1e )" \
9235 -c "Verifying peer X.509 certificate... ok" \
9236 -C "received HelloRetryRequest message"
9237
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009238requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009239requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009242requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009243requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009244requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9246run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
9247 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9248 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
9249 0 \
9250 -s "Protocol is TLSv1.3" \
9251 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9252 -s "received signature algorithm: 0x603" \
9253 -s "got named group: x448(001e)" \
9254 -s "Verifying peer X.509 certificate... ok" \
9255 -c "Protocol is TLSv1.3" \
9256 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9257 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9258 -c "NamedGroup: x448 ( 1e )" \
9259 -c "Verifying peer X.509 certificate... ok" \
9260 -C "received HelloRetryRequest message"
9261
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009262requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009263requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009264requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9266requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009267requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009268requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009269requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9270requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9271requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9272run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
9273 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9274 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
9275 0 \
9276 -s "Protocol is TLSv1.3" \
9277 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9278 -s "received signature algorithm: 0x804" \
9279 -s "got named group: x448(001e)" \
9280 -s "Verifying peer X.509 certificate... ok" \
9281 -c "Protocol is TLSv1.3" \
9282 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9283 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9284 -c "NamedGroup: x448 ( 1e )" \
9285 -c "Verifying peer X.509 certificate... ok" \
9286 -C "received HelloRetryRequest message"
9287
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009288requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009289requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009292requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009293requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9296run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
9297 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
9299 0 \
9300 -s "Protocol is TLSv1.3" \
9301 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9302 -s "received signature algorithm: 0x403" \
9303 -s "got named group: secp256r1(0017)" \
9304 -s "Verifying peer X.509 certificate... ok" \
9305 -c "Protocol is TLSv1.3" \
9306 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9307 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9308 -c "NamedGroup: secp256r1 ( 17 )" \
9309 -c "Verifying peer X.509 certificate... ok" \
9310 -C "received HelloRetryRequest message"
9311
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009312requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009316requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009317requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009318requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9319requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9320run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
9321 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9322 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
9323 0 \
9324 -s "Protocol is TLSv1.3" \
9325 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9326 -s "received signature algorithm: 0x503" \
9327 -s "got named group: secp256r1(0017)" \
9328 -s "Verifying peer X.509 certificate... ok" \
9329 -c "Protocol is TLSv1.3" \
9330 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9331 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9332 -c "NamedGroup: secp256r1 ( 17 )" \
9333 -c "Verifying peer X.509 certificate... ok" \
9334 -C "received HelloRetryRequest message"
9335
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009336requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009337requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009340requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009341requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009342requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9344run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
9345 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9346 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
9347 0 \
9348 -s "Protocol is TLSv1.3" \
9349 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9350 -s "received signature algorithm: 0x603" \
9351 -s "got named group: secp256r1(0017)" \
9352 -s "Verifying peer X.509 certificate... ok" \
9353 -c "Protocol is TLSv1.3" \
9354 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9355 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9356 -c "NamedGroup: secp256r1 ( 17 )" \
9357 -c "Verifying peer X.509 certificate... ok" \
9358 -C "received HelloRetryRequest message"
9359
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009360requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009361requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9364requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009365requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009366requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009367requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9368requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9369requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9370run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
9371 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9372 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
9373 0 \
9374 -s "Protocol is TLSv1.3" \
9375 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9376 -s "received signature algorithm: 0x804" \
9377 -s "got named group: secp256r1(0017)" \
9378 -s "Verifying peer X.509 certificate... ok" \
9379 -c "Protocol is TLSv1.3" \
9380 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9381 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9382 -c "NamedGroup: secp256r1 ( 17 )" \
9383 -c "Verifying peer X.509 certificate... ok" \
9384 -C "received HelloRetryRequest message"
9385
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009386requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009387requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009390requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009391requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009392requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9393requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9394run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
9395 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9396 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
9397 0 \
9398 -s "Protocol is TLSv1.3" \
9399 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9400 -s "received signature algorithm: 0x403" \
9401 -s "got named group: secp384r1(0018)" \
9402 -s "Verifying peer X.509 certificate... ok" \
9403 -c "Protocol is TLSv1.3" \
9404 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9405 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9406 -c "NamedGroup: secp384r1 ( 18 )" \
9407 -c "Verifying peer X.509 certificate... ok" \
9408 -C "received HelloRetryRequest message"
9409
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009410requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009411requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009414requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009415requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009416requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9417requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9418run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
9419 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9420 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
9421 0 \
9422 -s "Protocol is TLSv1.3" \
9423 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9424 -s "received signature algorithm: 0x503" \
9425 -s "got named group: secp384r1(0018)" \
9426 -s "Verifying peer X.509 certificate... ok" \
9427 -c "Protocol is TLSv1.3" \
9428 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9429 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9430 -c "NamedGroup: secp384r1 ( 18 )" \
9431 -c "Verifying peer X.509 certificate... ok" \
9432 -C "received HelloRetryRequest message"
9433
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009434requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009435requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009438requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009439requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009440requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9442run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
9443 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9444 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
9445 0 \
9446 -s "Protocol is TLSv1.3" \
9447 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9448 -s "received signature algorithm: 0x603" \
9449 -s "got named group: secp384r1(0018)" \
9450 -s "Verifying peer X.509 certificate... ok" \
9451 -c "Protocol is TLSv1.3" \
9452 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9453 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9454 -c "NamedGroup: secp384r1 ( 18 )" \
9455 -c "Verifying peer X.509 certificate... ok" \
9456 -C "received HelloRetryRequest message"
9457
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009458requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009460requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9462requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009463requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009464requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009465requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9466requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9467requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9468run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
9469 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9470 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
9471 0 \
9472 -s "Protocol is TLSv1.3" \
9473 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9474 -s "received signature algorithm: 0x804" \
9475 -s "got named group: secp384r1(0018)" \
9476 -s "Verifying peer X.509 certificate... ok" \
9477 -c "Protocol is TLSv1.3" \
9478 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9479 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9480 -c "NamedGroup: secp384r1 ( 18 )" \
9481 -c "Verifying peer X.509 certificate... ok" \
9482 -C "received HelloRetryRequest message"
9483
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009484requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009485requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009488requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009489requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009490requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9491requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9492run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
9493 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9494 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
9495 0 \
9496 -s "Protocol is TLSv1.3" \
9497 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9498 -s "received signature algorithm: 0x403" \
9499 -s "got named group: secp521r1(0019)" \
9500 -s "Verifying peer X.509 certificate... ok" \
9501 -c "Protocol is TLSv1.3" \
9502 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9503 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9504 -c "NamedGroup: secp521r1 ( 19 )" \
9505 -c "Verifying peer X.509 certificate... ok" \
9506 -C "received HelloRetryRequest message"
9507
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009508requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009509requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009512requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009513requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009514requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9515requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9516run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
9517 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9518 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
9519 0 \
9520 -s "Protocol is TLSv1.3" \
9521 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9522 -s "received signature algorithm: 0x503" \
9523 -s "got named group: secp521r1(0019)" \
9524 -s "Verifying peer X.509 certificate... ok" \
9525 -c "Protocol is TLSv1.3" \
9526 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9527 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9528 -c "NamedGroup: secp521r1 ( 19 )" \
