blob: 5a71d1c42b6e2fab255e0841ddab2ab68f4e5ea3 [file] [log] [blame]
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001#!/bin/sh
2
3# tls13-compat.sh
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19#
20# Purpose
21#
22# List TLS1.3 compat test cases. They are generated by
23# `./tests/scripts/generate_tls13_compat_tests.py -a -o tests/opt-testcases/tls13-compat.sh`.
24#
25# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
26# AND REGENERATE THIS FILE.
27#
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000028requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000029requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000030requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
31requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
32requires_openssl_tls1_3
33run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080034 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
35 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000036 0 \
37 -s "Protocol is TLSv1.3" \
38 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
39 -s "received signature algorithm: 0x403" \
40 -s "got named group: secp256r1(0017)" \
41 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000042 -C "received HelloRetryRequest message"
Jerry Yu31018ad2021-11-26 20:36:17 +080043
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000044requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000045requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000046requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
47requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
48requires_openssl_tls1_3
49run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +080050 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
51 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000052 0 \
53 -s "Protocol is TLSv1.3" \
54 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
55 -s "received signature algorithm: 0x503" \
56 -s "got named group: secp256r1(0017)" \
57 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000058 -C "received HelloRetryRequest message"
59
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000060requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000061requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000062requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
63requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
64requires_openssl_tls1_3
65run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +080066 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
67 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000068 0 \
69 -s "Protocol is TLSv1.3" \
70 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
71 -s "received signature algorithm: 0x603" \
72 -s "got named group: secp256r1(0017)" \
73 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000074 -C "received HelloRetryRequest message"
75
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000076requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000077requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000078requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
79requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
80requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
81requires_openssl_tls1_3
82run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080083 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
84 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +000085 0 \
86 -s "Protocol is TLSv1.3" \
87 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
88 -s "received signature algorithm: 0x804" \
89 -s "got named group: secp256r1(0017)" \
90 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +000091 -C "received HelloRetryRequest message"
92
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000093requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000094requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
96requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
97requires_openssl_tls1_3
98run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +080099 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
100 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000101 0 \
102 -s "Protocol is TLSv1.3" \
103 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
104 -s "received signature algorithm: 0x403" \
105 -s "got named group: secp384r1(0018)" \
106 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000107 -C "received HelloRetryRequest message"
108
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000109requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000110requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000111requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
112requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
113requires_openssl_tls1_3
114run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800115 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
116 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000117 0 \
118 -s "Protocol is TLSv1.3" \
119 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
120 -s "received signature algorithm: 0x503" \
121 -s "got named group: secp384r1(0018)" \
122 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000123 -C "received HelloRetryRequest message"
124
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000125requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000126requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000127requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
128requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
129requires_openssl_tls1_3
130run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800131 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
132 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000133 0 \
134 -s "Protocol is TLSv1.3" \
135 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
136 -s "received signature algorithm: 0x603" \
137 -s "got named group: secp384r1(0018)" \
138 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000139 -C "received HelloRetryRequest message"
140
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000141requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000142requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000143requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
144requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
145requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
146requires_openssl_tls1_3
147run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800148 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
149 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000150 0 \
151 -s "Protocol is TLSv1.3" \
152 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
153 -s "received signature algorithm: 0x804" \
154 -s "got named group: secp384r1(0018)" \
155 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000156 -C "received HelloRetryRequest message"
157
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000158requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000159requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000160requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
161requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
162requires_openssl_tls1_3
163run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800164 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
165 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000166 0 \
167 -s "Protocol is TLSv1.3" \
168 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
169 -s "received signature algorithm: 0x403" \
170 -s "got named group: secp521r1(0019)" \
171 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000172 -C "received HelloRetryRequest message"
173
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000174requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000175requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000176requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
177requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
178requires_openssl_tls1_3
179run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800180 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
181 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000182 0 \
183 -s "Protocol is TLSv1.3" \
184 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
185 -s "received signature algorithm: 0x503" \
186 -s "got named group: secp521r1(0019)" \
187 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000188 -C "received HelloRetryRequest message"
189
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000190requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000191requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
193requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
194requires_openssl_tls1_3
195run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800196 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
197 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000198 0 \
199 -s "Protocol is TLSv1.3" \
200 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
201 -s "received signature algorithm: 0x603" \
202 -s "got named group: secp521r1(0019)" \
203 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000204 -C "received HelloRetryRequest message"
205
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000206requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000207requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000208requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
209requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
210requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
211requires_openssl_tls1_3
212run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800213 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
214 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000215 0 \
216 -s "Protocol is TLSv1.3" \
217 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
218 -s "received signature algorithm: 0x804" \
219 -s "got named group: secp521r1(0019)" \
220 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000221 -C "received HelloRetryRequest message"
222
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000223requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000224requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000225requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
226requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
227requires_openssl_tls1_3
228run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800229 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
230 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000231 0 \
232 -s "Protocol is TLSv1.3" \
233 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
234 -s "received signature algorithm: 0x403" \
235 -s "got named group: x25519(001d)" \
236 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000237 -C "received HelloRetryRequest message"
238
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000239requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000240requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000241requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
242requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
243requires_openssl_tls1_3
244run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800245 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
246 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000247 0 \
248 -s "Protocol is TLSv1.3" \
249 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
250 -s "received signature algorithm: 0x503" \
251 -s "got named group: x25519(001d)" \
252 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000253 -C "received HelloRetryRequest message"
254
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000255requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000256requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
259requires_openssl_tls1_3
260run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800261 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
262 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000263 0 \
264 -s "Protocol is TLSv1.3" \
265 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
266 -s "received signature algorithm: 0x603" \
267 -s "got named group: x25519(001d)" \
268 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000269 -C "received HelloRetryRequest message"
270
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000271requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000272requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000273requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
274requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
275requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
276requires_openssl_tls1_3
277run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800278 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
279 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000280 0 \
281 -s "Protocol is TLSv1.3" \
282 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
283 -s "received signature algorithm: 0x804" \
284 -s "got named group: x25519(001d)" \
285 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000286 -C "received HelloRetryRequest message"
287
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000288requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000289requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
292requires_openssl_tls1_3
293run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800294 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
295 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000296 0 \
297 -s "Protocol is TLSv1.3" \
298 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
299 -s "received signature algorithm: 0x403" \
300 -s "got named group: x448(001e)" \
301 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000302 -C "received HelloRetryRequest message"
303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
308requires_openssl_tls1_3
309run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800310 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
311 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000312 0 \
313 -s "Protocol is TLSv1.3" \
314 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
315 -s "received signature algorithm: 0x503" \
316 -s "got named group: x448(001e)" \
317 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000318 -C "received HelloRetryRequest message"
319
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000320requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000321requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000322requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
323requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
324requires_openssl_tls1_3
325run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800326 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
327 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000328 0 \
329 -s "Protocol is TLSv1.3" \
330 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
331 -s "received signature algorithm: 0x603" \
332 -s "got named group: x448(001e)" \
333 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000334 -C "received HelloRetryRequest message"
335
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000336requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000337requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
340requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
341requires_openssl_tls1_3
342run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800343 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
344 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000345 0 \
346 -s "Protocol is TLSv1.3" \
347 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
348 -s "received signature algorithm: 0x804" \
349 -s "got named group: x448(001e)" \
350 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000351 -C "received HelloRetryRequest message"
352
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000353requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000354requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000355requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
356requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
357requires_openssl_tls1_3
358run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800359 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
360 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000361 0 \
362 -s "Protocol is TLSv1.3" \
363 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
364 -s "received signature algorithm: 0x403" \
365 -s "got named group: secp256r1(0017)" \
366 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000367 -C "received HelloRetryRequest message"
368
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000369requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000370requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000371requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
372requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
373requires_openssl_tls1_3
374run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800375 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
376 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000377 0 \
378 -s "Protocol is TLSv1.3" \
379 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
380 -s "received signature algorithm: 0x503" \
381 -s "got named group: secp256r1(0017)" \
382 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000383 -C "received HelloRetryRequest message"
384
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000385requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000386requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000387requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
388requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
389requires_openssl_tls1_3
390run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800391 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
392 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000393 0 \
394 -s "Protocol is TLSv1.3" \
395 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
396 -s "received signature algorithm: 0x603" \
397 -s "got named group: secp256r1(0017)" \
398 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000399 -C "received HelloRetryRequest message"
400
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000401requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000402requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000403requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
404requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
405requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
406requires_openssl_tls1_3
407run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800408 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
409 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000410 0 \
411 -s "Protocol is TLSv1.3" \
412 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
413 -s "received signature algorithm: 0x804" \
414 -s "got named group: secp256r1(0017)" \
415 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000416 -C "received HelloRetryRequest message"
417
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000418requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000419requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000420requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
421requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
422requires_openssl_tls1_3
423run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800424 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
425 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000426 0 \
427 -s "Protocol is TLSv1.3" \
428 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
429 -s "received signature algorithm: 0x403" \
430 -s "got named group: secp384r1(0018)" \
431 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000432 -C "received HelloRetryRequest message"
433
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000434requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000435requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
438requires_openssl_tls1_3
439run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800440 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
441 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000442 0 \
443 -s "Protocol is TLSv1.3" \
444 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
445 -s "received signature algorithm: 0x503" \
446 -s "got named group: secp384r1(0018)" \
447 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000448 -C "received HelloRetryRequest message"
449
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000450requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000451requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
454requires_openssl_tls1_3
455run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800456 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
457 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000458 0 \
459 -s "Protocol is TLSv1.3" \
460 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
461 -s "received signature algorithm: 0x603" \
462 -s "got named group: secp384r1(0018)" \
463 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000464 -C "received HelloRetryRequest message"
465
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000466requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000467requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000468requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
469requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
470requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
471requires_openssl_tls1_3
472run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800473 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
474 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000475 0 \
476 -s "Protocol is TLSv1.3" \
477 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
478 -s "received signature algorithm: 0x804" \
479 -s "got named group: secp384r1(0018)" \
480 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000481 -C "received HelloRetryRequest message"
482
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000483requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000484requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000485requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
486requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
487requires_openssl_tls1_3
488run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800489 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
490 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000491 0 \
492 -s "Protocol is TLSv1.3" \
493 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
494 -s "received signature algorithm: 0x403" \
495 -s "got named group: secp521r1(0019)" \
496 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000497 -C "received HelloRetryRequest message"
498
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000499requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000500requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000501requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
502requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
503requires_openssl_tls1_3
504run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800505 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
506 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000507 0 \
508 -s "Protocol is TLSv1.3" \
509 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
510 -s "received signature algorithm: 0x503" \
511 -s "got named group: secp521r1(0019)" \
512 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000513 -C "received HelloRetryRequest message"
514
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000515requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000516requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000517requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
518requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
519requires_openssl_tls1_3
520run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800521 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
522 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000523 0 \
524 -s "Protocol is TLSv1.3" \
525 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
526 -s "received signature algorithm: 0x603" \
527 -s "got named group: secp521r1(0019)" \
528 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000529 -C "received HelloRetryRequest message"
530
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000531requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000532requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000533requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
534requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
535requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
536requires_openssl_tls1_3
537run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800538 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
539 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000540 0 \
541 -s "Protocol is TLSv1.3" \
542 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
543 -s "received signature algorithm: 0x804" \
544 -s "got named group: secp521r1(0019)" \
545 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000546 -C "received HelloRetryRequest message"
547
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000548requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000549requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
552requires_openssl_tls1_3
553run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800554 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
555 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000556 0 \
557 -s "Protocol is TLSv1.3" \
558 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
559 -s "received signature algorithm: 0x403" \
560 -s "got named group: x25519(001d)" \
561 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000562 -C "received HelloRetryRequest message"
563
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000564requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000565requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000566requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
567requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
568requires_openssl_tls1_3
569run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800570 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
571 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000572 0 \
573 -s "Protocol is TLSv1.3" \
574 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
575 -s "received signature algorithm: 0x503" \
576 -s "got named group: x25519(001d)" \
577 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000578 -C "received HelloRetryRequest message"
579
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000580requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000581requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
584requires_openssl_tls1_3
585run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800586 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
587 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000588 0 \
589 -s "Protocol is TLSv1.3" \
590 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
591 -s "received signature algorithm: 0x603" \
592 -s "got named group: x25519(001d)" \
593 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000594 -C "received HelloRetryRequest message"
595
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000596requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000597requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000598requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
599requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
600requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
601requires_openssl_tls1_3
602run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800603 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
604 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000605 0 \
606 -s "Protocol is TLSv1.3" \
607 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
608 -s "received signature algorithm: 0x804" \
609 -s "got named group: x25519(001d)" \
610 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000611 -C "received HelloRetryRequest message"
612
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000613requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000614requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000615requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
616requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
617requires_openssl_tls1_3
618run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800619 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
620 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000621 0 \
622 -s "Protocol is TLSv1.3" \
623 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
624 -s "received signature algorithm: 0x403" \
625 -s "got named group: x448(001e)" \
626 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000627 -C "received HelloRetryRequest message"
628
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000629requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000630requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000631requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
633requires_openssl_tls1_3
634run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800635 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
636 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000637 0 \
638 -s "Protocol is TLSv1.3" \
639 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
640 -s "received signature algorithm: 0x503" \
641 -s "got named group: x448(001e)" \
642 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000643 -C "received HelloRetryRequest message"
644
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000645requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000646requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
648requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
649requires_openssl_tls1_3
650run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800651 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
652 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000653 0 \
654 -s "Protocol is TLSv1.3" \
655 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
656 -s "received signature algorithm: 0x603" \
657 -s "got named group: x448(001e)" \
658 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000659 -C "received HelloRetryRequest message"
660
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000661requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000662requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000663requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
664requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
665requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
666requires_openssl_tls1_3
667run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800668 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
669 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000670 0 \
671 -s "Protocol is TLSv1.3" \
672 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
673 -s "received signature algorithm: 0x804" \
674 -s "got named group: x448(001e)" \
675 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000676 -C "received HelloRetryRequest message"
677
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000678requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000679requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000680requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
681requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
682requires_openssl_tls1_3
683run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800684 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
685 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000686 0 \
687 -s "Protocol is TLSv1.3" \
688 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
689 -s "received signature algorithm: 0x403" \
690 -s "got named group: secp256r1(0017)" \
691 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000692 -C "received HelloRetryRequest message"
693
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000694requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000695requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000696requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
698requires_openssl_tls1_3
699run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800700 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
701 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000702 0 \
703 -s "Protocol is TLSv1.3" \
704 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
705 -s "received signature algorithm: 0x503" \
706 -s "got named group: secp256r1(0017)" \
707 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000708 -C "received HelloRetryRequest message"
709
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000710requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000711requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000712requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
713requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
714requires_openssl_tls1_3
715run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800716 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
717 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000718 0 \
719 -s "Protocol is TLSv1.3" \
720 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
721 -s "received signature algorithm: 0x603" \
722 -s "got named group: secp256r1(0017)" \
723 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000724 -C "received HelloRetryRequest message"
725
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000726requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000727requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000728requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
730requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
731requires_openssl_tls1_3
732run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800733 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
734 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000735 0 \
736 -s "Protocol is TLSv1.3" \
737 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
738 -s "received signature algorithm: 0x804" \
739 -s "got named group: secp256r1(0017)" \
740 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000741 -C "received HelloRetryRequest message"
742
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000743requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000744requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000745requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
746requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
747requires_openssl_tls1_3
748run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800749 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
750 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000751 0 \
752 -s "Protocol is TLSv1.3" \
753 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
754 -s "received signature algorithm: 0x403" \
755 -s "got named group: secp384r1(0018)" \
756 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000757 -C "received HelloRetryRequest message"
758
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000759requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000760requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000761requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
762requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
763requires_openssl_tls1_3
764run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800765 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
766 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000767 0 \
768 -s "Protocol is TLSv1.3" \
769 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
770 -s "received signature algorithm: 0x503" \
771 -s "got named group: secp384r1(0018)" \
772 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000773 -C "received HelloRetryRequest message"
774
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000775requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000776requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000777requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
778requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
779requires_openssl_tls1_3
780run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800781 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
782 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000783 0 \
784 -s "Protocol is TLSv1.3" \
785 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
786 -s "received signature algorithm: 0x603" \
787 -s "got named group: secp384r1(0018)" \
788 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000789 -C "received HelloRetryRequest message"
790
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000791requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000792requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000793requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
794requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
795requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
796requires_openssl_tls1_3
797run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800798 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
799 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000800 0 \
801 -s "Protocol is TLSv1.3" \
802 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
803 -s "received signature algorithm: 0x804" \
804 -s "got named group: secp384r1(0018)" \
805 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000806 -C "received HelloRetryRequest message"
807
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000808requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000809requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000810requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
811requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
812requires_openssl_tls1_3
813run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800814 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
815 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000816 0 \
817 -s "Protocol is TLSv1.3" \
818 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
819 -s "received signature algorithm: 0x403" \
820 -s "got named group: secp521r1(0019)" \
821 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000822 -C "received HelloRetryRequest message"
823
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000824requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000825requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000826requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
828requires_openssl_tls1_3
829run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800830 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
831 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000832 0 \
833 -s "Protocol is TLSv1.3" \
834 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
835 -s "received signature algorithm: 0x503" \
836 -s "got named group: secp521r1(0019)" \
837 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000838 -C "received HelloRetryRequest message"
839
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000840requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000841requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000842requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
843requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
844requires_openssl_tls1_3
845run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800846 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
847 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000848 0 \
849 -s "Protocol is TLSv1.3" \
850 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
851 -s "received signature algorithm: 0x603" \
852 -s "got named group: secp521r1(0019)" \
853 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000854 -C "received HelloRetryRequest message"
855
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000856requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000857requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000858requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
860requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
861requires_openssl_tls1_3
862run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800863 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
864 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000865 0 \
866 -s "Protocol is TLSv1.3" \
867 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
868 -s "received signature algorithm: 0x804" \
869 -s "got named group: secp521r1(0019)" \
870 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000871 -C "received HelloRetryRequest message"
872
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000873requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000874requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
877requires_openssl_tls1_3
878run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800879 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
880 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000881 0 \
882 -s "Protocol is TLSv1.3" \
883 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
884 -s "received signature algorithm: 0x403" \
885 -s "got named group: x25519(001d)" \
886 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000887 -C "received HelloRetryRequest message"
888
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000889requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000890requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000891requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
892requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
893requires_openssl_tls1_3
894run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800895 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
896 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000897 0 \
898 -s "Protocol is TLSv1.3" \
899 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
900 -s "received signature algorithm: 0x503" \
901 -s "got named group: x25519(001d)" \
902 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000903 -C "received HelloRetryRequest message"
904
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000905requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000906requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000907requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
908requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
909requires_openssl_tls1_3
910run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800911 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
912 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000913 0 \
914 -s "Protocol is TLSv1.3" \
915 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
916 -s "received signature algorithm: 0x603" \
917 -s "got named group: x25519(001d)" \
918 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000919 -C "received HelloRetryRequest message"
920
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000921requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000922requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000923requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
925requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
926requires_openssl_tls1_3
927run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800928 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
929 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000930 0 \
931 -s "Protocol is TLSv1.3" \
932 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
933 -s "received signature algorithm: 0x804" \
934 -s "got named group: x25519(001d)" \
935 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000936 -C "received HelloRetryRequest message"
937
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000938requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000939requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
942requires_openssl_tls1_3
943run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800944 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
945 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000946 0 \
947 -s "Protocol is TLSv1.3" \
948 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
949 -s "received signature algorithm: 0x403" \
950 -s "got named group: x448(001e)" \
951 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000952 -C "received HelloRetryRequest message"
953
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000954requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000955requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000956requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
958requires_openssl_tls1_3
959run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800960 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
961 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000962 0 \
963 -s "Protocol is TLSv1.3" \
964 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
965 -s "received signature algorithm: 0x503" \
966 -s "got named group: x448(001e)" \
967 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000968 -C "received HelloRetryRequest message"
969
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000970requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000971requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000972requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
973requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
974requires_openssl_tls1_3
975run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800976 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
977 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000978 0 \
979 -s "Protocol is TLSv1.3" \
980 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
981 -s "received signature algorithm: 0x603" \
982 -s "got named group: x448(001e)" \
983 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000984 -C "received HelloRetryRequest message"
985
XiaokangQianfb1a3fe2022-06-09 06:37:33 +0000986requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +0000987requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +0000988requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
989requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
990requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
991requires_openssl_tls1_3
992run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +0800993 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
994 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +0000995 0 \
996 -s "Protocol is TLSv1.3" \
997 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
998 -s "received signature algorithm: 0x804" \
999 -s "got named group: x448(001e)" \
1000 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001001 -C "received HelloRetryRequest message"
1002
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001003requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1007requires_openssl_tls1_3
1008run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001009 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1010 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001011 0 \
1012 -s "Protocol is TLSv1.3" \
1013 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1014 -s "received signature algorithm: 0x403" \
1015 -s "got named group: secp256r1(0017)" \
1016 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001017 -C "received HelloRetryRequest message"
1018
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001019requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001020requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001021requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1022requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1023requires_openssl_tls1_3
1024run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001025 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1026 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001027 0 \
1028 -s "Protocol is TLSv1.3" \
1029 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1030 -s "received signature algorithm: 0x503" \
1031 -s "got named group: secp256r1(0017)" \
1032 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001033 -C "received HelloRetryRequest message"
1034
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001035requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001036requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001037requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1038requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1039requires_openssl_tls1_3
1040run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001041 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1042 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001043 0 \
1044 -s "Protocol is TLSv1.3" \
1045 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1046 -s "received signature algorithm: 0x603" \
1047 -s "got named group: secp256r1(0017)" \
1048 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001049 -C "received HelloRetryRequest message"
1050
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001051requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001052requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001053requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1054requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1055requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1056requires_openssl_tls1_3
1057run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001058 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1059 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001060 0 \
1061 -s "Protocol is TLSv1.3" \
1062 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1063 -s "received signature algorithm: 0x804" \
1064 -s "got named group: secp256r1(0017)" \
1065 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001066 -C "received HelloRetryRequest message"
1067
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001068requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001069requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001070requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1071requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1072requires_openssl_tls1_3
1073run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001074 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1075 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001076 0 \
1077 -s "Protocol is TLSv1.3" \
1078 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1079 -s "received signature algorithm: 0x403" \
1080 -s "got named group: secp384r1(0018)" \
1081 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001082 -C "received HelloRetryRequest message"
1083
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001084requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001085requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001086requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1087requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1088requires_openssl_tls1_3
1089run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001090 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1091 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001092 0 \
1093 -s "Protocol is TLSv1.3" \
1094 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1095 -s "received signature algorithm: 0x503" \
1096 -s "got named group: secp384r1(0018)" \
1097 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001098 -C "received HelloRetryRequest message"
1099
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001100requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001101requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1104requires_openssl_tls1_3
1105run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001106 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1107 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001108 0 \
1109 -s "Protocol is TLSv1.3" \
1110 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1111 -s "received signature algorithm: 0x603" \
1112 -s "got named group: secp384r1(0018)" \
1113 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001114 -C "received HelloRetryRequest message"
1115
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001116requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001117requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1120requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1121requires_openssl_tls1_3
1122run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001123 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1124 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001125 0 \
1126 -s "Protocol is TLSv1.3" \
1127 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1128 -s "received signature algorithm: 0x804" \
1129 -s "got named group: secp384r1(0018)" \
1130 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001131 -C "received HelloRetryRequest message"
1132
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001133requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001134requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001135requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1136requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1137requires_openssl_tls1_3
1138run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001139 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1140 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001141 0 \
1142 -s "Protocol is TLSv1.3" \
1143 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1144 -s "received signature algorithm: 0x403" \
1145 -s "got named group: secp521r1(0019)" \
1146 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001147 -C "received HelloRetryRequest message"
1148
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001150requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1153requires_openssl_tls1_3
1154run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001155 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1156 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001157 0 \
1158 -s "Protocol is TLSv1.3" \
1159 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1160 -s "received signature algorithm: 0x503" \
1161 -s "got named group: secp521r1(0019)" \
1162 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001163 -C "received HelloRetryRequest message"
1164
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001165requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001166requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001167requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1169requires_openssl_tls1_3
1170run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001171 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1172 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001173 0 \
1174 -s "Protocol is TLSv1.3" \
1175 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1176 -s "received signature algorithm: 0x603" \
1177 -s "got named group: secp521r1(0019)" \
1178 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001179 -C "received HelloRetryRequest message"
1180
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001181requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001182requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001183requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1184requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1185requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1186requires_openssl_tls1_3
1187run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001188 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1189 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001190 0 \
1191 -s "Protocol is TLSv1.3" \
1192 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1193 -s "received signature algorithm: 0x804" \
1194 -s "got named group: secp521r1(0019)" \
1195 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001196 -C "received HelloRetryRequest message"
1197
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001198requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001199requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001200requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1201requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1202requires_openssl_tls1_3
1203run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001204 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1205 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001206 0 \
1207 -s "Protocol is TLSv1.3" \
1208 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1209 -s "received signature algorithm: 0x403" \
1210 -s "got named group: x25519(001d)" \
1211 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001212 -C "received HelloRetryRequest message"
1213
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001214requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001215requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1218requires_openssl_tls1_3
1219run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001220 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1221 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001222 0 \
1223 -s "Protocol is TLSv1.3" \
1224 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1225 -s "received signature algorithm: 0x503" \
1226 -s "got named group: x25519(001d)" \
1227 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001228 -C "received HelloRetryRequest message"
1229
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001230requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001231requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1234requires_openssl_tls1_3
1235run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001236 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1237 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001238 0 \
1239 -s "Protocol is TLSv1.3" \
1240 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1241 -s "received signature algorithm: 0x603" \
1242 -s "got named group: x25519(001d)" \
1243 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001244 -C "received HelloRetryRequest message"
1245
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001246requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001247requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001248requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1249requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1250requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1251requires_openssl_tls1_3
1252run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001253 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1254 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001255 0 \
1256 -s "Protocol is TLSv1.3" \
1257 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1258 -s "received signature algorithm: 0x804" \
1259 -s "got named group: x25519(001d)" \
1260 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001261 -C "received HelloRetryRequest message"
1262
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001263requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001264requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001265requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1266requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1267requires_openssl_tls1_3
1268run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001269 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1270 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001271 0 \
1272 -s "Protocol is TLSv1.3" \
1273 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1274 -s "received signature algorithm: 0x403" \
1275 -s "got named group: x448(001e)" \
1276 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001277 -C "received HelloRetryRequest message"
1278
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001279requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001280requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001281requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1282requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1283requires_openssl_tls1_3
1284run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001285 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1286 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001287 0 \
1288 -s "Protocol is TLSv1.3" \
1289 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1290 -s "received signature algorithm: 0x503" \
1291 -s "got named group: x448(001e)" \
1292 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001293 -C "received HelloRetryRequest message"
1294
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001295requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001296requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001297requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1298requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1299requires_openssl_tls1_3
1300run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001301 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1302 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001303 0 \
1304 -s "Protocol is TLSv1.3" \
1305 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1306 -s "received signature algorithm: 0x603" \
1307 -s "got named group: x448(001e)" \
1308 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001309 -C "received HelloRetryRequest message"
1310
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001311requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001312requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001313requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1315requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1316requires_openssl_tls1_3
1317run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001318 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1319 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001320 0 \
1321 -s "Protocol is TLSv1.3" \
1322 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1323 -s "received signature algorithm: 0x804" \
1324 -s "got named group: x448(001e)" \
1325 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001326 -C "received HelloRetryRequest message"
1327
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001328requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001329requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1332requires_openssl_tls1_3
1333run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001334 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1335 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001336 0 \
1337 -s "Protocol is TLSv1.3" \
1338 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1339 -s "received signature algorithm: 0x403" \
1340 -s "got named group: secp256r1(0017)" \
1341 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001342 -C "received HelloRetryRequest message"
1343
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001344requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001345requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001346requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1347requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1348requires_openssl_tls1_3
1349run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001350 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1351 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001352 0 \
1353 -s "Protocol is TLSv1.3" \
1354 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1355 -s "received signature algorithm: 0x503" \
1356 -s "got named group: secp256r1(0017)" \
1357 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001358 -C "received HelloRetryRequest message"
1359
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001360requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001361requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1364requires_openssl_tls1_3
1365run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001366 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1367 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001368 0 \
1369 -s "Protocol is TLSv1.3" \
1370 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1371 -s "received signature algorithm: 0x603" \
1372 -s "got named group: secp256r1(0017)" \
1373 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001374 -C "received HelloRetryRequest message"
1375
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001376requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001377requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1380requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1381requires_openssl_tls1_3
1382run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001383 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1384 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001385 0 \
1386 -s "Protocol is TLSv1.3" \
1387 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1388 -s "received signature algorithm: 0x804" \
1389 -s "got named group: secp256r1(0017)" \
1390 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001391 -C "received HelloRetryRequest message"
1392
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001393requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001394requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001395requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1396requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1397requires_openssl_tls1_3
1398run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001399 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1400 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001401 0 \
1402 -s "Protocol is TLSv1.3" \
1403 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1404 -s "received signature algorithm: 0x403" \
1405 -s "got named group: secp384r1(0018)" \
1406 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001407 -C "received HelloRetryRequest message"
1408
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001409requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001410requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001411requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1412requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1413requires_openssl_tls1_3
1414run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001415 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1416 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001417 0 \
1418 -s "Protocol is TLSv1.3" \
1419 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1420 -s "received signature algorithm: 0x503" \
1421 -s "got named group: secp384r1(0018)" \
1422 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001423 -C "received HelloRetryRequest message"
1424
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001425requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001426requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1429requires_openssl_tls1_3
1430run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001431 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1432 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001433 0 \
1434 -s "Protocol is TLSv1.3" \
1435 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1436 -s "received signature algorithm: 0x603" \
1437 -s "got named group: secp384r1(0018)" \
1438 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001439 -C "received HelloRetryRequest message"
1440
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001441requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001443requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1444requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1445requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1446requires_openssl_tls1_3
