blob: ed19a7b21b99cfe79f2672cddc765ca160735140 [file] [log] [blame]
Jerry Yu31018ad2021-11-26 20:36:17 +08001#!/bin/sh
2
Jerry Yudda036d2021-11-30 11:19:41 +08003# tls13-compat.sh
Jerry Yu31018ad2021-11-26 20:36:17 +08004#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19#
20# Purpose
21#
22# List TLS1.3 compat test cases. They are generated by
Ronald Crona1b8f6e2022-03-18 14:04:12 +010023# `./tests/scripts/generate_tls13_compat_tests.py -a -o ./tests/opt-testcases/tls13-compat.sh`.
Jerry Yu31018ad2021-11-26 20:36:17 +080024#
25# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
26# AND REGENERATE THIS FILE.
27#
Jerry Yu31018ad2021-11-26 20:36:17 +080028requires_openssl_tls1_3
29requires_config_enabled MBEDTLS_DEBUG_C
30requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +010031requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +010032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +020033run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +010034 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010035 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +080036 0 \
37 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010038 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +080039 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
40 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +080041 -c "NamedGroup: secp256r1 ( 17 )" \
42 -c "Verifying peer X.509 certificate... ok" \
43 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +080044
Jerry Yu31018ad2021-11-26 20:36:17 +080045requires_gnutls_tls1_3
46requires_gnutls_next_no_ticket
47requires_gnutls_next_disable_tls13_compat
48requires_config_enabled MBEDTLS_DEBUG_C
49requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +010050requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +010051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +020052run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +010053 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010054 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +080055 0 \
56 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010057 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +080058 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
59 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +080060 -c "NamedGroup: secp256r1 ( 17 )" \
61 -c "Verifying peer X.509 certificate... ok" \
62 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +080063
Jerry Yu31018ad2021-11-26 20:36:17 +080064requires_openssl_tls1_3
65requires_config_enabled MBEDTLS_DEBUG_C
66requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +010067requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +010068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +020069run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +010070 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010071 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +080072 0 \
73 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010074 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +080075 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
76 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +080077 -c "NamedGroup: secp384r1 ( 18 )" \
78 -c "Verifying peer X.509 certificate... ok" \
79 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +080080
Jerry Yu31018ad2021-11-26 20:36:17 +080081requires_gnutls_tls1_3
82requires_gnutls_next_no_ticket
83requires_gnutls_next_disable_tls13_compat
84requires_config_enabled MBEDTLS_DEBUG_C
85requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +010086requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +010087requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +020088run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +010089 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010090 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +080091 0 \
92 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +010093 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +080094 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
95 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +080096 -c "NamedGroup: secp384r1 ( 18 )" \
97 -c "Verifying peer X.509 certificate... ok" \
98 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +080099
Jerry Yu31018ad2021-11-26 20:36:17 +0800100requires_openssl_tls1_3
101requires_config_enabled MBEDTLS_DEBUG_C
102requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100103requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100104requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200105run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100106 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100107 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800108 0 \
109 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100110 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800111 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
112 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800113 -c "NamedGroup: secp521r1 ( 19 )" \
114 -c "Verifying peer X.509 certificate... ok" \
115 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800116
Jerry Yu31018ad2021-11-26 20:36:17 +0800117requires_gnutls_tls1_3
118requires_gnutls_next_no_ticket
119requires_gnutls_next_disable_tls13_compat
120requires_config_enabled MBEDTLS_DEBUG_C
121requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100122requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100123requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200124run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100125 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100126 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800127 0 \
128 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100129 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800130 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
131 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800132 -c "NamedGroup: secp521r1 ( 19 )" \
133 -c "Verifying peer X.509 certificate... ok" \
134 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800135
Jerry Yu31018ad2021-11-26 20:36:17 +0800136requires_openssl_tls1_3
137requires_config_enabled MBEDTLS_DEBUG_C
138requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100139requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100140requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200141run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100142 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100143 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800144 0 \
145 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100146 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800147 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
148 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800149 -c "NamedGroup: x25519 ( 1d )" \
150 -c "Verifying peer X.509 certificate... ok" \
151 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800152
Jerry Yu31018ad2021-11-26 20:36:17 +0800153requires_gnutls_tls1_3
154requires_gnutls_next_no_ticket
155requires_gnutls_next_disable_tls13_compat
156requires_config_enabled MBEDTLS_DEBUG_C
157requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100158requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200160run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100161 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100162 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800163 0 \
164 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100165 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800166 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
167 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800168 -c "NamedGroup: x25519 ( 1d )" \
169 -c "Verifying peer X.509 certificate... ok" \
170 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800171
Jerry Yu31018ad2021-11-26 20:36:17 +0800172requires_openssl_tls1_3
173requires_config_enabled MBEDTLS_DEBUG_C
174requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100175requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100176requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200177run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100178 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100179 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800180 0 \