9529 -c "Verifying peer X.509 certificate... ok" \
9530 -C "received HelloRetryRequest message"
9531
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009532requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009533requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009534requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009536requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009537requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009538requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9539requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9540run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
9541 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9542 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
9543 0 \
9544 -s "Protocol is TLSv1.3" \
9545 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9546 -s "received signature algorithm: 0x603" \
9547 -s "got named group: secp521r1(0019)" \
9548 -s "Verifying peer X.509 certificate... ok" \
9549 -c "Protocol is TLSv1.3" \
9550 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9551 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9552 -c "NamedGroup: secp521r1 ( 19 )" \
9553 -c "Verifying peer X.509 certificate... ok" \
9554 -C "received HelloRetryRequest message"
9555
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009556requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009557requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009558requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9560requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009561requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009562requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9565requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9566run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
9567 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9568 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
9569 0 \
9570 -s "Protocol is TLSv1.3" \
9571 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9572 -s "received signature algorithm: 0x804" \
9573 -s "got named group: secp521r1(0019)" \
9574 -s "Verifying peer X.509 certificate... ok" \
9575 -c "Protocol is TLSv1.3" \
9576 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9577 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9578 -c "NamedGroup: secp521r1 ( 19 )" \
9579 -c "Verifying peer X.509 certificate... ok" \
9580 -C "received HelloRetryRequest message"
9581
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009582requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009583requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009584requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009586requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009587requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009588requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9589requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9590run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
9591 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9592 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
9593 0 \
9594 -s "Protocol is TLSv1.3" \
9595 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9596 -s "received signature algorithm: 0x403" \
9597 -s "got named group: x25519(001d)" \
9598 -s "Verifying peer X.509 certificate... ok" \
9599 -c "Protocol is TLSv1.3" \
9600 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9601 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9602 -c "NamedGroup: x25519 ( 1d )" \
9603 -c "Verifying peer X.509 certificate... ok" \
9604 -C "received HelloRetryRequest message"
9605
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009606requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009607requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009610requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009611requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009612requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9614run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
9615 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9616 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
9617 0 \
9618 -s "Protocol is TLSv1.3" \
9619 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9620 -s "received signature algorithm: 0x503" \
9621 -s "got named group: x25519(001d)" \
9622 -s "Verifying peer X.509 certificate... ok" \
9623 -c "Protocol is TLSv1.3" \
9624 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9625 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9626 -c "NamedGroup: x25519 ( 1d )" \
9627 -c "Verifying peer X.509 certificate... ok" \
9628 -C "received HelloRetryRequest message"
9629
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009630requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009631requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009634requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009635requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9638run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
9639 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9640 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
9641 0 \
9642 -s "Protocol is TLSv1.3" \
9643 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9644 -s "received signature algorithm: 0x603" \
9645 -s "got named group: x25519(001d)" \
9646 -s "Verifying peer X.509 certificate... ok" \
9647 -c "Protocol is TLSv1.3" \
9648 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9649 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9650 -c "NamedGroup: x25519 ( 1d )" \
9651 -c "Verifying peer X.509 certificate... ok" \
9652 -C "received HelloRetryRequest message"
9653
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009654requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009655requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009656requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9658requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009659requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009660requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009661requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9662requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9663requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9664run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
9665 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9666 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
9667 0 \
9668 -s "Protocol is TLSv1.3" \
9669 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9670 -s "received signature algorithm: 0x804" \
9671 -s "got named group: x25519(001d)" \
9672 -s "Verifying peer X.509 certificate... ok" \
9673 -c "Protocol is TLSv1.3" \
9674 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9675 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9676 -c "NamedGroup: x25519 ( 1d )" \
9677 -c "Verifying peer X.509 certificate... ok" \
9678 -C "received HelloRetryRequest message"
9679
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009680requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009681requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009682requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9683requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009684requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009685requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009686requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9688run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
9689 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9690 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
9691 0 \
9692 -s "Protocol is TLSv1.3" \
9693 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9694 -s "received signature algorithm: 0x403" \
9695 -s "got named group: x448(001e)" \
9696 -s "Verifying peer X.509 certificate... ok" \
9697 -c "Protocol is TLSv1.3" \
9698 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9699 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9700 -c "NamedGroup: x448 ( 1e )" \
9701 -c "Verifying peer X.509 certificate... ok" \
9702 -C "received HelloRetryRequest message"
9703
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009704requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009705requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009708requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009709requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9711requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9712run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
9713 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9714 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
9715 0 \
9716 -s "Protocol is TLSv1.3" \
9717 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9718 -s "received signature algorithm: 0x503" \
9719 -s "got named group: x448(001e)" \
9720 -s "Verifying peer X.509 certificate... ok" \
9721 -c "Protocol is TLSv1.3" \
9722 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9723 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9724 -c "NamedGroup: x448 ( 1e )" \
9725 -c "Verifying peer X.509 certificate... ok" \
9726 -C "received HelloRetryRequest message"
9727
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009728requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009729requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009730requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009732requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009733requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009734requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9736run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
9737 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9738 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
9739 0 \
9740 -s "Protocol is TLSv1.3" \
9741 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9742 -s "received signature algorithm: 0x603" \
9743 -s "got named group: x448(001e)" \
9744 -s "Verifying peer X.509 certificate... ok" \
9745 -c "Protocol is TLSv1.3" \
9746 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9747 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9748 -c "NamedGroup: x448 ( 1e )" \
9749 -c "Verifying peer X.509 certificate... ok" \
9750 -C "received HelloRetryRequest message"
9751
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009752requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009753requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009754requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9756requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009757requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009758requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009759requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9760requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9761requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9762run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
9763 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9764 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
9765 0 \
9766 -s "Protocol is TLSv1.3" \
9767 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9768 -s "received signature algorithm: 0x804" \
9769 -s "got named group: x448(001e)" \
9770 -s "Verifying peer X.509 certificate... ok" \
9771 -c "Protocol is TLSv1.3" \
9772 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9773 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9774 -c "NamedGroup: x448 ( 1e )" \
9775 -c "Verifying peer X.509 certificate... ok" \
9776 -C "received HelloRetryRequest message"
9777
XiaokangQian9b938b72022-06-10 03:10:59 +00009778requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian83f81882022-03-17 06:26:36 +00009779requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009780requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9781requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9782requires_openssl_tls1_3
9783run_test "TLS 1.3 O->m: HRR secp256r1 -> secp384r1" \
9784 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9785 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9786 0 \
9787 -s "Protocol is TLSv1.3" \
9788 -s "got named group: secp384r1(0018)" \
9789 -s "Verifying peer X.509 certificate... ok" \
9790 -s "HTTP/1.0 200 OK" \
9791 -s "HRR selected_group: secp384r1"
9792
9793requires_config_enabled MBEDTLS_SSL_SRV_C
9794requires_config_enabled MBEDTLS_DEBUG_C
9795requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9797requires_openssl_tls1_3
9798run_test "TLS 1.3 O->m: HRR secp256r1 -> secp521r1" \
9799 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9800 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9801 0 \
9802 -s "Protocol is TLSv1.3" \
9803 -s "got named group: secp521r1(0019)" \
9804 -s "Verifying peer X.509 certificate... ok" \
9805 -s "HTTP/1.0 200 OK" \
9806 -s "HRR selected_group: secp521r1"
9807
9808requires_config_enabled MBEDTLS_SSL_SRV_C
9809requires_config_enabled MBEDTLS_DEBUG_C
9810requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9811requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9812requires_openssl_tls1_3
9813run_test "TLS 1.3 O->m: HRR secp256r1 -> x25519" \
9814 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9815 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9816 0 \
9817 -s "Protocol is TLSv1.3" \
9818 -s "got named group: x25519(001d)" \