1447run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001448 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1449 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001450 0 \
1451 -s "Protocol is TLSv1.3" \
1452 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1453 -s "received signature algorithm: 0x804" \
1454 -s "got named group: secp384r1(0018)" \
1455 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001456 -C "received HelloRetryRequest message"
1457
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001458requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001459requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001460requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1461requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1462requires_openssl_tls1_3
1463run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001464 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1465 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001466 0 \
1467 -s "Protocol is TLSv1.3" \
1468 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1469 -s "received signature algorithm: 0x403" \
1470 -s "got named group: secp521r1(0019)" \
1471 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001472 -C "received HelloRetryRequest message"
1473
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001474requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001475requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1478requires_openssl_tls1_3
1479run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001480 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1481 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001482 0 \
1483 -s "Protocol is TLSv1.3" \
1484 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1485 -s "received signature algorithm: 0x503" \
1486 -s "got named group: secp521r1(0019)" \
1487 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001488 -C "received HelloRetryRequest message"
1489
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001490requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001491requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001492requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1493requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1494requires_openssl_tls1_3
1495run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001496 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1497 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001498 0 \
1499 -s "Protocol is TLSv1.3" \
1500 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1501 -s "received signature algorithm: 0x603" \
1502 -s "got named group: secp521r1(0019)" \
1503 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001504 -C "received HelloRetryRequest message"
1505
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001506requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001507requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001508requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1509requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1510requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1511requires_openssl_tls1_3
1512run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001513 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1514 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001515 0 \
1516 -s "Protocol is TLSv1.3" \
1517 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1518 -s "received signature algorithm: 0x804" \
1519 -s "got named group: secp521r1(0019)" \
1520 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001521 -C "received HelloRetryRequest message"
1522
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001523requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001524requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001525requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1527requires_openssl_tls1_3
1528run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001529 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1530 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001531 0 \
1532 -s "Protocol is TLSv1.3" \
1533 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1534 -s "received signature algorithm: 0x403" \
1535 -s "got named group: x25519(001d)" \
1536 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001537 -C "received HelloRetryRequest message"
1538
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001539requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001540requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001541requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1542requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1543requires_openssl_tls1_3
1544run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001545 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1546 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001547 0 \
1548 -s "Protocol is TLSv1.3" \
1549 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1550 -s "received signature algorithm: 0x503" \
1551 -s "got named group: x25519(001d)" \
1552 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001553 -C "received HelloRetryRequest message"
1554
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001555requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001556requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001557requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1558requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1559requires_openssl_tls1_3
1560run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001561 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1562 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001563 0 \
1564 -s "Protocol is TLSv1.3" \
1565 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1566 -s "received signature algorithm: 0x603" \
1567 -s "got named group: x25519(001d)" \
1568 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001569 -C "received HelloRetryRequest message"
1570
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001571requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001572requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001573requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1574requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1575requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1576requires_openssl_tls1_3
1577run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001578 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1579 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001580 0 \
1581 -s "Protocol is TLSv1.3" \
1582 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1583 -s "received signature algorithm: 0x804" \
1584 -s "got named group: x25519(001d)" \
1585 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001586 -C "received HelloRetryRequest message"
1587
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001588requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001589requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001590requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1591requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1592requires_openssl_tls1_3
1593run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001594 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1595 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001596 0 \
1597 -s "Protocol is TLSv1.3" \
1598 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1599 -s "received signature algorithm: 0x403" \
1600 -s "got named group: x448(001e)" \
1601 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001602 -C "received HelloRetryRequest message"
1603
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001604requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001605requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001606requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1607requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1608requires_openssl_tls1_3
1609run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001610 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1611 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001612 0 \
1613 -s "Protocol is TLSv1.3" \
1614 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1615 -s "received signature algorithm: 0x503" \
1616 -s "got named group: x448(001e)" \
1617 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001618 -C "received HelloRetryRequest message"
1619
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001621requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1624requires_openssl_tls1_3
1625run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001626 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1627 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001628 0 \
1629 -s "Protocol is TLSv1.3" \
1630 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1631 -s "received signature algorithm: 0x603" \
1632 -s "got named group: x448(001e)" \
1633 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001634 -C "received HelloRetryRequest message"
1635
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001636requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001637requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001638requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1639requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1640requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1641requires_openssl_tls1_3
1642run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001643 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1644 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001645 0 \
1646 -s "Protocol is TLSv1.3" \
1647 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1648 -s "received signature algorithm: 0x804" \
1649 -s "got named group: x448(001e)" \
1650 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001651 -C "received HelloRetryRequest message"
1652
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001653requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001654requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001655requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1656requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1657requires_gnutls_tls1_3
1658requires_gnutls_next_no_ticket
1659requires_gnutls_next_disable_tls13_compat
1660run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001661 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1662 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001663 0 \
1664 -s "Protocol is TLSv1.3" \
1665 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1666 -s "received signature algorithm: 0x403" \
1667 -s "got named group: secp256r1(0017)" \
1668 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001669 -C "received HelloRetryRequest message"
1670
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001671requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001672requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001673requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1675requires_gnutls_tls1_3
1676requires_gnutls_next_no_ticket
1677requires_gnutls_next_disable_tls13_compat
1678run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001679 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1680 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001681 0 \
1682 -s "Protocol is TLSv1.3" \
1683 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1684 -s "received signature algorithm: 0x503" \
1685 -s "got named group: secp256r1(0017)" \
1686 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001687 -C "received HelloRetryRequest message"
1688
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001689requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001690requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001691requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1692requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1693requires_gnutls_tls1_3
1694requires_gnutls_next_no_ticket
1695requires_gnutls_next_disable_tls13_compat
1696run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001697 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1698 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001699 0 \
1700 -s "Protocol is TLSv1.3" \
1701 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1702 -s "received signature algorithm: 0x603" \
1703 -s "got named group: secp256r1(0017)" \
1704 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001705 -C "received HelloRetryRequest message"
1706
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001707requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001708requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001709requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1710requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1711requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1712requires_gnutls_tls1_3
1713requires_gnutls_next_no_ticket
1714requires_gnutls_next_disable_tls13_compat
1715run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001716 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1717 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001718 0 \
1719 -s "Protocol is TLSv1.3" \
1720 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1721 -s "received signature algorithm: 0x804" \
1722 -s "got named group: secp256r1(0017)" \
1723 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001724 -C "received HelloRetryRequest message"
1725
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001726requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001727requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001728requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1730requires_gnutls_tls1_3
1731requires_gnutls_next_no_ticket
1732requires_gnutls_next_disable_tls13_compat
1733run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001734 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1735 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001736 0 \
1737 -s "Protocol is TLSv1.3" \
1738 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1739 -s "received signature algorithm: 0x403" \
1740 -s "got named group: secp384r1(0018)" \
1741 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001742 -C "received HelloRetryRequest message"
1743
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001744requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001745requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1748requires_gnutls_tls1_3
1749requires_gnutls_next_no_ticket
1750requires_gnutls_next_disable_tls13_compat
1751run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001752 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1753 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001754 0 \
1755 -s "Protocol is TLSv1.3" \
1756 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1757 -s "received signature algorithm: 0x503" \
1758 -s "got named group: secp384r1(0018)" \
1759 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001760 -C "received HelloRetryRequest message"
1761
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001762requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001763requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001764requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1765requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1766requires_gnutls_tls1_3
1767requires_gnutls_next_no_ticket
1768requires_gnutls_next_disable_tls13_compat
1769run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001770 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1771 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001772 0 \
1773 -s "Protocol is TLSv1.3" \
1774 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1775 -s "received signature algorithm: 0x603" \
1776 -s "got named group: secp384r1(0018)" \
1777 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001778 -C "received HelloRetryRequest message"
1779
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001780requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001781requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001782requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1783requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1784requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1785requires_gnutls_tls1_3
1786requires_gnutls_next_no_ticket
1787requires_gnutls_next_disable_tls13_compat
1788run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001789 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1790 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001791 0 \
1792 -s "Protocol is TLSv1.3" \
1793 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1794 -s "received signature algorithm: 0x804" \
1795 -s "got named group: secp384r1(0018)" \
1796 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001797 -C "received HelloRetryRequest message"
1798
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001799requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001800requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001801requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1803requires_gnutls_tls1_3
1804requires_gnutls_next_no_ticket
1805requires_gnutls_next_disable_tls13_compat
1806run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001807 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1808 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001809 0 \
1810 -s "Protocol is TLSv1.3" \
1811 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1812 -s "received signature algorithm: 0x403" \
1813 -s "got named group: secp521r1(0019)" \
1814 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001815 -C "received HelloRetryRequest message"
1816
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001817requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001818requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1821requires_gnutls_tls1_3
1822requires_gnutls_next_no_ticket
1823requires_gnutls_next_disable_tls13_compat
1824run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001825 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1826 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001827 0 \
1828 -s "Protocol is TLSv1.3" \
1829 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1830 -s "received signature algorithm: 0x503" \
1831 -s "got named group: secp521r1(0019)" \
1832 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001833 -C "received HelloRetryRequest message"
1834
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001835requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001836requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001837requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1838requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1839requires_gnutls_tls1_3
1840requires_gnutls_next_no_ticket
1841requires_gnutls_next_disable_tls13_compat
1842run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001843 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1844 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001845 0 \
1846 -s "Protocol is TLSv1.3" \
1847 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1848 -s "received signature algorithm: 0x603" \
1849 -s "got named group: secp521r1(0019)" \
1850 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001851 -C "received HelloRetryRequest message"
1852
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001853requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001854requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001855requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1857requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1858requires_gnutls_tls1_3
1859requires_gnutls_next_no_ticket
1860requires_gnutls_next_disable_tls13_compat
1861run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001862 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1863 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001864 0 \
1865 -s "Protocol is TLSv1.3" \
1866 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1867 -s "received signature algorithm: 0x804" \
1868 -s "got named group: secp521r1(0019)" \
1869 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001870 -C "received HelloRetryRequest message"
1871
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001872requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001873requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001874requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1875requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1876requires_gnutls_tls1_3
1877requires_gnutls_next_no_ticket
1878requires_gnutls_next_disable_tls13_compat
1879run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001880 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1881 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001882 0 \
1883 -s "Protocol is TLSv1.3" \
1884 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1885 -s "received signature algorithm: 0x403" \
1886 -s "got named group: x25519(001d)" \
1887 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001888 -C "received HelloRetryRequest message"
1889
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001890requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001891requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1894requires_gnutls_tls1_3
1895requires_gnutls_next_no_ticket
1896requires_gnutls_next_disable_tls13_compat
1897run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001898 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1899 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001900 0 \
1901 -s "Protocol is TLSv1.3" \
1902 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1903 -s "received signature algorithm: 0x503" \
1904 -s "got named group: x25519(001d)" \
1905 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001906 -C "received HelloRetryRequest message"
1907
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001908requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001909requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001910requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1911requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1912requires_gnutls_tls1_3
1913requires_gnutls_next_no_ticket
1914requires_gnutls_next_disable_tls13_compat
1915run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001916 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1917 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001918 0 \
1919 -s "Protocol is TLSv1.3" \
1920 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1921 -s "received signature algorithm: 0x603" \
1922 -s "got named group: x25519(001d)" \
1923 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001924 -C "received HelloRetryRequest message"
1925
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001926requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001927requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001928requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1930requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1931requires_gnutls_tls1_3
1932requires_gnutls_next_no_ticket
1933requires_gnutls_next_disable_tls13_compat
1934run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001935 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1936 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001937 0 \
1938 -s "Protocol is TLSv1.3" \
1939 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1940 -s "received signature algorithm: 0x804" \
1941 -s "got named group: x25519(001d)" \
1942 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001943 -C "received HelloRetryRequest message"
1944
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001945requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001946requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1949requires_gnutls_tls1_3
1950requires_gnutls_next_no_ticket
1951requires_gnutls_next_disable_tls13_compat
1952run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001953 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1954 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001955 0 \
1956 -s "Protocol is TLSv1.3" \
1957 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1958 -s "received signature algorithm: 0x403" \
1959 -s "got named group: x448(001e)" \
1960 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001961 -C "received HelloRetryRequest message"
1962
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001963requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001964requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001965requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1966requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1967requires_gnutls_tls1_3
1968requires_gnutls_next_no_ticket
1969requires_gnutls_next_disable_tls13_compat
1970run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001971 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1972 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001973 0 \
1974 -s "Protocol is TLSv1.3" \
1975 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1976 -s "received signature algorithm: 0x503" \
1977 -s "got named group: x448(001e)" \
1978 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001979 -C "received HelloRetryRequest message"
1980
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001981requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00001982requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00001983requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1984requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1985requires_gnutls_tls1_3
1986requires_gnutls_next_no_ticket
1987requires_gnutls_next_disable_tls13_compat
1988run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08001989 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1990 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001991 0 \
1992 -s "Protocol is TLSv1.3" \
1993 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
1994 -s "received signature algorithm: 0x603" \
1995 -s "got named group: x448(001e)" \
1996 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00001997 -C "received HelloRetryRequest message"
1998
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00001999requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002000requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002001requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2002requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2003requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2004requires_gnutls_tls1_3
2005requires_gnutls_next_no_ticket
2006requires_gnutls_next_disable_tls13_compat
2007run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002008 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2009 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002010 0 \
2011 -s "Protocol is TLSv1.3" \
2012 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2013 -s "received signature algorithm: 0x804" \
2014 -s "got named group: x448(001e)" \
2015 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002016 -C "received HelloRetryRequest message"
2017
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002018requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002019requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2022requires_gnutls_tls1_3
2023requires_gnutls_next_no_ticket
2024requires_gnutls_next_disable_tls13_compat
2025run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002026 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2027 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002028 0 \
2029 -s "Protocol is TLSv1.3" \
2030 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2031 -s "received signature algorithm: 0x403" \
2032 -s "got named group: secp256r1(0017)" \
2033 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002034 -C "received HelloRetryRequest message"
2035
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002036requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002037requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002038requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2039requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2040requires_gnutls_tls1_3
2041requires_gnutls_next_no_ticket
2042requires_gnutls_next_disable_tls13_compat
2043run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002044 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2045 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002046 0 \
2047 -s "Protocol is TLSv1.3" \
2048 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2049 -s "received signature algorithm: 0x503" \
2050 -s "got named group: secp256r1(0017)" \
2051 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002052 -C "received HelloRetryRequest message"
2053
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002054requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002055requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002056requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2057requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2058requires_gnutls_tls1_3
2059requires_gnutls_next_no_ticket
2060requires_gnutls_next_disable_tls13_compat
2061run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002062 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2063 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002064 0 \
2065 -s "Protocol is TLSv1.3" \
2066 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2067 -s "received signature algorithm: 0x603" \
2068 -s "got named group: secp256r1(0017)" \
2069 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002070 -C "received HelloRetryRequest message"
2071
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002072requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002073requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002074requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2075requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2076requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2077requires_gnutls_tls1_3
2078requires_gnutls_next_no_ticket
2079requires_gnutls_next_disable_tls13_compat
2080run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002081 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2082 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002083 0 \
2084 -s "Protocol is TLSv1.3" \
2085 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2086 -s "received signature algorithm: 0x804" \
2087 -s "got named group: secp256r1(0017)" \
2088 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002089 -C "received HelloRetryRequest message"
2090
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002091requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002092requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002093requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2095requires_gnutls_tls1_3
2096requires_gnutls_next_no_ticket
2097requires_gnutls_next_disable_tls13_compat
2098run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002099 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2100 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002101 0 \
2102 -s "Protocol is TLSv1.3" \
2103 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2104 -s "received signature algorithm: 0x403" \
2105 -s "got named group: secp384r1(0018)" \
2106 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002107 -C "received HelloRetryRequest message"
2108
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002109requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002110requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002111requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2112requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2113requires_gnutls_tls1_3
2114requires_gnutls_next_no_ticket
2115requires_gnutls_next_disable_tls13_compat
2116run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002117 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2118 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002119 0 \
2120 -s "Protocol is TLSv1.3" \
2121 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2122 -s "received signature algorithm: 0x503" \
2123 -s "got named group: secp384r1(0018)" \
2124 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002125 -C "received HelloRetryRequest message"
2126
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002127requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002128requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002129requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2130requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2131requires_gnutls_tls1_3
2132requires_gnutls_next_no_ticket
2133requires_gnutls_next_disable_tls13_compat
2134run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002135 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2136 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002137 0 \
2138 -s "Protocol is TLSv1.3" \
2139 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2140 -s "received signature algorithm: 0x603" \
2141 -s "got named group: secp384r1(0018)" \
2142 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002143 -C "received HelloRetryRequest message"
2144
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002145requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002146requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002147requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2148requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2149requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2150requires_gnutls_tls1_3
2151requires_gnutls_next_no_ticket
2152requires_gnutls_next_disable_tls13_compat
2153run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002154 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2155 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002156 0 \
2157 -s "Protocol is TLSv1.3" \
2158 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2159 -s "received signature algorithm: 0x804" \
2160 -s "got named group: secp384r1(0018)" \
2161 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002162 -C "received HelloRetryRequest message"
2163
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002164requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002165requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002166requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2168requires_gnutls_tls1_3
2169requires_gnutls_next_no_ticket
2170requires_gnutls_next_disable_tls13_compat
2171run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002172 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2173 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002174 0 \
2175 -s "Protocol is TLSv1.3" \
2176 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2177 -s "received signature algorithm: 0x403" \
2178 -s "got named group: secp521r1(0019)" \
2179 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002180 -C "received HelloRetryRequest message"
2181
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002182requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002183requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002184requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2185requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2186requires_gnutls_tls1_3
2187requires_gnutls_next_no_ticket
2188requires_gnutls_next_disable_tls13_compat
2189run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002190 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2191 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002192 0 \
2193 -s "Protocol is TLSv1.3" \
2194 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2195 -s "received signature algorithm: 0x503" \
2196 -s "got named group: secp521r1(0019)" \
2197 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002198 -C "received HelloRetryRequest message"
2199
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002200requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002201requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002202requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2203requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2204requires_gnutls_tls1_3
2205requires_gnutls_next_no_ticket
2206requires_gnutls_next_disable_tls13_compat
2207run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002208 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2209 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002210 0 \
2211 -s "Protocol is TLSv1.3" \
2212 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2213 -s "received signature algorithm: 0x603" \
2214 -s "got named group: secp521r1(0019)" \
2215 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002216 -C "received HelloRetryRequest message"
2217
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002218requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002219requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002220requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2222requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2223requires_gnutls_tls1_3
2224requires_gnutls_next_no_ticket
2225requires_gnutls_next_disable_tls13_compat
2226run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002227 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2228 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002229 0 \
2230 -s "Protocol is TLSv1.3" \
2231 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2232 -s "received signature algorithm: 0x804" \
2233 -s "got named group: secp521r1(0019)" \
2234 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002235 -C "received HelloRetryRequest message"
2236
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002237requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002238requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002239requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2240requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2241requires_gnutls_tls1_3
2242requires_gnutls_next_no_ticket
2243requires_gnutls_next_disable_tls13_compat
2244run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002245 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2246 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002247 0 \
2248 -s "Protocol is TLSv1.3" \
2249 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2250 -s "received signature algorithm: 0x403" \
2251 -s "got named group: x25519(001d)" \
2252 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002253 -C "received HelloRetryRequest message"
2254
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002255requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002256requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2259requires_gnutls_tls1_3
2260requires_gnutls_next_no_ticket
2261requires_gnutls_next_disable_tls13_compat
2262run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002263 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2264 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002265 0 \
2266 -s "Protocol is TLSv1.3" \
2267 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2268 -s "received signature algorithm: 0x503" \
2269 -s "got named group: x25519(001d)" \
2270 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002271 -C "received HelloRetryRequest message"
2272
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002273requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002274requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2277requires_gnutls_tls1_3
2278requires_gnutls_next_no_ticket
2279requires_gnutls_next_disable_tls13_compat
2280run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002281 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2282 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002283 0 \
2284 -s "Protocol is TLSv1.3" \
2285 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2286 -s "received signature algorithm: 0x603" \
2287 -s "got named group: x25519(001d)" \
2288 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002289 -C "received HelloRetryRequest message"
2290
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002291requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002292requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002293requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2294requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2295requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2296requires_gnutls_tls1_3
2297requires_gnutls_next_no_ticket
2298requires_gnutls_next_disable_tls13_compat
2299run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002300 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2301 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002302 0 \
2303 -s "Protocol is TLSv1.3" \
2304 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2305 -s "received signature algorithm: 0x804" \
2306 -s "got named group: x25519(001d)" \
2307 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002308 -C "received HelloRetryRequest message"
2309
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002310requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002311requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002312requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2313requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2314requires_gnutls_tls1_3
2315requires_gnutls_next_no_ticket
2316requires_gnutls_next_disable_tls13_compat
2317run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002318 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2319 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002320 0 \
2321 -s "Protocol is TLSv1.3" \
2322 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2323 -s "received signature algorithm: 0x403" \
2324 -s "got named group: x448(001e)" \
2325 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002326 -C "received HelloRetryRequest message"
2327
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002328requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002329requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2332requires_gnutls_tls1_3
2333requires_gnutls_next_no_ticket
2334requires_gnutls_next_disable_tls13_compat
2335run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002336 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2337 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002338 0 \
2339 -s "Protocol is TLSv1.3" \
2340 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2341 -s "received signature algorithm: 0x503" \
2342 -s "got named group: x448(001e)" \
2343 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002344 -C "received HelloRetryRequest message"
2345
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002346requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002347requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002348requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2349requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2350requires_gnutls_tls1_3
2351requires_gnutls_next_no_ticket
2352requires_gnutls_next_disable_tls13_compat
2353run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002354 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2355 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002356 0 \
2357 -s "Protocol is TLSv1.3" \
2358 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2359 -s "received signature algorithm: 0x603" \
2360 -s "got named group: x448(001e)" \
2361 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002362 -C "received HelloRetryRequest message"
2363
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002364requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002365requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002366requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2367requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2368requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2369requires_gnutls_tls1_3
2370requires_gnutls_next_no_ticket
2371requires_gnutls_next_disable_tls13_compat
2372run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002373 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2374 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002375 0 \
2376 -s "Protocol is TLSv1.3" \
2377 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2378 -s "received signature algorithm: 0x804" \
2379 -s "got named group: x448(001e)" \
2380 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002381 -C "received HelloRetryRequest message"
2382
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002383requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002384requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002385requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2386requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2387requires_gnutls_tls1_3
2388requires_gnutls_next_no_ticket
2389requires_gnutls_next_disable_tls13_compat
2390run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002391 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2392 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002393 0 \
2394 -s "Protocol is TLSv1.3" \
2395 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2396 -s "received signature algorithm: 0x403" \
2397 -s "got named group: secp256r1(0017)" \
2398 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002399 -C "received HelloRetryRequest message"
2400
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002401requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002402requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002403requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2404requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2405requires_gnutls_tls1_3
2406requires_gnutls_next_no_ticket
2407requires_gnutls_next_disable_tls13_compat
2408run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002409 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2410 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002411 0 \
2412 -s "Protocol is TLSv1.3" \
2413 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2414 -s "received signature algorithm: 0x503" \
2415 -s "got named group: secp256r1(0017)" \
2416 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002417 -C "received HelloRetryRequest message"
2418
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002419requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002420requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002421requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2422requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2423requires_gnutls_tls1_3
2424requires_gnutls_next_no_ticket
2425requires_gnutls_next_disable_tls13_compat
2426run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002427 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2428 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002429 0 \
2430 -s "Protocol is TLSv1.3" \
2431 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2432 -s "received signature algorithm: 0x603" \
2433 -s "got named group: secp256r1(0017)" \
2434 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002435 -C "received HelloRetryRequest message"
2436
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002437requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002438requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002439requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2440requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2441requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2442requires_gnutls_tls1_3
2443requires_gnutls_next_no_ticket
2444requires_gnutls_next_disable_tls13_compat
2445run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002446 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2447 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002448 0 \
2449 -s "Protocol is TLSv1.3" \
2450 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2451 -s "received signature algorithm: 0x804" \
2452 -s "got named group: secp256r1(0017)" \
2453 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002454 -C "received HelloRetryRequest message"
2455
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002456requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002457requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002458requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2459requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2460requires_gnutls_tls1_3
2461requires_gnutls_next_no_ticket
2462requires_gnutls_next_disable_tls13_compat
2463run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002464 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2465 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002466 0 \
2467 -s "Protocol is TLSv1.3" \
2468 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2469 -s "received signature algorithm: 0x403" \
2470 -s "got named group: secp384r1(0018)" \
2471 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002472 -C "received HelloRetryRequest message"
2473
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002474requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002475requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2478requires_gnutls_tls1_3
2479requires_gnutls_next_no_ticket
2480requires_gnutls_next_disable_tls13_compat
2481run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002482 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2483 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002484 0 \
2485 -s "Protocol is TLSv1.3" \
2486 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2487 -s "received signature algorithm: 0x503" \
2488 -s "got named group: secp384r1(0018)" \
2489 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002490 -C "received HelloRetryRequest message"
2491
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002492requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002493requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002494requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2495requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2496requires_gnutls_tls1_3
2497requires_gnutls_next_no_ticket
2498requires_gnutls_next_disable_tls13_compat
2499run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002500 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2501 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002502 0 \
2503 -s "Protocol is TLSv1.3" \
2504 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2505 -s "received signature algorithm: 0x603" \
2506 -s "got named group: secp384r1(0018)" \
2507 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002508 -C "received HelloRetryRequest message"
2509
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002510requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002511requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002512requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2513requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2514requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2515requires_gnutls_tls1_3
2516requires_gnutls_next_no_ticket
2517requires_gnutls_next_disable_tls13_compat
2518run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002519 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2520 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002521 0 \
2522 -s "Protocol is TLSv1.3" \
2523 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2524 -s "received signature algorithm: 0x804" \
2525 -s "got named group: secp384r1(0018)" \
2526 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002527 -C "received HelloRetryRequest message"
2528
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002529requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002530requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002531requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2532requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2533requires_gnutls_tls1_3
2534requires_gnutls_next_no_ticket
2535requires_gnutls_next_disable_tls13_compat
2536run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002537 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2538 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002539 0 \
2540 -s "Protocol is TLSv1.3" \
2541 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2542 -s "received signature algorithm: 0x403" \
2543 -s "got named group: secp521r1(0019)" \
2544 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002545 -C "received HelloRetryRequest message"
2546
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002547requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002548requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002549requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2551requires_gnutls_tls1_3
2552requires_gnutls_next_no_ticket
2553requires_gnutls_next_disable_tls13_compat
2554run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002555 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2556 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002557 0 \
2558 -s "Protocol is TLSv1.3" \
2559 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2560 -s "received signature algorithm: 0x503" \
2561 -s "got named group: secp521r1(0019)" \
2562 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002563 -C "received HelloRetryRequest message"
2564
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002565requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002566requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002567requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2569requires_gnutls_tls1_3
2570requires_gnutls_next_no_ticket
2571requires_gnutls_next_disable_tls13_compat
2572run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002573 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2574 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002575 0 \
2576 -s "Protocol is TLSv1.3" \
2577 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2578 -s "received signature algorithm: 0x603" \
2579 -s "got named group: secp521r1(0019)" \
2580 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002581 -C "received HelloRetryRequest message"
2582
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002583requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002584requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002585requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2586requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2587requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2588requires_gnutls_tls1_3
2589requires_gnutls_next_no_ticket
2590requires_gnutls_next_disable_tls13_compat
2591run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002592 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2593 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002594 0 \
2595 -s "Protocol is TLSv1.3" \
2596 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2597 -s "received signature algorithm: 0x804" \
2598 -s "got named group: secp521r1(0019)" \
2599 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002600 -C "received HelloRetryRequest message"
2601
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002602requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002603requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002604requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2606requires_gnutls_tls1_3
2607requires_gnutls_next_no_ticket
2608requires_gnutls_next_disable_tls13_compat
2609run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002610 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2611 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002612 0 \
2613 -s "Protocol is TLSv1.3" \
2614 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2615 -s "received signature algorithm: 0x403" \
2616 -s "got named group: x25519(001d)" \
2617 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002618 -C "received HelloRetryRequest message"
2619
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002620requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002621requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2624requires_gnutls_tls1_3
2625requires_gnutls_next_no_ticket
2626requires_gnutls_next_disable_tls13_compat
2627run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002628 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2629 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002630 0 \
2631 -s "Protocol is TLSv1.3" \
2632 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2633 -s "received signature algorithm: 0x503" \
2634 -s "got named group: x25519(001d)" \
2635 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002636 -C "received HelloRetryRequest message"
2637
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002638requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002639requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002640requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2641requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2642requires_gnutls_tls1_3
2643requires_gnutls_next_no_ticket
2644requires_gnutls_next_disable_tls13_compat
2645run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002646 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2647 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002648 0 \
2649 -s "Protocol is TLSv1.3" \
2650 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2651 -s "received signature algorithm: 0x603" \
2652 -s "got named group: x25519(001d)" \
2653 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002654 -C "received HelloRetryRequest message"
2655
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002656requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002657requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002658requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2659requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2660requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2661requires_gnutls_tls1_3
2662requires_gnutls_next_no_ticket
2663requires_gnutls_next_disable_tls13_compat
2664run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002665 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2666 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002667 0 \
2668 -s "Protocol is TLSv1.3" \
2669 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2670 -s "received signature algorithm: 0x804" \
2671 -s "got named group: x25519(001d)" \
2672 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002673 -C "received HelloRetryRequest message"
2674
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002675requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002676requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002677requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2679requires_gnutls_tls1_3
2680requires_gnutls_next_no_ticket
2681requires_gnutls_next_disable_tls13_compat
2682run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002683 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2684 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002685 0 \
2686 -s "Protocol is TLSv1.3" \
2687 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2688 -s "received signature algorithm: 0x403" \
2689 -s "got named group: x448(001e)" \
2690 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002691 -C "received HelloRetryRequest message"
2692
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002693requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002694requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002695requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2696requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2697requires_gnutls_tls1_3
2698requires_gnutls_next_no_ticket
2699requires_gnutls_next_disable_tls13_compat
2700run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002701 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2702 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002703 0 \
2704 -s "Protocol is TLSv1.3" \
2705 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2706 -s "received signature algorithm: 0x503" \
2707 -s "got named group: x448(001e)" \
2708 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002709 -C "received HelloRetryRequest message"
2710
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002711requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002712requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002713requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2714requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2715requires_gnutls_tls1_3
2716requires_gnutls_next_no_ticket
2717requires_gnutls_next_disable_tls13_compat
2718run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002719 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2720 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002721 0 \
2722 -s "Protocol is TLSv1.3" \
2723 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2724 -s "received signature algorithm: 0x603" \
2725 -s "got named group: x448(001e)" \
2726 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002727 -C "received HelloRetryRequest message"
2728
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002729requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002730requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002731requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2733requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2734requires_gnutls_tls1_3
2735requires_gnutls_next_no_ticket
2736requires_gnutls_next_disable_tls13_compat
2737run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002738 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2739 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002740 0 \
2741 -s "Protocol is TLSv1.3" \
2742 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
2743 -s "received signature algorithm: 0x804" \
2744 -s "got named group: x448(001e)" \
2745 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002746 -C "received HelloRetryRequest message"
2747
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002748requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002749requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2752requires_gnutls_tls1_3
2753requires_gnutls_next_no_ticket
2754requires_gnutls_next_disable_tls13_compat
2755run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002756 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2757 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002758 0 \
2759 -s "Protocol is TLSv1.3" \
2760 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2761 -s "received signature algorithm: 0x403" \
2762 -s "got named group: secp256r1(0017)" \
2763 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002764 -C "received HelloRetryRequest message"
2765
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002766requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002767requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002768requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2769requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2770requires_gnutls_tls1_3
2771requires_gnutls_next_no_ticket
2772requires_gnutls_next_disable_tls13_compat
2773run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002774 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2775 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002776 0 \
2777 -s "Protocol is TLSv1.3" \
2778 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2779 -s "received signature algorithm: 0x503" \
2780 -s "got named group: secp256r1(0017)" \
2781 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002782 -C "received HelloRetryRequest message"
2783
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002784requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002785requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002786requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2787requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2788requires_gnutls_tls1_3
2789requires_gnutls_next_no_ticket
2790requires_gnutls_next_disable_tls13_compat
2791run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002792 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2793 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002794 0 \
2795 -s "Protocol is TLSv1.3" \
2796 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2797 -s "received signature algorithm: 0x603" \
2798 -s "got named group: secp256r1(0017)" \
2799 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002800 -C "received HelloRetryRequest message"
2801
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002802requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002803requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2806requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2807requires_gnutls_tls1_3
2808requires_gnutls_next_no_ticket
2809requires_gnutls_next_disable_tls13_compat
2810run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002811 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2812 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002813 0 \
2814 -s "Protocol is TLSv1.3" \
2815 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2816 -s "received signature algorithm: 0x804" \
2817 -s "got named group: secp256r1(0017)" \
2818 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002819 -C "received HelloRetryRequest message"
2820
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002821requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002822requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002823requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2824requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2825requires_gnutls_tls1_3
2826requires_gnutls_next_no_ticket
2827requires_gnutls_next_disable_tls13_compat
2828run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002829 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2830 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002831 0 \
2832 -s "Protocol is TLSv1.3" \
2833 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2834 -s "received signature algorithm: 0x403" \
2835 -s "got named group: secp384r1(0018)" \
2836 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002837 -C "received HelloRetryRequest message"
2838
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002839requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002840requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002841requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2842requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2843requires_gnutls_tls1_3
2844requires_gnutls_next_no_ticket
2845requires_gnutls_next_disable_tls13_compat
2846run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002847 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2848 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002849 0 \
2850 -s "Protocol is TLSv1.3" \
2851 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2852 -s "received signature algorithm: 0x503" \
2853 -s "got named group: secp384r1(0018)" \
2854 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002855 -C "received HelloRetryRequest message"
2856
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002857requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002858requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002859requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2860requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2861requires_gnutls_tls1_3
2862requires_gnutls_next_no_ticket
2863requires_gnutls_next_disable_tls13_compat
2864run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002865 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2866 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002867 0 \
2868 -s "Protocol is TLSv1.3" \
2869 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2870 -s "received signature algorithm: 0x603" \
2871 -s "got named group: secp384r1(0018)" \
2872 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002873 -C "received HelloRetryRequest message"
2874
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002875requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002876requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002877requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2878requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2879requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2880requires_gnutls_tls1_3