181 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100182 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800183 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
184 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800185 -c "NamedGroup: x448 ( 1e )" \
186 -c "Verifying peer X.509 certificate... ok" \
187 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800188
Jerry Yu31018ad2021-11-26 20:36:17 +0800189requires_gnutls_tls1_3
190requires_gnutls_next_no_ticket
191requires_gnutls_next_disable_tls13_compat
192requires_config_enabled MBEDTLS_DEBUG_C
193requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100194requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100195requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200196run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100197 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100198 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800199 0 \
200 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100201 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800202 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
203 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800204 -c "NamedGroup: x448 ( 1e )" \
205 -c "Verifying peer X.509 certificate... ok" \
206 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800207
Jerry Yu31018ad2021-11-26 20:36:17 +0800208requires_openssl_tls1_3
209requires_config_enabled MBEDTLS_DEBUG_C
210requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100211requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100212requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200213run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100214 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100215 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800216 0 \
217 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100218 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800219 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
220 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800221 -c "NamedGroup: secp256r1 ( 17 )" \
222 -c "Verifying peer X.509 certificate... ok" \
223 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800224
Jerry Yu31018ad2021-11-26 20:36:17 +0800225requires_gnutls_tls1_3
226requires_gnutls_next_no_ticket
227requires_gnutls_next_disable_tls13_compat
228requires_config_enabled MBEDTLS_DEBUG_C
229requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100230requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100231requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200232run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100233 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100234 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800235 0 \
236 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100237 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800238 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
239 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800240 -c "NamedGroup: secp256r1 ( 17 )" \
241 -c "Verifying peer X.509 certificate... ok" \
242 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800243
Jerry Yu31018ad2021-11-26 20:36:17 +0800244requires_openssl_tls1_3
245requires_config_enabled MBEDTLS_DEBUG_C
246requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100247requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100248requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200249run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100250 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100251 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800252 0 \
253 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100254 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800255 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
256 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800257 -c "NamedGroup: secp384r1 ( 18 )" \
258 -c "Verifying peer X.509 certificate... ok" \
259 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800260
Jerry Yu31018ad2021-11-26 20:36:17 +0800261requires_gnutls_tls1_3
262requires_gnutls_next_no_ticket
263requires_gnutls_next_disable_tls13_compat
264requires_config_enabled MBEDTLS_DEBUG_C
265requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100266requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100267requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200268run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100269 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100270 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800271 0 \
272 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100273 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800274 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
275 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800276 -c "NamedGroup: secp384r1 ( 18 )" \
277 -c "Verifying peer X.509 certificate... ok" \
278 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800279
Jerry Yu31018ad2021-11-26 20:36:17 +0800280requires_openssl_tls1_3
281requires_config_enabled MBEDTLS_DEBUG_C
282requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100283requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100284requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200285run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100286 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100287 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800288 0 \
289 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100290 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800291 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
292 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800293 -c "NamedGroup: secp521r1 ( 19 )" \
294 -c "Verifying peer X.509 certificate... ok" \
295 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800296
Jerry Yu31018ad2021-11-26 20:36:17 +0800297requires_gnutls_tls1_3
298requires_gnutls_next_no_ticket
299requires_gnutls_next_disable_tls13_compat
300requires_config_enabled MBEDTLS_DEBUG_C
301requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100302requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200304run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100305 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800307 0 \
308 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100309 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800310 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
311 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800312 -c "NamedGroup: secp521r1 ( 19 )" \
313 -c "Verifying peer X.509 certificate... ok" \
314 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800315
Jerry Yu31018ad2021-11-26 20:36:17 +0800316requires_openssl_tls1_3
317requires_config_enabled MBEDTLS_DEBUG_C
318requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100319requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100320requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200321run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100322 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100323 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800324 0 \
325 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100326 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800327 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
328 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800329 -c "NamedGroup: x25519 ( 1d )" \
330 -c "Verifying peer X.509 certificate... ok" \
331 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800332
Jerry Yu31018ad2021-11-26 20:36:17 +0800333requires_gnutls_tls1_3
334requires_gnutls_next_no_ticket
335requires_gnutls_next_disable_tls13_compat
336requires_config_enabled MBEDTLS_DEBUG_C
337requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100338requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200340run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100341 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100342 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800343 0 \
344 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100345 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800346 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
347 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800348 -c "NamedGroup: x25519 ( 1d )" \
349 -c "Verifying peer X.509 certificate... ok" \
350 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800351
Jerry Yu31018ad2021-11-26 20:36:17 +0800352requires_openssl_tls1_3