9819 -s "Verifying peer X.509 certificate... ok" \
9820 -s "HTTP/1.0 200 OK" \
9821 -s "HRR selected_group: x25519"
9822
9823requires_config_enabled MBEDTLS_SSL_SRV_C
9824requires_config_enabled MBEDTLS_DEBUG_C
9825requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9826requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9827requires_openssl_tls1_3
9828run_test "TLS 1.3 O->m: HRR secp256r1 -> x448" \
9829 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9830 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9831 0 \
9832 -s "Protocol is TLSv1.3" \
9833 -s "got named group: x448(001e)" \
9834 -s "Verifying peer X.509 certificate... ok" \
9835 -s "HTTP/1.0 200 OK" \
9836 -s "HRR selected_group: x448"
9837
9838requires_config_enabled MBEDTLS_SSL_SRV_C
9839requires_config_enabled MBEDTLS_DEBUG_C
9840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9842requires_openssl_tls1_3
9843run_test "TLS 1.3 O->m: HRR secp384r1 -> secp256r1" \
9844 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9845 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9846 0 \
9847 -s "Protocol is TLSv1.3" \
9848 -s "got named group: secp256r1(0017)" \
9849 -s "Verifying peer X.509 certificate... ok" \
9850 -s "HTTP/1.0 200 OK" \
9851 -s "HRR selected_group: secp256r1"
9852
9853requires_config_enabled MBEDTLS_SSL_SRV_C
9854requires_config_enabled MBEDTLS_DEBUG_C
9855requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9857requires_openssl_tls1_3
9858run_test "TLS 1.3 O->m: HRR secp384r1 -> secp521r1" \
9859 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9860 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9861 0 \
9862 -s "Protocol is TLSv1.3" \
9863 -s "got named group: secp521r1(0019)" \
9864 -s "Verifying peer X.509 certificate... ok" \
9865 -s "HTTP/1.0 200 OK" \
9866 -s "HRR selected_group: secp521r1"
9867
9868requires_config_enabled MBEDTLS_SSL_SRV_C
9869requires_config_enabled MBEDTLS_DEBUG_C
9870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9872requires_openssl_tls1_3
9873run_test "TLS 1.3 O->m: HRR secp384r1 -> x25519" \
9874 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9875 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9876 0 \
9877 -s "Protocol is TLSv1.3" \
9878 -s "got named group: x25519(001d)" \
9879 -s "Verifying peer X.509 certificate... ok" \
9880 -s "HTTP/1.0 200 OK" \
9881 -s "HRR selected_group: x25519"
9882
9883requires_config_enabled MBEDTLS_SSL_SRV_C
9884requires_config_enabled MBEDTLS_DEBUG_C
9885requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9886requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9887requires_openssl_tls1_3
9888run_test "TLS 1.3 O->m: HRR secp384r1 -> x448" \
9889 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9890 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9891 0 \
9892 -s "Protocol is TLSv1.3" \
9893 -s "got named group: x448(001e)" \
9894 -s "Verifying peer X.509 certificate... ok" \
9895 -s "HTTP/1.0 200 OK" \
9896 -s "HRR selected_group: x448"
9897
9898requires_config_enabled MBEDTLS_SSL_SRV_C
9899requires_config_enabled MBEDTLS_DEBUG_C
9900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9901requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9902requires_openssl_tls1_3
9903run_test "TLS 1.3 O->m: HRR secp521r1 -> secp256r1" \
9904 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9905 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9906 0 \
9907 -s "Protocol is TLSv1.3" \
9908 -s "got named group: secp256r1(0017)" \
9909 -s "Verifying peer X.509 certificate... ok" \
9910 -s "HTTP/1.0 200 OK" \
9911 -s "HRR selected_group: secp256r1"
9912
9913requires_config_enabled MBEDTLS_SSL_SRV_C
9914requires_config_enabled MBEDTLS_DEBUG_C
9915requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9916requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9917requires_openssl_tls1_3
9918run_test "TLS 1.3 O->m: HRR secp521r1 -> secp384r1" \
9919 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9920 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9921 0 \
9922 -s "Protocol is TLSv1.3" \
9923 -s "got named group: secp384r1(0018)" \
9924 -s "Verifying peer X.509 certificate... ok" \
9925 -s "HTTP/1.0 200 OK" \
9926 -s "HRR selected_group: secp384r1"
9927
9928requires_config_enabled MBEDTLS_SSL_SRV_C
9929requires_config_enabled MBEDTLS_DEBUG_C
9930requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9931requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9932requires_openssl_tls1_3
9933run_test "TLS 1.3 O->m: HRR secp521r1 -> x25519" \
9934 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9935 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9936 0 \
9937 -s "Protocol is TLSv1.3" \
9938 -s "got named group: x25519(001d)" \
9939 -s "Verifying peer X.509 certificate... ok" \
9940 -s "HTTP/1.0 200 OK" \
9941 -s "HRR selected_group: x25519"
9942
9943requires_config_enabled MBEDTLS_SSL_SRV_C
9944requires_config_enabled MBEDTLS_DEBUG_C
9945requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9946requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9947requires_openssl_tls1_3
9948run_test "TLS 1.3 O->m: HRR secp521r1 -> x448" \
9949 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9950 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9951 0 \
9952 -s "Protocol is TLSv1.3" \
9953 -s "got named group: x448(001e)" \
9954 -s "Verifying peer X.509 certificate... ok" \
9955 -s "HTTP/1.0 200 OK" \
9956 -s "HRR selected_group: x448"
9957
9958requires_config_enabled MBEDTLS_SSL_SRV_C
9959requires_config_enabled MBEDTLS_DEBUG_C
9960requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9961requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9962requires_openssl_tls1_3
9963run_test "TLS 1.3 O->m: HRR x25519 -> secp256r1" \
9964 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9965 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9966 0 \
9967 -s "Protocol is TLSv1.3" \
9968 -s "got named group: secp256r1(0017)" \
9969 -s "Verifying peer X.509 certificate... ok" \
9970 -s "HTTP/1.0 200 OK" \
9971 -s "HRR selected_group: secp256r1"
9972
9973requires_config_enabled MBEDTLS_SSL_SRV_C
9974requires_config_enabled MBEDTLS_DEBUG_C
9975requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9976requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9977requires_openssl_tls1_3
9978run_test "TLS 1.3 O->m: HRR x25519 -> secp384r1" \
9979 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9980 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9981 0 \
9982 -s "Protocol is TLSv1.3" \
9983 -s "got named group: secp384r1(0018)" \
9984 -s "Verifying peer X.509 certificate... ok" \
9985 -s "HTTP/1.0 200 OK" \
9986 -s "HRR selected_group: secp384r1"
9987
9988requires_config_enabled MBEDTLS_SSL_SRV_C
9989requires_config_enabled MBEDTLS_DEBUG_C
9990requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9991requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9992requires_openssl_tls1_3
9993run_test "TLS 1.3 O->m: HRR x25519 -> secp521r1" \
9994 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9995 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
9996 0 \
9997 -s "Protocol is TLSv1.3" \
9998 -s "got named group: secp521r1(0019)" \
9999 -s "Verifying peer X.509 certificate... ok" \
10000 -s "HTTP/1.0 200 OK" \
10001 -s "HRR selected_group: secp521r1"
10002
10003requires_config_enabled MBEDTLS_SSL_SRV_C
10004requires_config_enabled MBEDTLS_DEBUG_C
10005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10007requires_openssl_tls1_3
10008run_test "TLS 1.3 O->m: HRR x25519 -> x448" \
10009 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10010 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519:X448 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10011 0 \
10012 -s "Protocol is TLSv1.3" \
10013 -s "got named group: x448(001e)" \
10014 -s "Verifying peer X.509 certificate... ok" \
10015 -s "HTTP/1.0 200 OK" \
10016 -s "HRR selected_group: x448"
10017
10018requires_config_enabled MBEDTLS_SSL_SRV_C
10019requires_config_enabled MBEDTLS_DEBUG_C
10020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10022requires_openssl_tls1_3
10023run_test "TLS 1.3 O->m: HRR x448 -> secp256r1" \
10024 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10025 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-256 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10026 0 \
10027 -s "Protocol is TLSv1.3" \
10028 -s "got named group: secp256r1(0017)" \
10029 -s "Verifying peer X.509 certificate... ok" \
10030 -s "HTTP/1.0 200 OK" \
10031 -s "HRR selected_group: secp256r1"
10032
10033requires_config_enabled MBEDTLS_SSL_SRV_C
10034requires_config_enabled MBEDTLS_DEBUG_C
10035requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10036requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10037requires_openssl_tls1_3
10038run_test "TLS 1.3 O->m: HRR x448 -> secp384r1" \
10039 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10040 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-384 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10041 0 \
10042 -s "Protocol is TLSv1.3" \
10043 -s "got named group: secp384r1(0018)" \
10044 -s "Verifying peer X.509 certificate... ok" \
10045 -s "HTTP/1.0 200 OK" \
10046 -s "HRR selected_group: secp384r1"
10047
10048requires_config_enabled MBEDTLS_SSL_SRV_C
10049requires_config_enabled MBEDTLS_DEBUG_C
10050requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10052requires_openssl_tls1_3
10053run_test "TLS 1.3 O->m: HRR x448 -> secp521r1" \
10054 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10055 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:P-521 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10056 0 \
10057 -s "Protocol is TLSv1.3" \
10058 -s "got named group: secp521r1(0019)" \
10059 -s "Verifying peer X.509 certificate... ok" \
10060 -s "HTTP/1.0 200 OK" \
10061 -s "HRR selected_group: secp521r1"
10062
10063requires_config_enabled MBEDTLS_SSL_SRV_C
10064requires_config_enabled MBEDTLS_DEBUG_C
10065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10067requires_openssl_tls1_3
10068run_test "TLS 1.3 O->m: HRR x448 -> x25519" \
10069 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10070 "$O_NEXT_CLI_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448:X25519 -msg -tls1_3 -CAfile data_files/test-ca2.crt" \
10071 0 \
10072 -s "Protocol is TLSv1.3" \
10073 -s "got named group: x25519(001d)" \
10074 -s "Verifying peer X.509 certificate... ok" \
10075 -s "HTTP/1.0 200 OK" \
10076 -s "HRR selected_group: x25519"
10077
10078requires_config_enabled MBEDTLS_SSL_SRV_C
10079requires_config_enabled MBEDTLS_DEBUG_C
10080requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10082requires_gnutls_tls1_3
10083requires_gnutls_next_no_ticket
10084requires_gnutls_next_disable_tls13_compat
10085run_test "TLS 1.3 G->m: HRR secp256r1 -> secp384r1" \
10086 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10087 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10088 0 \
10089 -s "Protocol is TLSv1.3" \
10090 -s "got named group: secp384r1(0018)" \
10091 -s "Verifying peer X.509 certificate... ok" \
10092 -c "HTTP/1.0 200 OK" \
10093 -s "HRR selected_group: secp384r1"
10094
10095requires_config_enabled MBEDTLS_SSL_SRV_C
10096requires_config_enabled MBEDTLS_DEBUG_C
10097requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10098requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10099requires_gnutls_tls1_3
10100requires_gnutls_next_no_ticket
10101requires_gnutls_next_disable_tls13_compat
10102run_test "TLS 1.3 G->m: HRR secp256r1 -> secp521r1" \
10103 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10104 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10105 0 \
10106 -s "Protocol is TLSv1.3" \
10107 -s "got named group: secp521r1(0019)" \
10108 -s "Verifying peer X.509 certificate... ok" \
10109 -c "HTTP/1.0 200 OK" \
10110 -s "HRR selected_group: secp521r1"
10111
10112requires_config_enabled MBEDTLS_SSL_SRV_C
10113requires_config_enabled MBEDTLS_DEBUG_C
10114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10116requires_gnutls_tls1_3
10117requires_gnutls_next_no_ticket
10118requires_gnutls_next_disable_tls13_compat
10119run_test "TLS 1.3 G->m: HRR secp256r1 -> x25519" \
10120 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10121 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10122 0 \
10123 -s "Protocol is TLSv1.3" \
10124 -s "got named group: x25519(001d)" \
10125 -s "Verifying peer X.509 certificate... ok" \
10126 -c "HTTP/1.0 200 OK" \
10127 -s "HRR selected_group: x25519"
10128
10129requires_config_enabled MBEDTLS_SSL_SRV_C
10130requires_config_enabled MBEDTLS_DEBUG_C
10131requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10132requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10133requires_gnutls_tls1_3
10134requires_gnutls_next_no_ticket
10135requires_gnutls_next_disable_tls13_compat
10136run_test "TLS 1.3 G->m: HRR secp256r1 -> x448" \
10137 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10138 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10139 0 \
10140 -s "Protocol is TLSv1.3" \
10141 -s "got named group: x448(001e)" \
10142 -s "Verifying peer X.509 certificate... ok" \
10143 -c "HTTP/1.0 200 OK" \
10144 -s "HRR selected_group: x448"
10145
10146requires_config_enabled MBEDTLS_SSL_SRV_C
10147requires_config_enabled MBEDTLS_DEBUG_C
10148requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10149requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10150requires_gnutls_tls1_3
10151requires_gnutls_next_no_ticket
10152requires_gnutls_next_disable_tls13_compat
10153run_test "TLS 1.3 G->m: HRR secp384r1 -> secp256r1" \