2881requires_gnutls_next_no_ticket
2882requires_gnutls_next_disable_tls13_compat
2883run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002884 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2885 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002886 0 \
2887 -s "Protocol is TLSv1.3" \
2888 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2889 -s "received signature algorithm: 0x804" \
2890 -s "got named group: secp384r1(0018)" \
2891 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002892 -C "received HelloRetryRequest message"
2893
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002894requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002895requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002896requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2898requires_gnutls_tls1_3
2899requires_gnutls_next_no_ticket
2900requires_gnutls_next_disable_tls13_compat
2901run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002902 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2903 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002904 0 \
2905 -s "Protocol is TLSv1.3" \
2906 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2907 -s "received signature algorithm: 0x403" \
2908 -s "got named group: secp521r1(0019)" \
2909 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002910 -C "received HelloRetryRequest message"
2911
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002912requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002913requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002914requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2915requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2916requires_gnutls_tls1_3
2917requires_gnutls_next_no_ticket
2918requires_gnutls_next_disable_tls13_compat
2919run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002920 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2921 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002922 0 \
2923 -s "Protocol is TLSv1.3" \
2924 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2925 -s "received signature algorithm: 0x503" \
2926 -s "got named group: secp521r1(0019)" \
2927 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002928 -C "received HelloRetryRequest message"
2929
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002930requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002931requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002932requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2933requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2934requires_gnutls_tls1_3
2935requires_gnutls_next_no_ticket
2936requires_gnutls_next_disable_tls13_compat
2937run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002938 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2939 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002940 0 \
2941 -s "Protocol is TLSv1.3" \
2942 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2943 -s "received signature algorithm: 0x603" \
2944 -s "got named group: secp521r1(0019)" \
2945 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002946 -C "received HelloRetryRequest message"
2947
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002948requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002949requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002950requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2951requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2952requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2953requires_gnutls_tls1_3
2954requires_gnutls_next_no_ticket
2955requires_gnutls_next_disable_tls13_compat
2956run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002957 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2958 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002959 0 \
2960 -s "Protocol is TLSv1.3" \
2961 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2962 -s "received signature algorithm: 0x804" \
2963 -s "got named group: secp521r1(0019)" \
2964 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002965 -C "received HelloRetryRequest message"
2966
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002967requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002968requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002969requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2970requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2971requires_gnutls_tls1_3
2972requires_gnutls_next_no_ticket
2973requires_gnutls_next_disable_tls13_compat
2974run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002975 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2976 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002977 0 \
2978 -s "Protocol is TLSv1.3" \
2979 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2980 -s "received signature algorithm: 0x403" \
2981 -s "got named group: x25519(001d)" \
2982 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002983 -C "received HelloRetryRequest message"
2984
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00002985requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00002986requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00002987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
2988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2989requires_gnutls_tls1_3
2990requires_gnutls_next_no_ticket
2991requires_gnutls_next_disable_tls13_compat
2992run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08002993 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2994 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00002995 0 \
2996 -s "Protocol is TLSv1.3" \
2997 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
2998 -s "received signature algorithm: 0x503" \
2999 -s "got named group: x25519(001d)" \
3000 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003001 -C "received HelloRetryRequest message"
3002
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003003requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003004requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003005requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3006requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3007requires_gnutls_tls1_3
3008requires_gnutls_next_no_ticket
3009requires_gnutls_next_disable_tls13_compat
3010run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003011 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3012 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003013 0 \
3014 -s "Protocol is TLSv1.3" \
3015 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3016 -s "received signature algorithm: 0x603" \
3017 -s "got named group: x25519(001d)" \
3018 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003019 -C "received HelloRetryRequest message"
3020
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003021requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003022requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003023requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3024requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3025requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3026requires_gnutls_tls1_3
3027requires_gnutls_next_no_ticket
3028requires_gnutls_next_disable_tls13_compat
3029run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003030 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3031 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003032 0 \
3033 -s "Protocol is TLSv1.3" \
3034 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3035 -s "received signature algorithm: 0x804" \
3036 -s "got named group: x25519(001d)" \
3037 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003038 -C "received HelloRetryRequest message"
3039
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003040requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003041requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003042requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3043requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3044requires_gnutls_tls1_3
3045requires_gnutls_next_no_ticket
3046requires_gnutls_next_disable_tls13_compat
3047run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003048 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3049 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003050 0 \
3051 -s "Protocol is TLSv1.3" \
3052 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3053 -s "received signature algorithm: 0x403" \
3054 -s "got named group: x448(001e)" \
3055 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003056 -C "received HelloRetryRequest message"
3057
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003058requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003059requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3062requires_gnutls_tls1_3
3063requires_gnutls_next_no_ticket
3064requires_gnutls_next_disable_tls13_compat
3065run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003066 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3067 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003068 0 \
3069 -s "Protocol is TLSv1.3" \
3070 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3071 -s "received signature algorithm: 0x503" \
3072 -s "got named group: x448(001e)" \
3073 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003074 -C "received HelloRetryRequest message"
3075
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003076requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003077requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003078requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3079requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3080requires_gnutls_tls1_3
3081requires_gnutls_next_no_ticket
3082requires_gnutls_next_disable_tls13_compat
3083run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003084 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3085 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003086 0 \
3087 -s "Protocol is TLSv1.3" \
3088 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3089 -s "received signature algorithm: 0x603" \
3090 -s "got named group: x448(001e)" \
3091 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003092 -C "received HelloRetryRequest message"
3093
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003094requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003095requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003096requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3097requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3098requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3099requires_gnutls_tls1_3
3100requires_gnutls_next_no_ticket
3101requires_gnutls_next_disable_tls13_compat
3102run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003103 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3104 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003105 0 \
3106 -s "Protocol is TLSv1.3" \
3107 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3108 -s "received signature algorithm: 0x804" \
3109 -s "got named group: x448(001e)" \
3110 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003111 -C "received HelloRetryRequest message"
3112
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003113requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003114requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003115requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3116requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3117requires_gnutls_tls1_3
3118requires_gnutls_next_no_ticket
3119requires_gnutls_next_disable_tls13_compat
3120run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003121 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3122 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003123 0 \
3124 -s "Protocol is TLSv1.3" \
3125 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3126 -s "received signature algorithm: 0x403" \
3127 -s "got named group: secp256r1(0017)" \
3128 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003129 -C "received HelloRetryRequest message"
3130
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003131requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003132requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003133requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3134requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3135requires_gnutls_tls1_3
3136requires_gnutls_next_no_ticket
3137requires_gnutls_next_disable_tls13_compat
3138run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003139 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3140 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003141 0 \
3142 -s "Protocol is TLSv1.3" \
3143 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3144 -s "received signature algorithm: 0x503" \
3145 -s "got named group: secp256r1(0017)" \
3146 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003147 -C "received HelloRetryRequest message"
3148
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003149requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003150requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3153requires_gnutls_tls1_3
3154requires_gnutls_next_no_ticket
3155requires_gnutls_next_disable_tls13_compat
3156run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003157 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3158 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003159 0 \
3160 -s "Protocol is TLSv1.3" \
3161 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3162 -s "received signature algorithm: 0x603" \
3163 -s "got named group: secp256r1(0017)" \
3164 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003165 -C "received HelloRetryRequest message"
3166
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003167requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003168requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003169requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3171requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3172requires_gnutls_tls1_3
3173requires_gnutls_next_no_ticket
3174requires_gnutls_next_disable_tls13_compat
3175run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003176 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3177 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003178 0 \
3179 -s "Protocol is TLSv1.3" \
3180 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3181 -s "received signature algorithm: 0x804" \
3182 -s "got named group: secp256r1(0017)" \
3183 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003184 -C "received HelloRetryRequest message"
3185
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003186requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003187requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003188requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3189requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3190requires_gnutls_tls1_3
3191requires_gnutls_next_no_ticket
3192requires_gnutls_next_disable_tls13_compat
3193run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003194 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3195 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003196 0 \
3197 -s "Protocol is TLSv1.3" \
3198 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3199 -s "received signature algorithm: 0x403" \
3200 -s "got named group: secp384r1(0018)" \
3201 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003202 -C "received HelloRetryRequest message"
3203
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003204requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003205requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003206requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3207requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3208requires_gnutls_tls1_3
3209requires_gnutls_next_no_ticket
3210requires_gnutls_next_disable_tls13_compat
3211run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003212 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3213 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003214 0 \
3215 -s "Protocol is TLSv1.3" \
3216 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3217 -s "received signature algorithm: 0x503" \
3218 -s "got named group: secp384r1(0018)" \
3219 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003220 -C "received HelloRetryRequest message"
3221
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003222requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003223requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003224requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3226requires_gnutls_tls1_3
3227requires_gnutls_next_no_ticket
3228requires_gnutls_next_disable_tls13_compat
3229run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003230 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3231 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003232 0 \
3233 -s "Protocol is TLSv1.3" \
3234 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3235 -s "received signature algorithm: 0x603" \
3236 -s "got named group: secp384r1(0018)" \
3237 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003238 -C "received HelloRetryRequest message"
3239
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003240requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003241requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003242requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3243requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3244requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3245requires_gnutls_tls1_3
3246requires_gnutls_next_no_ticket
3247requires_gnutls_next_disable_tls13_compat
3248run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003249 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3250 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003251 0 \
3252 -s "Protocol is TLSv1.3" \
3253 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3254 -s "received signature algorithm: 0x804" \
3255 -s "got named group: secp384r1(0018)" \
3256 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003257 -C "received HelloRetryRequest message"
3258
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003259requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003260requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003261requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3262requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3263requires_gnutls_tls1_3
3264requires_gnutls_next_no_ticket
3265requires_gnutls_next_disable_tls13_compat
3266run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003267 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3268 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003269 0 \
3270 -s "Protocol is TLSv1.3" \
3271 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3272 -s "received signature algorithm: 0x403" \
3273 -s "got named group: secp521r1(0019)" \
3274 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003275 -C "received HelloRetryRequest message"
3276
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003277requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003278requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003279requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3280requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3281requires_gnutls_tls1_3
3282requires_gnutls_next_no_ticket
3283requires_gnutls_next_disable_tls13_compat
3284run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003285 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3286 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003287 0 \
3288 -s "Protocol is TLSv1.3" \
3289 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3290 -s "received signature algorithm: 0x503" \
3291 -s "got named group: secp521r1(0019)" \
3292 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003293 -C "received HelloRetryRequest message"
3294
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003295requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003296requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003297requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3298requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3299requires_gnutls_tls1_3
3300requires_gnutls_next_no_ticket
3301requires_gnutls_next_disable_tls13_compat
3302run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003303 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3304 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003305 0 \
3306 -s "Protocol is TLSv1.3" \
3307 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3308 -s "received signature algorithm: 0x603" \
3309 -s "got named group: secp521r1(0019)" \
3310 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003311 -C "received HelloRetryRequest message"
3312
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003313requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003314requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003315requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3316requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3317requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3318requires_gnutls_tls1_3
3319requires_gnutls_next_no_ticket
3320requires_gnutls_next_disable_tls13_compat
3321run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003322 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3323 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003324 0 \
3325 -s "Protocol is TLSv1.3" \
3326 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3327 -s "received signature algorithm: 0x804" \
3328 -s "got named group: secp521r1(0019)" \
3329 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003330 -C "received HelloRetryRequest message"
3331
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003332requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3336requires_gnutls_tls1_3
3337requires_gnutls_next_no_ticket
3338requires_gnutls_next_disable_tls13_compat
3339run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003340 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3341 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003342 0 \
3343 -s "Protocol is TLSv1.3" \
3344 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3345 -s "received signature algorithm: 0x403" \
3346 -s "got named group: x25519(001d)" \
3347 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003348 -C "received HelloRetryRequest message"
3349
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003350requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003351requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003352requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3353requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3354requires_gnutls_tls1_3
3355requires_gnutls_next_no_ticket
3356requires_gnutls_next_disable_tls13_compat
3357run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003358 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3359 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003360 0 \
3361 -s "Protocol is TLSv1.3" \
3362 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3363 -s "received signature algorithm: 0x503" \
3364 -s "got named group: x25519(001d)" \
3365 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003366 -C "received HelloRetryRequest message"
3367
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003368requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003369requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003370requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3371requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3372requires_gnutls_tls1_3
3373requires_gnutls_next_no_ticket
3374requires_gnutls_next_disable_tls13_compat
3375run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003376 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3377 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003378 0 \
3379 -s "Protocol is TLSv1.3" \
3380 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3381 -s "received signature algorithm: 0x603" \
3382 -s "got named group: x25519(001d)" \
3383 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003384 -C "received HelloRetryRequest message"
3385
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003386requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003387requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3390requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3391requires_gnutls_tls1_3
3392requires_gnutls_next_no_ticket
3393requires_gnutls_next_disable_tls13_compat
3394run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003395 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3396 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003397 0 \
3398 -s "Protocol is TLSv1.3" \
3399 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3400 -s "received signature algorithm: 0x804" \
3401 -s "got named group: x25519(001d)" \
3402 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003403 -C "received HelloRetryRequest message"
3404
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003405requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003406requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003407requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3409requires_gnutls_tls1_3
3410requires_gnutls_next_no_ticket
3411requires_gnutls_next_disable_tls13_compat
3412run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003413 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3414 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003415 0 \
3416 -s "Protocol is TLSv1.3" \
3417 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3418 -s "received signature algorithm: 0x403" \
3419 -s "got named group: x448(001e)" \
3420 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003421 -C "received HelloRetryRequest message"
3422
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003423requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003424requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003425requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3426requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3427requires_gnutls_tls1_3
3428requires_gnutls_next_no_ticket
3429requires_gnutls_next_disable_tls13_compat
3430run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003431 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3432 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003433 0 \
3434 -s "Protocol is TLSv1.3" \
3435 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3436 -s "received signature algorithm: 0x503" \
3437 -s "got named group: x448(001e)" \
3438 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003439 -C "received HelloRetryRequest message"
3440
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003441requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003442requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003443requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3444requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3445requires_gnutls_tls1_3
3446requires_gnutls_next_no_ticket
3447requires_gnutls_next_disable_tls13_compat
3448run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003449 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3450 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003451 0 \
3452 -s "Protocol is TLSv1.3" \
3453 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3454 -s "received signature algorithm: 0x603" \
3455 -s "got named group: x448(001e)" \
3456 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003457 -C "received HelloRetryRequest message"
3458
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00003459requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00003461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3463requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3464requires_gnutls_tls1_3
3465requires_gnutls_next_no_ticket
3466requires_gnutls_next_disable_tls13_compat
3467run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003468 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3469 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003470 0 \
3471 -s "Protocol is TLSv1.3" \
3472 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3473 -s "received signature algorithm: 0x804" \
3474 -s "got named group: x448(001e)" \
3475 -s "Verifying peer X.509 certificate... ok" \
XiaokangQianb1847a22022-06-08 07:49:31 +00003476 -C "received HelloRetryRequest message"
3477
Jerry Yu31018ad2021-11-26 20:36:17 +08003478requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003479requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003480requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003481requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003483run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003484 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3485 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003486 0 \
3487 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003488 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003489 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3490 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003491 -c "NamedGroup: secp256r1 ( 17 )" \
3492 -c "Verifying peer X.509 certificate... ok" \
3493 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003494
Jerry Yu31018ad2021-11-26 20:36:17 +08003495requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003496requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003497requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003498requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003499requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003500run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003501 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3502 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003503 0 \
3504 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003505 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003506 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3507 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003508 -c "NamedGroup: secp256r1 ( 17 )" \
3509 -c "Verifying peer X.509 certificate... ok" \
3510 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003511
Jerry Yu31018ad2021-11-26 20:36:17 +08003512requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003513requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003514requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003515requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003516requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003517run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003518 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3519 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003520 0 \
3521 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003522 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003523 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3524 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003525 -c "NamedGroup: secp256r1 ( 17 )" \
3526 -c "Verifying peer X.509 certificate... ok" \
3527 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003528
Jerry Yu31018ad2021-11-26 20:36:17 +08003529requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003530requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003531requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003532requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003533requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003534requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003535run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003536 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3537 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003538 0 \
3539 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003540 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003541 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3542 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003543 -c "NamedGroup: secp256r1 ( 17 )" \
3544 -c "Verifying peer X.509 certificate... ok" \
3545 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003546
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003547requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003548requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003549requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003552run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003553 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3554 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003555 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003556 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003557 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003558 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003559 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3560 -c "NamedGroup: secp384r1 ( 18 )" \
3561 -c "Verifying peer X.509 certificate... ok" \
3562 -C "received HelloRetryRequest message"
3563
3564requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003565requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003566requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003567requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3569run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003570 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3571 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003572 0 \
3573 -c "HTTP/1.0 200 ok" \
3574 -c "Protocol is TLSv1.3" \
3575 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3576 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3577 -c "NamedGroup: secp384r1 ( 18 )" \
3578 -c "Verifying peer X.509 certificate... ok" \
3579 -C "received HelloRetryRequest message"
3580
3581requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003582requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003583requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003584requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3586run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003587 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3588 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003589 0 \
3590 -c "HTTP/1.0 200 ok" \
3591 -c "Protocol is TLSv1.3" \
3592 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3593 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3594 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003595 -c "Verifying peer X.509 certificate... ok" \
3596 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003597
Jerry Yu31018ad2021-11-26 20:36:17 +08003598requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003599requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003600requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003601requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003602requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003603requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003604run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003605 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3606 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003607 0 \
3608 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003609 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003610 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3611 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003612 -c "NamedGroup: secp384r1 ( 18 )" \
3613 -c "Verifying peer X.509 certificate... ok" \
3614 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003615
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003616requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003617requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003618requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003619requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003620requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003621run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003622 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3623 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003624 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003625 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003626 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003627 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003628 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3629 -c "NamedGroup: secp521r1 ( 19 )" \
3630 -c "Verifying peer X.509 certificate... ok" \
3631 -C "received HelloRetryRequest message"
3632
3633requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003634requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003635requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3638run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003639 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3640 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003641 0 \
3642 -c "HTTP/1.0 200 ok" \
3643 -c "Protocol is TLSv1.3" \
3644 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3645 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3646 -c "NamedGroup: secp521r1 ( 19 )" \
3647 -c "Verifying peer X.509 certificate... ok" \
3648 -C "received HelloRetryRequest message"
3649
3650requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003651requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003652requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003653requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3655run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003656 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3657 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003658 0 \
3659 -c "HTTP/1.0 200 ok" \
3660 -c "Protocol is TLSv1.3" \
3661 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3662 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3663 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003664 -c "Verifying peer X.509 certificate... ok" \
3665 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003666
Jerry Yu31018ad2021-11-26 20:36:17 +08003667requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003668requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003669requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003670requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003671requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003672requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003673run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003674 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3675 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003676 0 \
3677 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003678 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003679 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3680 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003681 -c "NamedGroup: secp521r1 ( 19 )" \
3682 -c "Verifying peer X.509 certificate... ok" \
3683 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003684
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003685requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003686requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003687requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003688requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003689requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003690run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003691 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3692 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003693 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003694 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003695 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003696 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003697 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3698 -c "NamedGroup: x25519 ( 1d )" \
3699 -c "Verifying peer X.509 certificate... ok" \
3700 -C "received HelloRetryRequest message"
3701
3702requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003703requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003704requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003705requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3706requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3707run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003708 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3709 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003710 0 \
3711 -c "HTTP/1.0 200 ok" \
3712 -c "Protocol is TLSv1.3" \
3713 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3714 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3715 -c "NamedGroup: x25519 ( 1d )" \
3716 -c "Verifying peer X.509 certificate... ok" \
3717 -C "received HelloRetryRequest message"
3718
3719requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003720requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003721requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3724run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003725 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3726 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003727 0 \
3728 -c "HTTP/1.0 200 ok" \
3729 -c "Protocol is TLSv1.3" \
3730 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3731 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3732 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003733 -c "Verifying peer X.509 certificate... ok" \
3734 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003735
Jerry Yu31018ad2021-11-26 20:36:17 +08003736requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003737requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003738requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003739requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003740requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003741requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003742run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003743 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3744 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003745 0 \
3746 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003747 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003748 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3749 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003750 -c "NamedGroup: x25519 ( 1d )" \
3751 -c "Verifying peer X.509 certificate... ok" \
3752 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003753
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003754requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003755requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003756requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003757requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003758requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003759run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003760 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3761 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003762 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003763 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003764 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003765 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003766 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3767 -c "NamedGroup: x448 ( 1e )" \
3768 -c "Verifying peer X.509 certificate... ok" \
3769 -C "received HelloRetryRequest message"
3770
3771requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003772requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003773requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3776run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003777 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3778 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003779 0 \
3780 -c "HTTP/1.0 200 ok" \
3781 -c "Protocol is TLSv1.3" \
3782 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3783 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3784 -c "NamedGroup: x448 ( 1e )" \
3785 -c "Verifying peer X.509 certificate... ok" \
3786 -C "received HelloRetryRequest message"
3787
3788requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003789requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003790requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003791requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3792requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3793run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003794 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3795 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003796 0 \
3797 -c "HTTP/1.0 200 ok" \
3798 -c "Protocol is TLSv1.3" \
3799 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3800 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3801 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003802 -c "Verifying peer X.509 certificate... ok" \
3803 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003804
Jerry Yu31018ad2021-11-26 20:36:17 +08003805requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003806requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003807requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003808requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003809requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003810requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003811run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003812 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3813 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003814 0 \
3815 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003816 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003817 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
3818 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003819 -c "NamedGroup: x448 ( 1e )" \
3820 -c "Verifying peer X.509 certificate... ok" \
3821 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003822
Jerry Yu31018ad2021-11-26 20:36:17 +08003823requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003824requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003825requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003826requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003828run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003829 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3830 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003831 0 \
3832 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003833 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003834 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3835 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003836 -c "NamedGroup: secp256r1 ( 17 )" \
3837 -c "Verifying peer X.509 certificate... ok" \
3838 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003839
Jerry Yu31018ad2021-11-26 20:36:17 +08003840requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003841requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003842requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003843requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003844requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003845run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003846 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3847 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003848 0 \
3849 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003850 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003851 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3852 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003853 -c "NamedGroup: secp256r1 ( 17 )" \
3854 -c "Verifying peer X.509 certificate... ok" \
3855 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003856
Jerry Yu31018ad2021-11-26 20:36:17 +08003857requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003858requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003859requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003860requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003861requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003862run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003863 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3864 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003865 0 \
3866 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003867 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003868 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3869 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003870 -c "NamedGroup: secp256r1 ( 17 )" \
3871 -c "Verifying peer X.509 certificate... ok" \
3872 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003873
Jerry Yu31018ad2021-11-26 20:36:17 +08003874requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003875requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003876requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003877requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003878requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003879requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003880run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003881 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3882 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003883 0 \
3884 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003885 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003886 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3887 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003888 -c "NamedGroup: secp256r1 ( 17 )" \
3889 -c "Verifying peer X.509 certificate... ok" \
3890 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003891
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003892requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003893requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003894requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003895requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003896requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003897run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003898 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3899 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003900 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003901 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003902 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003903 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003904 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3905 -c "NamedGroup: secp384r1 ( 18 )" \
3906 -c "Verifying peer X.509 certificate... ok" \
3907 -C "received HelloRetryRequest message"
3908
3909requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003910requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003911requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003912requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3913requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3914run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003915 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3916 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003917 0 \
3918 -c "HTTP/1.0 200 ok" \
3919 -c "Protocol is TLSv1.3" \
3920 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3921 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3922 -c "NamedGroup: secp384r1 ( 18 )" \
3923 -c "Verifying peer X.509 certificate... ok" \
3924 -C "received HelloRetryRequest message"
3925
3926requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003927requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003928requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003929requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3931run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003932 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3933 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003934 0 \
3935 -c "HTTP/1.0 200 ok" \
3936 -c "Protocol is TLSv1.3" \
3937 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3938 -c "Certificate Verify: Signature algorithm ( 0603 )" \
3939 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003940 -c "Verifying peer X.509 certificate... ok" \
3941 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003942
Jerry Yu31018ad2021-11-26 20:36:17 +08003943requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003944requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003945requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003948requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003949run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003950 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3951 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003952 0 \
3953 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003954 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003955 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3956 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003957 -c "NamedGroup: secp384r1 ( 18 )" \
3958 -c "Verifying peer X.509 certificate... ok" \
3959 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003960
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003961requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08003962requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003963requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003964requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003965requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003966run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003967 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3968 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003969 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003970 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003971 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003972 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003973 -c "Certificate Verify: Signature algorithm ( 0403 )" \
3974 -c "NamedGroup: secp521r1 ( 19 )" \
3975 -c "Verifying peer X.509 certificate... ok" \
3976 -C "received HelloRetryRequest message"
3977
3978requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003979requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003980requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003981requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3983run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08003984 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
3985 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003986 0 \
3987 -c "HTTP/1.0 200 ok" \
3988 -c "Protocol is TLSv1.3" \
3989 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
3990 -c "Certificate Verify: Signature algorithm ( 0503 )" \
3991 -c "NamedGroup: secp521r1 ( 19 )" \
3992 -c "Verifying peer X.509 certificate... ok" \
3993 -C "received HelloRetryRequest message"
3994
3995requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003996requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00003997requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02003998requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3999requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4000run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004001 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4002 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004003 0 \
4004 -c "HTTP/1.0 200 ok" \
4005 -c "Protocol is TLSv1.3" \
4006 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4007 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4008 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004009 -c "Verifying peer X.509 certificate... ok" \
4010 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004011
Jerry Yu31018ad2021-11-26 20:36:17 +08004012requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004013requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004014requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004015requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004017requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004018run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004019 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4020 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004021 0 \
4022 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004023 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004024 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4025 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004026 -c "NamedGroup: secp521r1 ( 19 )" \
4027 -c "Verifying peer X.509 certificate... ok" \
4028 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004029
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004030requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004031requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004032requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004033requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004034requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004035run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004036 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4037 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004038 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004039 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004040 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004041 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004042 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4043 -c "NamedGroup: x25519 ( 1d )" \
4044 -c "Verifying peer X.509 certificate... ok" \
4045 -C "received HelloRetryRequest message"
4046
4047requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004048requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004049requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004050requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4052run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004053 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4054 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004055 0 \
4056 -c "HTTP/1.0 200 ok" \
4057 -c "Protocol is TLSv1.3" \
4058 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4059 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4060 -c "NamedGroup: x25519 ( 1d )" \
4061 -c "Verifying peer X.509 certificate... ok" \
4062 -C "received HelloRetryRequest message"
4063
4064requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004065requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004066requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004067requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4069run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004070 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4071 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004072 0 \
4073 -c "HTTP/1.0 200 ok" \
4074 -c "Protocol is TLSv1.3" \
4075 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4076 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4077 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004078 -c "Verifying peer X.509 certificate... ok" \
4079 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004080
Jerry Yu31018ad2021-11-26 20:36:17 +08004081requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004082requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004083requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004084requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004086requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004087run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004088 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4089 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004090 0 \
4091 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004092 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004093 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4094 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004095 -c "NamedGroup: x25519 ( 1d )" \
4096 -c "Verifying peer X.509 certificate... ok" \
4097 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004098
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004099requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004100requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004101requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004104run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004105 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4106 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004107 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004108 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004109 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004110 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004111 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4112 -c "NamedGroup: x448 ( 1e )" \
4113 -c "Verifying peer X.509 certificate... ok" \
4114 -C "received HelloRetryRequest message"
4115
4116requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004117requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004118requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004119requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4120requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4121run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004122 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4123 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004124 0 \
4125 -c "HTTP/1.0 200 ok" \
4126 -c "Protocol is TLSv1.3" \
4127 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4128 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4129 -c "NamedGroup: x448 ( 1e )" \
4130 -c "Verifying peer X.509 certificate... ok" \
4131 -C "received HelloRetryRequest message"
4132
4133requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004134requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004135requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004136requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4137requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4138run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004139 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4140 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004141 0 \
4142 -c "HTTP/1.0 200 ok" \
4143 -c "Protocol is TLSv1.3" \
4144 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4145 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4146 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004147 -c "Verifying peer X.509 certificate... ok" \
4148 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004149
Jerry Yu31018ad2021-11-26 20:36:17 +08004150requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004151requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004152requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004153requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004154requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004155requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004156run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004157 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4158 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004159 0 \
4160 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004161 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004162 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4163 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004164 -c "NamedGroup: x448 ( 1e )" \
4165 -c "Verifying peer X.509 certificate... ok" \
4166 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004167
Jerry Yu31018ad2021-11-26 20:36:17 +08004168requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004169requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004170requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004171requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004172requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004173run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004174 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4175 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004176 0 \
4177 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004178 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004179 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4180 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004181 -c "NamedGroup: secp256r1 ( 17 )" \
4182 -c "Verifying peer X.509 certificate... ok" \
4183 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004184
Jerry Yu31018ad2021-11-26 20:36:17 +08004185requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004186requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004187requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004188requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004189requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004190run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004191 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4192 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004193 0 \
4194 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004195 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004196 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4197 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004198 -c "NamedGroup: secp256r1 ( 17 )" \
4199 -c "Verifying peer X.509 certificate... ok" \
4200 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004201
Jerry Yu31018ad2021-11-26 20:36:17 +08004202requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004203requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004204requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004205requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004206requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004207run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004208 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4209 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004210 0 \
4211 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004212 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004213 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4214 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004215 -c "NamedGroup: secp256r1 ( 17 )" \
4216 -c "Verifying peer X.509 certificate... ok" \
4217 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004218
Jerry Yu31018ad2021-11-26 20:36:17 +08004219requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004220requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004221requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004222requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004223requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004224requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004225run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004226 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4227 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004228 0 \
4229 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004230 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004231 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4232 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004233 -c "NamedGroup: secp256r1 ( 17 )" \
4234 -c "Verifying peer X.509 certificate... ok" \
4235 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004236
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004237requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004238requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004239requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004242run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004243 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4244 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004245 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004246 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004247 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004248 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004249 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4250 -c "NamedGroup: secp384r1 ( 18 )" \
4251 -c "Verifying peer X.509 certificate... ok" \
4252 -C "received HelloRetryRequest message"
4253