353requires_config_enabled MBEDTLS_DEBUG_C
354requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100355requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100356requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200357run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100358 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100359 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800360 0 \
361 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100362 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800363 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
364 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800365 -c "NamedGroup: x448 ( 1e )" \
366 -c "Verifying peer X.509 certificate... ok" \
367 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800368
Jerry Yu31018ad2021-11-26 20:36:17 +0800369requires_gnutls_tls1_3
370requires_gnutls_next_no_ticket
371requires_gnutls_next_disable_tls13_compat
372requires_config_enabled MBEDTLS_DEBUG_C
373requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100374requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100375requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200376run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100377 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100378 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800379 0 \
380 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100381 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800382 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
383 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800384 -c "NamedGroup: x448 ( 1e )" \
385 -c "Verifying peer X.509 certificate... ok" \
386 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800387
Jerry Yu31018ad2021-11-26 20:36:17 +0800388requires_openssl_tls1_3
389requires_config_enabled MBEDTLS_DEBUG_C
390requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100391requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200393run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100394 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100395 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800396 0 \
397 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100398 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800399 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
400 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800401 -c "NamedGroup: secp256r1 ( 17 )" \
402 -c "Verifying peer X.509 certificate... ok" \
403 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800404
Jerry Yu31018ad2021-11-26 20:36:17 +0800405requires_gnutls_tls1_3
406requires_gnutls_next_no_ticket
407requires_gnutls_next_disable_tls13_compat
408requires_config_enabled MBEDTLS_DEBUG_C
409requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100410requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100411requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200412run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100413 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100414 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800415 0 \
416 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100417 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800418 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
419 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800420 -c "NamedGroup: secp256r1 ( 17 )" \
421 -c "Verifying peer X.509 certificate... ok" \
422 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800423
Jerry Yu31018ad2021-11-26 20:36:17 +0800424requires_openssl_tls1_3
425requires_config_enabled MBEDTLS_DEBUG_C
426requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100427requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200429run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100430 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100431 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800432 0 \
433 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100434 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800435 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
436 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800437 -c "NamedGroup: secp384r1 ( 18 )" \
438 -c "Verifying peer X.509 certificate... ok" \
439 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800440
Jerry Yu31018ad2021-11-26 20:36:17 +0800441requires_gnutls_tls1_3
442requires_gnutls_next_no_ticket
443requires_gnutls_next_disable_tls13_compat
444requires_config_enabled MBEDTLS_DEBUG_C
445requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100446requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200448run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100449 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100450 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800451 0 \
452 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100453 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800454 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
455 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800456 -c "NamedGroup: secp384r1 ( 18 )" \
457 -c "Verifying peer X.509 certificate... ok" \
458 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800459
Jerry Yu31018ad2021-11-26 20:36:17 +0800460requires_openssl_tls1_3
461requires_config_enabled MBEDTLS_DEBUG_C
462requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100463requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100464requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200465run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100466 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100467 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800468 0 \
469 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100470 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800471 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
472 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800473 -c "NamedGroup: secp521r1 ( 19 )" \
474 -c "Verifying peer X.509 certificate... ok" \
475 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800476
Jerry Yu31018ad2021-11-26 20:36:17 +0800477requires_gnutls_tls1_3
478requires_gnutls_next_no_ticket
479requires_gnutls_next_disable_tls13_compat
480requires_config_enabled MBEDTLS_DEBUG_C
481requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100482requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100483requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200484run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100485 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100486 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800487 0 \
488 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100489 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800490 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
491 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800492 -c "NamedGroup: secp521r1 ( 19 )" \
493 -c "Verifying peer X.509 certificate... ok" \
494 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800495
Jerry Yu31018ad2021-11-26 20:36:17 +0800496requires_openssl_tls1_3
497requires_config_enabled MBEDTLS_DEBUG_C
498requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100499requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100500requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200501run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100502 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100503 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800504 0 \
505 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100506 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800507 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
508 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800509 -c "NamedGroup: x25519 ( 1d )" \
510 -c "Verifying peer X.509 certificate... ok" \
511 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800512
Jerry Yu31018ad2021-11-26 20:36:17 +0800513requires_gnutls_tls1_3
514requires_gnutls_next_no_ticket
515requires_gnutls_next_disable_tls13_compat
516requires_config_enabled MBEDTLS_DEBUG_C
517requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100518requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100519requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200520run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100521 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100522 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800523 0 \