10154 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10155 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10156 0 \
10157 -s "Protocol is TLSv1.3" \
10158 -s "got named group: secp256r1(0017)" \
10159 -s "Verifying peer X.509 certificate... ok" \
10160 -c "HTTP/1.0 200 OK" \
10161 -s "HRR selected_group: secp256r1"
10162
10163requires_config_enabled MBEDTLS_SSL_SRV_C
10164requires_config_enabled MBEDTLS_DEBUG_C
10165requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10166requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10167requires_gnutls_tls1_3
10168requires_gnutls_next_no_ticket
10169requires_gnutls_next_disable_tls13_compat
10170run_test "TLS 1.3 G->m: HRR secp384r1 -> secp521r1" \
10171 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10172 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10173 0 \
10174 -s "Protocol is TLSv1.3" \
10175 -s "got named group: secp521r1(0019)" \
10176 -s "Verifying peer X.509 certificate... ok" \
10177 -c "HTTP/1.0 200 OK" \
10178 -s "HRR selected_group: secp521r1"
10179
10180requires_config_enabled MBEDTLS_SSL_SRV_C
10181requires_config_enabled MBEDTLS_DEBUG_C
10182requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10183requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10184requires_gnutls_tls1_3
10185requires_gnutls_next_no_ticket
10186requires_gnutls_next_disable_tls13_compat
10187run_test "TLS 1.3 G->m: HRR secp384r1 -> x25519" \
10188 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10189 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10190 0 \
10191 -s "Protocol is TLSv1.3" \
10192 -s "got named group: x25519(001d)" \
10193 -s "Verifying peer X.509 certificate... ok" \
10194 -c "HTTP/1.0 200 OK" \
10195 -s "HRR selected_group: x25519"
10196
10197requires_config_enabled MBEDTLS_SSL_SRV_C
10198requires_config_enabled MBEDTLS_DEBUG_C
10199requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10201requires_gnutls_tls1_3
10202requires_gnutls_next_no_ticket
10203requires_gnutls_next_disable_tls13_compat
10204run_test "TLS 1.3 G->m: HRR secp384r1 -> x448" \
10205 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10206 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10207 0 \
10208 -s "Protocol is TLSv1.3" \
10209 -s "got named group: x448(001e)" \
10210 -s "Verifying peer X.509 certificate... ok" \
10211 -c "HTTP/1.0 200 OK" \
10212 -s "HRR selected_group: x448"
10213
10214requires_config_enabled MBEDTLS_SSL_SRV_C
10215requires_config_enabled MBEDTLS_DEBUG_C
10216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10218requires_gnutls_tls1_3
10219requires_gnutls_next_no_ticket
10220requires_gnutls_next_disable_tls13_compat
10221run_test "TLS 1.3 G->m: HRR secp521r1 -> secp256r1" \
10222 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10223 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10224 0 \
10225 -s "Protocol is TLSv1.3" \
10226 -s "got named group: secp256r1(0017)" \
10227 -s "Verifying peer X.509 certificate... ok" \
10228 -c "HTTP/1.0 200 OK" \
10229 -s "HRR selected_group: secp256r1"
10230
10231requires_config_enabled MBEDTLS_SSL_SRV_C
10232requires_config_enabled MBEDTLS_DEBUG_C
10233requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10234requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10235requires_gnutls_tls1_3
10236requires_gnutls_next_no_ticket
10237requires_gnutls_next_disable_tls13_compat
10238run_test "TLS 1.3 G->m: HRR secp521r1 -> secp384r1" \
10239 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10240 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10241 0 \
10242 -s "Protocol is TLSv1.3" \
10243 -s "got named group: secp384r1(0018)" \
10244 -s "Verifying peer X.509 certificate... ok" \
10245 -c "HTTP/1.0 200 OK" \
10246 -s "HRR selected_group: secp384r1"
10247
10248requires_config_enabled MBEDTLS_SSL_SRV_C
10249requires_config_enabled MBEDTLS_DEBUG_C
10250requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10251requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10252requires_gnutls_tls1_3
10253requires_gnutls_next_no_ticket
10254requires_gnutls_next_disable_tls13_compat
10255run_test "TLS 1.3 G->m: HRR secp521r1 -> x25519" \
10256 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10257 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10258 0 \
10259 -s "Protocol is TLSv1.3" \
10260 -s "got named group: x25519(001d)" \
10261 -s "Verifying peer X.509 certificate... ok" \
10262 -c "HTTP/1.0 200 OK" \
10263 -s "HRR selected_group: x25519"
10264
10265requires_config_enabled MBEDTLS_SSL_SRV_C
10266requires_config_enabled MBEDTLS_DEBUG_C
10267requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10268requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10269requires_gnutls_tls1_3
10270requires_gnutls_next_no_ticket
10271requires_gnutls_next_disable_tls13_compat
10272run_test "TLS 1.3 G->m: HRR secp521r1 -> x448" \
10273 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10274 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10275 0 \
10276 -s "Protocol is TLSv1.3" \
10277 -s "got named group: x448(001e)" \
10278 -s "Verifying peer X.509 certificate... ok" \
10279 -c "HTTP/1.0 200 OK" \
10280 -s "HRR selected_group: x448"
10281
10282requires_config_enabled MBEDTLS_SSL_SRV_C
10283requires_config_enabled MBEDTLS_DEBUG_C
10284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10286requires_gnutls_tls1_3
10287requires_gnutls_next_no_ticket
10288requires_gnutls_next_disable_tls13_compat
10289run_test "TLS 1.3 G->m: HRR x25519 -> secp256r1" \
10290 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10291 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10292 0 \
10293 -s "Protocol is TLSv1.3" \
10294 -s "got named group: secp256r1(0017)" \
10295 -s "Verifying peer X.509 certificate... ok" \
10296 -c "HTTP/1.0 200 OK" \
10297 -s "HRR selected_group: secp256r1"
10298
10299requires_config_enabled MBEDTLS_SSL_SRV_C
10300requires_config_enabled MBEDTLS_DEBUG_C
10301requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10303requires_gnutls_tls1_3
10304requires_gnutls_next_no_ticket
10305requires_gnutls_next_disable_tls13_compat
10306run_test "TLS 1.3 G->m: HRR x25519 -> secp384r1" \
10307 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10308 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10309 0 \
10310 -s "Protocol is TLSv1.3" \
10311 -s "got named group: secp384r1(0018)" \
10312 -s "Verifying peer X.509 certificate... ok" \
10313 -c "HTTP/1.0 200 OK" \
10314 -s "HRR selected_group: secp384r1"
10315
10316requires_config_enabled MBEDTLS_SSL_SRV_C
10317requires_config_enabled MBEDTLS_DEBUG_C
10318requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10319requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10320requires_gnutls_tls1_3
10321requires_gnutls_next_no_ticket
10322requires_gnutls_next_disable_tls13_compat
10323run_test "TLS 1.3 G->m: HRR x25519 -> secp521r1" \
10324 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10325 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10326 0 \
10327 -s "Protocol is TLSv1.3" \
10328 -s "got named group: secp521r1(0019)" \
10329 -s "Verifying peer X.509 certificate... ok" \
10330 -c "HTTP/1.0 200 OK" \
10331 -s "HRR selected_group: secp521r1"
10332
10333requires_config_enabled MBEDTLS_SSL_SRV_C
10334requires_config_enabled MBEDTLS_DEBUG_C
10335requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10336requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10337requires_gnutls_tls1_3
10338requires_gnutls_next_no_ticket
10339requires_gnutls_next_disable_tls13_compat
10340run_test "TLS 1.3 G->m: HRR x25519 -> x448" \
10341 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10342 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10343 0 \
10344 -s "Protocol is TLSv1.3" \
10345 -s "got named group: x448(001e)" \
10346 -s "Verifying peer X.509 certificate... ok" \
10347 -c "HTTP/1.0 200 OK" \
10348 -s "HRR selected_group: x448"
10349
10350requires_config_enabled MBEDTLS_SSL_SRV_C
10351requires_config_enabled MBEDTLS_DEBUG_C
10352requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10353requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10354requires_gnutls_tls1_3
10355requires_gnutls_next_no_ticket
10356requires_gnutls_next_disable_tls13_compat
10357run_test "TLS 1.3 G->m: HRR x448 -> secp256r1" \
10358 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10359 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10360 0 \
10361 -s "Protocol is TLSv1.3" \
10362 -s "got named group: secp256r1(0017)" \
10363 -s "Verifying peer X.509 certificate... ok" \
10364 -c "HTTP/1.0 200 OK" \
10365 -s "HRR selected_group: secp256r1"
10366
10367requires_config_enabled MBEDTLS_SSL_SRV_C
10368requires_config_enabled MBEDTLS_DEBUG_C
10369requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10370requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10371requires_gnutls_tls1_3
10372requires_gnutls_next_no_ticket
10373requires_gnutls_next_disable_tls13_compat
10374run_test "TLS 1.3 G->m: HRR x448 -> secp384r1" \
10375 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10376 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10377 0 \
10378 -s "Protocol is TLSv1.3" \
10379 -s "got named group: secp384r1(0018)" \
10380 -s "Verifying peer X.509 certificate... ok" \
10381 -c "HTTP/1.0 200 OK" \
10382 -s "HRR selected_group: secp384r1"
10383
10384requires_config_enabled MBEDTLS_SSL_SRV_C
10385requires_config_enabled MBEDTLS_DEBUG_C
10386requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10387requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10388requires_gnutls_tls1_3
10389requires_gnutls_next_no_ticket
10390requires_gnutls_next_disable_tls13_compat
10391run_test "TLS 1.3 G->m: HRR x448 -> secp521r1" \
10392 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10393 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10394 0 \
10395 -s "Protocol is TLSv1.3" \
10396 -s "got named group: secp521r1(0019)" \
10397 -s "Verifying peer X.509 certificate... ok" \
10398 -c "HTTP/1.0 200 OK" \
10399 -s "HRR selected_group: secp521r1"
10400
10401requires_config_enabled MBEDTLS_SSL_SRV_C
10402requires_config_enabled MBEDTLS_DEBUG_C
10403requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10404requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10405requires_gnutls_tls1_3
10406requires_gnutls_next_no_ticket
10407requires_gnutls_next_disable_tls13_compat
10408run_test "TLS 1.3 G->m: HRR x448 -> x25519" \
10409 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10410 "$G_NEXT_CLI_NO_CERT --debug=4 localhost -p $SRV_PORT --single-key-share --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS --x509cafile data_files/test-ca2.crt" \
10411 0 \
10412 -s "Protocol is TLSv1.3" \
10413 -s "got named group: x25519(001d)" \
10414 -s "Verifying peer X.509 certificate... ok" \
10415 -c "HTTP/1.0 200 OK" \
10416 -s "HRR selected_group: x25519"
10417
10418requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010419requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010420requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010421requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10422requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQiana1931442022-03-25 11:58:22 +000010423run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010424 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010425 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQiana1931442022-03-25 11:58:22 +000010426 0 \
10427 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010428 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010429 -c "NamedGroup: secp256r1 ( 17 )" \
10430 -c "NamedGroup: secp384r1 ( 18 )" \
10431 -c "Verifying peer X.509 certificate... ok" \
10432 -c "received HelloRetryRequest message" \
10433 -c "selected_group ( 24 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010434
XiaokangQian83f81882022-03-17 06:26:36 +000010435requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010436requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010437requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010438requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10439requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010440run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010441 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010442 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian83f81882022-03-17 06:26:36 +000010443 0 \
10444 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010445 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010446 -c "NamedGroup: secp256r1 ( 17 )" \
10447 -c "NamedGroup: secp521r1 ( 19 )" \
10448 -c "Verifying peer X.509 certificate... ok" \
10449 -c "received HelloRetryRequest message" \
10450 -c "selected_group ( 25 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010451
XiaokangQian83f81882022-03-17 06:26:36 +000010452requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010453requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010454requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010455requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10456requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010457run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010458 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010459 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian83f81882022-03-17 06:26:36 +000010460 0 \
10461 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010462 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010463 -c "NamedGroup: secp256r1 ( 17 )" \
10464 -c "NamedGroup: x25519 ( 1d )" \