4254requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004255requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004256requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4259run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004260 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4261 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004262 0 \
4263 -c "HTTP/1.0 200 ok" \
4264 -c "Protocol is TLSv1.3" \
4265 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4266 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4267 -c "NamedGroup: secp384r1 ( 18 )" \
4268 -c "Verifying peer X.509 certificate... ok" \
4269 -C "received HelloRetryRequest message"
4270
4271requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004272requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004273requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004274requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4276run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004277 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4278 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004279 0 \
4280 -c "HTTP/1.0 200 ok" \
4281 -c "Protocol is TLSv1.3" \
4282 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4283 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4284 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004285 -c "Verifying peer X.509 certificate... ok" \
4286 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004287
Jerry Yu31018ad2021-11-26 20:36:17 +08004288requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004289requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004290requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004291requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004293requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004294run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004295 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4296 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004297 0 \
4298 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004299 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004300 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4301 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004302 -c "NamedGroup: secp384r1 ( 18 )" \
4303 -c "Verifying peer X.509 certificate... ok" \
4304 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004305
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004306requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004307requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004308requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004309requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004310requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004311run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004312 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4313 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004314 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004315 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004316 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004317 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004318 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4319 -c "NamedGroup: secp521r1 ( 19 )" \
4320 -c "Verifying peer X.509 certificate... ok" \
4321 -C "received HelloRetryRequest message"
4322
4323requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004324requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004325requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004326requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4327requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4328run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004329 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4330 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004331 0 \
4332 -c "HTTP/1.0 200 ok" \
4333 -c "Protocol is TLSv1.3" \
4334 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4335 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4336 -c "NamedGroup: secp521r1 ( 19 )" \
4337 -c "Verifying peer X.509 certificate... ok" \
4338 -C "received HelloRetryRequest message"
4339
4340requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004341requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004342requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004343requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4344requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4345run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004346 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4347 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004348 0 \
4349 -c "HTTP/1.0 200 ok" \
4350 -c "Protocol is TLSv1.3" \
4351 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4352 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4353 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004354 -c "Verifying peer X.509 certificate... ok" \
4355 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004356
Jerry Yu31018ad2021-11-26 20:36:17 +08004357requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004358requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004359requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004360requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004361requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004362requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004363run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004364 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4365 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004366 0 \
4367 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004368 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004369 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4370 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004371 -c "NamedGroup: secp521r1 ( 19 )" \
4372 -c "Verifying peer X.509 certificate... ok" \
4373 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004374
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004375requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004376requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004377requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004380run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004381 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4382 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004383 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004384 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004385 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004386 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004387 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4388 -c "NamedGroup: x25519 ( 1d )" \
4389 -c "Verifying peer X.509 certificate... ok" \
4390 -C "received HelloRetryRequest message"
4391
4392requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004393requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004394requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004395requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4396requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4397run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004398 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4399 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004400 0 \
4401 -c "HTTP/1.0 200 ok" \
4402 -c "Protocol is TLSv1.3" \
4403 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4404 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4405 -c "NamedGroup: x25519 ( 1d )" \
4406 -c "Verifying peer X.509 certificate... ok" \
4407 -C "received HelloRetryRequest message"
4408
4409requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004410requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004411requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4414run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004415 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4416 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004417 0 \
4418 -c "HTTP/1.0 200 ok" \
4419 -c "Protocol is TLSv1.3" \
4420 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4421 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4422 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004423 -c "Verifying peer X.509 certificate... ok" \
4424 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004425
Jerry Yu31018ad2021-11-26 20:36:17 +08004426requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004427requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004428requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004429requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004431requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004432run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004433 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4434 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004435 0 \
4436 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004437 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004438 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4439 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004440 -c "NamedGroup: x25519 ( 1d )" \
4441 -c "Verifying peer X.509 certificate... ok" \
4442 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004443
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004444requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004445requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004446requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004447requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004448requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004449run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004450 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4451 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004452 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004453 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004454 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004455 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004456 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4457 -c "NamedGroup: x448 ( 1e )" \
4458 -c "Verifying peer X.509 certificate... ok" \
4459 -C "received HelloRetryRequest message"
4460
4461requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004462requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004463requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004464requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4465requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4466run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004467 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4468 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004469 0 \
4470 -c "HTTP/1.0 200 ok" \
4471 -c "Protocol is TLSv1.3" \
4472 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4473 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4474 -c "NamedGroup: x448 ( 1e )" \
4475 -c "Verifying peer X.509 certificate... ok" \
4476 -C "received HelloRetryRequest message"
4477
4478requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004479requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004480requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004481requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4483run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004484 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4485 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004486 0 \
4487 -c "HTTP/1.0 200 ok" \
4488 -c "Protocol is TLSv1.3" \
4489 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4490 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4491 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004492 -c "Verifying peer X.509 certificate... ok" \
4493 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004494
Jerry Yu31018ad2021-11-26 20:36:17 +08004495requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004496requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004497requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004498requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004499requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004500requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004501run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004502 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4503 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004504 0 \
4505 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004506 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004507 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
4508 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004509 -c "NamedGroup: x448 ( 1e )" \
4510 -c "Verifying peer X.509 certificate... ok" \
4511 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004512
Jerry Yu31018ad2021-11-26 20:36:17 +08004513requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004514requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004515requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004516requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004517requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004518run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004519 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4520 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004521 0 \
4522 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004523 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004524 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4525 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004526 -c "NamedGroup: secp256r1 ( 17 )" \
4527 -c "Verifying peer X.509 certificate... ok" \
4528 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004529
Jerry Yu31018ad2021-11-26 20:36:17 +08004530requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004531requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004532requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004533requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004534requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004535run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004536 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4537 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004538 0 \
4539 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004540 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004541 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4542 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004543 -c "NamedGroup: secp256r1 ( 17 )" \
4544 -c "Verifying peer X.509 certificate... ok" \
4545 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004546
Jerry Yu31018ad2021-11-26 20:36:17 +08004547requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004548requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004549requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004552run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004553 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4554 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004555 0 \
4556 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004557 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004558 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4559 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004560 -c "NamedGroup: secp256r1 ( 17 )" \
4561 -c "Verifying peer X.509 certificate... ok" \
4562 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004563
Jerry Yu31018ad2021-11-26 20:36:17 +08004564requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004565requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004566requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004567requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004569requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004570run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004571 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4572 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004573 0 \
4574 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004575 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004576 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4577 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004578 -c "NamedGroup: secp256r1 ( 17 )" \
4579 -c "Verifying peer X.509 certificate... ok" \
4580 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004581
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004582requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004583requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004584requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004585requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004586requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004587run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004588 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4589 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004590 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004591 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004592 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004593 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004594 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4595 -c "NamedGroup: secp384r1 ( 18 )" \
4596 -c "Verifying peer X.509 certificate... ok" \
4597 -C "received HelloRetryRequest message"
4598
4599requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004600requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004601requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004602requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4604run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004605 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4606 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004607 0 \
4608 -c "HTTP/1.0 200 ok" \
4609 -c "Protocol is TLSv1.3" \
4610 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4611 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4612 -c "NamedGroup: secp384r1 ( 18 )" \
4613 -c "Verifying peer X.509 certificate... ok" \
4614 -C "received HelloRetryRequest message"
4615
4616requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004617requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004618requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004619requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4620requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4621run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004622 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4623 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004624 0 \
4625 -c "HTTP/1.0 200 ok" \
4626 -c "Protocol is TLSv1.3" \
4627 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4628 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4629 -c "NamedGroup: secp384r1 ( 18 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004630 -c "Verifying peer X.509 certificate... ok" \
4631 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004632
Jerry Yu31018ad2021-11-26 20:36:17 +08004633requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004634requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004635requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004638requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004639run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004640 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4641 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004642 0 \
4643 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004644 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004645 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4646 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004647 -c "NamedGroup: secp384r1 ( 18 )" \
4648 -c "Verifying peer X.509 certificate... ok" \
4649 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004650
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004651requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004652requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004653requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004654requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004655requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004656run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004657 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4658 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004659 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004660 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004661 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004662 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004663 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4664 -c "NamedGroup: secp521r1 ( 19 )" \
4665 -c "Verifying peer X.509 certificate... ok" \
4666 -C "received HelloRetryRequest message"
4667
4668requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004669requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004670requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004671requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4672requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4673run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004674 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4675 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004676 0 \
4677 -c "HTTP/1.0 200 ok" \
4678 -c "Protocol is TLSv1.3" \
4679 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4680 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4681 -c "NamedGroup: secp521r1 ( 19 )" \
4682 -c "Verifying peer X.509 certificate... ok" \
4683 -C "received HelloRetryRequest message"
4684
4685requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004686requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004687requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004688requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4689requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4690run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004691 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4692 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004693 0 \
4694 -c "HTTP/1.0 200 ok" \
4695 -c "Protocol is TLSv1.3" \
4696 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4697 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4698 -c "NamedGroup: secp521r1 ( 19 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004699 -c "Verifying peer X.509 certificate... ok" \
4700 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004701
Jerry Yu31018ad2021-11-26 20:36:17 +08004702requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004703requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004704requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004705requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004706requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004707requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004708run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004709 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4710 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004711 0 \
4712 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004713 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004714 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4715 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004716 -c "NamedGroup: secp521r1 ( 19 )" \
4717 -c "Verifying peer X.509 certificate... ok" \
4718 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004719
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004720requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004721requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004722requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004723requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004724requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004725run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004726 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4727 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004728 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004729 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004730 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004731 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004732 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4733 -c "NamedGroup: x25519 ( 1d )" \
4734 -c "Verifying peer X.509 certificate... ok" \
4735 -C "received HelloRetryRequest message"
4736
4737requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004738requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004739requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004740requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4741requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4742run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004743 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4744 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004745 0 \
4746 -c "HTTP/1.0 200 ok" \
4747 -c "Protocol is TLSv1.3" \
4748 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4749 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4750 -c "NamedGroup: x25519 ( 1d )" \
4751 -c "Verifying peer X.509 certificate... ok" \
4752 -C "received HelloRetryRequest message"
4753
4754requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004755requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004756requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004757requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4758requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4759run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004760 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4761 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004762 0 \
4763 -c "HTTP/1.0 200 ok" \
4764 -c "Protocol is TLSv1.3" \
4765 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4766 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4767 -c "NamedGroup: x25519 ( 1d )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004768 -c "Verifying peer X.509 certificate... ok" \
4769 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004770
Jerry Yu31018ad2021-11-26 20:36:17 +08004771requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004772requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004773requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004774requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004777run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004778 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4779 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004780 0 \
4781 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004782 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004783 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4784 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004785 -c "NamedGroup: x25519 ( 1d )" \
4786 -c "Verifying peer X.509 certificate... ok" \
4787 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004788
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004789requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004790requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004791requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004792requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004793requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004794run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004795 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4796 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004797 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004798 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004799 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004800 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004801 -c "Certificate Verify: Signature algorithm ( 0403 )" \
4802 -c "NamedGroup: x448 ( 1e )" \
4803 -c "Verifying peer X.509 certificate... ok" \
4804 -C "received HelloRetryRequest message"
4805
4806requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004807requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004808requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004809requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4810requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4811run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004812 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4813 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004814 0 \
4815 -c "HTTP/1.0 200 ok" \
4816 -c "Protocol is TLSv1.3" \
4817 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4818 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4819 -c "NamedGroup: x448 ( 1e )" \
4820 -c "Verifying peer X.509 certificate... ok" \
4821 -C "received HelloRetryRequest message"
4822
4823requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004824requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004825requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004826requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4828run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004829 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4830 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004831 0 \
4832 -c "HTTP/1.0 200 ok" \
4833 -c "Protocol is TLSv1.3" \
4834 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4835 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4836 -c "NamedGroup: x448 ( 1e )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004837 -c "Verifying peer X.509 certificate... ok" \
4838 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004839
Jerry Yu31018ad2021-11-26 20:36:17 +08004840requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004841requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004842requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004843requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004844requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08004845requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02004846run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004847 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4848 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004849 0 \
4850 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004851 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004852 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
4853 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004854 -c "NamedGroup: x448 ( 1e )" \
4855 -c "Verifying peer X.509 certificate... ok" \
4856 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004857
Jerry Yu31018ad2021-11-26 20:36:17 +08004858requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004859requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004860requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004861requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004862requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004863run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004864 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4865 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004866 0 \
4867 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004868 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004869 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4870 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004871 -c "NamedGroup: secp256r1 ( 17 )" \
4872 -c "Verifying peer X.509 certificate... ok" \
4873 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004874
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004875requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004876requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004877requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004878requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004879requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004880run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004881 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4882 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004883 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004884 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004885 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004886 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004887 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4888 -c "NamedGroup: secp256r1 ( 17 )" \
4889 -c "Verifying peer X.509 certificate... ok" \
4890 -C "received HelloRetryRequest message"
4891
4892requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004893requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004894requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004895requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4896requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4897run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004898 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4899 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004900 0 \
4901 -c "HTTP/1.0 200 ok" \
4902 -c "Protocol is TLSv1.3" \
4903 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4904 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4905 -c "NamedGroup: secp256r1 ( 17 )" \
4906 -c "Verifying peer X.509 certificate... ok" \
4907 -C "received HelloRetryRequest message"
4908
4909requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004910requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004911requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004912requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4913requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4914requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4915run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004916 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4917 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004918 0 \
4919 -c "HTTP/1.0 200 ok" \
4920 -c "Protocol is TLSv1.3" \
4921 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4922 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004923 -c "NamedGroup: secp256r1 ( 17 )" \
4924 -c "Verifying peer X.509 certificate... ok" \
4925 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004926
Jerry Yu31018ad2021-11-26 20:36:17 +08004927requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004928requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004929requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004930requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004931requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02004932run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004933 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4934 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004935 0 \
4936 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004937 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004938 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4939 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004940 -c "NamedGroup: secp384r1 ( 18 )" \
4941 -c "Verifying peer X.509 certificate... ok" \
4942 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004943
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004944requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004945requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004946requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004947requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01004948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004949run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004950 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4951 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004952 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004953 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01004954 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08004955 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004956 -c "Certificate Verify: Signature algorithm ( 0503 )" \
4957 -c "NamedGroup: secp384r1 ( 18 )" \
4958 -c "Verifying peer X.509 certificate... ok" \
4959 -C "received HelloRetryRequest message"
4960
4961requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004962requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004963requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004964requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4965requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4966run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004967 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4968 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004969 0 \
4970 -c "HTTP/1.0 200 ok" \
4971 -c "Protocol is TLSv1.3" \
4972 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4973 -c "Certificate Verify: Signature algorithm ( 0603 )" \
4974 -c "NamedGroup: secp384r1 ( 18 )" \
4975 -c "Verifying peer X.509 certificate... ok" \
4976 -C "received HelloRetryRequest message"
4977
4978requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004979requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004980requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004981requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4983requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4984run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08004985 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4986 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02004987 0 \
4988 -c "HTTP/1.0 200 ok" \
4989 -c "Protocol is TLSv1.3" \
4990 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
4991 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08004992 -c "NamedGroup: secp384r1 ( 18 )" \
4993 -c "Verifying peer X.509 certificate... ok" \
4994 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08004995
Jerry Yu31018ad2021-11-26 20:36:17 +08004996requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08004997requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00004998requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01004999requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005000requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005001run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005002 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5003 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005004 0 \
5005 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005006 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005007 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5008 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005009 -c "NamedGroup: secp521r1 ( 19 )" \
5010 -c "Verifying peer X.509 certificate... ok" \
5011 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005012
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005013requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005014requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005015requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005018run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005019 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5020 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005021 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005022 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005023 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005024 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005025 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5026 -c "NamedGroup: secp521r1 ( 19 )" \
5027 -c "Verifying peer X.509 certificate... ok" \
5028 -C "received HelloRetryRequest message"
5029
5030requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005031requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005032requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005033requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5034requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5035run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005036 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5037 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005038 0 \
5039 -c "HTTP/1.0 200 ok" \
5040 -c "Protocol is TLSv1.3" \
5041 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5042 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5043 -c "NamedGroup: secp521r1 ( 19 )" \
5044 -c "Verifying peer X.509 certificate... ok" \
5045 -C "received HelloRetryRequest message"
5046
5047requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005048requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005049requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005050requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5052requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5053run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005054 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5055 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005056 0 \
5057 -c "HTTP/1.0 200 ok" \
5058 -c "Protocol is TLSv1.3" \
5059 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5060 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005061 -c "NamedGroup: secp521r1 ( 19 )" \
5062 -c "Verifying peer X.509 certificate... ok" \
5063 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005064
Jerry Yu31018ad2021-11-26 20:36:17 +08005065requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005066requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005067requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005070run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005071 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5072 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005073 0 \
5074 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005075 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005076 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5077 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005078 -c "NamedGroup: x25519 ( 1d )" \
5079 -c "Verifying peer X.509 certificate... ok" \
5080 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005081
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005082requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005083requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005084requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005085requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005086requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005087run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005088 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5089 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005090 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005091 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005092 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005093 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005094 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5095 -c "NamedGroup: x25519 ( 1d )" \
5096 -c "Verifying peer X.509 certificate... ok" \
5097 -C "received HelloRetryRequest message"
5098
5099requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005100requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005101requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005102requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5104run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005105 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5106 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005107 0 \
5108 -c "HTTP/1.0 200 ok" \
5109 -c "Protocol is TLSv1.3" \
5110 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5111 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5112 -c "NamedGroup: x25519 ( 1d )" \
5113 -c "Verifying peer X.509 certificate... ok" \
5114 -C "received HelloRetryRequest message"
5115
5116requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005117requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005118requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005119requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5120requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5121requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5122run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005123 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5124 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005125 0 \
5126 -c "HTTP/1.0 200 ok" \
5127 -c "Protocol is TLSv1.3" \
5128 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5129 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005130 -c "NamedGroup: x25519 ( 1d )" \
5131 -c "Verifying peer X.509 certificate... ok" \
5132 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005133
Jerry Yu31018ad2021-11-26 20:36:17 +08005134requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005135requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005136requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005137requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005138requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02005139run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005140 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5141 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005142 0 \
5143 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005144 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005145 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5146 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005147 -c "NamedGroup: x448 ( 1e )" \
5148 -c "Verifying peer X.509 certificate... ok" \
5149 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005150
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005151requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005152requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005153requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005154requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005155requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005156run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005157 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5158 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005159 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005160 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005161 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005162 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005163 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005164 -c "NamedGroup: x448 ( 1e )" \
5165 -c "Verifying peer X.509 certificate... ok" \
5166 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005167
Jerry Yu31018ad2021-11-26 20:36:17 +08005168requires_openssl_tls1_3
Jerry Yu31018ad2021-11-26 20:36:17 +08005169requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005170requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005171requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005172requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005173run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005174 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5175 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005176 0 \
5177 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01005178 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005179 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005180 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5181 -c "NamedGroup: x448 ( 1e )" \
5182 -c "Verifying peer X.509 certificate... ok" \
5183 -C "received HelloRetryRequest message"
5184
5185requires_openssl_tls1_3
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005186requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005187requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005188requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5189requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5190requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5191run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005192 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5193 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005194 0 \
5195 -c "HTTP/1.0 200 ok" \
5196 -c "Protocol is TLSv1.3" \
5197 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
5198 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5199 -c "NamedGroup: x448 ( 1e )" \
5200 -c "Verifying peer X.509 certificate... ok" \
5201 -C "received HelloRetryRequest message"
5202
5203requires_gnutls_tls1_3
5204requires_gnutls_next_no_ticket
5205requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005206requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005207requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005208requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5209requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5210run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005211 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005212 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005213 0 \
5214 -c "HTTP/1.0 200 OK" \
5215 -c "Protocol is TLSv1.3" \
5216 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5217 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5218 -c "NamedGroup: secp256r1 ( 17 )" \
5219 -c "Verifying peer X.509 certificate... ok" \
5220 -C "received HelloRetryRequest message"
5221
5222requires_gnutls_tls1_3
5223requires_gnutls_next_no_ticket
5224requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005225requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005226requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005227requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5228requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5229run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005230 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005231 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005232 0 \
5233 -c "HTTP/1.0 200 OK" \
5234 -c "Protocol is TLSv1.3" \
5235 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
Jerry Yucdcb6832021-11-29 16:50:13 +08005236 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08005237 -c "NamedGroup: secp256r1 ( 17 )" \
5238 -c "Verifying peer X.509 certificate... ok" \
5239 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08005240
Jerry Yu31018ad2021-11-26 20:36:17 +08005241requires_gnutls_tls1_3
5242requires_gnutls_next_no_ticket
5243requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08005244requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005245requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01005246requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01005247requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005248run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005249 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005250 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005251 0 \
5252 -c "HTTP/1.0 200 OK" \
5253 -c "Protocol is TLSv1.3" \
5254 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5255 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5256 -c "NamedGroup: secp256r1 ( 17 )" \
5257 -c "Verifying peer X.509 certificate... ok" \
5258 -C "received HelloRetryRequest message"
5259
5260requires_gnutls_tls1_3
5261requires_gnutls_next_no_ticket
5262requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005263requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005264requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005265requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5266requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5267requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5268run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005269 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005270 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005271 0 \
5272 -c "HTTP/1.0 200 OK" \
5273 -c "Protocol is TLSv1.3" \
5274 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5275 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5276 -c "NamedGroup: secp256r1 ( 17 )" \
5277 -c "Verifying peer X.509 certificate... ok" \
5278 -C "received HelloRetryRequest message"
5279
5280requires_gnutls_tls1_3
5281requires_gnutls_next_no_ticket
5282requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005283requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005284requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005285requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5286requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5287run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005288 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005289 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005290 0 \
5291 -c "HTTP/1.0 200 OK" \
5292 -c "Protocol is TLSv1.3" \
5293 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5294 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5295 -c "NamedGroup: secp384r1 ( 18 )" \
5296 -c "Verifying peer X.509 certificate... ok" \
5297 -C "received HelloRetryRequest message"
5298
5299requires_gnutls_tls1_3
5300requires_gnutls_next_no_ticket
5301requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005302requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005303requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005304requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5305requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5306run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005307 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005308 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005309 0 \
5310 -c "HTTP/1.0 200 OK" \
5311 -c "Protocol is TLSv1.3" \
5312 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5313 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5314 -c "NamedGroup: secp384r1 ( 18 )" \
5315 -c "Verifying peer X.509 certificate... ok" \
5316 -C "received HelloRetryRequest message"
5317
5318requires_gnutls_tls1_3
5319requires_gnutls_next_no_ticket
5320requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005321requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005322requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005323requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5324requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5325run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005326 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005327 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005328 0 \
5329 -c "HTTP/1.0 200 OK" \
5330 -c "Protocol is TLSv1.3" \
5331 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5332 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5333 -c "NamedGroup: secp384r1 ( 18 )" \
5334 -c "Verifying peer X.509 certificate... ok" \
5335 -C "received HelloRetryRequest message"
5336
5337requires_gnutls_tls1_3
5338requires_gnutls_next_no_ticket
5339requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005340requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005341requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005342requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5343requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5344requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5345run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005346 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005347 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005348 0 \
5349 -c "HTTP/1.0 200 OK" \
5350 -c "Protocol is TLSv1.3" \
5351 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5352 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5353 -c "NamedGroup: secp384r1 ( 18 )" \
5354 -c "Verifying peer X.509 certificate... ok" \
5355 -C "received HelloRetryRequest message"
5356
5357requires_gnutls_tls1_3
5358requires_gnutls_next_no_ticket
5359requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005360requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005361requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005362requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5363requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5364run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005365 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005366 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005367 0 \
5368 -c "HTTP/1.0 200 OK" \
5369 -c "Protocol is TLSv1.3" \
5370 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5371 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5372 -c "NamedGroup: secp521r1 ( 19 )" \
5373 -c "Verifying peer X.509 certificate... ok" \
5374 -C "received HelloRetryRequest message"
5375
5376requires_gnutls_tls1_3
5377requires_gnutls_next_no_ticket
5378requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005379requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005380requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005381requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5382requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5383run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005384 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005385 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005386 0 \
5387 -c "HTTP/1.0 200 OK" \
5388 -c "Protocol is TLSv1.3" \
5389 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5390 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5391 -c "NamedGroup: secp521r1 ( 19 )" \
5392 -c "Verifying peer X.509 certificate... ok" \
5393 -C "received HelloRetryRequest message"
5394
5395requires_gnutls_tls1_3
5396requires_gnutls_next_no_ticket
5397requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005398requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005399requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005400requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5401requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5402run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005403 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005404 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005405 0 \
5406 -c "HTTP/1.0 200 OK" \
5407 -c "Protocol is TLSv1.3" \
5408 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5409 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5410 -c "NamedGroup: secp521r1 ( 19 )" \
5411 -c "Verifying peer X.509 certificate... ok" \
5412 -C "received HelloRetryRequest message"
5413
5414requires_gnutls_tls1_3
5415requires_gnutls_next_no_ticket
5416requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005417requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005418requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005419requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5421requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5422run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005423 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005424 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005425 0 \
5426 -c "HTTP/1.0 200 OK" \
5427 -c "Protocol is TLSv1.3" \
5428 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5429 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5430 -c "NamedGroup: secp521r1 ( 19 )" \
5431 -c "Verifying peer X.509 certificate... ok" \
5432 -C "received HelloRetryRequest message"
5433
5434requires_gnutls_tls1_3
5435requires_gnutls_next_no_ticket
5436requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005437requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005438requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005439requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5440requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5441run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005442 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005443 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005444 0 \
5445 -c "HTTP/1.0 200 OK" \
5446 -c "Protocol is TLSv1.3" \
5447 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5448 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5449 -c "NamedGroup: x25519 ( 1d )" \
5450 -c "Verifying peer X.509 certificate... ok" \
5451 -C "received HelloRetryRequest message"
5452
5453requires_gnutls_tls1_3
5454requires_gnutls_next_no_ticket
5455requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005456requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005457requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005458requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5459requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5460run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005461 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005462 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005463 0 \
5464 -c "HTTP/1.0 200 OK" \
5465 -c "Protocol is TLSv1.3" \
5466 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5467 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5468 -c "NamedGroup: x25519 ( 1d )" \
5469 -c "Verifying peer X.509 certificate... ok" \
5470 -C "received HelloRetryRequest message"
5471
5472requires_gnutls_tls1_3
5473requires_gnutls_next_no_ticket
5474requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005475requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005476requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005477requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5478requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5479run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005480 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005481 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005482 0 \
5483 -c "HTTP/1.0 200 OK" \
5484 -c "Protocol is TLSv1.3" \
5485 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5486 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5487 -c "NamedGroup: x25519 ( 1d )" \
5488 -c "Verifying peer X.509 certificate... ok" \
5489 -C "received HelloRetryRequest message"
5490
5491requires_gnutls_tls1_3
5492requires_gnutls_next_no_ticket
5493requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005494requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005495requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005496requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5498requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5499run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005500 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005501 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005502 0 \
5503 -c "HTTP/1.0 200 OK" \
5504 -c "Protocol is TLSv1.3" \
5505 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5506 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5507 -c "NamedGroup: x25519 ( 1d )" \
5508 -c "Verifying peer X.509 certificate... ok" \
5509 -C "received HelloRetryRequest message"
5510
5511requires_gnutls_tls1_3
5512requires_gnutls_next_no_ticket
5513requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005514requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005515requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005516requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5517requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5518run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005519 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005520 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005521 0 \
5522 -c "HTTP/1.0 200 OK" \
5523 -c "Protocol is TLSv1.3" \
5524 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5525 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5526 -c "NamedGroup: x448 ( 1e )" \
5527 -c "Verifying peer X.509 certificate... ok" \
5528 -C "received HelloRetryRequest message"
5529
5530requires_gnutls_tls1_3
5531requires_gnutls_next_no_ticket
5532requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005533requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005534requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005535requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5536requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5537run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005538 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005539 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005540 0 \
5541 -c "HTTP/1.0 200 OK" \
5542 -c "Protocol is TLSv1.3" \
5543 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5544 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5545 -c "NamedGroup: x448 ( 1e )" \
5546 -c "Verifying peer X.509 certificate... ok" \
5547 -C "received HelloRetryRequest message"
5548
5549requires_gnutls_tls1_3
5550requires_gnutls_next_no_ticket
5551requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005552requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005553requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5556run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005557 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005558 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005559 0 \
5560 -c "HTTP/1.0 200 OK" \
5561 -c "Protocol is TLSv1.3" \
5562 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5563 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5564 -c "NamedGroup: x448 ( 1e )" \
5565 -c "Verifying peer X.509 certificate... ok" \
5566 -C "received HelloRetryRequest message"
5567
5568requires_gnutls_tls1_3
5569requires_gnutls_next_no_ticket
5570requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005571requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005572requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005573requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5574requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5575requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5576run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005577 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005578 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005579 0 \
5580 -c "HTTP/1.0 200 OK" \
5581 -c "Protocol is TLSv1.3" \
5582 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
5583 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5584 -c "NamedGroup: x448 ( 1e )" \
5585 -c "Verifying peer X.509 certificate... ok" \
5586 -C "received HelloRetryRequest message"
5587
5588requires_gnutls_tls1_3
5589requires_gnutls_next_no_ticket
5590requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005591requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005592requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005593requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5594requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5595run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005596 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005597 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005598 0 \
5599 -c "HTTP/1.0 200 OK" \
5600 -c "Protocol is TLSv1.3" \
5601 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5602 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5603 -c "NamedGroup: secp256r1 ( 17 )" \
5604 -c "Verifying peer X.509 certificate... ok" \
5605 -C "received HelloRetryRequest message"
5606
5607requires_gnutls_tls1_3
5608requires_gnutls_next_no_ticket
5609requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005610requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005611requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005612requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5614run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005615 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005616 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005617 0 \
5618 -c "HTTP/1.0 200 OK" \
5619 -c "Protocol is TLSv1.3" \
5620 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5621 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5622 -c "NamedGroup: secp256r1 ( 17 )" \
5623 -c "Verifying peer X.509 certificate... ok" \
5624 -C "received HelloRetryRequest message"
5625
5626requires_gnutls_tls1_3
5627requires_gnutls_next_no_ticket
5628requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005629requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005630requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005631requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5633run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005634 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005635 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005636 0 \