10465 -c "Verifying peer X.509 certificate... ok" \
10466 -c "received HelloRetryRequest message" \
10467 -c "selected_group ( 29 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010468
XiaokangQian83f81882022-03-17 06:26:36 +000010469requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010470requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010471requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010472requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10473requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010474run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010475 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010476 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +000010477 0 \
10478 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010479 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010480 -c "NamedGroup: secp256r1 ( 17 )" \
10481 -c "NamedGroup: x448 ( 1e )" \
10482 -c "Verifying peer X.509 certificate... ok" \
10483 -c "received HelloRetryRequest message" \
10484 -c "selected_group ( 30 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010485
XiaokangQian2e17fb82022-03-28 03:30:05 +000010486requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010487requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010488requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010489requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10490requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10491run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010492 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010493 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010494 0 \
10495 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010496 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010497 -c "NamedGroup: secp384r1 ( 18 )" \
10498 -c "NamedGroup: secp256r1 ( 17 )" \
10499 -c "Verifying peer X.509 certificate... ok" \
10500 -c "received HelloRetryRequest message" \
10501 -c "selected_group ( 23 )"
10502
10503requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010504requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10508run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010509 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010510 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010511 0 \
10512 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010513 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010514 -c "NamedGroup: secp384r1 ( 18 )" \
10515 -c "NamedGroup: secp521r1 ( 19 )" \
10516 -c "Verifying peer X.509 certificate... ok" \
10517 -c "received HelloRetryRequest message" \
10518 -c "selected_group ( 25 )"
10519
10520requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010521requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010522requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010523requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10524requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10525run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010526 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010527 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010528 0 \
10529 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010530 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010531 -c "NamedGroup: secp384r1 ( 18 )" \
10532 -c "NamedGroup: x25519 ( 1d )" \
10533 -c "Verifying peer X.509 certificate... ok" \
10534 -c "received HelloRetryRequest message" \
10535 -c "selected_group ( 29 )"
10536
10537requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010538requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010539requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010540requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10541requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10542run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010543 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010544 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010545 0 \
10546 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010547 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010548 -c "NamedGroup: secp384r1 ( 18 )" \
10549 -c "NamedGroup: x448 ( 1e )" \
10550 -c "Verifying peer X.509 certificate... ok" \
10551 -c "received HelloRetryRequest message" \
10552 -c "selected_group ( 30 )"
10553
10554requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010555requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010556requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010557requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10558requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10559run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010560 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010561 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010562 0 \
10563 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010564 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010565 -c "NamedGroup: secp521r1 ( 19 )" \
10566 -c "NamedGroup: secp256r1 ( 17 )" \
10567 -c "Verifying peer X.509 certificate... ok" \
10568 -c "received HelloRetryRequest message" \
10569 -c "selected_group ( 23 )"
10570
10571requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010572requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010573requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10576run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010577 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010578 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010579 0 \
10580 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010581 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010582 -c "NamedGroup: secp521r1 ( 19 )" \
10583 -c "NamedGroup: secp384r1 ( 18 )" \
10584 -c "Verifying peer X.509 certificate... ok" \
10585 -c "received HelloRetryRequest message" \
10586 -c "selected_group ( 24 )"
10587
10588requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010589requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010590requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010591requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10592requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10593run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010594 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010595 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010596 0 \
10597 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010598 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010599 -c "NamedGroup: secp521r1 ( 19 )" \
10600 -c "NamedGroup: x25519 ( 1d )" \
10601 -c "Verifying peer X.509 certificate... ok" \
10602 -c "received HelloRetryRequest message" \
10603 -c "selected_group ( 29 )"
10604
10605requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010606requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010607requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10610run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010611 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010612 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010613 0 \
10614 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010615 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010616 -c "NamedGroup: secp521r1 ( 19 )" \
10617 -c "NamedGroup: x448 ( 1e )" \
10618 -c "Verifying peer X.509 certificate... ok" \
10619 -c "received HelloRetryRequest message" \
10620 -c "selected_group ( 30 )"
10621
10622requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010623requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010624requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010625requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10626requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10627run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010628 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010629 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010630 0 \
10631 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010632 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010633 -c "NamedGroup: x25519 ( 1d )" \
10634 -c "NamedGroup: secp256r1 ( 17 )" \
10635 -c "Verifying peer X.509 certificate... ok" \
10636 -c "received HelloRetryRequest message" \
10637 -c "selected_group ( 23 )"
10638
10639requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010640requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010641requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010642requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10643requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10644run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010645 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010646 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010647 0 \
10648 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010649 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010650 -c "NamedGroup: x25519 ( 1d )" \
10651 -c "NamedGroup: secp384r1 ( 18 )" \
10652 -c "Verifying peer X.509 certificate... ok" \
10653 -c "received HelloRetryRequest message" \
10654 -c "selected_group ( 24 )"
10655
10656requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010657requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010658requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010659requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10661run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010662 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010663 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010664 0 \
10665 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010666 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010667 -c "NamedGroup: x25519 ( 1d )" \
10668 -c "NamedGroup: secp521r1 ( 19 )" \
10669 -c "Verifying peer X.509 certificate... ok" \
10670 -c "received HelloRetryRequest message" \
10671 -c "selected_group ( 25 )"
10672
10673requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010674requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010675requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010676requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10678run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010679 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010680 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010681 0 \
10682 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010683 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010684 -c "NamedGroup: x25519 ( 1d )" \
10685 -c "NamedGroup: x448 ( 1e )" \
10686 -c "Verifying peer X.509 certificate... ok" \
10687 -c "received HelloRetryRequest message" \
10688 -c "selected_group ( 30 )"
10689
10690requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010691requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010692requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010693requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10694requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10695run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010696 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010697 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010698 0 \
10699 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010700 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010701 -c "NamedGroup: x448 ( 1e )" \
10702 -c "NamedGroup: secp256r1 ( 17 )" \
10703 -c "Verifying peer X.509 certificate... ok" \
10704 -c "received HelloRetryRequest message" \
10705 -c "selected_group ( 23 )"
10706
10707requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010708requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010709requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010710requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10711requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10712run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010713 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010714 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010715 0 \
10716 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010717 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010718 -c "NamedGroup: x448 ( 1e )" \
10719 -c "NamedGroup: secp384r1 ( 18 )" \
10720 -c "Verifying peer X.509 certificate... ok" \
10721 -c "received HelloRetryRequest message" \
10722 -c "selected_group ( 24 )"
10723
10724requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010725requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010726requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010727requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10728requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10729run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010730 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010731 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010732 0 \
10733 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010734 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010735 -c "NamedGroup: x448 ( 1e )" \
10736 -c "NamedGroup: secp521r1 ( 19 )" \
10737 -c "Verifying peer X.509 certificate... ok" \
10738 -c "received HelloRetryRequest message" \
10739 -c "selected_group ( 25 )"
10740
10741requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010742requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010743requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010744requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10745requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10746run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010747 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -accept $SRV_PORT -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010748 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010749 0 \
10750 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010751 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010752 -c "NamedGroup: x448 ( 1e )" \
10753 -c "NamedGroup: x25519 ( 1d )" \
10754 -c "Verifying peer X.509 certificate... ok" \
10755 -c "received HelloRetryRequest message" \
10756 -c "selected_group ( 29 )"
10757
10758requires_gnutls_tls1_3
10759requires_gnutls_next_no_ticket
10760requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010761requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010762requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010763requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10764requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10765run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010766 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010767 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010768 0 \
10769 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010770 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010771 -c "NamedGroup: secp256r1 ( 17 )" \
10772 -c "NamedGroup: secp384r1 ( 18 )" \
10773 -c "Verifying peer X.509 certificate... ok" \
10774 -c "received HelloRetryRequest message" \
10775 -c "selected_group ( 24 )"
10776
10777requires_gnutls_tls1_3
10778requires_gnutls_next_no_ticket
10779requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010780requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010781requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010782requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10783requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10784run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010785 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010786 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010787 0 \
10788 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010789 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010790 -c "NamedGroup: secp256r1 ( 17 )" \
10791 -c "NamedGroup: secp521r1 ( 19 )" \
10792 -c "Verifying peer X.509 certificate... ok" \
10793 -c "received HelloRetryRequest message" \
10794 -c "selected_group ( 25 )"
10795
10796requires_gnutls_tls1_3
10797requires_gnutls_next_no_ticket
10798requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010799requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010800requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010801requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10803run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010804 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010805 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010806 0 \
10807 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010808 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010809 -c "NamedGroup: secp256r1 ( 17 )" \
10810 -c "NamedGroup: x25519 ( 1d )" \
10811 -c "Verifying peer X.509 certificate... ok" \
10812 -c "received HelloRetryRequest message" \
10813 -c "selected_group ( 29 )"
10814
XiaokangQian83f81882022-03-17 06:26:36 +000010815requires_gnutls_tls1_3
10816requires_gnutls_next_no_ticket
10817requires_gnutls_next_disable_tls13_compat
XiaokangQian83f81882022-03-17 06:26:36 +000010818requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010819requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10821requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010822run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010823 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010824 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +000010825 0 \
10826 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010827 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010828 -c "NamedGroup: secp256r1 ( 17 )" \
10829 -c "NamedGroup: x448 ( 1e )" \
10830 -c "Verifying peer X.509 certificate... ok" \
10831 -c "received HelloRetryRequest message" \
10832 -c "selected_group ( 30 )"
XiaokangQian2e17fb82022-03-28 03:30:05 +000010833
10834requires_gnutls_tls1_3
10835requires_gnutls_next_no_ticket
10836requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010837requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010838requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010839requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10840requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10841run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010842 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010843 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010844 0 \
10845 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010846 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010847 -c "NamedGroup: secp384r1 ( 18 )" \
10848 -c "NamedGroup: secp256r1 ( 17 )" \
10849 -c "Verifying peer X.509 certificate... ok" \
10850 -c "received HelloRetryRequest message" \
10851 -c "selected_group ( 23 )"
10852
10853requires_gnutls_tls1_3
10854requires_gnutls_next_no_ticket
10855requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010856requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010857requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010858requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10860run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010861 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010862 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010863 0 \
10864 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010865 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010866 -c "NamedGroup: secp384r1 ( 18 )" \
10867 -c "NamedGroup: secp521r1 ( 19 )" \
10868 -c "Verifying peer X.509 certificate... ok" \
10869 -c "received HelloRetryRequest message" \
10870 -c "selected_group ( 25 )"
10871
10872requires_gnutls_tls1_3
10873requires_gnutls_next_no_ticket
10874requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010875requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010876requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010877requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10878requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10879run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010880 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010881 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010882 0 \
10883 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010884 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010885 -c "NamedGroup: secp384r1 ( 18 )" \
10886 -c "NamedGroup: x25519 ( 1d )" \
10887 -c "Verifying peer X.509 certificate... ok" \
10888 -c "received HelloRetryRequest message" \
10889 -c "selected_group ( 29 )"
10890
10891requires_gnutls_tls1_3
10892requires_gnutls_next_no_ticket
10893requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010894requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010895requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010896requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10898run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010899 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010900 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010901 0 \
10902 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010903 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010904 -c "NamedGroup: secp384r1 ( 18 )" \
10905 -c "NamedGroup: x448 ( 1e )" \
10906 -c "Verifying peer X.509 certificate... ok" \
10907 -c "received HelloRetryRequest message" \
10908 -c "selected_group ( 30 )"
10909
10910requires_gnutls_tls1_3
10911requires_gnutls_next_no_ticket
10912requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010913requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010914requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010915requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10916requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10917run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010918 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010919 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010920 0 \
10921 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010922 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010923 -c "NamedGroup: secp521r1 ( 19 )" \
10924 -c "NamedGroup: secp256r1 ( 17 )" \
10925 -c "Verifying peer X.509 certificate... ok" \
10926 -c "received HelloRetryRequest message" \
10927 -c "selected_group ( 23 )"
10928
10929requires_gnutls_tls1_3
10930requires_gnutls_next_no_ticket
10931requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010932requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010933requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010934requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10935requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10936run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010937 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010938 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010939 0 \
10940 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010941 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010942 -c "NamedGroup: secp521r1 ( 19 )" \
10943 -c "NamedGroup: secp384r1 ( 18 )" \
10944 -c "Verifying peer X.509 certificate... ok" \
10945 -c "received HelloRetryRequest message" \
10946 -c "selected_group ( 24 )"
10947
10948requires_gnutls_tls1_3
10949requires_gnutls_next_no_ticket
10950requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010951requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010952requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010953requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10954requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10955run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010956 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010957 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010958 0 \
10959 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010960 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010961 -c "NamedGroup: secp521r1 ( 19 )" \
10962 -c "NamedGroup: x25519 ( 1d )" \
10963 -c "Verifying peer X.509 certificate... ok" \
10964 -c "received HelloRetryRequest message" \
10965 -c "selected_group ( 29 )"
10966
10967requires_gnutls_tls1_3
10968requires_gnutls_next_no_ticket
10969requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010970requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010971requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010972requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10973requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10974run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010975 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010976 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010977 0 \
10978 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010979 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010980 -c "NamedGroup: secp521r1 ( 19 )" \
10981 -c "NamedGroup: x448 ( 1e )" \
10982 -c "Verifying peer X.509 certificate... ok" \
10983 -c "received HelloRetryRequest message" \
10984 -c "selected_group ( 30 )"
10985
10986requires_gnutls_tls1_3
10987requires_gnutls_next_no_ticket
10988requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010989requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010990requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010991requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10992requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10993run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010994 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010995 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010996 0 \
10997 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010998 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010999 -c "NamedGroup: x25519 ( 1d )" \
11000 -c "NamedGroup: secp256r1 ( 17 )" \
11001 -c "Verifying peer X.509 certificate... ok" \
11002 -c "received HelloRetryRequest message" \
11003 -c "selected_group ( 23 )"
11004
11005requires_gnutls_tls1_3
11006requires_gnutls_next_no_ticket
11007requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011008requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011009requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011010requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11011requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11012run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011013 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011014 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011015 0 \
11016 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011017 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011018 -c "NamedGroup: x25519 ( 1d )" \
11019 -c "NamedGroup: secp384r1 ( 18 )" \
11020 -c "Verifying peer X.509 certificate... ok" \
11021 -c "received HelloRetryRequest message" \
11022 -c "selected_group ( 24 )"
11023
11024requires_gnutls_tls1_3
11025requires_gnutls_next_no_ticket
11026requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011027requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011028requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011029requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11030requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11031run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011032 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011033 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011034 0 \