5637 -c "HTTP/1.0 200 OK" \
5638 -c "Protocol is TLSv1.3" \
5639 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5640 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5641 -c "NamedGroup: secp256r1 ( 17 )" \
5642 -c "Verifying peer X.509 certificate... ok" \
5643 -C "received HelloRetryRequest message"
5644
5645requires_gnutls_tls1_3
5646requires_gnutls_next_no_ticket
5647requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005648requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005649requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005650requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5651requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5652requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5653run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005654 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005655 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005656 0 \
5657 -c "HTTP/1.0 200 OK" \
5658 -c "Protocol is TLSv1.3" \
5659 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5660 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5661 -c "NamedGroup: secp256r1 ( 17 )" \
5662 -c "Verifying peer X.509 certificate... ok" \
5663 -C "received HelloRetryRequest message"
5664
5665requires_gnutls_tls1_3
5666requires_gnutls_next_no_ticket
5667requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005668requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005669requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005670requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5671requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5672run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005673 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005674 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005675 0 \
5676 -c "HTTP/1.0 200 OK" \
5677 -c "Protocol is TLSv1.3" \
5678 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5679 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5680 -c "NamedGroup: secp384r1 ( 18 )" \
5681 -c "Verifying peer X.509 certificate... ok" \
5682 -C "received HelloRetryRequest message"
5683
5684requires_gnutls_tls1_3
5685requires_gnutls_next_no_ticket
5686requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005687requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005688requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005689requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5690requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5691run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005692 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005693 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005694 0 \
5695 -c "HTTP/1.0 200 OK" \
5696 -c "Protocol is TLSv1.3" \
5697 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5698 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5699 -c "NamedGroup: secp384r1 ( 18 )" \
5700 -c "Verifying peer X.509 certificate... ok" \
5701 -C "received HelloRetryRequest message"
5702
5703requires_gnutls_tls1_3
5704requires_gnutls_next_no_ticket
5705requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005706requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005707requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005708requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5709requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5710run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005711 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005712 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005713 0 \
5714 -c "HTTP/1.0 200 OK" \
5715 -c "Protocol is TLSv1.3" \
5716 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5717 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5718 -c "NamedGroup: secp384r1 ( 18 )" \
5719 -c "Verifying peer X.509 certificate... ok" \
5720 -C "received HelloRetryRequest message"
5721
5722requires_gnutls_tls1_3
5723requires_gnutls_next_no_ticket
5724requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005725requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005726requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005727requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5728requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5729requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5730run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005731 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005732 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005733 0 \
5734 -c "HTTP/1.0 200 OK" \
5735 -c "Protocol is TLSv1.3" \
5736 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5737 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5738 -c "NamedGroup: secp384r1 ( 18 )" \
5739 -c "Verifying peer X.509 certificate... ok" \
5740 -C "received HelloRetryRequest message"
5741
5742requires_gnutls_tls1_3
5743requires_gnutls_next_no_ticket
5744requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005745requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005746requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005747requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5748requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5749run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005750 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005751 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005752 0 \
5753 -c "HTTP/1.0 200 OK" \
5754 -c "Protocol is TLSv1.3" \
5755 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5756 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5757 -c "NamedGroup: secp521r1 ( 19 )" \
5758 -c "Verifying peer X.509 certificate... ok" \
5759 -C "received HelloRetryRequest message"
5760
5761requires_gnutls_tls1_3
5762requires_gnutls_next_no_ticket
5763requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005764requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005765requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005766requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5767requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5768run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005769 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005770 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005771 0 \
5772 -c "HTTP/1.0 200 OK" \
5773 -c "Protocol is TLSv1.3" \
5774 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5775 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5776 -c "NamedGroup: secp521r1 ( 19 )" \
5777 -c "Verifying peer X.509 certificate... ok" \
5778 -C "received HelloRetryRequest message"
5779
5780requires_gnutls_tls1_3
5781requires_gnutls_next_no_ticket
5782requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005783requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005784requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005785requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5786requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5787run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005788 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005789 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005790 0 \
5791 -c "HTTP/1.0 200 OK" \
5792 -c "Protocol is TLSv1.3" \
5793 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5794 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5795 -c "NamedGroup: secp521r1 ( 19 )" \
5796 -c "Verifying peer X.509 certificate... ok" \
5797 -C "received HelloRetryRequest message"
5798
5799requires_gnutls_tls1_3
5800requires_gnutls_next_no_ticket
5801requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005802requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005803requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5806requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5807run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005808 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005809 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005810 0 \
5811 -c "HTTP/1.0 200 OK" \
5812 -c "Protocol is TLSv1.3" \
5813 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5814 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5815 -c "NamedGroup: secp521r1 ( 19 )" \
5816 -c "Verifying peer X.509 certificate... ok" \
5817 -C "received HelloRetryRequest message"
5818
5819requires_gnutls_tls1_3
5820requires_gnutls_next_no_ticket
5821requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005822requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005823requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5826run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005827 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005828 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005829 0 \
5830 -c "HTTP/1.0 200 OK" \
5831 -c "Protocol is TLSv1.3" \
5832 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5833 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5834 -c "NamedGroup: x25519 ( 1d )" \
5835 -c "Verifying peer X.509 certificate... ok" \
5836 -C "received HelloRetryRequest message"
5837
5838requires_gnutls_tls1_3
5839requires_gnutls_next_no_ticket
5840requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005841requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005842requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005843requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5844requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5845run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005846 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005847 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005848 0 \
5849 -c "HTTP/1.0 200 OK" \
5850 -c "Protocol is TLSv1.3" \
5851 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5852 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5853 -c "NamedGroup: x25519 ( 1d )" \
5854 -c "Verifying peer X.509 certificate... ok" \
5855 -C "received HelloRetryRequest message"
5856
5857requires_gnutls_tls1_3
5858requires_gnutls_next_no_ticket
5859requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005860requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005861requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005862requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5863requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5864run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005865 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005866 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005867 0 \
5868 -c "HTTP/1.0 200 OK" \
5869 -c "Protocol is TLSv1.3" \
5870 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5871 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5872 -c "NamedGroup: x25519 ( 1d )" \
5873 -c "Verifying peer X.509 certificate... ok" \
5874 -C "received HelloRetryRequest message"
5875
5876requires_gnutls_tls1_3
5877requires_gnutls_next_no_ticket
5878requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005879requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005880requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005881requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5882requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5883requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5884run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005885 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005886 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005887 0 \
5888 -c "HTTP/1.0 200 OK" \
5889 -c "Protocol is TLSv1.3" \
5890 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5891 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5892 -c "NamedGroup: x25519 ( 1d )" \
5893 -c "Verifying peer X.509 certificate... ok" \
5894 -C "received HelloRetryRequest message"
5895
5896requires_gnutls_tls1_3
5897requires_gnutls_next_no_ticket
5898requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005899requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005900requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005901requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5902requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5903run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005904 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005905 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005906 0 \
5907 -c "HTTP/1.0 200 OK" \
5908 -c "Protocol is TLSv1.3" \
5909 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5910 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5911 -c "NamedGroup: x448 ( 1e )" \
5912 -c "Verifying peer X.509 certificate... ok" \
5913 -C "received HelloRetryRequest message"
5914
5915requires_gnutls_tls1_3
5916requires_gnutls_next_no_ticket
5917requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005918requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005919requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005920requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5921requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5922run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005923 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005924 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005925 0 \
5926 -c "HTTP/1.0 200 OK" \
5927 -c "Protocol is TLSv1.3" \
5928 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5929 -c "Certificate Verify: Signature algorithm ( 0503 )" \
5930 -c "NamedGroup: x448 ( 1e )" \
5931 -c "Verifying peer X.509 certificate... ok" \
5932 -C "received HelloRetryRequest message"
5933
5934requires_gnutls_tls1_3
5935requires_gnutls_next_no_ticket
5936requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005937requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005938requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005939requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5940requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5941run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005942 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005943 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005944 0 \
5945 -c "HTTP/1.0 200 OK" \
5946 -c "Protocol is TLSv1.3" \
5947 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5948 -c "Certificate Verify: Signature algorithm ( 0603 )" \
5949 -c "NamedGroup: x448 ( 1e )" \
5950 -c "Verifying peer X.509 certificate... ok" \
5951 -C "received HelloRetryRequest message"
5952
5953requires_gnutls_tls1_3
5954requires_gnutls_next_no_ticket
5955requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005956requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005957requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005958requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5959requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5960requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5961run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005962 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005963 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005964 0 \
5965 -c "HTTP/1.0 200 OK" \
5966 -c "Protocol is TLSv1.3" \
5967 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5968 -c "Certificate Verify: Signature algorithm ( 0804 )" \
5969 -c "NamedGroup: x448 ( 1e )" \
5970 -c "Verifying peer X.509 certificate... ok" \
5971 -C "received HelloRetryRequest message"
5972
5973requires_gnutls_tls1_3
5974requires_gnutls_next_no_ticket
5975requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005976requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005977requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005978requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5979requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5980run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00005981 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08005982 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005983 0 \
5984 -c "HTTP/1.0 200 OK" \
5985 -c "Protocol is TLSv1.3" \
5986 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5987 -c "Certificate Verify: Signature algorithm ( 0403 )" \
5988 -c "NamedGroup: secp256r1 ( 17 )" \
5989 -c "Verifying peer X.509 certificate... ok" \
5990 -C "received HelloRetryRequest message"
5991
5992requires_gnutls_tls1_3
5993requires_gnutls_next_no_ticket
5994requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005995requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00005996requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02005997requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
5998requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5999run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006000 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006001 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006002 0 \
6003 -c "HTTP/1.0 200 OK" \
6004 -c "Protocol is TLSv1.3" \
6005 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6006 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6007 -c "NamedGroup: secp256r1 ( 17 )" \
6008 -c "Verifying peer X.509 certificate... ok" \
6009 -C "received HelloRetryRequest message"
6010
6011requires_gnutls_tls1_3
6012requires_gnutls_next_no_ticket
6013requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006014requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006015requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6018run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006019 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006020 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006021 0 \
6022 -c "HTTP/1.0 200 OK" \
6023 -c "Protocol is TLSv1.3" \
6024 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6025 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6026 -c "NamedGroup: secp256r1 ( 17 )" \
6027 -c "Verifying peer X.509 certificate... ok" \
6028 -C "received HelloRetryRequest message"
6029
6030requires_gnutls_tls1_3
6031requires_gnutls_next_no_ticket
6032requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006033requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006034requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006035requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6036requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6037requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6038run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006039 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006040 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006041 0 \
6042 -c "HTTP/1.0 200 OK" \
6043 -c "Protocol is TLSv1.3" \
6044 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6045 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6046 -c "NamedGroup: secp256r1 ( 17 )" \
6047 -c "Verifying peer X.509 certificate... ok" \
6048 -C "received HelloRetryRequest message"
6049
6050requires_gnutls_tls1_3
6051requires_gnutls_next_no_ticket
6052requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006053requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006054requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006055requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6056requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6057run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006058 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006059 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006060 0 \
6061 -c "HTTP/1.0 200 OK" \
6062 -c "Protocol is TLSv1.3" \
6063 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6064 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6065 -c "NamedGroup: secp384r1 ( 18 )" \
6066 -c "Verifying peer X.509 certificate... ok" \
6067 -C "received HelloRetryRequest message"
6068
6069requires_gnutls_tls1_3
6070requires_gnutls_next_no_ticket
6071requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006072requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006073requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006074requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6075requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6076run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006077 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006078 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006079 0 \
6080 -c "HTTP/1.0 200 OK" \
6081 -c "Protocol is TLSv1.3" \
6082 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6083 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6084 -c "NamedGroup: secp384r1 ( 18 )" \
6085 -c "Verifying peer X.509 certificate... ok" \
6086 -C "received HelloRetryRequest message"
6087
6088requires_gnutls_tls1_3
6089requires_gnutls_next_no_ticket
6090requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006091requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006092requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006093requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6095run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006096 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006097 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006098 0 \
6099 -c "HTTP/1.0 200 OK" \
6100 -c "Protocol is TLSv1.3" \
6101 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6102 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6103 -c "NamedGroup: secp384r1 ( 18 )" \
6104 -c "Verifying peer X.509 certificate... ok" \
6105 -C "received HelloRetryRequest message"
6106
6107requires_gnutls_tls1_3
6108requires_gnutls_next_no_ticket
6109requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006110requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006111requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006112requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6113requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6114requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6115run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006116 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006117 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006118 0 \
6119 -c "HTTP/1.0 200 OK" \
6120 -c "Protocol is TLSv1.3" \
6121 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6122 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6123 -c "NamedGroup: secp384r1 ( 18 )" \
6124 -c "Verifying peer X.509 certificate... ok" \
6125 -C "received HelloRetryRequest message"
6126
6127requires_gnutls_tls1_3
6128requires_gnutls_next_no_ticket
6129requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006130requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006131requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006132requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6133requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6134run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006135 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006136 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006137 0 \
6138 -c "HTTP/1.0 200 OK" \
6139 -c "Protocol is TLSv1.3" \
6140 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6141 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6142 -c "NamedGroup: secp521r1 ( 19 )" \
6143 -c "Verifying peer X.509 certificate... ok" \
6144 -C "received HelloRetryRequest message"
6145
6146requires_gnutls_tls1_3
6147requires_gnutls_next_no_ticket
6148requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006149requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006150requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006151requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6153run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006154 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006155 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006156 0 \
6157 -c "HTTP/1.0 200 OK" \
6158 -c "Protocol is TLSv1.3" \
6159 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6160 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6161 -c "NamedGroup: secp521r1 ( 19 )" \
6162 -c "Verifying peer X.509 certificate... ok" \
6163 -C "received HelloRetryRequest message"
6164
6165requires_gnutls_tls1_3
6166requires_gnutls_next_no_ticket
6167requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006168requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006169requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006170requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6171requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6172run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006173 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006174 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006175 0 \
6176 -c "HTTP/1.0 200 OK" \
6177 -c "Protocol is TLSv1.3" \
6178 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6179 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6180 -c "NamedGroup: secp521r1 ( 19 )" \
6181 -c "Verifying peer X.509 certificate... ok" \
6182 -C "received HelloRetryRequest message"
6183
6184requires_gnutls_tls1_3
6185requires_gnutls_next_no_ticket
6186requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006187requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006188requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006189requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6190requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6191requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6192run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006193 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006194 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006195 0 \
6196 -c "HTTP/1.0 200 OK" \
6197 -c "Protocol is TLSv1.3" \
6198 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6199 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6200 -c "NamedGroup: secp521r1 ( 19 )" \
6201 -c "Verifying peer X.509 certificate... ok" \
6202 -C "received HelloRetryRequest message"
6203
6204requires_gnutls_tls1_3
6205requires_gnutls_next_no_ticket
6206requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006207requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006208requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006209requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6210requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6211run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006212 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006213 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006214 0 \
6215 -c "HTTP/1.0 200 OK" \
6216 -c "Protocol is TLSv1.3" \
6217 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6218 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6219 -c "NamedGroup: x25519 ( 1d )" \
6220 -c "Verifying peer X.509 certificate... ok" \
6221 -C "received HelloRetryRequest message"
6222
6223requires_gnutls_tls1_3
6224requires_gnutls_next_no_ticket
6225requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006226requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006227requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006228requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6229requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6230run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006231 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006232 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006233 0 \
6234 -c "HTTP/1.0 200 OK" \
6235 -c "Protocol is TLSv1.3" \
6236 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6237 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6238 -c "NamedGroup: x25519 ( 1d )" \
6239 -c "Verifying peer X.509 certificate... ok" \
6240 -C "received HelloRetryRequest message"
6241
6242requires_gnutls_tls1_3
6243requires_gnutls_next_no_ticket
6244requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006245requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006246requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006247requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6248requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6249run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006250 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006251 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006252 0 \
6253 -c "HTTP/1.0 200 OK" \
6254 -c "Protocol is TLSv1.3" \
6255 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6256 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6257 -c "NamedGroup: x25519 ( 1d )" \
6258 -c "Verifying peer X.509 certificate... ok" \
6259 -C "received HelloRetryRequest message"
6260
6261requires_gnutls_tls1_3
6262requires_gnutls_next_no_ticket
6263requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006264requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006265requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006266requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6267requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6268requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6269run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006270 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006271 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006272 0 \
6273 -c "HTTP/1.0 200 OK" \
6274 -c "Protocol is TLSv1.3" \
6275 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6276 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6277 -c "NamedGroup: x25519 ( 1d )" \
6278 -c "Verifying peer X.509 certificate... ok" \
6279 -C "received HelloRetryRequest message"
6280
6281requires_gnutls_tls1_3
6282requires_gnutls_next_no_ticket
6283requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006284requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006285requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006286requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6287requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6288run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006289 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006290 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006291 0 \
6292 -c "HTTP/1.0 200 OK" \
6293 -c "Protocol is TLSv1.3" \
6294 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6295 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6296 -c "NamedGroup: x448 ( 1e )" \
6297 -c "Verifying peer X.509 certificate... ok" \
6298 -C "received HelloRetryRequest message"
6299
6300requires_gnutls_tls1_3
6301requires_gnutls_next_no_ticket
6302requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006303requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006304requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006305requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6307run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006308 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006309 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006310 0 \
6311 -c "HTTP/1.0 200 OK" \
6312 -c "Protocol is TLSv1.3" \
6313 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6314 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6315 -c "NamedGroup: x448 ( 1e )" \
6316 -c "Verifying peer X.509 certificate... ok" \
6317 -C "received HelloRetryRequest message"
6318
6319requires_gnutls_tls1_3
6320requires_gnutls_next_no_ticket
6321requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006322requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006323requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006324requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6325requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6326run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006327 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006328 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006329 0 \
6330 -c "HTTP/1.0 200 OK" \
6331 -c "Protocol is TLSv1.3" \
6332 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6333 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6334 -c "NamedGroup: x448 ( 1e )" \
6335 -c "Verifying peer X.509 certificate... ok" \
6336 -C "received HelloRetryRequest message"
6337
6338requires_gnutls_tls1_3
6339requires_gnutls_next_no_ticket
6340requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006341requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006342requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006343requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6344requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6345requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6346run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006347 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006348 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006349 0 \
6350 -c "HTTP/1.0 200 OK" \
6351 -c "Protocol is TLSv1.3" \
6352 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
6353 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6354 -c "NamedGroup: x448 ( 1e )" \
6355 -c "Verifying peer X.509 certificate... ok" \
6356 -C "received HelloRetryRequest message"
6357
6358requires_gnutls_tls1_3
6359requires_gnutls_next_no_ticket
6360requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006361requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006362requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006363requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6364requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6365run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006366 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006367 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006368 0 \
6369 -c "HTTP/1.0 200 OK" \
6370 -c "Protocol is TLSv1.3" \
6371 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6372 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6373 -c "NamedGroup: secp256r1 ( 17 )" \
6374 -c "Verifying peer X.509 certificate... ok" \
6375 -C "received HelloRetryRequest message"
6376
6377requires_gnutls_tls1_3
6378requires_gnutls_next_no_ticket
6379requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006380requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006381requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006382requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6383requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6384run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006385 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006386 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006387 0 \
6388 -c "HTTP/1.0 200 OK" \
6389 -c "Protocol is TLSv1.3" \
6390 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6391 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6392 -c "NamedGroup: secp256r1 ( 17 )" \
6393 -c "Verifying peer X.509 certificate... ok" \
6394 -C "received HelloRetryRequest message"
6395
6396requires_gnutls_tls1_3
6397requires_gnutls_next_no_ticket
6398requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006399requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006400requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006401requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6402requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6403run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006404 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006405 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006406 0 \
6407 -c "HTTP/1.0 200 OK" \
6408 -c "Protocol is TLSv1.3" \
6409 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6410 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6411 -c "NamedGroup: secp256r1 ( 17 )" \
6412 -c "Verifying peer X.509 certificate... ok" \
6413 -C "received HelloRetryRequest message"
6414
6415requires_gnutls_tls1_3
6416requires_gnutls_next_no_ticket
6417requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006418requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006419requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006420requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6421requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6422requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6423run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006424 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006425 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006426 0 \
6427 -c "HTTP/1.0 200 OK" \
6428 -c "Protocol is TLSv1.3" \
6429 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6430 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6431 -c "NamedGroup: secp256r1 ( 17 )" \
6432 -c "Verifying peer X.509 certificate... ok" \
6433 -C "received HelloRetryRequest message"
6434
6435requires_gnutls_tls1_3
6436requires_gnutls_next_no_ticket
6437requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006438requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006439requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006440requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6442run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006443 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006444 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006445 0 \
6446 -c "HTTP/1.0 200 OK" \
6447 -c "Protocol is TLSv1.3" \
6448 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6449 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6450 -c "NamedGroup: secp384r1 ( 18 )" \
6451 -c "Verifying peer X.509 certificate... ok" \
6452 -C "received HelloRetryRequest message"
6453
6454requires_gnutls_tls1_3
6455requires_gnutls_next_no_ticket
6456requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006457requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006458requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006459requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6460requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6461run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006462 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006463 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006464 0 \
6465 -c "HTTP/1.0 200 OK" \
6466 -c "Protocol is TLSv1.3" \
6467 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6468 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6469 -c "NamedGroup: secp384r1 ( 18 )" \
6470 -c "Verifying peer X.509 certificate... ok" \
6471 -C "received HelloRetryRequest message"
6472
6473requires_gnutls_tls1_3
6474requires_gnutls_next_no_ticket
6475requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006476requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006477requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006478requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6479requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6480run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006481 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006482 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006483 0 \
6484 -c "HTTP/1.0 200 OK" \
6485 -c "Protocol is TLSv1.3" \
6486 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6487 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6488 -c "NamedGroup: secp384r1 ( 18 )" \
6489 -c "Verifying peer X.509 certificate... ok" \
6490 -C "received HelloRetryRequest message"
6491
6492requires_gnutls_tls1_3
6493requires_gnutls_next_no_ticket
6494requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006495requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006496requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006497requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6498requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6499requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6500run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006501 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006502 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006503 0 \
6504 -c "HTTP/1.0 200 OK" \
6505 -c "Protocol is TLSv1.3" \
6506 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6507 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6508 -c "NamedGroup: secp384r1 ( 18 )" \
6509 -c "Verifying peer X.509 certificate... ok" \
6510 -C "received HelloRetryRequest message"
6511
6512requires_gnutls_tls1_3
6513requires_gnutls_next_no_ticket
6514requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006515requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006516requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006517requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6518requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6519run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006520 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006521 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006522 0 \
6523 -c "HTTP/1.0 200 OK" \
6524 -c "Protocol is TLSv1.3" \
6525 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6526 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6527 -c "NamedGroup: secp521r1 ( 19 )" \
6528 -c "Verifying peer X.509 certificate... ok" \
6529 -C "received HelloRetryRequest message"
6530
6531requires_gnutls_tls1_3
6532requires_gnutls_next_no_ticket
6533requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006534requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006535requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006536requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6537requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6538run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006539 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006540 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006541 0 \
6542 -c "HTTP/1.0 200 OK" \
6543 -c "Protocol is TLSv1.3" \
6544 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6545 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6546 -c "NamedGroup: secp521r1 ( 19 )" \
6547 -c "Verifying peer X.509 certificate... ok" \
6548 -C "received HelloRetryRequest message"
6549
6550requires_gnutls_tls1_3
6551requires_gnutls_next_no_ticket
6552requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006553requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006554requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006555requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6556requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6557run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006558 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006559 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006560 0 \
6561 -c "HTTP/1.0 200 OK" \
6562 -c "Protocol is TLSv1.3" \
6563 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6564 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6565 -c "NamedGroup: secp521r1 ( 19 )" \
6566 -c "Verifying peer X.509 certificate... ok" \
6567 -C "received HelloRetryRequest message"
6568
6569requires_gnutls_tls1_3
6570requires_gnutls_next_no_ticket
6571requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006572requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006573requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6576requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6577run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006578 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006579 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006580 0 \
6581 -c "HTTP/1.0 200 OK" \
6582 -c "Protocol is TLSv1.3" \
6583 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6584 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6585 -c "NamedGroup: secp521r1 ( 19 )" \
6586 -c "Verifying peer X.509 certificate... ok" \
6587 -C "received HelloRetryRequest message"
6588
6589requires_gnutls_tls1_3
6590requires_gnutls_next_no_ticket
6591requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006592requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006593requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006594requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6595requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6596run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006597 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006598 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006599 0 \
6600 -c "HTTP/1.0 200 OK" \
6601 -c "Protocol is TLSv1.3" \
6602 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6603 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6604 -c "NamedGroup: x25519 ( 1d )" \
6605 -c "Verifying peer X.509 certificate... ok" \
6606 -C "received HelloRetryRequest message"
6607
6608requires_gnutls_tls1_3
6609requires_gnutls_next_no_ticket
6610requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006611requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006612requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006613requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6614requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6615run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006616 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006617 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006618 0 \
6619 -c "HTTP/1.0 200 OK" \
6620 -c "Protocol is TLSv1.3" \
6621 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6622 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6623 -c "NamedGroup: x25519 ( 1d )" \
6624 -c "Verifying peer X.509 certificate... ok" \
6625 -C "received HelloRetryRequest message"
6626
6627requires_gnutls_tls1_3
6628requires_gnutls_next_no_ticket
6629requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006630requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006631requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006632requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6633requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6634run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006635 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006636 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006637 0 \
6638 -c "HTTP/1.0 200 OK" \
6639 -c "Protocol is TLSv1.3" \
6640 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6641 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6642 -c "NamedGroup: x25519 ( 1d )" \
6643 -c "Verifying peer X.509 certificate... ok" \
6644 -C "received HelloRetryRequest message"
6645
6646requires_gnutls_tls1_3
6647requires_gnutls_next_no_ticket
6648requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006649requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006650requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006651requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6652requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6653requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6654run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006655 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006656 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006657 0 \
6658 -c "HTTP/1.0 200 OK" \
6659 -c "Protocol is TLSv1.3" \
6660 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6661 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6662 -c "NamedGroup: x25519 ( 1d )" \
6663 -c "Verifying peer X.509 certificate... ok" \
6664 -C "received HelloRetryRequest message"
6665
6666requires_gnutls_tls1_3
6667requires_gnutls_next_no_ticket
6668requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006669requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006670requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006671requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6672requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6673run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006674 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006675 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006676 0 \
6677 -c "HTTP/1.0 200 OK" \
6678 -c "Protocol is TLSv1.3" \
6679 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6680 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6681 -c "NamedGroup: x448 ( 1e )" \
6682 -c "Verifying peer X.509 certificate... ok" \
6683 -C "received HelloRetryRequest message"
6684
6685requires_gnutls_tls1_3
6686requires_gnutls_next_no_ticket
6687requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006688requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006689requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006690requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6691requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6692run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006693 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006694 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006695 0 \
6696 -c "HTTP/1.0 200 OK" \
6697 -c "Protocol is TLSv1.3" \
6698 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6699 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6700 -c "NamedGroup: x448 ( 1e )" \
6701 -c "Verifying peer X.509 certificate... ok" \
6702 -C "received HelloRetryRequest message"
6703
6704requires_gnutls_tls1_3
6705requires_gnutls_next_no_ticket
6706requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006707requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006708requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006709requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6710requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6711run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006712 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006713 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006714 0 \
6715 -c "HTTP/1.0 200 OK" \
6716 -c "Protocol is TLSv1.3" \
6717 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6718 -c "Certificate Verify: Signature algorithm ( 0603 )" \
6719 -c "NamedGroup: x448 ( 1e )" \
6720 -c "Verifying peer X.509 certificate... ok" \
6721 -C "received HelloRetryRequest message"
6722
6723requires_gnutls_tls1_3
6724requires_gnutls_next_no_ticket
6725requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006726requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006727requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006728requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6730requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6731run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006732 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006733 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006734 0 \
6735 -c "HTTP/1.0 200 OK" \
6736 -c "Protocol is TLSv1.3" \
6737 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6738 -c "Certificate Verify: Signature algorithm ( 0804 )" \
6739 -c "NamedGroup: x448 ( 1e )" \
6740 -c "Verifying peer X.509 certificate... ok" \
6741 -C "received HelloRetryRequest message"
6742
6743requires_gnutls_tls1_3
6744requires_gnutls_next_no_ticket
6745requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006746requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006747requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006748requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6749requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6750run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006751 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006752 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006753 0 \
6754 -c "HTTP/1.0 200 OK" \
6755 -c "Protocol is TLSv1.3" \
6756 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6757 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6758 -c "NamedGroup: secp256r1 ( 17 )" \
6759 -c "Verifying peer X.509 certificate... ok" \
6760 -C "received HelloRetryRequest message"
6761
6762requires_gnutls_tls1_3
6763requires_gnutls_next_no_ticket
6764requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006765requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006766requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006767requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006769run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006770 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006771 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006772 0 \
6773 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006774 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006775 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6776 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006777 -c "NamedGroup: secp256r1 ( 17 )" \
6778 -c "Verifying peer X.509 certificate... ok" \
6779 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006780
Jerry Yu31018ad2021-11-26 20:36:17 +08006781requires_gnutls_tls1_3
6782requires_gnutls_next_no_ticket
6783requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006784requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006785requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006786requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006787requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02006788run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006789 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006790 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006791 0 \
6792 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006793 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006794 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6795 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006796 -c "NamedGroup: secp256r1 ( 17 )" \
6797 -c "Verifying peer X.509 certificate... ok" \
6798 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006799
Jerry Yu31018ad2021-11-26 20:36:17 +08006800requires_gnutls_tls1_3
6801requires_gnutls_next_no_ticket
6802requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006803requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006804requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006805requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006806requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08006807requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02006808run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006809 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006810 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006811 0 \
6812 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006813 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006814 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6815 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006816 -c "NamedGroup: secp256r1 ( 17 )" \
6817 -c "Verifying peer X.509 certificate... ok" \
6818 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006819
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006820requires_gnutls_tls1_3
6821requires_gnutls_next_no_ticket
6822requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006823requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006824requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006825requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006826requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006827run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006828 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006829 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006830 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006831 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006832 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006833 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006834 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6835 -c "NamedGroup: secp384r1 ( 18 )" \
6836 -c "Verifying peer X.509 certificate... ok" \
6837 -C "received HelloRetryRequest message"
6838
6839requires_gnutls_tls1_3
6840requires_gnutls_next_no_ticket
6841requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006842requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006843requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6846run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006847 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006848 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006849 0 \
6850 -c "HTTP/1.0 200 OK" \
6851 -c "Protocol is TLSv1.3" \
6852 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6853 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6854 -c "NamedGroup: secp384r1 ( 18 )" \
6855 -c "Verifying peer X.509 certificate... ok" \
6856 -C "received HelloRetryRequest message"
6857
6858requires_gnutls_tls1_3
6859requires_gnutls_next_no_ticket
6860requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006861requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006862requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006863requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6864requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6865run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006866 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006867 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006868 0 \
6869 -c "HTTP/1.0 200 OK" \
6870 -c "Protocol is TLSv1.3" \
6871 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6872 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006873 -c "NamedGroup: secp384r1 ( 18 )" \
6874 -c "Verifying peer X.509 certificate... ok" \
6875 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006876
Jerry Yu31018ad2021-11-26 20:36:17 +08006877requires_gnutls_tls1_3
6878requires_gnutls_next_no_ticket
6879requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006880requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006881requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006882requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006883requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08006884requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02006885run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006886 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006887 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006888 0 \
6889 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006890 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006891 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6892 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006893 -c "NamedGroup: secp384r1 ( 18 )" \
6894 -c "Verifying peer X.509 certificate... ok" \
6895 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006896
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006897requires_gnutls_tls1_3
6898requires_gnutls_next_no_ticket
6899requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006900requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006901requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006902requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006903requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006904run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006905 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006906 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006907 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006908 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006909 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006910 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006911 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6912 -c "NamedGroup: secp521r1 ( 19 )" \
6913 -c "Verifying peer X.509 certificate... ok" \
6914 -C "received HelloRetryRequest message"
6915
6916requires_gnutls_tls1_3
6917requires_gnutls_next_no_ticket
6918requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006919requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006920requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006921requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6922requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6923run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006924 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006925 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006926 0 \
6927 -c "HTTP/1.0 200 OK" \
6928 -c "Protocol is TLSv1.3" \
6929 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6930 -c "Certificate Verify: Signature algorithm ( 0503 )" \
6931 -c "NamedGroup: secp521r1 ( 19 )" \
6932 -c "Verifying peer X.509 certificate... ok" \
6933 -C "received HelloRetryRequest message"
6934
6935requires_gnutls_tls1_3
6936requires_gnutls_next_no_ticket
6937requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006938requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006939requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6942run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006943 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006944 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006945 0 \
6946 -c "HTTP/1.0 200 OK" \
6947 -c "Protocol is TLSv1.3" \
6948 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6949 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006950 -c "NamedGroup: secp521r1 ( 19 )" \
6951 -c "Verifying peer X.509 certificate... ok" \
6952 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006953
Jerry Yu31018ad2021-11-26 20:36:17 +08006954requires_gnutls_tls1_3
6955requires_gnutls_next_no_ticket
6956requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006957requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006958requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006959requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006960requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08006961requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02006962run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006963 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006964 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006965 0 \
6966 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006967 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006968 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6969 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08006970 -c "NamedGroup: secp521r1 ( 19 )" \
6971 -c "Verifying peer X.509 certificate... ok" \
6972 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08006973
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006974requires_gnutls_tls1_3
6975requires_gnutls_next_no_ticket
6976requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08006977requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006978requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01006979requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01006980requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006981run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00006982 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08006983 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006984 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006985 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01006986 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08006987 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006988 -c "Certificate Verify: Signature algorithm ( 0403 )" \
6989 -c "NamedGroup: x25519 ( 1d )" \
6990 -c "Verifying peer X.509 certificate... ok" \
6991 -C "received HelloRetryRequest message"
6992
6993requires_gnutls_tls1_3
6994requires_gnutls_next_no_ticket
6995requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006996requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00006997requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02006998requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
6999requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7000run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007001 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007002 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007003 0 \
7004 -c "HTTP/1.0 200 OK" \
7005 -c "Protocol is TLSv1.3" \
7006 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7007 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7008 -c "NamedGroup: x25519 ( 1d )" \
7009 -c "Verifying peer X.509 certificate... ok" \
7010 -C "received HelloRetryRequest message"
7011
7012requires_gnutls_tls1_3
7013requires_gnutls_next_no_ticket
7014requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007015requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007016requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007017requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7018requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7019run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007020 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007021 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007022 0 \
7023 -c "HTTP/1.0 200 OK" \
7024 -c "Protocol is TLSv1.3" \
7025 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7026 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007027 -c "NamedGroup: x25519 ( 1d )" \
7028 -c "Verifying peer X.509 certificate... ok" \
7029 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007030
Jerry Yu31018ad2021-11-26 20:36:17 +08007031requires_gnutls_tls1_3
7032requires_gnutls_next_no_ticket
7033requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007034requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007035requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007036requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007037requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007038requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007039run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007040 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007041 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007042 0 \
7043 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007044 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007045 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7046 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007047 -c "NamedGroup: x25519 ( 1d )" \
7048 -c "Verifying peer X.509 certificate... ok" \
7049 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007050
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007051requires_gnutls_tls1_3
7052requires_gnutls_next_no_ticket
7053requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007054requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007055requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007056requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007057requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007058run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007059 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007060 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007061 0 \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007062 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007063 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007064 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007065 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7066 -c "NamedGroup: x448 ( 1e )" \
7067 -c "Verifying peer X.509 certificate... ok" \
7068 -C "received HelloRetryRequest message"
7069
7070requires_gnutls_tls1_3
7071requires_gnutls_next_no_ticket
7072requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007073requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007074requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007075requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7076requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7077run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007078 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007079 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007080 0 \
7081 -c "HTTP/1.0 200 OK" \
7082 -c "Protocol is TLSv1.3" \
7083 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7084 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7085 -c "NamedGroup: x448 ( 1e )" \
7086 -c "Verifying peer X.509 certificate... ok" \
7087 -C "received HelloRetryRequest message"
7088
7089requires_gnutls_tls1_3
7090requires_gnutls_next_no_ticket
7091requires_gnutls_next_disable_tls13_compat
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007092requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007093requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007094requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7095requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7096run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007097 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007098 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
Ronald Cron9d0a3e82022-04-05 16:13:38 +02007099 0 \
7100 -c "HTTP/1.0 200 OK" \
7101 -c "Protocol is TLSv1.3" \
7102 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
7103 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007104 -c "NamedGroup: x448 ( 1e )" \
7105 -c "Verifying peer X.509 certificate... ok" \