11035 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011036 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011037 -c "NamedGroup: x25519 ( 1d )" \
11038 -c "NamedGroup: secp521r1 ( 19 )" \
11039 -c "Verifying peer X.509 certificate... ok" \
11040 -c "received HelloRetryRequest message" \
11041 -c "selected_group ( 25 )"
11042
11043requires_gnutls_tls1_3
11044requires_gnutls_next_no_ticket
11045requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011046requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011047requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011048requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11049requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11050run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011051 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011052 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011053 0 \
11054 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011055 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011056 -c "NamedGroup: x25519 ( 1d )" \
11057 -c "NamedGroup: x448 ( 1e )" \
11058 -c "Verifying peer X.509 certificate... ok" \
11059 -c "received HelloRetryRequest message" \
11060 -c "selected_group ( 30 )"
11061
11062requires_gnutls_tls1_3
11063requires_gnutls_next_no_ticket
11064requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011065requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011066requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011067requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11069run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011070 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011071 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011072 0 \
11073 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011074 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011075 -c "NamedGroup: x448 ( 1e )" \
11076 -c "NamedGroup: secp256r1 ( 17 )" \
11077 -c "Verifying peer X.509 certificate... ok" \
11078 -c "received HelloRetryRequest message" \
11079 -c "selected_group ( 23 )"
11080
11081requires_gnutls_tls1_3
11082requires_gnutls_next_no_ticket
11083requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011084requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011085requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011086requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11087requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11088run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011089 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011090 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011091 0 \
11092 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011093 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011094 -c "NamedGroup: x448 ( 1e )" \
11095 -c "NamedGroup: secp384r1 ( 18 )" \
11096 -c "Verifying peer X.509 certificate... ok" \
11097 -c "received HelloRetryRequest message" \
11098 -c "selected_group ( 24 )"
11099
11100requires_gnutls_tls1_3
11101requires_gnutls_next_no_ticket
11102requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011103requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011104requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011105requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11106requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11107run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011108 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011109 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011110 0 \
11111 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011112 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011113 -c "NamedGroup: x448 ( 1e )" \
11114 -c "NamedGroup: secp521r1 ( 19 )" \
11115 -c "Verifying peer X.509 certificate... ok" \
11116 -c "received HelloRetryRequest message" \
11117 -c "selected_group ( 25 )"
11118
11119requires_gnutls_tls1_3
11120requires_gnutls_next_no_ticket
11121requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000011122requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011123requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000011124requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11125requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11126run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011127 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011128 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011129 0 \
11130 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020011131 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000011132 -c "NamedGroup: x448 ( 1e )" \
11133 -c "NamedGroup: x25519 ( 1d )" \
11134 -c "Verifying peer X.509 certificate... ok" \
11135 -c "received HelloRetryRequest message" \
11136 -c "selected_group ( 29 )"
XiaokangQianb1847a22022-06-08 07:49:31 +000011137
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011138requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011139requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011142requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011143requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011144requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11145requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11146run_test "TLS 1.3 m->m: HRR secp256r1 -> secp384r1" \
11147 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11148 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
11149 0 \
11150 -s "Protocol is TLSv1.3" \
11151 -s "got named group: secp384r1(0018)" \
11152 -s "Verifying peer X.509 certificate... ok" \
11153 -c "Protocol is TLSv1.3" \
11154 -c "NamedGroup: secp256r1 ( 17 )" \
11155 -c "NamedGroup: secp384r1 ( 18 )" \
11156 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011157 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011158 -c "received HelloRetryRequest message" \
11159 -c "selected_group ( 24 )"
11160
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011161requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011162requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011163requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11164requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011165requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011166requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011167requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11169run_test "TLS 1.3 m->m: HRR secp256r1 -> secp521r1" \
11170 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11171 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
11172 0 \
11173 -s "Protocol is TLSv1.3" \
11174 -s "got named group: secp521r1(0019)" \
11175 -s "Verifying peer X.509 certificate... ok" \
11176 -c "Protocol is TLSv1.3" \
11177 -c "NamedGroup: secp256r1 ( 17 )" \
11178 -c "NamedGroup: secp521r1 ( 19 )" \
11179 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011180 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011181 -c "received HelloRetryRequest message" \
11182 -c "selected_group ( 25 )"
11183
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011184requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011185requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011186requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011188requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011189requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011190requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11191requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11192run_test "TLS 1.3 m->m: HRR secp256r1 -> x25519" \
11193 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11194 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
11195 0 \
11196 -s "Protocol is TLSv1.3" \
11197 -s "got named group: x25519(001d)" \
11198 -s "Verifying peer X.509 certificate... ok" \
11199 -c "Protocol is TLSv1.3" \
11200 -c "NamedGroup: secp256r1 ( 17 )" \
11201 -c "NamedGroup: x25519 ( 1d )" \
11202 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011203 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011204 -c "received HelloRetryRequest message" \
11205 -c "selected_group ( 29 )"
11206
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011207requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011208requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011209requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11210requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011211requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011212requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011213requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11214requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11215run_test "TLS 1.3 m->m: HRR secp256r1 -> x448" \
11216 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11217 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
11218 0 \
11219 -s "Protocol is TLSv1.3" \
11220 -s "got named group: x448(001e)" \
11221 -s "Verifying peer X.509 certificate... ok" \
11222 -c "Protocol is TLSv1.3" \
11223 -c "NamedGroup: secp256r1 ( 17 )" \
11224 -c "NamedGroup: x448 ( 1e )" \
11225 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011226 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011227 -c "received HelloRetryRequest message" \
11228 -c "selected_group ( 30 )"
11229
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011230requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011231requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011234requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11238run_test "TLS 1.3 m->m: HRR secp384r1 -> secp256r1" \
11239 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11240 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
11241 0 \
11242 -s "Protocol is TLSv1.3" \
11243 -s "got named group: secp256r1(0017)" \
11244 -s "Verifying peer X.509 certificate... ok" \
11245 -c "Protocol is TLSv1.3" \
11246 -c "NamedGroup: secp384r1 ( 18 )" \
11247 -c "NamedGroup: secp256r1 ( 17 )" \
11248 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011249 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011250 -c "received HelloRetryRequest message" \
11251 -c "selected_group ( 23 )"
11252
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011253requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011254requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011255requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011257requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011258requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011259requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11260requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11261run_test "TLS 1.3 m->m: HRR secp384r1 -> secp521r1" \
11262 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11263 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
11264 0 \
11265 -s "Protocol is TLSv1.3" \
11266 -s "got named group: secp521r1(0019)" \
11267 -s "Verifying peer X.509 certificate... ok" \
11268 -c "Protocol is TLSv1.3" \
11269 -c "NamedGroup: secp384r1 ( 18 )" \
11270 -c "NamedGroup: secp521r1 ( 19 )" \
11271 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011272 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011273 -c "received HelloRetryRequest message" \
11274 -c "selected_group ( 25 )"
11275
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011276requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011277requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011278requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11279requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011280requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011281requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011282requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11283requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11284run_test "TLS 1.3 m->m: HRR secp384r1 -> x25519" \
11285 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11286 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
11287 0 \
11288 -s "Protocol is TLSv1.3" \
11289 -s "got named group: x25519(001d)" \
11290 -s "Verifying peer X.509 certificate... ok" \
11291 -c "Protocol is TLSv1.3" \
11292 -c "NamedGroup: secp384r1 ( 18 )" \
11293 -c "NamedGroup: x25519 ( 1d )" \
11294 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011295 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011296 -c "received HelloRetryRequest message" \
11297 -c "selected_group ( 29 )"
11298
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011299requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011300requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011301requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011303requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011304requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011305requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11307run_test "TLS 1.3 m->m: HRR secp384r1 -> x448" \
11308 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11309 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
11310 0 \
11311 -s "Protocol is TLSv1.3" \
11312 -s "got named group: x448(001e)" \
11313 -s "Verifying peer X.509 certificate... ok" \
11314 -c "Protocol is TLSv1.3" \
11315 -c "NamedGroup: secp384r1 ( 18 )" \
11316 -c "NamedGroup: x448 ( 1e )" \
11317 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011318 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011319 -c "received HelloRetryRequest message" \