7106 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08007107
Jerry Yu31018ad2021-11-26 20:36:17 +08007108requires_gnutls_tls1_3
7109requires_gnutls_next_no_ticket
7110requires_gnutls_next_disable_tls13_compat
Jerry Yu31018ad2021-11-26 20:36:17 +08007111requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007112requires_config_enabled MBEDTLS_DEBUG_C
Ronald Cron6f135e12021-12-08 16:57:54 +01007113requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01007114requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08007115requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02007116run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007117 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007118 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007119 0 \
7120 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01007121 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08007122 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007123 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08007124 -c "NamedGroup: x448 ( 1e )" \
7125 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian8031ba72022-03-22 12:53:45 +00007126 -C "received HelloRetryRequest message"
XiaokangQian83f81882022-03-17 06:26:36 +00007127
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007128requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007129requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007130requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7131requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007132requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7136run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007137 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7138 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007139 0 \
7140 -s "Protocol is TLSv1.3" \
7141 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7142 -s "received signature algorithm: 0x403" \
7143 -s "got named group: secp256r1(0017)" \
7144 -s "Verifying peer X.509 certificate... ok" \
7145 -c "Protocol is TLSv1.3" \
7146 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7147 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7148 -c "NamedGroup: secp256r1 ( 17 )" \
7149 -c "Verifying peer X.509 certificate... ok" \
7150 -C "received HelloRetryRequest message"
7151
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007152requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007153requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007154requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7155requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007156requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007157requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7160run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007161 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7162 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007163 0 \
7164 -s "Protocol is TLSv1.3" \
7165 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7166 -s "received signature algorithm: 0x503" \
7167 -s "got named group: secp256r1(0017)" \
7168 -s "Verifying peer X.509 certificate... ok" \
7169 -c "Protocol is TLSv1.3" \
7170 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7171 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7172 -c "NamedGroup: secp256r1 ( 17 )" \
7173 -c "Verifying peer X.509 certificate... ok" \
7174 -C "received HelloRetryRequest message"
7175
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007176requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007177requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007178requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007180requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007181requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007182requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7183requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7184run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007185 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7186 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007187 0 \
7188 -s "Protocol is TLSv1.3" \
7189 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7190 -s "received signature algorithm: 0x603" \
7191 -s "got named group: secp256r1(0017)" \
7192 -s "Verifying peer X.509 certificate... ok" \
7193 -c "Protocol is TLSv1.3" \
7194 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7195 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7196 -c "NamedGroup: secp256r1 ( 17 )" \
7197 -c "Verifying peer X.509 certificate... ok" \
7198 -C "received HelloRetryRequest message"
7199
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007200requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007201requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007202requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7203requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7204requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007205requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007206requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007207requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7208requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7209requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7210run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007211 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7212 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007213 0 \
7214 -s "Protocol is TLSv1.3" \
7215 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7216 -s "received signature algorithm: 0x804" \
7217 -s "got named group: secp256r1(0017)" \
7218 -s "Verifying peer X.509 certificate... ok" \
7219 -c "Protocol is TLSv1.3" \
7220 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7221 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7222 -c "NamedGroup: secp256r1 ( 17 )" \
7223 -c "Verifying peer X.509 certificate... ok" \
7224 -C "received HelloRetryRequest message"
7225
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007226requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007227requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007228requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7229requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007230requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007231requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7234run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007235 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7236 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007237 0 \
7238 -s "Protocol is TLSv1.3" \
7239 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7240 -s "received signature algorithm: 0x403" \
7241 -s "got named group: secp384r1(0018)" \
7242 -s "Verifying peer X.509 certificate... ok" \
7243 -c "Protocol is TLSv1.3" \
7244 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7245 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7246 -c "NamedGroup: secp384r1 ( 18 )" \
7247 -c "Verifying peer X.509 certificate... ok" \
7248 -C "received HelloRetryRequest message"
7249
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007250requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007251requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007252requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7253requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007254requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007255requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7258run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007259 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7260 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007261 0 \
7262 -s "Protocol is TLSv1.3" \
7263 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7264 -s "received signature algorithm: 0x503" \
7265 -s "got named group: secp384r1(0018)" \
7266 -s "Verifying peer X.509 certificate... ok" \
7267 -c "Protocol is TLSv1.3" \
7268 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7269 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7270 -c "NamedGroup: secp384r1 ( 18 )" \
7271 -c "Verifying peer X.509 certificate... ok" \
7272 -C "received HelloRetryRequest message"
7273
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007274requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007275requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007276requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7277requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007278requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007279requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007280requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7281requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7282run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007283 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7284 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007285 0 \
7286 -s "Protocol is TLSv1.3" \
7287 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7288 -s "received signature algorithm: 0x603" \
7289 -s "got named group: secp384r1(0018)" \
7290 -s "Verifying peer X.509 certificate... ok" \
7291 -c "Protocol is TLSv1.3" \
7292 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7293 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7294 -c "NamedGroup: secp384r1 ( 18 )" \
7295 -c "Verifying peer X.509 certificate... ok" \
7296 -C "received HelloRetryRequest message"
7297
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007298requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007299requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007300requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7301requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7302requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007303requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007304requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007305requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7307requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7308run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007309 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7310 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007311 0 \
7312 -s "Protocol is TLSv1.3" \
7313 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7314 -s "received signature algorithm: 0x804" \
7315 -s "got named group: secp384r1(0018)" \
7316 -s "Verifying peer X.509 certificate... ok" \
7317 -c "Protocol is TLSv1.3" \
7318 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7319 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7320 -c "NamedGroup: secp384r1 ( 18 )" \
7321 -c "Verifying peer X.509 certificate... ok" \
7322 -C "received HelloRetryRequest message"
7323
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007324requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007325requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007326requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7327requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007328requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007329requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7332run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007333 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7334 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007335 0 \
7336 -s "Protocol is TLSv1.3" \
7337 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7338 -s "received signature algorithm: 0x403" \
7339 -s "got named group: secp521r1(0019)" \
7340 -s "Verifying peer X.509 certificate... ok" \
7341 -c "Protocol is TLSv1.3" \
7342 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7343 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7344 -c "NamedGroup: secp521r1 ( 19 )" \
7345 -c "Verifying peer X.509 certificate... ok" \
7346 -C "received HelloRetryRequest message"
7347
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007348requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007349requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007350requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7351requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007352requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007353requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7356run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007357 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7358 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007359 0 \
7360 -s "Protocol is TLSv1.3" \
7361 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7362 -s "received signature algorithm: 0x503" \
7363 -s "got named group: secp521r1(0019)" \
7364 -s "Verifying peer X.509 certificate... ok" \
7365 -c "Protocol is TLSv1.3" \
7366 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7367 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7368 -c "NamedGroup: secp521r1 ( 19 )" \
7369 -c "Verifying peer X.509 certificate... ok" \
7370 -C "received HelloRetryRequest message"
7371
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007372requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007373requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007374requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7375requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007376requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007377requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7380run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007381 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7382 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007383 0 \
7384 -s "Protocol is TLSv1.3" \
7385 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7386 -s "received signature algorithm: 0x603" \
7387 -s "got named group: secp521r1(0019)" \
7388 -s "Verifying peer X.509 certificate... ok" \
7389 -c "Protocol is TLSv1.3" \
7390 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7391 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7392 -c "NamedGroup: secp521r1 ( 19 )" \
7393 -c "Verifying peer X.509 certificate... ok" \
7394 -C "received HelloRetryRequest message"
7395
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007396requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007397requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007398requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7399requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7400requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007401requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007402requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007403requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7404requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7405requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7406run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007407 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7408 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007409 0 \
7410 -s "Protocol is TLSv1.3" \
7411 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7412 -s "received signature algorithm: 0x804" \
7413 -s "got named group: secp521r1(0019)" \
7414 -s "Verifying peer X.509 certificate... ok" \
7415 -c "Protocol is TLSv1.3" \
7416 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7417 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7418 -c "NamedGroup: secp521r1 ( 19 )" \
7419 -c "Verifying peer X.509 certificate... ok" \
7420 -C "received HelloRetryRequest message"
7421
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007422requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007423requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007424requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7425requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007426requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7430run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007431 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7432 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007433 0 \
7434 -s "Protocol is TLSv1.3" \
7435 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7436 -s "received signature algorithm: 0x403" \
7437 -s "got named group: x25519(001d)" \
7438 -s "Verifying peer X.509 certificate... ok" \
7439 -c "Protocol is TLSv1.3" \
7440 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7441 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7442 -c "NamedGroup: x25519 ( 1d )" \
7443 -c "Verifying peer X.509 certificate... ok" \
7444 -C "received HelloRetryRequest message"
7445
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007446requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007447requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007448requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7449requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007450requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007451requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7454run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007455 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7456 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007457 0 \
7458 -s "Protocol is TLSv1.3" \
7459 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7460 -s "received signature algorithm: 0x503" \
7461 -s "got named group: x25519(001d)" \
7462 -s "Verifying peer X.509 certificate... ok" \
7463 -c "Protocol is TLSv1.3" \
7464 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7465 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7466 -c "NamedGroup: x25519 ( 1d )" \
7467 -c "Verifying peer X.509 certificate... ok" \
7468 -C "received HelloRetryRequest message"
7469
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007470requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007471requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007472requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7473requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007474requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007475requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7478run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007479 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7480 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007481 0 \
7482 -s "Protocol is TLSv1.3" \
7483 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7484 -s "received signature algorithm: 0x603" \
7485 -s "got named group: x25519(001d)" \
7486 -s "Verifying peer X.509 certificate... ok" \
7487 -c "Protocol is TLSv1.3" \
7488 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7489 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7490 -c "NamedGroup: x25519 ( 1d )" \
7491 -c "Verifying peer X.509 certificate... ok" \
7492 -C "received HelloRetryRequest message"
7493
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007494requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007495requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007496requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7498requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007499requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007500requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007501requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7502requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7503requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7504run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007505 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7506 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007507 0 \
7508 -s "Protocol is TLSv1.3" \
7509 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7510 -s "received signature algorithm: 0x804" \
7511 -s "got named group: x25519(001d)" \
7512 -s "Verifying peer X.509 certificate... ok" \
7513 -c "Protocol is TLSv1.3" \
7514 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7515 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7516 -c "NamedGroup: x25519 ( 1d )" \
7517 -c "Verifying peer X.509 certificate... ok" \
7518 -C "received HelloRetryRequest message"
7519
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007520requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007521requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007522requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7523requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007524requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007525requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7528run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007529 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7530 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007531 0 \
7532 -s "Protocol is TLSv1.3" \
7533 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7534 -s "received signature algorithm: 0x403" \
7535 -s "got named group: x448(001e)" \
7536 -s "Verifying peer X.509 certificate... ok" \
7537 -c "Protocol is TLSv1.3" \
7538 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7539 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7540 -c "NamedGroup: x448 ( 1e )" \
7541 -c "Verifying peer X.509 certificate... ok" \
7542 -C "received HelloRetryRequest message"
7543
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007544requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007545requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007546requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007548requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007549requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7552run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007553 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7554 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007555 0 \
7556 -s "Protocol is TLSv1.3" \
7557 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7558 -s "received signature algorithm: 0x503" \
7559 -s "got named group: x448(001e)" \
7560 -s "Verifying peer X.509 certificate... ok" \
7561 -c "Protocol is TLSv1.3" \
7562 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7563 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7564 -c "NamedGroup: x448 ( 1e )" \
7565 -c "Verifying peer X.509 certificate... ok" \
7566 -C "received HelloRetryRequest message"
7567
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007568requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007569requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007570requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7571requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007572requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007573requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7576run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007577 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7578 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007579 0 \
7580 -s "Protocol is TLSv1.3" \
7581 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7582 -s "received signature algorithm: 0x603" \
7583 -s "got named group: x448(001e)" \
7584 -s "Verifying peer X.509 certificate... ok" \
7585 -c "Protocol is TLSv1.3" \
7586 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7587 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7588 -c "NamedGroup: x448 ( 1e )" \
7589 -c "Verifying peer X.509 certificate... ok" \
7590 -C "received HelloRetryRequest message"
7591
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007592requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007593requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007594requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7595requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7596requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007597requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7601requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7602run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007603 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7604 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007605 0 \
7606 -s "Protocol is TLSv1.3" \
7607 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
7608 -s "received signature algorithm: 0x804" \
7609 -s "got named group: x448(001e)" \
7610 -s "Verifying peer X.509 certificate... ok" \
7611 -c "Protocol is TLSv1.3" \
7612 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7613 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7614 -c "NamedGroup: x448 ( 1e )" \
7615 -c "Verifying peer X.509 certificate... ok" \
7616 -C "received HelloRetryRequest message"
7617
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007618requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007619requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007620requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7621requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007622requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007623requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007624requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7626run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007627 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7628 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007629 0 \
7630 -s "Protocol is TLSv1.3" \
7631 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7632 -s "received signature algorithm: 0x403" \
7633 -s "got named group: secp256r1(0017)" \
7634 -s "Verifying peer X.509 certificate... ok" \
7635 -c "Protocol is TLSv1.3" \
7636 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7637 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7638 -c "NamedGroup: secp256r1 ( 17 )" \
7639 -c "Verifying peer X.509 certificate... ok" \
7640 -C "received HelloRetryRequest message"
7641
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007642requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007643requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007644requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7645requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007646requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007647requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007648requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7650run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007651 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7652 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007653 0 \
7654 -s "Protocol is TLSv1.3" \
7655 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7656 -s "received signature algorithm: 0x503" \
7657 -s "got named group: secp256r1(0017)" \
7658 -s "Verifying peer X.509 certificate... ok" \
7659 -c "Protocol is TLSv1.3" \
7660 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7661 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7662 -c "NamedGroup: secp256r1 ( 17 )" \
7663 -c "Verifying peer X.509 certificate... ok" \
7664 -C "received HelloRetryRequest message"
7665
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007666requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007667requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007668requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7669requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007670requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007671requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007672requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7674run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007675 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7676 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007677 0 \
7678 -s "Protocol is TLSv1.3" \
7679 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7680 -s "received signature algorithm: 0x603" \
7681 -s "got named group: secp256r1(0017)" \
7682 -s "Verifying peer X.509 certificate... ok" \
7683 -c "Protocol is TLSv1.3" \
7684 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7685 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7686 -c "NamedGroup: secp256r1 ( 17 )" \
7687 -c "Verifying peer X.509 certificate... ok" \
7688 -C "received HelloRetryRequest message"
7689
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007690requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007691requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007692requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7693requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7694requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007695requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007696requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007697requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7698requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7699requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7700run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007701 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7702 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007703 0 \
7704 -s "Protocol is TLSv1.3" \
7705 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7706 -s "received signature algorithm: 0x804" \
7707 -s "got named group: secp256r1(0017)" \
7708 -s "Verifying peer X.509 certificate... ok" \
7709 -c "Protocol is TLSv1.3" \
7710 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7711 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7712 -c "NamedGroup: secp256r1 ( 17 )" \
7713 -c "Verifying peer X.509 certificate... ok" \
7714 -C "received HelloRetryRequest message"
7715
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007716requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007717requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007718requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7719requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007720requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007721requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7724run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007725 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7726 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007727 0 \
7728 -s "Protocol is TLSv1.3" \
7729 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7730 -s "received signature algorithm: 0x403" \
7731 -s "got named group: secp384r1(0018)" \
7732 -s "Verifying peer X.509 certificate... ok" \
7733 -c "Protocol is TLSv1.3" \
7734 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7735 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7736 -c "NamedGroup: secp384r1 ( 18 )" \
7737 -c "Verifying peer X.509 certificate... ok" \
7738 -C "received HelloRetryRequest message"
7739
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007740requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007741requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007742requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7743requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007744requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007745requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7748run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007749 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7750 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007751 0 \
7752 -s "Protocol is TLSv1.3" \
7753 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7754 -s "received signature algorithm: 0x503" \
7755 -s "got named group: secp384r1(0018)" \
7756 -s "Verifying peer X.509 certificate... ok" \
7757 -c "Protocol is TLSv1.3" \
7758 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7759 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7760 -c "NamedGroup: secp384r1 ( 18 )" \
7761 -c "Verifying peer X.509 certificate... ok" \
7762 -C "received HelloRetryRequest message"
7763
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007764requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007765requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007766requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7767requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007768requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007769requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007770requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7772run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007773 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7774 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007775 0 \
7776 -s "Protocol is TLSv1.3" \
7777 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7778 -s "received signature algorithm: 0x603" \
7779 -s "got named group: secp384r1(0018)" \
7780 -s "Verifying peer X.509 certificate... ok" \
7781 -c "Protocol is TLSv1.3" \
7782 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7783 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7784 -c "NamedGroup: secp384r1 ( 18 )" \
7785 -c "Verifying peer X.509 certificate... ok" \
7786 -C "received HelloRetryRequest message"
7787
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007788requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007789requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007790requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7792requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007793requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007794requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007795requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7797requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7798run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007799 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7800 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007801 0 \
7802 -s "Protocol is TLSv1.3" \
7803 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7804 -s "received signature algorithm: 0x804" \
7805 -s "got named group: secp384r1(0018)" \
7806 -s "Verifying peer X.509 certificate... ok" \
7807 -c "Protocol is TLSv1.3" \
7808 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7809 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7810 -c "NamedGroup: secp384r1 ( 18 )" \
7811 -c "Verifying peer X.509 certificate... ok" \
7812 -C "received HelloRetryRequest message"
7813
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007814requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007815requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007816requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7817requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007818requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007819requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7821requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7822run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007823 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7824 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007825 0 \
7826 -s "Protocol is TLSv1.3" \
7827 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7828 -s "received signature algorithm: 0x403" \
7829 -s "got named group: secp521r1(0019)" \
7830 -s "Verifying peer X.509 certificate... ok" \
7831 -c "Protocol is TLSv1.3" \
7832 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7833 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7834 -c "NamedGroup: secp521r1 ( 19 )" \
7835 -c "Verifying peer X.509 certificate... ok" \
7836 -C "received HelloRetryRequest message"
7837
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007838requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007839requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007840requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007842requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007843requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7846run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007847 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7848 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007849 0 \
7850 -s "Protocol is TLSv1.3" \
7851 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7852 -s "received signature algorithm: 0x503" \
7853 -s "got named group: secp521r1(0019)" \
7854 -s "Verifying peer X.509 certificate... ok" \
7855 -c "Protocol is TLSv1.3" \
7856 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7857 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7858 -c "NamedGroup: secp521r1 ( 19 )" \
7859 -c "Verifying peer X.509 certificate... ok" \
7860 -C "received HelloRetryRequest message"
7861
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007862requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007863requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007864requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7865requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007866requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007867requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007868requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7870run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007871 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7872 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007873 0 \
7874 -s "Protocol is TLSv1.3" \
7875 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7876 -s "received signature algorithm: 0x603" \
7877 -s "got named group: secp521r1(0019)" \
7878 -s "Verifying peer X.509 certificate... ok" \
7879 -c "Protocol is TLSv1.3" \
7880 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7881 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7882 -c "NamedGroup: secp521r1 ( 19 )" \
7883 -c "Verifying peer X.509 certificate... ok" \
7884 -C "received HelloRetryRequest message"
7885
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007886requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007887requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7890requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007891requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007892requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007893requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7895requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7896run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007897 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7898 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007899 0 \
7900 -s "Protocol is TLSv1.3" \
7901 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7902 -s "received signature algorithm: 0x804" \
7903 -s "got named group: secp521r1(0019)" \
7904 -s "Verifying peer X.509 certificate... ok" \
7905 -c "Protocol is TLSv1.3" \
7906 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7907 -c "Certificate Verify: Signature algorithm ( 0804 )" \
7908 -c "NamedGroup: secp521r1 ( 19 )" \
7909 -c "Verifying peer X.509 certificate... ok" \
7910 -C "received HelloRetryRequest message"
7911
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007912requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007913requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007914requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7915requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007916requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007917requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7920run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007921 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7922 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007923 0 \
7924 -s "Protocol is TLSv1.3" \
7925 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7926 -s "received signature algorithm: 0x403" \
7927 -s "got named group: x25519(001d)" \
7928 -s "Verifying peer X.509 certificate... ok" \
7929 -c "Protocol is TLSv1.3" \
7930 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7931 -c "Certificate Verify: Signature algorithm ( 0403 )" \
7932 -c "NamedGroup: x25519 ( 1d )" \
7933 -c "Verifying peer X.509 certificate... ok" \
7934 -C "received HelloRetryRequest message"
7935
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007936requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007937requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007938requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7939requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007940requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007941requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007942requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7944run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007945 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7946 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007947 0 \
7948 -s "Protocol is TLSv1.3" \
7949 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7950 -s "received signature algorithm: 0x503" \
7951 -s "got named group: x25519(001d)" \
7952 -s "Verifying peer X.509 certificate... ok" \
7953 -c "Protocol is TLSv1.3" \
7954 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7955 -c "Certificate Verify: Signature algorithm ( 0503 )" \
7956 -c "NamedGroup: x25519 ( 1d )" \
7957 -c "Verifying peer X.509 certificate... ok" \
7958 -C "received HelloRetryRequest message"
7959
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007960requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007961requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007962requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7963requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00007964requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7968run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007969 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7970 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007971 0 \
7972 -s "Protocol is TLSv1.3" \
7973 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
7974 -s "received signature algorithm: 0x603" \
7975 -s "got named group: x25519(001d)" \
7976 -s "Verifying peer X.509 certificate... ok" \
7977 -c "Protocol is TLSv1.3" \
7978 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7979 -c "Certificate Verify: Signature algorithm ( 0603 )" \
7980 -c "NamedGroup: x25519 ( 1d )" \
7981 -c "Verifying peer X.509 certificate... ok" \
7982 -C "received HelloRetryRequest message"
7983
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00007984requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007985requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007986requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7988requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00007989requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00007990requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00007991requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
7992requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7993requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7994run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08007995 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
7996 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00007997 0 \
7998 -s "Protocol is TLSv1.3" \
7999 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8000 -s "received signature algorithm: 0x804" \
8001 -s "got named group: x25519(001d)" \
8002 -s "Verifying peer X.509 certificate... ok" \
8003 -c "Protocol is TLSv1.3" \
8004 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8005 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8006 -c "NamedGroup: x25519 ( 1d )" \
8007 -c "Verifying peer X.509 certificate... ok" \
8008 -C "received HelloRetryRequest message"
8009
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008010requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008011requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008012requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8013requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008014requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008015requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8018run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008019 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8020 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008021 0 \
8022 -s "Protocol is TLSv1.3" \
8023 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8024 -s "received signature algorithm: 0x403" \
8025 -s "got named group: x448(001e)" \
8026 -s "Verifying peer X.509 certificate... ok" \
8027 -c "Protocol is TLSv1.3" \
8028 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8029 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8030 -c "NamedGroup: x448 ( 1e )" \
8031 -c "Verifying peer X.509 certificate... ok" \
8032 -C "received HelloRetryRequest message"
8033
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008034requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008035requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008036requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8037requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008038requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008039requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008040requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8042run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008043 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8044 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008045 0 \
8046 -s "Protocol is TLSv1.3" \
8047 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8048 -s "received signature algorithm: 0x503" \
8049 -s "got named group: x448(001e)" \
8050 -s "Verifying peer X.509 certificate... ok" \
8051 -c "Protocol is TLSv1.3" \
8052 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8053 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8054 -c "NamedGroup: x448 ( 1e )" \
8055 -c "Verifying peer X.509 certificate... ok" \
8056 -C "received HelloRetryRequest message"
8057
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008058requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008059requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008060requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008062requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8066run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008067 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8068 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008069 0 \
8070 -s "Protocol is TLSv1.3" \
8071 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8072 -s "received signature algorithm: 0x603" \
8073 -s "got named group: x448(001e)" \
8074 -s "Verifying peer X.509 certificate... ok" \
8075 -c "Protocol is TLSv1.3" \
8076 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8077 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8078 -c "NamedGroup: x448 ( 1e )" \
8079 -c "Verifying peer X.509 certificate... ok" \
8080 -C "received HelloRetryRequest message"
8081
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008082requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008083requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008084requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8086requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008087requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008088requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008089requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8090requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8091requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8092run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008093 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8094 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008095 0 \
8096 -s "Protocol is TLSv1.3" \
8097 -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
8098 -s "received signature algorithm: 0x804" \
8099 -s "got named group: x448(001e)" \
8100 -s "Verifying peer X.509 certificate... ok" \
8101 -c "Protocol is TLSv1.3" \
8102 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
8103 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8104 -c "NamedGroup: x448 ( 1e )" \
8105 -c "Verifying peer X.509 certificate... ok" \
8106 -C "received HelloRetryRequest message"
8107
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008108requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008109requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008110requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8111requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008112requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008113requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8116run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008117 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8118 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008119 0 \
8120 -s "Protocol is TLSv1.3" \
8121 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8122 -s "received signature algorithm: 0x403" \
8123 -s "got named group: secp256r1(0017)" \
8124 -s "Verifying peer X.509 certificate... ok" \
8125 -c "Protocol is TLSv1.3" \
8126 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8127 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8128 -c "NamedGroup: secp256r1 ( 17 )" \
8129 -c "Verifying peer X.509 certificate... ok" \
8130 -C "received HelloRetryRequest message"
8131
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008132requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008136requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008137requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008138requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8140run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008141 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8142 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008143 0 \
8144 -s "Protocol is TLSv1.3" \
8145 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8146 -s "received signature algorithm: 0x503" \
8147 -s "got named group: secp256r1(0017)" \
8148 -s "Verifying peer X.509 certificate... ok" \
8149 -c "Protocol is TLSv1.3" \
8150 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8151 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8152 -c "NamedGroup: secp256r1 ( 17 )" \
8153 -c "Verifying peer X.509 certificate... ok" \
8154 -C "received HelloRetryRequest message"
8155
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008156requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008157requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008160requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008161requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008162requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8163requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8164run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008165 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8166 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008167 0 \
8168 -s "Protocol is TLSv1.3" \
8169 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8170 -s "received signature algorithm: 0x603" \
8171 -s "got named group: secp256r1(0017)" \
8172 -s "Verifying peer X.509 certificate... ok" \
8173 -c "Protocol is TLSv1.3" \
8174 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8175 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8176 -c "NamedGroup: secp256r1 ( 17 )" \
8177 -c "Verifying peer X.509 certificate... ok" \
8178 -C "received HelloRetryRequest message"
8179
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008180requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008181requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008182requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8183requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8184requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008185requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008186requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008187requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8188requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8189requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8190run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008191 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8192 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008193 0 \
8194 -s "Protocol is TLSv1.3" \
8195 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8196 -s "received signature algorithm: 0x804" \
8197 -s "got named group: secp256r1(0017)" \
8198 -s "Verifying peer X.509 certificate... ok" \
8199 -c "Protocol is TLSv1.3" \
8200 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8201 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8202 -c "NamedGroup: secp256r1 ( 17 )" \
8203 -c "Verifying peer X.509 certificate... ok" \
8204 -C "received HelloRetryRequest message"
8205
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008206requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008207requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008208requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8209requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008210requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008211requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008212requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8214run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008215 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8216 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008217 0 \
8218 -s "Protocol is TLSv1.3" \
8219 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8220 -s "received signature algorithm: 0x403" \
8221 -s "got named group: secp384r1(0018)" \
8222 -s "Verifying peer X.509 certificate... ok" \
8223 -c "Protocol is TLSv1.3" \
8224 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8225 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8226 -c "NamedGroup: secp384r1 ( 18 )" \
8227 -c "Verifying peer X.509 certificate... ok" \
8228 -C "received HelloRetryRequest message"
8229
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008230requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008231requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008234requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8238run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008239 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8240 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008241 0 \
8242 -s "Protocol is TLSv1.3" \
8243 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8244 -s "received signature algorithm: 0x503" \
8245 -s "got named group: secp384r1(0018)" \
8246 -s "Verifying peer X.509 certificate... ok" \
8247 -c "Protocol is TLSv1.3" \
8248 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8249 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8250 -c "NamedGroup: secp384r1 ( 18 )" \
8251 -c "Verifying peer X.509 certificate... ok" \
8252 -C "received HelloRetryRequest message"
8253
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008254requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008255requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008256requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008258requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008259requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008260requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8261requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8262run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008263 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8264 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008265 0 \
8266 -s "Protocol is TLSv1.3" \
8267 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8268 -s "received signature algorithm: 0x603" \
8269 -s "got named group: secp384r1(0018)" \
8270 -s "Verifying peer X.509 certificate... ok" \
8271 -c "Protocol is TLSv1.3" \
8272 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8273 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8274 -c "NamedGroup: secp384r1 ( 18 )" \
8275 -c "Verifying peer X.509 certificate... ok" \
8276 -C "received HelloRetryRequest message"
8277
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008278requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008279requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008280requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8281requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8282requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008283requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008284requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008285requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8286requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8287requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8288run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008289 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8290 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008291 0 \
8292 -s "Protocol is TLSv1.3" \
8293 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8294 -s "received signature algorithm: 0x804" \
8295 -s "got named group: secp384r1(0018)" \
8296 -s "Verifying peer X.509 certificate... ok" \
8297 -c "Protocol is TLSv1.3" \
8298 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8299 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8300 -c "NamedGroup: secp384r1 ( 18 )" \
8301 -c "Verifying peer X.509 certificate... ok" \
8302 -C "received HelloRetryRequest message"
8303
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008304requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008305requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008306requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8307requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008308requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008309requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8311requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8312run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008313 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8314 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008315 0 \
8316 -s "Protocol is TLSv1.3" \
8317 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8318 -s "received signature algorithm: 0x403" \
8319 -s "got named group: secp521r1(0019)" \
8320 -s "Verifying peer X.509 certificate... ok" \
8321 -c "Protocol is TLSv1.3" \
8322 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8323 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8324 -c "NamedGroup: secp521r1 ( 19 )" \
8325 -c "Verifying peer X.509 certificate... ok" \
8326 -C "received HelloRetryRequest message"
8327
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008328requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008329requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008332requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8336run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008337 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8338 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008339 0 \
8340 -s "Protocol is TLSv1.3" \
8341 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8342 -s "received signature algorithm: 0x503" \
8343 -s "got named group: secp521r1(0019)" \
8344 -s "Verifying peer X.509 certificate... ok" \
8345 -c "Protocol is TLSv1.3" \
8346 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8347 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8348 -c "NamedGroup: secp521r1 ( 19 )" \
8349 -c "Verifying peer X.509 certificate... ok" \
8350 -C "received HelloRetryRequest message"
8351
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008352requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008353requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008354requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8355requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008356requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8360run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008361 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8362 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008363 0 \
8364 -s "Protocol is TLSv1.3" \
8365 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8366 -s "received signature algorithm: 0x603" \
8367 -s "got named group: secp521r1(0019)" \
8368 -s "Verifying peer X.509 certificate... ok" \
8369 -c "Protocol is TLSv1.3" \
8370 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8371 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8372 -c "NamedGroup: secp521r1 ( 19 )" \
8373 -c "Verifying peer X.509 certificate... ok" \
8374 -C "received HelloRetryRequest message"
8375
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008376requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008377requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008378requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8379requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8380requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008381requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008382requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008383requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8384requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8385requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8386run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008387 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8388 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008389 0 \
8390 -s "Protocol is TLSv1.3" \
8391 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8392 -s "received signature algorithm: 0x804" \
8393 -s "got named group: secp521r1(0019)" \
8394 -s "Verifying peer X.509 certificate... ok" \
8395 -c "Protocol is TLSv1.3" \
8396 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8397 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8398 -c "NamedGroup: secp521r1 ( 19 )" \
8399 -c "Verifying peer X.509 certificate... ok" \
8400 -C "received HelloRetryRequest message"
8401
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008402requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008403requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008404requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8405requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008406requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008407requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8410run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008411 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8412 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008413 0 \
8414 -s "Protocol is TLSv1.3" \
8415 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8416 -s "received signature algorithm: 0x403" \
8417 -s "got named group: x25519(001d)" \
8418 -s "Verifying peer X.509 certificate... ok" \
8419 -c "Protocol is TLSv1.3" \
8420 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8421 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8422 -c "NamedGroup: x25519 ( 1d )" \
8423 -c "Verifying peer X.509 certificate... ok" \
8424 -C "received HelloRetryRequest message"
8425
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008426requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008427requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008428requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008430requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008431requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8434run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008435 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8436 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008437 0 \
8438 -s "Protocol is TLSv1.3" \
8439 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8440 -s "received signature algorithm: 0x503" \
8441 -s "got named group: x25519(001d)" \
8442 -s "Verifying peer X.509 certificate... ok" \
8443 -c "Protocol is TLSv1.3" \
8444 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8445 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8446 -c "NamedGroup: x25519 ( 1d )" \
8447 -c "Verifying peer X.509 certificate... ok" \
8448 -C "received HelloRetryRequest message"
8449
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008450requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008451requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008452requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008454requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008455requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8458run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008459 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8460 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008461 0 \
8462 -s "Protocol is TLSv1.3" \
8463 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8464 -s "received signature algorithm: 0x603" \
8465 -s "got named group: x25519(001d)" \
8466 -s "Verifying peer X.509 certificate... ok" \
8467 -c "Protocol is TLSv1.3" \
8468 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8469 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8470 -c "NamedGroup: x25519 ( 1d )" \
8471 -c "Verifying peer X.509 certificate... ok" \
8472 -C "received HelloRetryRequest message"
8473
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008474requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008475requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008476requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8477requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8478requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008479requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008480requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008481requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8483requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8484run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008485 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8486 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008487 0 \
8488 -s "Protocol is TLSv1.3" \
8489 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8490 -s "received signature algorithm: 0x804" \
8491 -s "got named group: x25519(001d)" \
8492 -s "Verifying peer X.509 certificate... ok" \
8493 -c "Protocol is TLSv1.3" \
8494 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8495 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8496 -c "NamedGroup: x25519 ( 1d )" \
8497 -c "Verifying peer X.509 certificate... ok" \
8498 -C "received HelloRetryRequest message"
8499
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008500requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008501requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008502requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8503requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008504requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8508run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008509 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8510 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008511 0 \
8512 -s "Protocol is TLSv1.3" \
8513 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8514 -s "received signature algorithm: 0x403" \
8515 -s "got named group: x448(001e)" \
8516 -s "Verifying peer X.509 certificate... ok" \
8517 -c "Protocol is TLSv1.3" \
8518 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8519 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8520 -c "NamedGroup: x448 ( 1e )" \
8521 -c "Verifying peer X.509 certificate... ok" \
8522 -C "received HelloRetryRequest message"
8523
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008524requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008525requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008526requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8527requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008528requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8532run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008533 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8534 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008535 0 \
8536 -s "Protocol is TLSv1.3" \
8537 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8538 -s "received signature algorithm: 0x503" \
8539 -s "got named group: x448(001e)" \
8540 -s "Verifying peer X.509 certificate... ok" \
8541 -c "Protocol is TLSv1.3" \
8542 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8543 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8544 -c "NamedGroup: x448 ( 1e )" \
8545 -c "Verifying peer X.509 certificate... ok" \
8546 -C "received HelloRetryRequest message"
8547
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008548requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008549requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008550requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008552requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008553requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8556run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008557 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8558 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008559 0 \
8560 -s "Protocol is TLSv1.3" \
8561 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8562 -s "received signature algorithm: 0x603" \
8563 -s "got named group: x448(001e)" \
8564 -s "Verifying peer X.509 certificate... ok" \
8565 -c "Protocol is TLSv1.3" \
8566 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8567 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8568 -c "NamedGroup: x448 ( 1e )" \
8569 -c "Verifying peer X.509 certificate... ok" \
8570 -C "received HelloRetryRequest message"
8571
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008572requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008573requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008574requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8576requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008577requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008578requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008579requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8580requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8581requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8582run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008583 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8584 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008585 0 \
8586 -s "Protocol is TLSv1.3" \
8587 -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
8588 -s "received signature algorithm: 0x804" \
8589 -s "got named group: x448(001e)" \
8590 -s "Verifying peer X.509 certificate... ok" \
8591 -c "Protocol is TLSv1.3" \
8592 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8593 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8594 -c "NamedGroup: x448 ( 1e )" \
8595 -c "Verifying peer X.509 certificate... ok" \
8596 -C "received HelloRetryRequest message"
8597
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008598requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008599requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008600requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008602requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008603requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008604requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8606run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008607 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8608 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008609 0 \
8610 -s "Protocol is TLSv1.3" \
8611 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8612 -s "received signature algorithm: 0x403" \
8613 -s "got named group: secp256r1(0017)" \
8614 -s "Verifying peer X.509 certificate... ok" \
8615 -c "Protocol is TLSv1.3" \
8616 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8617 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8618 -c "NamedGroup: secp256r1 ( 17 )" \
8619 -c "Verifying peer X.509 certificate... ok" \
8620 -C "received HelloRetryRequest message"
8621
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008622requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008623requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008624requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008626requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008627requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008628requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8630run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008631 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8632 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008633 0 \
8634 -s "Protocol is TLSv1.3" \
8635 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8636 -s "received signature algorithm: 0x503" \
8637 -s "got named group: secp256r1(0017)" \
8638 -s "Verifying peer X.509 certificate... ok" \
8639 -c "Protocol is TLSv1.3" \
8640 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8641 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8642 -c "NamedGroup: secp256r1 ( 17 )" \
8643 -c "Verifying peer X.509 certificate... ok" \
8644 -C "received HelloRetryRequest message"
8645
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008646requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008647requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008648requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008650requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008651requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008652requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8654run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008655 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8656 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008657 0 \
8658 -s "Protocol is TLSv1.3" \
8659 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8660 -s "received signature algorithm: 0x603" \
8661 -s "got named group: secp256r1(0017)" \
8662 -s "Verifying peer X.509 certificate... ok" \
8663 -c "Protocol is TLSv1.3" \
8664 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8665 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8666 -c "NamedGroup: secp256r1 ( 17 )" \
8667 -c "Verifying peer X.509 certificate... ok" \
8668 -C "received HelloRetryRequest message"
8669
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008670requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008671requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008672requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8674requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008675requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008676requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008677requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8679requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8680run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008681 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8682 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008683 0 \
8684 -s "Protocol is TLSv1.3" \
8685 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8686 -s "received signature algorithm: 0x804" \
8687 -s "got named group: secp256r1(0017)" \
8688 -s "Verifying peer X.509 certificate... ok" \
8689 -c "Protocol is TLSv1.3" \
8690 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8691 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8692 -c "NamedGroup: secp256r1 ( 17 )" \
8693 -c "Verifying peer X.509 certificate... ok" \
8694 -C "received HelloRetryRequest message"
8695
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008696requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008697requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008700requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008701requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008702requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8704run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008705 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8706 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008707 0 \
8708 -s "Protocol is TLSv1.3" \
8709 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8710 -s "received signature algorithm: 0x403" \
8711 -s "got named group: secp384r1(0018)" \
8712 -s "Verifying peer X.509 certificate... ok" \
8713 -c "Protocol is TLSv1.3" \
8714 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8715 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8716 -c "NamedGroup: secp384r1 ( 18 )" \
8717 -c "Verifying peer X.509 certificate... ok" \
8718 -C "received HelloRetryRequest message"
8719
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008720requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008721requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008722requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8723requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008724requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008725requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8728run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008729 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8730 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008731 0 \
8732 -s "Protocol is TLSv1.3" \
8733 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8734 -s "received signature algorithm: 0x503" \
8735 -s "got named group: secp384r1(0018)" \
8736 -s "Verifying peer X.509 certificate... ok" \
8737 -c "Protocol is TLSv1.3" \
8738 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8739 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8740 -c "NamedGroup: secp384r1 ( 18 )" \
8741 -c "Verifying peer X.509 certificate... ok" \
8742 -C "received HelloRetryRequest message"
8743
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008744requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008745requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008746requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8747requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008748requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008749requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008750requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8751requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8752run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008753 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8754 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008755 0 \
8756 -s "Protocol is TLSv1.3" \
8757 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8758 -s "received signature algorithm: 0x603" \
8759 -s "got named group: secp384r1(0018)" \
8760 -s "Verifying peer X.509 certificate... ok" \
8761 -c "Protocol is TLSv1.3" \
8762 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8763 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8764 -c "NamedGroup: secp384r1 ( 18 )" \
8765 -c "Verifying peer X.509 certificate... ok" \
8766 -C "received HelloRetryRequest message"
8767
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008768requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008769requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008770requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8772requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008773requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008774requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008775requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8777requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8778run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008779 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8780 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008781 0 \
8782 -s "Protocol is TLSv1.3" \
8783 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8784 -s "received signature algorithm: 0x804" \
8785 -s "got named group: secp384r1(0018)" \
8786 -s "Verifying peer X.509 certificate... ok" \
8787 -c "Protocol is TLSv1.3" \
8788 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8789 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8790 -c "NamedGroup: secp384r1 ( 18 )" \
8791 -c "Verifying peer X.509 certificate... ok" \
8792 -C "received HelloRetryRequest message"
8793
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008794requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008795requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008796requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8797requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008798requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008799requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008800requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8801requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8802run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008803 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8804 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008805 0 \
8806 -s "Protocol is TLSv1.3" \
8807 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8808 -s "received signature algorithm: 0x403" \
8809 -s "got named group: secp521r1(0019)" \
8810 -s "Verifying peer X.509 certificate... ok" \
8811 -c "Protocol is TLSv1.3" \
8812 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8813 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8814 -c "NamedGroup: secp521r1 ( 19 )" \
8815 -c "Verifying peer X.509 certificate... ok" \
8816 -C "received HelloRetryRequest message"
8817
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008818requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008819requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008820requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8821requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008822requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008823requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008824requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8825requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8826run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008827 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8828 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008829 0 \
8830 -s "Protocol is TLSv1.3" \
8831 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8832 -s "received signature algorithm: 0x503" \
8833 -s "got named group: secp521r1(0019)" \
8834 -s "Verifying peer X.509 certificate... ok" \
8835 -c "Protocol is TLSv1.3" \
8836 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8837 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8838 -c "NamedGroup: secp521r1 ( 19 )" \
8839 -c "Verifying peer X.509 certificate... ok" \
8840 -C "received HelloRetryRequest message"
8841
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008842requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008843requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008844requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008846requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008847requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008848requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8849requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8850run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008851 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8852 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008853 0 \
8854 -s "Protocol is TLSv1.3" \
8855 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8856 -s "received signature algorithm: 0x603" \
8857 -s "got named group: secp521r1(0019)" \
8858 -s "Verifying peer X.509 certificate... ok" \
8859 -c "Protocol is TLSv1.3" \
8860 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8861 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8862 -c "NamedGroup: secp521r1 ( 19 )" \
8863 -c "Verifying peer X.509 certificate... ok" \
8864 -C "received HelloRetryRequest message"
8865
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008866requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008867requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008868requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8870requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008871requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008872requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008873requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8874requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8875requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8876run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008877 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8878 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008879 0 \
8880 -s "Protocol is TLSv1.3" \
8881 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8882 -s "received signature algorithm: 0x804" \
8883 -s "got named group: secp521r1(0019)" \
8884 -s "Verifying peer X.509 certificate... ok" \
8885 -c "Protocol is TLSv1.3" \
8886 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8887 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8888 -c "NamedGroup: secp521r1 ( 19 )" \
8889 -c "Verifying peer X.509 certificate... ok" \
8890 -C "received HelloRetryRequest message"
8891
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008892requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008893requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008894requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8895requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008896requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008897requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008898requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8899requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8900run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008901 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8902 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008903 0 \
8904 -s "Protocol is TLSv1.3" \
8905 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8906 -s "received signature algorithm: 0x403" \
8907 -s "got named group: x25519(001d)" \
8908 -s "Verifying peer X.509 certificate... ok" \
8909 -c "Protocol is TLSv1.3" \
8910 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8911 -c "Certificate Verify: Signature algorithm ( 0403 )" \
8912 -c "NamedGroup: x25519 ( 1d )" \
8913 -c "Verifying peer X.509 certificate... ok" \
8914 -C "received HelloRetryRequest message"
8915
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008916requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008917requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008918requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008920requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008921requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008922requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8924run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008925 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8926 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008927 0 \
8928 -s "Protocol is TLSv1.3" \
8929 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8930 -s "received signature algorithm: 0x503" \
8931 -s "got named group: x25519(001d)" \
8932 -s "Verifying peer X.509 certificate... ok" \
8933 -c "Protocol is TLSv1.3" \
8934 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8935 -c "Certificate Verify: Signature algorithm ( 0503 )" \
8936 -c "NamedGroup: x25519 ( 1d )" \
8937 -c "Verifying peer X.509 certificate... ok" \
8938 -C "received HelloRetryRequest message"
8939
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008940requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008941requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008942requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008944requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8948run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008949 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8950 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008951 0 \
8952 -s "Protocol is TLSv1.3" \
8953 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8954 -s "received signature algorithm: 0x603" \
8955 -s "got named group: x25519(001d)" \
8956 -s "Verifying peer X.509 certificate... ok" \
8957 -c "Protocol is TLSv1.3" \
8958 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8959 -c "Certificate Verify: Signature algorithm ( 0603 )" \
8960 -c "NamedGroup: x25519 ( 1d )" \
8961 -c "Verifying peer X.509 certificate... ok" \
8962 -C "received HelloRetryRequest message"
8963
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008964requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008965requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008966requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8968requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00008969requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008970requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008971requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8972requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8973requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8974run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008975 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
8976 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00008977 0 \
8978 -s "Protocol is TLSv1.3" \
8979 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
8980 -s "received signature algorithm: 0x804" \
8981 -s "got named group: x25519(001d)" \
8982 -s "Verifying peer X.509 certificate... ok" \
8983 -c "Protocol is TLSv1.3" \
8984 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8985 -c "Certificate Verify: Signature algorithm ( 0804 )" \
8986 -c "NamedGroup: x25519 ( 1d )" \
8987 -c "Verifying peer X.509 certificate... ok" \
8988 -C "received HelloRetryRequest message"
8989
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00008990requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008991requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008992requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00008994requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00008995requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00008996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
8997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8998run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08008999 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9000 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009001 0 \
9002 -s "Protocol is TLSv1.3" \
9003 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9004 -s "received signature algorithm: 0x403" \
9005 -s "got named group: x448(001e)" \
9006 -s "Verifying peer X.509 certificate... ok" \
9007 -c "Protocol is TLSv1.3" \
9008 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9009 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9010 -c "NamedGroup: x448 ( 1e )" \
9011 -c "Verifying peer X.509 certificate... ok" \
9012 -C "received HelloRetryRequest message"
9013
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009014requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009015requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009016requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9017requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009018requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009019requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9022run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009023 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9024 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009025 0 \
9026 -s "Protocol is TLSv1.3" \
9027 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9028 -s "received signature algorithm: 0x503" \
9029 -s "got named group: x448(001e)" \
9030 -s "Verifying peer X.509 certificate... ok" \
9031 -c "Protocol is TLSv1.3" \
9032 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9033 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9034 -c "NamedGroup: x448 ( 1e )" \
9035 -c "Verifying peer X.509 certificate... ok" \
9036 -C "received HelloRetryRequest message"
9037
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009038requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009039requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009040requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009042requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009043requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009044requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9045requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9046run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009047 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9048 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009049 0 \
9050 -s "Protocol is TLSv1.3" \
9051 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9052 -s "received signature algorithm: 0x603" \
9053 -s "got named group: x448(001e)" \
9054 -s "Verifying peer X.509 certificate... ok" \
9055 -c "Protocol is TLSv1.3" \
9056 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9057 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9058 -c "NamedGroup: x448 ( 1e )" \
9059 -c "Verifying peer X.509 certificate... ok" \
9060 -C "received HelloRetryRequest message"
9061
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009062requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009063requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009064requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9065requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9066requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009067requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009068requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009069requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9070requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9071requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9072run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009073 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9074 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009075 0 \
9076 -s "Protocol is TLSv1.3" \
9077 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
9078 -s "received signature algorithm: 0x804" \
9079 -s "got named group: x448(001e)" \
9080 -s "Verifying peer X.509 certificate... ok" \
9081 -c "Protocol is TLSv1.3" \
9082 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
9083 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9084 -c "NamedGroup: x448 ( 1e )" \
9085 -c "Verifying peer X.509 certificate... ok" \
9086 -C "received HelloRetryRequest message"
9087
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009088requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009089requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009090requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9091requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009092requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009093requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009094requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9095requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9096run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009097 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9098 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009099 0 \
9100 -s "Protocol is TLSv1.3" \
9101 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9102 -s "received signature algorithm: 0x403" \
9103 -s "got named group: secp256r1(0017)" \
9104 -s "Verifying peer X.509 certificate... ok" \
9105 -c "Protocol is TLSv1.3" \
9106 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9107 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9108 -c "NamedGroup: secp256r1 ( 17 )" \
9109 -c "Verifying peer X.509 certificate... ok" \
9110 -C "received HelloRetryRequest message"
9111
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009112requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009113requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009116requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009117requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9120run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009121 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9122 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009123 0 \
9124 -s "Protocol is TLSv1.3" \
9125 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9126 -s "received signature algorithm: 0x503" \
9127 -s "got named group: secp256r1(0017)" \
9128 -s "Verifying peer X.509 certificate... ok" \
9129 -c "Protocol is TLSv1.3" \
9130 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9131 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9132 -c "NamedGroup: secp256r1 ( 17 )" \
9133 -c "Verifying peer X.509 certificate... ok" \
9134 -C "received HelloRetryRequest message"
9135
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009136requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009137requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009138requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009140requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009141requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009142requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9144run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009145 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9146 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009147 0 \
9148 -s "Protocol is TLSv1.3" \
9149 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9150 -s "received signature algorithm: 0x603" \
9151 -s "got named group: secp256r1(0017)" \
9152 -s "Verifying peer X.509 certificate... ok" \
9153 -c "Protocol is TLSv1.3" \
9154 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9155 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9156 -c "NamedGroup: secp256r1 ( 17 )" \
9157 -c "Verifying peer X.509 certificate... ok" \
9158 -C "received HelloRetryRequest message"
9159
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009160requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009161requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009162requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9163requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9164requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009165requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009166requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009167requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9169requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9170run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009171 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9172 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009173 0 \
9174 -s "Protocol is TLSv1.3" \
9175 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9176 -s "received signature algorithm: 0x804" \
9177 -s "got named group: secp256r1(0017)" \
9178 -s "Verifying peer X.509 certificate... ok" \
9179 -c "Protocol is TLSv1.3" \
9180 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9181 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9182 -c "NamedGroup: secp256r1 ( 17 )" \
9183 -c "Verifying peer X.509 certificate... ok" \
9184 -C "received HelloRetryRequest message"
9185
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009186requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009187requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009188requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9189requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009190requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009191requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009192requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9193requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9194run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009195 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9196 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009197 0 \
9198 -s "Protocol is TLSv1.3" \
9199 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9200 -s "received signature algorithm: 0x403" \
9201 -s "got named group: secp384r1(0018)" \
9202 -s "Verifying peer X.509 certificate... ok" \
9203 -c "Protocol is TLSv1.3" \
9204 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9205 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9206 -c "NamedGroup: secp384r1 ( 18 )" \
9207 -c "Verifying peer X.509 certificate... ok" \
9208 -C "received HelloRetryRequest message"
9209
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009210requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009211requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009212requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009214requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009215requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009216requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9218run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009219 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9220 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009221 0 \
9222 -s "Protocol is TLSv1.3" \
9223 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9224 -s "received signature algorithm: 0x503" \
9225 -s "got named group: secp384r1(0018)" \
9226 -s "Verifying peer X.509 certificate... ok" \
9227 -c "Protocol is TLSv1.3" \
9228 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9229 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9230 -c "NamedGroup: secp384r1 ( 18 )" \
9231 -c "Verifying peer X.509 certificate... ok" \
9232 -C "received HelloRetryRequest message"
9233
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009234requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009235requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009236requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9237requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009238requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009239requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9242run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009243 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9244 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009245 0 \
9246 -s "Protocol is TLSv1.3" \
9247 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9248 -s "received signature algorithm: 0x603" \
9249 -s "got named group: secp384r1(0018)" \
9250 -s "Verifying peer X.509 certificate... ok" \
9251 -c "Protocol is TLSv1.3" \
9252 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9253 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9254 -c "NamedGroup: secp384r1 ( 18 )" \
9255 -c "Verifying peer X.509 certificate... ok" \
9256 -C "received HelloRetryRequest message"
9257
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009258requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009259requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009260requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9261requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9262requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009263requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009264requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009265requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9266requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9267requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9268run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009269 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9270 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009271 0 \
9272 -s "Protocol is TLSv1.3" \
9273 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9274 -s "received signature algorithm: 0x804" \
9275 -s "got named group: secp384r1(0018)" \
9276 -s "Verifying peer X.509 certificate... ok" \
9277 -c "Protocol is TLSv1.3" \
9278 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9279 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9280 -c "NamedGroup: secp384r1 ( 18 )" \
9281 -c "Verifying peer X.509 certificate... ok" \
9282 -C "received HelloRetryRequest message"
9283
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009284requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009285requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009286requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9287requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009288requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009289requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9292run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009293 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9294 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009295 0 \
9296 -s "Protocol is TLSv1.3" \
9297 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9298 -s "received signature algorithm: 0x403" \
9299 -s "got named group: secp521r1(0019)" \
9300 -s "Verifying peer X.509 certificate... ok" \
9301 -c "Protocol is TLSv1.3" \
9302 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9303 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9304 -c "NamedGroup: secp521r1 ( 19 )" \
9305 -c "Verifying peer X.509 certificate... ok" \
9306 -C "received HelloRetryRequest message"
9307
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009308requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009309requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009310requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9311requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009312requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9316run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009317 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9318 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009319 0 \
9320 -s "Protocol is TLSv1.3" \
9321 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9322 -s "received signature algorithm: 0x503" \
9323 -s "got named group: secp521r1(0019)" \
9324 -s "Verifying peer X.509 certificate... ok" \
9325 -c "Protocol is TLSv1.3" \
9326 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9327 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9328 -c "NamedGroup: secp521r1 ( 19 )" \
9329 -c "Verifying peer X.509 certificate... ok" \
9330 -C "received HelloRetryRequest message"
9331
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009332requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009336requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009337requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9340run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009341 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9342 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009343 0 \
9344 -s "Protocol is TLSv1.3" \
9345 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9346 -s "received signature algorithm: 0x603" \
9347 -s "got named group: secp521r1(0019)" \
9348 -s "Verifying peer X.509 certificate... ok" \
9349 -c "Protocol is TLSv1.3" \
9350 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9351 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9352 -c "NamedGroup: secp521r1 ( 19 )" \
9353 -c "Verifying peer X.509 certificate... ok" \
9354 -C "received HelloRetryRequest message"
9355
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009356requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009357requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009358requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9360requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009361requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009362requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009363requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9364requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9365requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9366run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009367 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9368 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009369 0 \
9370 -s "Protocol is TLSv1.3" \
9371 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9372 -s "received signature algorithm: 0x804" \
9373 -s "got named group: secp521r1(0019)" \
9374 -s "Verifying peer X.509 certificate... ok" \
9375 -c "Protocol is TLSv1.3" \
9376 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9377 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9378 -c "NamedGroup: secp521r1 ( 19 )" \
9379 -c "Verifying peer X.509 certificate... ok" \
9380 -C "received HelloRetryRequest message"
9381
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009382requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009383requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009384requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9385requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009386requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009387requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009388requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9390run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009391 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9392 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009393 0 \
9394 -s "Protocol is TLSv1.3" \
9395 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9396 -s "received signature algorithm: 0x403" \
9397 -s "got named group: x25519(001d)" \
9398 -s "Verifying peer X.509 certificate... ok" \
9399 -c "Protocol is TLSv1.3" \
9400 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9401 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9402 -c "NamedGroup: x25519 ( 1d )" \
9403 -c "Verifying peer X.509 certificate... ok" \
9404 -C "received HelloRetryRequest message"
9405
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009406requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009407requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009408requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9409requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009410requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009411requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009412requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9414run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009415 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9416 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009417 0 \
9418 -s "Protocol is TLSv1.3" \
9419 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9420 -s "received signature algorithm: 0x503" \
9421 -s "got named group: x25519(001d)" \
9422 -s "Verifying peer X.509 certificate... ok" \
9423 -c "Protocol is TLSv1.3" \
9424 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9425 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9426 -c "NamedGroup: x25519 ( 1d )" \
9427 -c "Verifying peer X.509 certificate... ok" \
9428 -C "received HelloRetryRequest message"
9429
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009430requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009431requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009432requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9433requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009434requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009435requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9438run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009439 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9440 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009441 0 \
9442 -s "Protocol is TLSv1.3" \
9443 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9444 -s "received signature algorithm: 0x603" \
9445 -s "got named group: x25519(001d)" \
9446 -s "Verifying peer X.509 certificate... ok" \
9447 -c "Protocol is TLSv1.3" \
9448 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9449 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9450 -c "NamedGroup: x25519 ( 1d )" \
9451 -c "Verifying peer X.509 certificate... ok" \
9452 -C "received HelloRetryRequest message"
9453
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009454requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009455requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9458requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009459requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009460requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009461requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9463requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9464run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009465 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9466 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009467 0 \
9468 -s "Protocol is TLSv1.3" \
9469 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9470 -s "received signature algorithm: 0x804" \
9471 -s "got named group: x25519(001d)" \
9472 -s "Verifying peer X.509 certificate... ok" \
9473 -c "Protocol is TLSv1.3" \
9474 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9475 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9476 -c "NamedGroup: x25519 ( 1d )" \
9477 -c "Verifying peer X.509 certificate... ok" \
9478 -C "received HelloRetryRequest message"
9479
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009480requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009481requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009482requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9483requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009484requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009485requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009486requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9487requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9488run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009489 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9490 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009491 0 \
9492 -s "Protocol is TLSv1.3" \
9493 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9494 -s "received signature algorithm: 0x403" \
9495 -s "got named group: x448(001e)" \
9496 -s "Verifying peer X.509 certificate... ok" \
9497 -c "Protocol is TLSv1.3" \
9498 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9499 -c "Certificate Verify: Signature algorithm ( 0403 )" \
9500 -c "NamedGroup: x448 ( 1e )" \
9501 -c "Verifying peer X.509 certificate... ok" \
9502 -C "received HelloRetryRequest message"
9503
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009504requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009505requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009506requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9507requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009508requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009509requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9512run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009513 "$P_SRV crt_file=data_files/ecdsa_secp384r1.crt key_file=data_files/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9514 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009515 0 \
9516 -s "Protocol is TLSv1.3" \
9517 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9518 -s "received signature algorithm: 0x503" \
9519 -s "got named group: x448(001e)" \
9520 -s "Verifying peer X.509 certificate... ok" \
9521 -c "Protocol is TLSv1.3" \
9522 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9523 -c "Certificate Verify: Signature algorithm ( 0503 )" \
9524 -c "NamedGroup: x448 ( 1e )" \
9525 -c "Verifying peer X.509 certificate... ok" \
9526 -C "received HelloRetryRequest message"
9527
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009528requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009529requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009530requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9531requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +00009532requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009533requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009534requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9536run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009537 "$P_SRV crt_file=data_files/ecdsa_secp521r1.crt key_file=data_files/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9538 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009539 0 \
9540 -s "Protocol is TLSv1.3" \
9541 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9542 -s "received signature algorithm: 0x603" \
9543 -s "got named group: x448(001e)" \
9544 -s "Verifying peer X.509 certificate... ok" \
9545 -c "Protocol is TLSv1.3" \
9546 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9547 -c "Certificate Verify: Signature algorithm ( 0603 )" \
9548 -c "NamedGroup: x448 ( 1e )" \
9549 -c "Verifying peer X.509 certificate... ok" \
9550 -C "received HelloRetryRequest message"
9551
XiaokangQianfb1a3fe2022-06-09 06:37:33 +00009552requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009553requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9556requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
XiaokangQianb1847a22022-06-08 07:49:31 +00009557requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009558requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +00009559requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9560requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9561requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9562run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009563 "$P_SRV crt_file=data_files/server2-sha256.crt key_file=data_files/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9564 "$P_CLI ca_file=data_files/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +00009565 0 \
9566 -s "Protocol is TLSv1.3" \
9567 -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
9568 -s "received signature algorithm: 0x804" \
9569 -s "got named group: x448(001e)" \
9570 -s "Verifying peer X.509 certificate... ok" \
9571 -c "Protocol is TLSv1.3" \
9572 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9573 -c "Certificate Verify: Signature algorithm ( 0804 )" \
9574 -c "NamedGroup: x448 ( 1e )" \
9575 -c "Verifying peer X.509 certificate... ok" \
9576 -C "received HelloRetryRequest message"
9577
XiaokangQian9b938b72022-06-10 03:10:59 +00009578requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian83f81882022-03-17 06:26:36 +00009579requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian9b938b72022-06-10 03:10:59 +00009580requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9581requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9582requires_openssl_tls1_3
9583run_test "TLS 1.3 O->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009584 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9585 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009586 0 \
9587 -s "Protocol is TLSv1.3" \
9588 -s "got named group: secp384r1(0018)" \
9589 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009590 -s "HRR selected_group: secp384r1"
9591
9592requires_config_enabled MBEDTLS_SSL_SRV_C
9593requires_config_enabled MBEDTLS_DEBUG_C
9594requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9595requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9596requires_openssl_tls1_3
9597run_test "TLS 1.3 O->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009598 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9599 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009600 0 \
9601 -s "Protocol is TLSv1.3" \
9602 -s "got named group: secp521r1(0019)" \
9603 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009604 -s "HRR selected_group: secp521r1"
9605
9606requires_config_enabled MBEDTLS_SSL_SRV_C
9607requires_config_enabled MBEDTLS_DEBUG_C
9608requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9610requires_openssl_tls1_3
9611run_test "TLS 1.3 O->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009612 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9613 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009614 0 \
9615 -s "Protocol is TLSv1.3" \
9616 -s "got named group: x25519(001d)" \
9617 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009618 -s "HRR selected_group: x25519"
9619
9620requires_config_enabled MBEDTLS_SSL_SRV_C
9621requires_config_enabled MBEDTLS_DEBUG_C
9622requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9623requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9624requires_openssl_tls1_3
9625run_test "TLS 1.3 O->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009626 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9627 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-256:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009628 0 \
9629 -s "Protocol is TLSv1.3" \
9630 -s "got named group: x448(001e)" \
9631 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009632 -s "HRR selected_group: x448"
9633
9634requires_config_enabled MBEDTLS_SSL_SRV_C
9635requires_config_enabled MBEDTLS_DEBUG_C
9636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9638requires_openssl_tls1_3
9639run_test "TLS 1.3 O->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009640 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9641 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009642 0 \
9643 -s "Protocol is TLSv1.3" \
9644 -s "got named group: secp256r1(0017)" \
9645 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009646 -s "HRR selected_group: secp256r1"
9647
9648requires_config_enabled MBEDTLS_SSL_SRV_C
9649requires_config_enabled MBEDTLS_DEBUG_C
9650requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9651requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9652requires_openssl_tls1_3
9653run_test "TLS 1.3 O->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009654 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9655 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009656 0 \
9657 -s "Protocol is TLSv1.3" \
9658 -s "got named group: secp521r1(0019)" \
9659 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009660 -s "HRR selected_group: secp521r1"
9661
9662requires_config_enabled MBEDTLS_SSL_SRV_C
9663requires_config_enabled MBEDTLS_DEBUG_C
9664requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9665requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9666requires_openssl_tls1_3
9667run_test "TLS 1.3 O->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009668 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9669 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009670 0 \
9671 -s "Protocol is TLSv1.3" \
9672 -s "got named group: x25519(001d)" \
9673 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009674 -s "HRR selected_group: x25519"
9675
9676requires_config_enabled MBEDTLS_SSL_SRV_C
9677requires_config_enabled MBEDTLS_DEBUG_C
9678requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9680requires_openssl_tls1_3
9681run_test "TLS 1.3 O->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009682 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9683 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-384:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009684 0 \
9685 -s "Protocol is TLSv1.3" \
9686 -s "got named group: x448(001e)" \
9687 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009688 -s "HRR selected_group: x448"
9689
9690requires_config_enabled MBEDTLS_SSL_SRV_C
9691requires_config_enabled MBEDTLS_DEBUG_C
9692requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9693requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9694requires_openssl_tls1_3
9695run_test "TLS 1.3 O->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009696 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9697 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009698 0 \
9699 -s "Protocol is TLSv1.3" \
9700 -s "got named group: secp256r1(0017)" \
9701 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009702 -s "HRR selected_group: secp256r1"
9703
9704requires_config_enabled MBEDTLS_SSL_SRV_C
9705requires_config_enabled MBEDTLS_DEBUG_C
9706requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9708requires_openssl_tls1_3
9709run_test "TLS 1.3 O->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009710 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9711 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009712 0 \
9713 -s "Protocol is TLSv1.3" \
9714 -s "got named group: secp384r1(0018)" \
9715 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009716 -s "HRR selected_group: secp384r1"
9717
9718requires_config_enabled MBEDTLS_SSL_SRV_C
9719requires_config_enabled MBEDTLS_DEBUG_C
9720requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9721requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9722requires_openssl_tls1_3
9723run_test "TLS 1.3 O->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009724 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9725 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009726 0 \
9727 -s "Protocol is TLSv1.3" \
9728 -s "got named group: x25519(001d)" \
9729 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009730 -s "HRR selected_group: x25519"
9731
9732requires_config_enabled MBEDTLS_SSL_SRV_C
9733requires_config_enabled MBEDTLS_DEBUG_C
9734requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9736requires_openssl_tls1_3
9737run_test "TLS 1.3 O->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009738 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9739 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups P-521:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009740 0 \
9741 -s "Protocol is TLSv1.3" \
9742 -s "got named group: x448(001e)" \
9743 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009744 -s "HRR selected_group: x448"
9745
9746requires_config_enabled MBEDTLS_SSL_SRV_C
9747requires_config_enabled MBEDTLS_DEBUG_C
9748requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9749requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9750requires_openssl_tls1_3
9751run_test "TLS 1.3 O->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009752 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9753 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009754 0 \
9755 -s "Protocol is TLSv1.3" \
9756 -s "got named group: secp256r1(0017)" \
9757 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009758 -s "HRR selected_group: secp256r1"
9759
9760requires_config_enabled MBEDTLS_SSL_SRV_C
9761requires_config_enabled MBEDTLS_DEBUG_C
9762requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9763requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9764requires_openssl_tls1_3
9765run_test "TLS 1.3 O->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009766 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9767 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009768 0 \
9769 -s "Protocol is TLSv1.3" \
9770 -s "got named group: secp384r1(0018)" \
9771 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009772 -s "HRR selected_group: secp384r1"
9773
9774requires_config_enabled MBEDTLS_SSL_SRV_C
9775requires_config_enabled MBEDTLS_DEBUG_C
9776requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9777requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9778requires_openssl_tls1_3
9779run_test "TLS 1.3 O->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009780 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9781 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009782 0 \
9783 -s "Protocol is TLSv1.3" \
9784 -s "got named group: secp521r1(0019)" \
9785 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009786 -s "HRR selected_group: secp521r1"
9787
9788requires_config_enabled MBEDTLS_SSL_SRV_C
9789requires_config_enabled MBEDTLS_DEBUG_C
9790requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9792requires_openssl_tls1_3
9793run_test "TLS 1.3 O->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009794 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9795 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X25519:X448 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009796 0 \
9797 -s "Protocol is TLSv1.3" \
9798 -s "got named group: x448(001e)" \
9799 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009800 -s "HRR selected_group: x448"
9801
9802requires_config_enabled MBEDTLS_SSL_SRV_C
9803requires_config_enabled MBEDTLS_DEBUG_C
9804requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9805requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9806requires_openssl_tls1_3
9807run_test "TLS 1.3 O->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009808 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9809 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-256 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009810 0 \
9811 -s "Protocol is TLSv1.3" \
9812 -s "got named group: secp256r1(0017)" \
9813 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009814 -s "HRR selected_group: secp256r1"
9815
9816requires_config_enabled MBEDTLS_SSL_SRV_C
9817requires_config_enabled MBEDTLS_DEBUG_C
9818requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9819requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9820requires_openssl_tls1_3
9821run_test "TLS 1.3 O->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009822 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9823 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-384 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009824 0 \
9825 -s "Protocol is TLSv1.3" \
9826 -s "got named group: secp384r1(0018)" \
9827 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009828 -s "HRR selected_group: secp384r1"
9829
9830requires_config_enabled MBEDTLS_SSL_SRV_C
9831requires_config_enabled MBEDTLS_DEBUG_C
9832requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9834requires_openssl_tls1_3
9835run_test "TLS 1.3 O->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009836 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9837 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:P-521 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009838 0 \
9839 -s "Protocol is TLSv1.3" \
9840 -s "got named group: secp521r1(0019)" \
9841 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009842 -s "HRR selected_group: secp521r1"
9843
9844requires_config_enabled MBEDTLS_SSL_SRV_C
9845requires_config_enabled MBEDTLS_DEBUG_C
9846requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9847requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9848requires_openssl_tls1_3
9849run_test "TLS 1.3 O->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009850 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9851 "$O_NEXT_CLI_NO_CERT -CAfile data_files/test-ca2.crt -groups X448:X25519 -msg -tls1_3" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009852 0 \
9853 -s "Protocol is TLSv1.3" \
9854 -s "got named group: x25519(001d)" \
9855 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009856 -s "HRR selected_group: x25519"
9857
9858requires_config_enabled MBEDTLS_SSL_SRV_C
9859requires_config_enabled MBEDTLS_DEBUG_C
9860requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9861requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9862requires_gnutls_tls1_3
9863requires_gnutls_next_no_ticket
9864requires_gnutls_next_disable_tls13_compat
9865run_test "TLS 1.3 G->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009866 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9867 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009868 0 \
9869 -s "Protocol is TLSv1.3" \
9870 -s "got named group: secp384r1(0018)" \
9871 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009872 -s "HRR selected_group: secp384r1"
9873
9874requires_config_enabled MBEDTLS_SSL_SRV_C
9875requires_config_enabled MBEDTLS_DEBUG_C
9876requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9878requires_gnutls_tls1_3
9879requires_gnutls_next_no_ticket
9880requires_gnutls_next_disable_tls13_compat
9881run_test "TLS 1.3 G->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009882 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9883 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009884 0 \
9885 -s "Protocol is TLSv1.3" \
9886 -s "got named group: secp521r1(0019)" \
9887 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009888 -s "HRR selected_group: secp521r1"
9889
9890requires_config_enabled MBEDTLS_SSL_SRV_C
9891requires_config_enabled MBEDTLS_DEBUG_C
9892requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9893requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9894requires_gnutls_tls1_3
9895requires_gnutls_next_no_ticket
9896requires_gnutls_next_disable_tls13_compat
9897run_test "TLS 1.3 G->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009898 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9899 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009900 0 \
9901 -s "Protocol is TLSv1.3" \
9902 -s "got named group: x25519(001d)" \
9903 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009904 -s "HRR selected_group: x25519"
9905
9906requires_config_enabled MBEDTLS_SSL_SRV_C
9907requires_config_enabled MBEDTLS_DEBUG_C
9908requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9909requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9910requires_gnutls_tls1_3
9911requires_gnutls_next_no_ticket
9912requires_gnutls_next_disable_tls13_compat
9913run_test "TLS 1.3 G->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009914 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9915 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009916 0 \
9917 -s "Protocol is TLSv1.3" \
9918 -s "got named group: x448(001e)" \
9919 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009920 -s "HRR selected_group: x448"
9921
9922requires_config_enabled MBEDTLS_SSL_SRV_C
9923requires_config_enabled MBEDTLS_DEBUG_C
9924requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9925requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9926requires_gnutls_tls1_3
9927requires_gnutls_next_no_ticket
9928requires_gnutls_next_disable_tls13_compat
9929run_test "TLS 1.3 G->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009930 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9931 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009932 0 \
9933 -s "Protocol is TLSv1.3" \
9934 -s "got named group: secp256r1(0017)" \
9935 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009936 -s "HRR selected_group: secp256r1"
9937
9938requires_config_enabled MBEDTLS_SSL_SRV_C
9939requires_config_enabled MBEDTLS_DEBUG_C
9940requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9942requires_gnutls_tls1_3
9943requires_gnutls_next_no_ticket
9944requires_gnutls_next_disable_tls13_compat
9945run_test "TLS 1.3 G->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009946 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9947 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009948 0 \
9949 -s "Protocol is TLSv1.3" \
9950 -s "got named group: secp521r1(0019)" \
9951 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009952 -s "HRR selected_group: secp521r1"
9953
9954requires_config_enabled MBEDTLS_SSL_SRV_C
9955requires_config_enabled MBEDTLS_DEBUG_C
9956requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9958requires_gnutls_tls1_3
9959requires_gnutls_next_no_ticket
9960requires_gnutls_next_disable_tls13_compat
9961run_test "TLS 1.3 G->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009962 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9963 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009964 0 \
9965 -s "Protocol is TLSv1.3" \
9966 -s "got named group: x25519(001d)" \