11320 -c "selected_group ( 30 )"
11321
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011322requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011323requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011324requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011326requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011327requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011328requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11329requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11330run_test "TLS 1.3 m->m: HRR secp521r1 -> secp256r1" \
11331 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11332 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
11333 0 \
11334 -s "Protocol is TLSv1.3" \
11335 -s "got named group: secp256r1(0017)" \
11336 -s "Verifying peer X.509 certificate... ok" \
11337 -c "Protocol is TLSv1.3" \
11338 -c "NamedGroup: secp521r1 ( 19 )" \
11339 -c "NamedGroup: secp256r1 ( 17 )" \
11340 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011341 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011342 -c "received HelloRetryRequest message" \
11343 -c "selected_group ( 23 )"
11344
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011345requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011346requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011347requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11348requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011349requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011350requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11353run_test "TLS 1.3 m->m: HRR secp521r1 -> secp384r1" \
11354 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11355 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
11356 0 \
11357 -s "Protocol is TLSv1.3" \
11358 -s "got named group: secp384r1(0018)" \
11359 -s "Verifying peer X.509 certificate... ok" \
11360 -c "Protocol is TLSv1.3" \
11361 -c "NamedGroup: secp521r1 ( 19 )" \
11362 -c "NamedGroup: secp384r1 ( 18 )" \
11363 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011364 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011365 -c "received HelloRetryRequest message" \
11366 -c "selected_group ( 24 )"
11367
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011368requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011369requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011370requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11371requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011372requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011373requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011374requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11375requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11376run_test "TLS 1.3 m->m: HRR secp521r1 -> x25519" \
11377 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11378 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
11379 0 \
11380 -s "Protocol is TLSv1.3" \
11381 -s "got named group: x25519(001d)" \
11382 -s "Verifying peer X.509 certificate... ok" \
11383 -c "Protocol is TLSv1.3" \
11384 -c "NamedGroup: secp521r1 ( 19 )" \
11385 -c "NamedGroup: x25519 ( 1d )" \
11386 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011387 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011388 -c "received HelloRetryRequest message" \
11389 -c "selected_group ( 29 )"
11390
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011391requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011392requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011393requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011395requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011396requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011397requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11398requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11399run_test "TLS 1.3 m->m: HRR secp521r1 -> x448" \
11400 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11401 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
11402 0 \
11403 -s "Protocol is TLSv1.3" \
11404 -s "got named group: x448(001e)" \
11405 -s "Verifying peer X.509 certificate... ok" \
11406 -c "Protocol is TLSv1.3" \
11407 -c "NamedGroup: secp521r1 ( 19 )" \
11408 -c "NamedGroup: x448 ( 1e )" \
11409 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011410 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011411 -c "received HelloRetryRequest message" \
11412 -c "selected_group ( 30 )"
11413
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011414requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011415requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011416requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11417requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011418requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011419requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011420requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11421requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11422run_test "TLS 1.3 m->m: HRR x25519 -> secp256r1" \
11423 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11424 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
11425 0 \
11426 -s "Protocol is TLSv1.3" \
11427 -s "got named group: secp256r1(0017)" \
11428 -s "Verifying peer X.509 certificate... ok" \
11429 -c "Protocol is TLSv1.3" \
11430 -c "NamedGroup: x25519 ( 1d )" \
11431 -c "NamedGroup: secp256r1 ( 17 )" \
11432 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011433 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011434 -c "received HelloRetryRequest message" \
11435 -c "selected_group ( 23 )"
11436
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011437requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011438requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011439requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11440requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011441requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011443requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11444requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11445run_test "TLS 1.3 m->m: HRR x25519 -> secp384r1" \
11446 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11447 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
11448 0 \
11449 -s "Protocol is TLSv1.3" \
11450 -s "got named group: secp384r1(0018)" \
11451 -s "Verifying peer X.509 certificate... ok" \
11452 -c "Protocol is TLSv1.3" \
11453 -c "NamedGroup: x25519 ( 1d )" \
11454 -c "NamedGroup: secp384r1 ( 18 )" \
11455 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011456 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011457 -c "received HelloRetryRequest message" \
11458 -c "selected_group ( 24 )"
11459
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011460requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011461requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011462requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11463requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011464requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011465requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011466requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11468run_test "TLS 1.3 m->m: HRR x25519 -> secp521r1" \
11469 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11470 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
11471 0 \
11472 -s "Protocol is TLSv1.3" \
11473 -s "got named group: secp521r1(0019)" \
11474 -s "Verifying peer X.509 certificate... ok" \
11475 -c "Protocol is TLSv1.3" \
11476 -c "NamedGroup: x25519 ( 1d )" \
11477 -c "NamedGroup: secp521r1 ( 19 )" \
11478 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011479 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011480 -c "received HelloRetryRequest message" \
11481 -c "selected_group ( 25 )"
11482
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011483requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011484requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011487requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011488requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011489requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11490requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11491run_test "TLS 1.3 m->m: HRR x25519 -> x448" \
11492 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11493 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
11494 0 \
11495 -s "Protocol is TLSv1.3" \
11496 -s "got named group: x448(001e)" \
11497 -s "Verifying peer X.509 certificate... ok" \
11498 -c "Protocol is TLSv1.3" \
11499 -c "NamedGroup: x25519 ( 1d )" \
11500 -c "NamedGroup: x448 ( 1e )" \
11501 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011502 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011503 -c "received HelloRetryRequest message" \
11504 -c "selected_group ( 30 )"
11505
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011506requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011507requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011508requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11509requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011510requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011511requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011512requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11513requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11514run_test "TLS 1.3 m->m: HRR x448 -> secp256r1" \
11515 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11516 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
11517 0 \
11518 -s "Protocol is TLSv1.3" \
11519 -s "got named group: secp256r1(0017)" \
11520 -s "Verifying peer X.509 certificate... ok" \
11521 -c "Protocol is TLSv1.3" \
11522 -c "NamedGroup: x448 ( 1e )" \
11523 -c "NamedGroup: secp256r1 ( 17 )" \
11524 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011525 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011526 -c "received HelloRetryRequest message" \
11527 -c "selected_group ( 23 )"
11528
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011529requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011530requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011531requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11532requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011533requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011534requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011535requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11536requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11537run_test "TLS 1.3 m->m: HRR x448 -> secp384r1" \
11538 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11539 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
11540 0 \
11541 -s "Protocol is TLSv1.3" \
11542 -s "got named group: secp384r1(0018)" \
11543 -s "Verifying peer X.509 certificate... ok" \
11544 -c "Protocol is TLSv1.3" \
11545 -c "NamedGroup: x448 ( 1e )" \
11546 -c "NamedGroup: secp384r1 ( 18 )" \
11547 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011548 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011549 -c "received HelloRetryRequest message" \
11550 -c "selected_group ( 24 )"
11551
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011552requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011553requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011556requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011557requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011558requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11560run_test "TLS 1.3 m->m: HRR x448 -> secp521r1" \
11561 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11562 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
11563 0 \
11564 -s "Protocol is TLSv1.3" \
11565 -s "got named group: secp521r1(0019)" \
11566 -s "Verifying peer X.509 certificate... ok" \
11567 -c "Protocol is TLSv1.3" \
11568 -c "NamedGroup: x448 ( 1e )" \
11569 -c "NamedGroup: secp521r1 ( 19 )" \
11570 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011571 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011572 -c "received HelloRetryRequest message" \
11573 -c "selected_group ( 25 )"
11574
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011575requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011576requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011577requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11578requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011579requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011580requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011581requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11583run_test "TLS 1.3 m->m: HRR x448 -> x25519" \
11584 "$P_SRV_NO_CERT server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11585 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
11586 0 \
11587 -s "Protocol is TLSv1.3" \
11588 -s "got named group: x25519(001d)" \
11589 -s "Verifying peer X.509 certificate... ok" \
11590 -c "Protocol is TLSv1.3" \
11591 -c "NamedGroup: x448 ( 1e )" \
11592 -c "NamedGroup: x25519 ( 1d )" \
11593 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011594 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011595 -c "received HelloRetryRequest message" \
11596 -c "selected_group ( 29 )"