9967 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009968 -s "HRR selected_group: x25519"
9969
9970requires_config_enabled MBEDTLS_SSL_SRV_C
9971requires_config_enabled MBEDTLS_DEBUG_C
9972requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9973requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9974requires_gnutls_tls1_3
9975requires_gnutls_next_no_ticket
9976requires_gnutls_next_disable_tls13_compat
9977run_test "TLS 1.3 G->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009978 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9979 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009980 0 \
9981 -s "Protocol is TLSv1.3" \
9982 -s "got named group: x448(001e)" \
9983 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009984 -s "HRR selected_group: x448"
9985
9986requires_config_enabled MBEDTLS_SSL_SRV_C
9987requires_config_enabled MBEDTLS_DEBUG_C
9988requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
9989requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9990requires_gnutls_tls1_3
9991requires_gnutls_next_no_ticket
9992requires_gnutls_next_disable_tls13_compat
9993run_test "TLS 1.3 G->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +08009994 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9995 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +00009996 0 \
9997 -s "Protocol is TLSv1.3" \
9998 -s "got named group: secp256r1(0017)" \
9999 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010000 -s "HRR selected_group: secp256r1"
10001
10002requires_config_enabled MBEDTLS_SSL_SRV_C
10003requires_config_enabled MBEDTLS_DEBUG_C
10004requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10005requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10006requires_gnutls_tls1_3
10007requires_gnutls_next_no_ticket
10008requires_gnutls_next_disable_tls13_compat
10009run_test "TLS 1.3 G->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010010 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10011 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010012 0 \
10013 -s "Protocol is TLSv1.3" \
10014 -s "got named group: secp384r1(0018)" \
10015 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010016 -s "HRR selected_group: secp384r1"
10017
10018requires_config_enabled MBEDTLS_SSL_SRV_C
10019requires_config_enabled MBEDTLS_DEBUG_C
10020requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10022requires_gnutls_tls1_3
10023requires_gnutls_next_no_ticket
10024requires_gnutls_next_disable_tls13_compat
10025run_test "TLS 1.3 G->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010026 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10027 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010028 0 \
10029 -s "Protocol is TLSv1.3" \
10030 -s "got named group: x25519(001d)" \
10031 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010032 -s "HRR selected_group: x25519"
10033
10034requires_config_enabled MBEDTLS_SSL_SRV_C
10035requires_config_enabled MBEDTLS_DEBUG_C
10036requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10037requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10038requires_gnutls_tls1_3
10039requires_gnutls_next_no_ticket
10040requires_gnutls_next_disable_tls13_compat
10041run_test "TLS 1.3 G->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010042 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10043 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010044 0 \
10045 -s "Protocol is TLSv1.3" \
10046 -s "got named group: x448(001e)" \
10047 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010048 -s "HRR selected_group: x448"
10049
10050requires_config_enabled MBEDTLS_SSL_SRV_C
10051requires_config_enabled MBEDTLS_DEBUG_C
10052requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10053requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10054requires_gnutls_tls1_3
10055requires_gnutls_next_no_ticket
10056requires_gnutls_next_disable_tls13_compat
10057run_test "TLS 1.3 G->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010058 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10059 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010060 0 \
10061 -s "Protocol is TLSv1.3" \
10062 -s "got named group: secp256r1(0017)" \
10063 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010064 -s "HRR selected_group: secp256r1"
10065
10066requires_config_enabled MBEDTLS_SSL_SRV_C
10067requires_config_enabled MBEDTLS_DEBUG_C
10068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10070requires_gnutls_tls1_3
10071requires_gnutls_next_no_ticket
10072requires_gnutls_next_disable_tls13_compat
10073run_test "TLS 1.3 G->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010074 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10075 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010076 0 \
10077 -s "Protocol is TLSv1.3" \
10078 -s "got named group: secp384r1(0018)" \
10079 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010080 -s "HRR selected_group: secp384r1"
10081
10082requires_config_enabled MBEDTLS_SSL_SRV_C
10083requires_config_enabled MBEDTLS_DEBUG_C
10084requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10086requires_gnutls_tls1_3
10087requires_gnutls_next_no_ticket
10088requires_gnutls_next_disable_tls13_compat
10089run_test "TLS 1.3 G->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010090 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10091 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010092 0 \
10093 -s "Protocol is TLSv1.3" \
10094 -s "got named group: secp521r1(0019)" \
10095 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010096 -s "HRR selected_group: secp521r1"
10097
10098requires_config_enabled MBEDTLS_SSL_SRV_C
10099requires_config_enabled MBEDTLS_DEBUG_C
10100requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10102requires_gnutls_tls1_3
10103requires_gnutls_next_no_ticket
10104requires_gnutls_next_disable_tls13_compat
10105run_test "TLS 1.3 G->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010106 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10107 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010108 0 \
10109 -s "Protocol is TLSv1.3" \
10110 -s "got named group: x448(001e)" \
10111 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010112 -s "HRR selected_group: x448"
10113
10114requires_config_enabled MBEDTLS_SSL_SRV_C
10115requires_config_enabled MBEDTLS_DEBUG_C
10116requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10118requires_gnutls_tls1_3
10119requires_gnutls_next_no_ticket
10120requires_gnutls_next_disable_tls13_compat
10121run_test "TLS 1.3 G->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010122 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10123 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010124 0 \
10125 -s "Protocol is TLSv1.3" \
10126 -s "got named group: secp256r1(0017)" \
10127 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010128 -s "HRR selected_group: secp256r1"
10129
10130requires_config_enabled MBEDTLS_SSL_SRV_C
10131requires_config_enabled MBEDTLS_DEBUG_C
10132requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10133requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10134requires_gnutls_tls1_3
10135requires_gnutls_next_no_ticket
10136requires_gnutls_next_disable_tls13_compat
10137run_test "TLS 1.3 G->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010138 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10139 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010140 0 \
10141 -s "Protocol is TLSv1.3" \
10142 -s "got named group: secp384r1(0018)" \
10143 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010144 -s "HRR selected_group: secp384r1"
10145
10146requires_config_enabled MBEDTLS_SSL_SRV_C
10147requires_config_enabled MBEDTLS_DEBUG_C
10148requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10149requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10150requires_gnutls_tls1_3
10151requires_gnutls_next_no_ticket
10152requires_gnutls_next_disable_tls13_compat
10153run_test "TLS 1.3 G->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010154 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10155 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010156 0 \
10157 -s "Protocol is TLSv1.3" \
10158 -s "got named group: secp521r1(0019)" \
10159 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010160 -s "HRR selected_group: secp521r1"
10161
10162requires_config_enabled MBEDTLS_SSL_SRV_C
10163requires_config_enabled MBEDTLS_DEBUG_C
10164requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10166requires_gnutls_tls1_3
10167requires_gnutls_next_no_ticket
10168requires_gnutls_next_disable_tls13_compat
10169run_test "TLS 1.3 G->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010170 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10171 "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile data_files/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010172 0 \
10173 -s "Protocol is TLSv1.3" \
10174 -s "got named group: x25519(001d)" \
10175 -s "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010176 -s "HRR selected_group: x25519"
10177
10178requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010179requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010180requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010181requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10182requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQiana1931442022-03-25 11:58:22 +000010183run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010184 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10185 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQiana1931442022-03-25 11:58:22 +000010186 0 \
10187 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010188 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010189 -c "NamedGroup: secp256r1 ( 17 )" \
10190 -c "NamedGroup: secp384r1 ( 18 )" \
10191 -c "Verifying peer X.509 certificate... ok" \
10192 -c "received HelloRetryRequest message" \
10193 -c "selected_group ( 24 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010194
XiaokangQian83f81882022-03-17 06:26:36 +000010195requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010196requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010197requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010198requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10199requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010200run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010201 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10202 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010203 0 \
10204 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010205 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010206 -c "NamedGroup: secp256r1 ( 17 )" \
10207 -c "NamedGroup: secp521r1 ( 19 )" \
10208 -c "Verifying peer X.509 certificate... ok" \
10209 -c "received HelloRetryRequest message" \
10210 -c "selected_group ( 25 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010211
XiaokangQian83f81882022-03-17 06:26:36 +000010212requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010213requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010214requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010215requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10216requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010217run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010218 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10219 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010220 0 \
10221 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010222 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010223 -c "NamedGroup: secp256r1 ( 17 )" \
10224 -c "NamedGroup: x25519 ( 1d )" \
10225 -c "Verifying peer X.509 certificate... ok" \
10226 -c "received HelloRetryRequest message" \
10227 -c "selected_group ( 29 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010228
XiaokangQian83f81882022-03-17 06:26:36 +000010229requires_openssl_tls1_3
XiaokangQian83f81882022-03-17 06:26:36 +000010230requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010231requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010234run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010235 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10236 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010237 0 \
10238 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010239 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010240 -c "NamedGroup: secp256r1 ( 17 )" \
10241 -c "NamedGroup: x448 ( 1e )" \
10242 -c "Verifying peer X.509 certificate... ok" \
10243 -c "received HelloRetryRequest message" \
10244 -c "selected_group ( 30 )"
XiaokangQian83f81882022-03-17 06:26:36 +000010245
XiaokangQian2e17fb82022-03-28 03:30:05 +000010246requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010247requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010248requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010249requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10250requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10251run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010252 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10253 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010254 0 \
10255 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010256 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010257 -c "NamedGroup: secp384r1 ( 18 )" \
10258 -c "NamedGroup: secp256r1 ( 17 )" \
10259 -c "Verifying peer X.509 certificate... ok" \
10260 -c "received HelloRetryRequest message" \
10261 -c "selected_group ( 23 )"
10262
10263requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010264requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010265requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010266requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10267requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10268run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010269 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10270 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010271 0 \
10272 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010273 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010274 -c "NamedGroup: secp384r1 ( 18 )" \
10275 -c "NamedGroup: secp521r1 ( 19 )" \
10276 -c "Verifying peer X.509 certificate... ok" \
10277 -c "received HelloRetryRequest message" \
10278 -c "selected_group ( 25 )"
10279
10280requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010281requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010282requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010283requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10284requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10285run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010286 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10287 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010288 0 \
10289 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010290 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010291 -c "NamedGroup: secp384r1 ( 18 )" \
10292 -c "NamedGroup: x25519 ( 1d )" \
10293 -c "Verifying peer X.509 certificate... ok" \
10294 -c "received HelloRetryRequest message" \
10295 -c "selected_group ( 29 )"
10296
10297requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010298requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010299requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010300requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10301requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10302run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010303 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10304 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010305 0 \
10306 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010307 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010308 -c "NamedGroup: secp384r1 ( 18 )" \
10309 -c "NamedGroup: x448 ( 1e )" \
10310 -c "Verifying peer X.509 certificate... ok" \
10311 -c "received HelloRetryRequest message" \
10312 -c "selected_group ( 30 )"
10313
10314requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010315requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010316requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010317requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10318requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10319run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010320 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10321 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010322 0 \
10323 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010324 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010325 -c "NamedGroup: secp521r1 ( 19 )" \
10326 -c "NamedGroup: secp256r1 ( 17 )" \
10327 -c "Verifying peer X.509 certificate... ok" \
10328 -c "received HelloRetryRequest message" \
10329 -c "selected_group ( 23 )"
10330
10331requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010332requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010333requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010334requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10335requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10336run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010337 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10338 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010339 0 \
10340 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010341 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010342 -c "NamedGroup: secp521r1 ( 19 )" \
10343 -c "NamedGroup: secp384r1 ( 18 )" \
10344 -c "Verifying peer X.509 certificate... ok" \
10345 -c "received HelloRetryRequest message" \
10346 -c "selected_group ( 24 )"
10347
10348requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010349requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010350requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010351requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10352requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10353run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010354 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10355 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010356 0 \
10357 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010358 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010359 -c "NamedGroup: secp521r1 ( 19 )" \
10360 -c "NamedGroup: x25519 ( 1d )" \
10361 -c "Verifying peer X.509 certificate... ok" \
10362 -c "received HelloRetryRequest message" \
10363 -c "selected_group ( 29 )"
10364
10365requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010366requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010367requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010368requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10369requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10370run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010371 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10372 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010373 0 \
10374 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010375 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010376 -c "NamedGroup: secp521r1 ( 19 )" \
10377 -c "NamedGroup: x448 ( 1e )" \
10378 -c "Verifying peer X.509 certificate... ok" \
10379 -c "received HelloRetryRequest message" \
10380 -c "selected_group ( 30 )"
10381
10382requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010383requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010384requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010385requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10386requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10387run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010388 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10389 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010390 0 \
10391 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010392 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010393 -c "NamedGroup: x25519 ( 1d )" \
10394 -c "NamedGroup: secp256r1 ( 17 )" \
10395 -c "Verifying peer X.509 certificate... ok" \
10396 -c "received HelloRetryRequest message" \
10397 -c "selected_group ( 23 )"
10398
10399requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010400requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010401requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010402requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10403requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10404run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010405 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10406 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010407 0 \
10408 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010409 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010410 -c "NamedGroup: x25519 ( 1d )" \
10411 -c "NamedGroup: secp384r1 ( 18 )" \
10412 -c "Verifying peer X.509 certificate... ok" \
10413 -c "received HelloRetryRequest message" \
10414 -c "selected_group ( 24 )"
10415
10416requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010417requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010418requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010419requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10421run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010422 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10423 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010424 0 \
10425 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010426 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010427 -c "NamedGroup: x25519 ( 1d )" \
10428 -c "NamedGroup: secp521r1 ( 19 )" \
10429 -c "Verifying peer X.509 certificate... ok" \
10430 -c "received HelloRetryRequest message" \
10431 -c "selected_group ( 25 )"
10432
10433requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010434requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010435requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010436requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10437requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10438run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010439 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10440 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010441 0 \
10442 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010443 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010444 -c "NamedGroup: x25519 ( 1d )" \
10445 -c "NamedGroup: x448 ( 1e )" \
10446 -c "Verifying peer X.509 certificate... ok" \
10447 -c "received HelloRetryRequest message" \
10448 -c "selected_group ( 30 )"
10449
10450requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010451requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010452requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010453requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10454requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10455run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010456 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10457 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010458 0 \
10459 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010460 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010461 -c "NamedGroup: x448 ( 1e )" \
10462 -c "NamedGroup: secp256r1 ( 17 )" \
10463 -c "Verifying peer X.509 certificate... ok" \
10464 -c "received HelloRetryRequest message" \
10465 -c "selected_group ( 23 )"
10466
10467requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010468requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010469requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010470requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10471requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10472run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010473 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10474 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010475 0 \
10476 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010477 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010478 -c "NamedGroup: x448 ( 1e )" \
10479 -c "NamedGroup: secp384r1 ( 18 )" \
10480 -c "Verifying peer X.509 certificate... ok" \
10481 -c "received HelloRetryRequest message" \
10482 -c "selected_group ( 24 )"
10483
10484requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010485requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010486requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010487requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10489run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010490 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10491 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010492 0 \
10493 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010494 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010495 -c "NamedGroup: x448 ( 1e )" \
10496 -c "NamedGroup: secp521r1 ( 19 )" \
10497 -c "Verifying peer X.509 certificate... ok" \
10498 -c "received HelloRetryRequest message" \
10499 -c "selected_group ( 25 )"
10500
10501requires_openssl_tls1_3
XiaokangQian2e17fb82022-03-28 03:30:05 +000010502requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010503requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010504requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10505requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10506run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010507 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
10508 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010509 0 \
10510 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010511 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010512 -c "NamedGroup: x448 ( 1e )" \
10513 -c "NamedGroup: x25519 ( 1d )" \
10514 -c "Verifying peer X.509 certificate... ok" \
10515 -c "received HelloRetryRequest message" \
10516 -c "selected_group ( 29 )"
10517
10518requires_gnutls_tls1_3
10519requires_gnutls_next_no_ticket
10520requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010521requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010522requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010523requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10524requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10525run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010526 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010527 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010528 0 \
10529 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010530 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010531 -c "NamedGroup: secp256r1 ( 17 )" \
10532 -c "NamedGroup: secp384r1 ( 18 )" \
10533 -c "Verifying peer X.509 certificate... ok" \
10534 -c "received HelloRetryRequest message" \
10535 -c "selected_group ( 24 )"
10536
10537requires_gnutls_tls1_3
10538requires_gnutls_next_no_ticket
10539requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010540requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010541requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010542requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10543requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10544run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010545 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010546 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010547 0 \
10548 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010549 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010550 -c "NamedGroup: secp256r1 ( 17 )" \
10551 -c "NamedGroup: secp521r1 ( 19 )" \
10552 -c "Verifying peer X.509 certificate... ok" \
10553 -c "received HelloRetryRequest message" \
10554 -c "selected_group ( 25 )"
10555
10556requires_gnutls_tls1_3
10557requires_gnutls_next_no_ticket
10558requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010559requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010560requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010561requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10562requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10563run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010564 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010565 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010566 0 \
10567 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010568 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010569 -c "NamedGroup: secp256r1 ( 17 )" \
10570 -c "NamedGroup: x25519 ( 1d )" \
10571 -c "Verifying peer X.509 certificate... ok" \
10572 -c "received HelloRetryRequest message" \
10573 -c "selected_group ( 29 )"
10574
XiaokangQian83f81882022-03-17 06:26:36 +000010575requires_gnutls_tls1_3
10576requires_gnutls_next_no_ticket
10577requires_gnutls_next_disable_tls13_compat
XiaokangQian83f81882022-03-17 06:26:36 +000010578requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010579requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian83f81882022-03-17 06:26:36 +000010580requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10581requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +000010582run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010583 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010584 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQian83f81882022-03-17 06:26:36 +000010585 0 \
10586 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010587 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +000010588 -c "NamedGroup: secp256r1 ( 17 )" \
10589 -c "NamedGroup: x448 ( 1e )" \
10590 -c "Verifying peer X.509 certificate... ok" \
10591 -c "received HelloRetryRequest message" \
10592 -c "selected_group ( 30 )"
XiaokangQian2e17fb82022-03-28 03:30:05 +000010593
10594requires_gnutls_tls1_3
10595requires_gnutls_next_no_ticket
10596requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010597requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010598requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10601run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010602 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010603 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010604 0 \
10605 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010606 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010607 -c "NamedGroup: secp384r1 ( 18 )" \
10608 -c "NamedGroup: secp256r1 ( 17 )" \
10609 -c "Verifying peer X.509 certificate... ok" \
10610 -c "received HelloRetryRequest message" \
10611 -c "selected_group ( 23 )"
10612
10613requires_gnutls_tls1_3
10614requires_gnutls_next_no_ticket
10615requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010616requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010617requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010618requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10619requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10620run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010621 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010622 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010623 0 \
10624 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010625 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010626 -c "NamedGroup: secp384r1 ( 18 )" \
10627 -c "NamedGroup: secp521r1 ( 19 )" \
10628 -c "Verifying peer X.509 certificate... ok" \
10629 -c "received HelloRetryRequest message" \
10630 -c "selected_group ( 25 )"
10631
10632requires_gnutls_tls1_3
10633requires_gnutls_next_no_ticket
10634requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010635requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010636requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010637requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10638requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10639run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010640 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010641 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010642 0 \
10643 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010644 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010645 -c "NamedGroup: secp384r1 ( 18 )" \
10646 -c "NamedGroup: x25519 ( 1d )" \
10647 -c "Verifying peer X.509 certificate... ok" \
10648 -c "received HelloRetryRequest message" \
10649 -c "selected_group ( 29 )"
10650
10651requires_gnutls_tls1_3
10652requires_gnutls_next_no_ticket
10653requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010654requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010655requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010656requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10657requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10658run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010659 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010660 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010661 0 \
10662 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010663 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010664 -c "NamedGroup: secp384r1 ( 18 )" \
10665 -c "NamedGroup: x448 ( 1e )" \
10666 -c "Verifying peer X.509 certificate... ok" \
10667 -c "received HelloRetryRequest message" \
10668 -c "selected_group ( 30 )"
10669
10670requires_gnutls_tls1_3
10671requires_gnutls_next_no_ticket
10672requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010673requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010674requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010675requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10676requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10677run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010678 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010679 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010680 0 \
10681 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010682 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010683 -c "NamedGroup: secp521r1 ( 19 )" \
10684 -c "NamedGroup: secp256r1 ( 17 )" \
10685 -c "Verifying peer X.509 certificate... ok" \
10686 -c "received HelloRetryRequest message" \
10687 -c "selected_group ( 23 )"
10688
10689requires_gnutls_tls1_3
10690requires_gnutls_next_no_ticket
10691requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010692requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010693requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010694requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10695requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10696run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010697 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010698 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010699 0 \
10700 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010701 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010702 -c "NamedGroup: secp521r1 ( 19 )" \
10703 -c "NamedGroup: secp384r1 ( 18 )" \
10704 -c "Verifying peer X.509 certificate... ok" \
10705 -c "received HelloRetryRequest message" \
10706 -c "selected_group ( 24 )"
10707
10708requires_gnutls_tls1_3
10709requires_gnutls_next_no_ticket
10710requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010711requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010712requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010713requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10714requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10715run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010716 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010717 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010718 0 \
10719 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010720 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010721 -c "NamedGroup: secp521r1 ( 19 )" \
10722 -c "NamedGroup: x25519 ( 1d )" \
10723 -c "Verifying peer X.509 certificate... ok" \
10724 -c "received HelloRetryRequest message" \
10725 -c "selected_group ( 29 )"
10726
10727requires_gnutls_tls1_3
10728requires_gnutls_next_no_ticket
10729requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010730requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010731requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010732requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10733requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10734run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010735 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010736 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010737 0 \
10738 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010739 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010740 -c "NamedGroup: secp521r1 ( 19 )" \
10741 -c "NamedGroup: x448 ( 1e )" \
10742 -c "Verifying peer X.509 certificate... ok" \
10743 -c "received HelloRetryRequest message" \
10744 -c "selected_group ( 30 )"
10745
10746requires_gnutls_tls1_3
10747requires_gnutls_next_no_ticket
10748requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010749requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010750requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010751requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10752requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10753run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010754 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010755 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010756 0 \
10757 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010758 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010759 -c "NamedGroup: x25519 ( 1d )" \
10760 -c "NamedGroup: secp256r1 ( 17 )" \
10761 -c "Verifying peer X.509 certificate... ok" \
10762 -c "received HelloRetryRequest message" \
10763 -c "selected_group ( 23 )"
10764
10765requires_gnutls_tls1_3
10766requires_gnutls_next_no_ticket
10767requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010768requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010769requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010770requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10772run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010773 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010774 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010775 0 \
10776 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010777 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010778 -c "NamedGroup: x25519 ( 1d )" \
10779 -c "NamedGroup: secp384r1 ( 18 )" \
10780 -c "Verifying peer X.509 certificate... ok" \
10781 -c "received HelloRetryRequest message" \
10782 -c "selected_group ( 24 )"
10783
10784requires_gnutls_tls1_3
10785requires_gnutls_next_no_ticket
10786requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010787requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010788requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010789requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10790requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10791run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010792 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010793 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010794 0 \
10795 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010796 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010797 -c "NamedGroup: x25519 ( 1d )" \
10798 -c "NamedGroup: secp521r1 ( 19 )" \
10799 -c "Verifying peer X.509 certificate... ok" \
10800 -c "received HelloRetryRequest message" \
10801 -c "selected_group ( 25 )"
10802
10803requires_gnutls_tls1_3
10804requires_gnutls_next_no_ticket
10805requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010806requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010807requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010808requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10809requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10810run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010811 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010812 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010813 0 \
10814 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010815 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010816 -c "NamedGroup: x25519 ( 1d )" \
10817 -c "NamedGroup: x448 ( 1e )" \
10818 -c "Verifying peer X.509 certificate... ok" \
10819 -c "received HelloRetryRequest message" \
10820 -c "selected_group ( 30 )"
10821
10822requires_gnutls_tls1_3
10823requires_gnutls_next_no_ticket
10824requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010825requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010826requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010827requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10828requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10829run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010830 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010831 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010832 0 \
10833 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010834 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010835 -c "NamedGroup: x448 ( 1e )" \
10836 -c "NamedGroup: secp256r1 ( 17 )" \
10837 -c "Verifying peer X.509 certificate... ok" \
10838 -c "received HelloRetryRequest message" \
10839 -c "selected_group ( 23 )"
10840
10841requires_gnutls_tls1_3
10842requires_gnutls_next_no_ticket
10843requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010844requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010845requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010846requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10847requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10848run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010849 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010850 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010851 0 \
10852 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010853 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010854 -c "NamedGroup: x448 ( 1e )" \
10855 -c "NamedGroup: secp384r1 ( 18 )" \
10856 -c "Verifying peer X.509 certificate... ok" \
10857 -c "received HelloRetryRequest message" \
10858 -c "selected_group ( 24 )"
10859
10860requires_gnutls_tls1_3
10861requires_gnutls_next_no_ticket
10862requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010863requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010864requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010865requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10866requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10867run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010868 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010869 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010870 0 \
10871 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010872 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010873 -c "NamedGroup: x448 ( 1e )" \
10874 -c "NamedGroup: secp521r1 ( 19 )" \
10875 -c "Verifying peer X.509 certificate... ok" \
10876 -c "received HelloRetryRequest message" \
10877 -c "selected_group ( 25 )"
10878
10879requires_gnutls_tls1_3
10880requires_gnutls_next_no_ticket
10881requires_gnutls_next_disable_tls13_compat
XiaokangQian2e17fb82022-03-28 03:30:05 +000010882requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010883requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQian2e17fb82022-03-28 03:30:05 +000010884requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10885requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10886run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010887 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010888 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010889 0 \
10890 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +020010891 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +000010892 -c "NamedGroup: x448 ( 1e )" \
10893 -c "NamedGroup: x25519 ( 1d )" \
10894 -c "Verifying peer X.509 certificate... ok" \
10895 -c "received HelloRetryRequest message" \
10896 -c "selected_group ( 29 )"
XiaokangQianb1847a22022-06-08 07:49:31 +000010897
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010898requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010899requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010900requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10901requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010902requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010903requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010904requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10905requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10906run_test "TLS 1.3 m->m: HRR secp256r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010907 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10908 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010909 0 \
10910 -s "Protocol is TLSv1.3" \
10911 -s "got named group: secp384r1(0018)" \
10912 -s "Verifying peer X.509 certificate... ok" \
10913 -c "Protocol is TLSv1.3" \
10914 -c "NamedGroup: secp256r1 ( 17 )" \
10915 -c "NamedGroup: secp384r1 ( 18 )" \
10916 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010917 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010918 -c "received HelloRetryRequest message" \
10919 -c "selected_group ( 24 )"
10920
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010921requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010922requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010923requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010925requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010926requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010927requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10928requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10929run_test "TLS 1.3 m->m: HRR secp256r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010930 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10931 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010932 0 \
10933 -s "Protocol is TLSv1.3" \
10934 -s "got named group: secp521r1(0019)" \
10935 -s "Verifying peer X.509 certificate... ok" \
10936 -c "Protocol is TLSv1.3" \
10937 -c "NamedGroup: secp256r1 ( 17 )" \
10938 -c "NamedGroup: secp521r1 ( 19 )" \
10939 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010940 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010941 -c "received HelloRetryRequest message" \
10942 -c "selected_group ( 25 )"
10943
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010944requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010945requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010946requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010948requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010949requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010950requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10951requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10952run_test "TLS 1.3 m->m: HRR secp256r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010953 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10954 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010955 0 \
10956 -s "Protocol is TLSv1.3" \
10957 -s "got named group: x25519(001d)" \
10958 -s "Verifying peer X.509 certificate... ok" \
10959 -c "Protocol is TLSv1.3" \
10960 -c "NamedGroup: secp256r1 ( 17 )" \
10961 -c "NamedGroup: x25519 ( 1d )" \
10962 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010963 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010964 -c "received HelloRetryRequest message" \
10965 -c "selected_group ( 29 )"
10966
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010967requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010968requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010969requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10970requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010971requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010972requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010973requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10974requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10975run_test "TLS 1.3 m->m: HRR secp256r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010976 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10977 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010978 0 \
10979 -s "Protocol is TLSv1.3" \
10980 -s "got named group: x448(001e)" \
10981 -s "Verifying peer X.509 certificate... ok" \
10982 -c "Protocol is TLSv1.3" \
10983 -c "NamedGroup: secp256r1 ( 17 )" \
10984 -c "NamedGroup: x448 ( 1e )" \
10985 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000010986 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000010987 -c "received HelloRetryRequest message" \
10988 -c "selected_group ( 30 )"
10989
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000010990requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010991requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010992requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000010994requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000010995requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000010996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
10997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10998run_test "TLS 1.3 m->m: HRR secp384r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080010999 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11000 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011001 0 \
11002 -s "Protocol is TLSv1.3" \
11003 -s "got named group: secp256r1(0017)" \
11004 -s "Verifying peer X.509 certificate... ok" \
11005 -c "Protocol is TLSv1.3" \
11006 -c "NamedGroup: secp384r1 ( 18 )" \
11007 -c "NamedGroup: secp256r1 ( 17 )" \
11008 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011009 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011010 -c "received HelloRetryRequest message" \
11011 -c "selected_group ( 23 )"
11012
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011013requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011014requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011015requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011017requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011018requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011019requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11020requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11021run_test "TLS 1.3 m->m: HRR secp384r1 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011022 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11023 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011024 0 \
11025 -s "Protocol is TLSv1.3" \
11026 -s "got named group: secp521r1(0019)" \
11027 -s "Verifying peer X.509 certificate... ok" \
11028 -c "Protocol is TLSv1.3" \
11029 -c "NamedGroup: secp384r1 ( 18 )" \
11030 -c "NamedGroup: secp521r1 ( 19 )" \
11031 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011032 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011033 -c "received HelloRetryRequest message" \
11034 -c "selected_group ( 25 )"
11035
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011036requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011037requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011038requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11039requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011040requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011041requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011042requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11043requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11044run_test "TLS 1.3 m->m: HRR secp384r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011045 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11046 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011047 0 \
11048 -s "Protocol is TLSv1.3" \
11049 -s "got named group: x25519(001d)" \
11050 -s "Verifying peer X.509 certificate... ok" \
11051 -c "Protocol is TLSv1.3" \
11052 -c "NamedGroup: secp384r1 ( 18 )" \
11053 -c "NamedGroup: x25519 ( 1d )" \
11054 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011055 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011056 -c "received HelloRetryRequest message" \
11057 -c "selected_group ( 29 )"
11058
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011059requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011060requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011061requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011063requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011064requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011065requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11067run_test "TLS 1.3 m->m: HRR secp384r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011068 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11069 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011070 0 \
11071 -s "Protocol is TLSv1.3" \
11072 -s "got named group: x448(001e)" \
11073 -s "Verifying peer X.509 certificate... ok" \
11074 -c "Protocol is TLSv1.3" \
11075 -c "NamedGroup: secp384r1 ( 18 )" \
11076 -c "NamedGroup: x448 ( 1e )" \
11077 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011078 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011079 -c "received HelloRetryRequest message" \
11080 -c "selected_group ( 30 )"
11081
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011082requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011083requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011084requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011086requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011087requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011088requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11090run_test "TLS 1.3 m->m: HRR secp521r1 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011091 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11092 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011093 0 \
11094 -s "Protocol is TLSv1.3" \
11095 -s "got named group: secp256r1(0017)" \
11096 -s "Verifying peer X.509 certificate... ok" \
11097 -c "Protocol is TLSv1.3" \
11098 -c "NamedGroup: secp521r1 ( 19 )" \
11099 -c "NamedGroup: secp256r1 ( 17 )" \
11100 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011101 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011102 -c "received HelloRetryRequest message" \
11103 -c "selected_group ( 23 )"
11104
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011105requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011106requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011107requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11108requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011109requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011110requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011111requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11112requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11113run_test "TLS 1.3 m->m: HRR secp521r1 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011114 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11115 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011116 0 \
11117 -s "Protocol is TLSv1.3" \
11118 -s "got named group: secp384r1(0018)" \
11119 -s "Verifying peer X.509 certificate... ok" \
11120 -c "Protocol is TLSv1.3" \
11121 -c "NamedGroup: secp521r1 ( 19 )" \
11122 -c "NamedGroup: secp384r1 ( 18 )" \
11123 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011124 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011125 -c "received HelloRetryRequest message" \
11126 -c "selected_group ( 24 )"
11127
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011128requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011129requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011130requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11131requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011132requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011133requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011134requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11135requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11136run_test "TLS 1.3 m->m: HRR secp521r1 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011137 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11138 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011139 0 \
11140 -s "Protocol is TLSv1.3" \
11141 -s "got named group: x25519(001d)" \
11142 -s "Verifying peer X.509 certificate... ok" \
11143 -c "Protocol is TLSv1.3" \
11144 -c "NamedGroup: secp521r1 ( 19 )" \
11145 -c "NamedGroup: x25519 ( 1d )" \
11146 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011147 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011148 -c "received HelloRetryRequest message" \
11149 -c "selected_group ( 29 )"
11150
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011151requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011152requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011153requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11154requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011155requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011156requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011157requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11159run_test "TLS 1.3 m->m: HRR secp521r1 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011160 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11161 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011162 0 \
11163 -s "Protocol is TLSv1.3" \
11164 -s "got named group: x448(001e)" \
11165 -s "Verifying peer X.509 certificate... ok" \
11166 -c "Protocol is TLSv1.3" \
11167 -c "NamedGroup: secp521r1 ( 19 )" \
11168 -c "NamedGroup: x448 ( 1e )" \
11169 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011170 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011171 -c "received HelloRetryRequest message" \
11172 -c "selected_group ( 30 )"
11173
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011174requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011175requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011176requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11177requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011178requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011179requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011180requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11181requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11182run_test "TLS 1.3 m->m: HRR x25519 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011183 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11184 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011185 0 \
11186 -s "Protocol is TLSv1.3" \
11187 -s "got named group: secp256r1(0017)" \
11188 -s "Verifying peer X.509 certificate... ok" \
11189 -c "Protocol is TLSv1.3" \
11190 -c "NamedGroup: x25519 ( 1d )" \
11191 -c "NamedGroup: secp256r1 ( 17 )" \
11192 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011193 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011194 -c "received HelloRetryRequest message" \
11195 -c "selected_group ( 23 )"
11196
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011197requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011198requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011199requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011201requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011202requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11205run_test "TLS 1.3 m->m: HRR x25519 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011206 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11207 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011208 0 \
11209 -s "Protocol is TLSv1.3" \
11210 -s "got named group: secp384r1(0018)" \
11211 -s "Verifying peer X.509 certificate... ok" \
11212 -c "Protocol is TLSv1.3" \
11213 -c "NamedGroup: x25519 ( 1d )" \
11214 -c "NamedGroup: secp384r1 ( 18 )" \
11215 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011216 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011217 -c "received HelloRetryRequest message" \
11218 -c "selected_group ( 24 )"
11219
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011220requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011221requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011222requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11223requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011224requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011225requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011226requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11227requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11228run_test "TLS 1.3 m->m: HRR x25519 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011229 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11230 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011231 0 \
11232 -s "Protocol is TLSv1.3" \
11233 -s "got named group: secp521r1(0019)" \
11234 -s "Verifying peer X.509 certificate... ok" \
11235 -c "Protocol is TLSv1.3" \
11236 -c "NamedGroup: x25519 ( 1d )" \
11237 -c "NamedGroup: secp521r1 ( 19 )" \
11238 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011239 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011240 -c "received HelloRetryRequest message" \
11241 -c "selected_group ( 25 )"
11242
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011243requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011244requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011245requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11246requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011247requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011248requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011249requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11250requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11251run_test "TLS 1.3 m->m: HRR x25519 -> x448" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011252 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11253 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011254 0 \
11255 -s "Protocol is TLSv1.3" \
11256 -s "got named group: x448(001e)" \
11257 -s "Verifying peer X.509 certificate... ok" \
11258 -c "Protocol is TLSv1.3" \
11259 -c "NamedGroup: x25519 ( 1d )" \
11260 -c "NamedGroup: x448 ( 1e )" \
11261 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011262 -s "HRR selected_group: x448" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011263 -c "received HelloRetryRequest message" \
11264 -c "selected_group ( 30 )"
11265
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011266requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011267requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011268requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11269requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011270requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011271requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011272requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11273requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11274run_test "TLS 1.3 m->m: HRR x448 -> secp256r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011275 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11276 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011277 0 \
11278 -s "Protocol is TLSv1.3" \
11279 -s "got named group: secp256r1(0017)" \
11280 -s "Verifying peer X.509 certificate... ok" \
11281 -c "Protocol is TLSv1.3" \
11282 -c "NamedGroup: x448 ( 1e )" \
11283 -c "NamedGroup: secp256r1 ( 17 )" \
11284 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011285 -s "HRR selected_group: secp256r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011286 -c "received HelloRetryRequest message" \
11287 -c "selected_group ( 23 )"
11288
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011289requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011290requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011291requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011293requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011294requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011295requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11296requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11297run_test "TLS 1.3 m->m: HRR x448 -> secp384r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011298 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11299 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011300 0 \
11301 -s "Protocol is TLSv1.3" \
11302 -s "got named group: secp384r1(0018)" \
11303 -s "Verifying peer X.509 certificate... ok" \
11304 -c "Protocol is TLSv1.3" \
11305 -c "NamedGroup: x448 ( 1e )" \
11306 -c "NamedGroup: secp384r1 ( 18 )" \
11307 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011308 -s "HRR selected_group: secp384r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011309 -c "received HelloRetryRequest message" \
11310 -c "selected_group ( 24 )"
11311
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011312requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011313requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011314requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11315requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011316requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011317requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011318requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11319requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11320run_test "TLS 1.3 m->m: HRR x448 -> secp521r1" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011321 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11322 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011323 0 \
11324 -s "Protocol is TLSv1.3" \
11325 -s "got named group: secp521r1(0019)" \
11326 -s "Verifying peer X.509 certificate... ok" \
11327 -c "Protocol is TLSv1.3" \
11328 -c "NamedGroup: x448 ( 1e )" \
11329 -c "NamedGroup: secp521r1 ( 19 )" \
11330 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011331 -s "HRR selected_group: secp521r1" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011332 -c "received HelloRetryRequest message" \
11333 -c "selected_group ( 25 )"
11334
XiaokangQianfb1a3fe2022-06-09 06:37:33 +000011335requires_config_enabled MBEDTLS_SSL_SRV_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011336requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011337requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11338requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQianb1847a22022-06-08 07:49:31 +000011339requires_config_enabled MBEDTLS_SSL_CLI_C
XiaokangQian9b938b72022-06-10 03:10:59 +000011340requires_config_enabled MBEDTLS_DEBUG_C
XiaokangQianb1847a22022-06-08 07:49:31 +000011341requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
11342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11343run_test "TLS 1.3 m->m: HRR x448 -> x25519" \
Jerry Yub7c12a42022-06-12 20:53:02 +080011344 "$P_SRV crt_file=data_files/ecdsa_secp256r1.crt key_file=data_files/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x25519 force_version=tls13 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11345 "$P_CLI ca_file=data_files/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519 force_version=tls13" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011346 0 \
11347 -s "Protocol is TLSv1.3" \
11348 -s "got named group: x25519(001d)" \
11349 -s "Verifying peer X.509 certificate... ok" \
11350 -c "Protocol is TLSv1.3" \
11351 -c "NamedGroup: x448 ( 1e )" \
11352 -c "NamedGroup: x25519 ( 1d )" \
11353 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian9b938b72022-06-10 03:10:59 +000011354 -s "HRR selected_group: x25519" \
XiaokangQianb1847a22022-06-08 07:49:31 +000011355 -c "received HelloRetryRequest message" \
11356 -c "selected_group ( 29 )"