524 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100525 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800526 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
527 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800528 -c "NamedGroup: x25519 ( 1d )" \
529 -c "Verifying peer X.509 certificate... ok" \
530 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800531
Jerry Yu31018ad2021-11-26 20:36:17 +0800532requires_openssl_tls1_3
533requires_config_enabled MBEDTLS_DEBUG_C
534requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100535requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100536requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200537run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100538 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100539 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800540 0 \
541 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100542 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800543 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
544 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800545 -c "NamedGroup: x448 ( 1e )" \
546 -c "Verifying peer X.509 certificate... ok" \
547 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800548
Jerry Yu31018ad2021-11-26 20:36:17 +0800549requires_gnutls_tls1_3
550requires_gnutls_next_no_ticket
551requires_gnutls_next_disable_tls13_compat
552requires_config_enabled MBEDTLS_DEBUG_C
553requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100554requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100555requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200556run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100557 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100558 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800559 0 \
560 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100561 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800562 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
563 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800564 -c "NamedGroup: x448 ( 1e )" \
565 -c "Verifying peer X.509 certificate... ok" \
566 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800567
Jerry Yu31018ad2021-11-26 20:36:17 +0800568requires_openssl_tls1_3
569requires_config_enabled MBEDTLS_DEBUG_C
570requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100571requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100572requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800573requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200574run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100575 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100576 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800577 0 \
578 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100579 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800580 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
581 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800582 -c "NamedGroup: secp256r1 ( 17 )" \
583 -c "Verifying peer X.509 certificate... ok" \
584 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800585
Jerry Yu31018ad2021-11-26 20:36:17 +0800586requires_gnutls_tls1_3
587requires_gnutls_next_no_ticket
588requires_gnutls_next_disable_tls13_compat
589requires_config_enabled MBEDTLS_DEBUG_C
590requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100591requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100592requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800593requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200594run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100595 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP256R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100596 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800597 0 \
598 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100599 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800600 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
601 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800602 -c "NamedGroup: secp256r1 ( 17 )" \
603 -c "Verifying peer X.509 certificate... ok" \
604 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800605
Jerry Yu31018ad2021-11-26 20:36:17 +0800606requires_openssl_tls1_3
607requires_config_enabled MBEDTLS_DEBUG_C
608requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100609requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100610requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800611requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200612run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100613 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100614 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800615 0 \
616 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100617 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800618 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
619 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800620 -c "NamedGroup: secp384r1 ( 18 )" \
621 -c "Verifying peer X.509 certificate... ok" \
622 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800623
Jerry Yu31018ad2021-11-26 20:36:17 +0800624requires_gnutls_tls1_3
625requires_gnutls_next_no_ticket
626requires_gnutls_next_disable_tls13_compat
627requires_config_enabled MBEDTLS_DEBUG_C
628requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100629requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100630requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800631requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200632run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100633 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP384R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100634 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800635 0 \
636 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100637 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800638 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
639 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800640 -c "NamedGroup: secp384r1 ( 18 )" \
641 -c "Verifying peer X.509 certificate... ok" \
642 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800643
Jerry Yu31018ad2021-11-26 20:36:17 +0800644requires_openssl_tls1_3
645requires_config_enabled MBEDTLS_DEBUG_C
646requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100647requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100648requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800649requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200650run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100651 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100652 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800653 0 \
654 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100655 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800656 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
657 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800658 -c "NamedGroup: secp521r1 ( 19 )" \
659 -c "Verifying peer X.509 certificate... ok" \
660 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800661
Jerry Yu31018ad2021-11-26 20:36:17 +0800662requires_gnutls_tls1_3
663requires_gnutls_next_no_ticket
664requires_gnutls_next_disable_tls13_compat
665requires_config_enabled MBEDTLS_DEBUG_C
666requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100667requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100668requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800669requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200670run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100671 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-SECP521R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100672 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800673 0 \
674 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100675 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800676 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
677 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800678 -c "NamedGroup: secp521r1 ( 19 )" \
679 -c "Verifying peer X.509 certificate... ok" \
680 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800681
Jerry Yu31018ad2021-11-26 20:36:17 +0800682requires_openssl_tls1_3
683requires_config_enabled MBEDTLS_DEBUG_C
684requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100685requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100686requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800687requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200688run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100689 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100690 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800691 0 \
692 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100693 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800694 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
695 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800696 -c "NamedGroup: x25519 ( 1d )" \
697 -c "Verifying peer X.509 certificate... ok" \
698 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800699
Jerry Yu31018ad2021-11-26 20:36:17 +0800700requires_gnutls_tls1_3
701requires_gnutls_next_no_ticket
702requires_gnutls_next_disable_tls13_compat
703requires_config_enabled MBEDTLS_DEBUG_C
704requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100705requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100706requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800707requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200708run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100709 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X25519:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100710 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800711 0 \
712 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100713 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800714 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
715 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800716 -c "NamedGroup: x25519 ( 1d )" \
717 -c "Verifying peer X.509 certificate... ok" \
718 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800719
Jerry Yu31018ad2021-11-26 20:36:17 +0800720requires_openssl_tls1_3
721requires_config_enabled MBEDTLS_DEBUG_C
722requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100723requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100724requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800725requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200726run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100727 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100728 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800729 0 \
730 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100731 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800732 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
733 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800734 -c "NamedGroup: x448 ( 1e )" \
735 -c "Verifying peer X.509 certificate... ok" \
736 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800737
Jerry Yu31018ad2021-11-26 20:36:17 +0800738requires_gnutls_tls1_3
739requires_gnutls_next_no_ticket
740requires_gnutls_next_disable_tls13_compat
741requires_config_enabled MBEDTLS_DEBUG_C
742requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100743requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100744requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +0800745requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +0200746run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100747 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-GCM:+GROUP-X448:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100748 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800749 0 \
750 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100751 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800752 -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
753 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800754 -c "NamedGroup: x448 ( 1e )" \
755 -c "Verifying peer X.509 certificate... ok" \
756 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800757
Jerry Yu31018ad2021-11-26 20:36:17 +0800758requires_openssl_tls1_3
759requires_config_enabled MBEDTLS_DEBUG_C
760requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100761requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100762requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200763run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100764 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100765 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800766 0 \
767 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100768 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800769 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
770 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800771 -c "NamedGroup: secp256r1 ( 17 )" \
772 -c "Verifying peer X.509 certificate... ok" \
773 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800774
Jerry Yu31018ad2021-11-26 20:36:17 +0800775requires_gnutls_tls1_3
776requires_gnutls_next_no_ticket
777requires_gnutls_next_disable_tls13_compat
778requires_config_enabled MBEDTLS_DEBUG_C
779requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100780requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100781requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200782run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100783 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP256R1:+SHA384:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100784 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800785 0 \
786 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100787 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800788 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
789 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800790 -c "NamedGroup: secp256r1 ( 17 )" \
791 -c "Verifying peer X.509 certificate... ok" \
792 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800793
Jerry Yu31018ad2021-11-26 20:36:17 +0800794requires_openssl_tls1_3
795requires_config_enabled MBEDTLS_DEBUG_C
796requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100797requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100798requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200799run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100800 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100801 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800802 0 \
803 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100804 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800805 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
806 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800807 -c "NamedGroup: secp384r1 ( 18 )" \
808 -c "Verifying peer X.509 certificate... ok" \
809 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800810
Jerry Yu31018ad2021-11-26 20:36:17 +0800811requires_gnutls_tls1_3
812requires_gnutls_next_no_ticket
813requires_gnutls_next_disable_tls13_compat
814requires_config_enabled MBEDTLS_DEBUG_C
815requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100816requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100817requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200818run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100819 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP384R1:+SHA384:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100820 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800821 0 \
822 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100823 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800824 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
825 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800826 -c "NamedGroup: secp384r1 ( 18 )" \
827 -c "Verifying peer X.509 certificate... ok" \
828 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800829
Jerry Yu31018ad2021-11-26 20:36:17 +0800830requires_openssl_tls1_3
831requires_config_enabled MBEDTLS_DEBUG_C
832requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100833requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100834requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200835run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100836 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100837 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800838 0 \
839 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100840 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800841 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
842 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800843 -c "NamedGroup: secp521r1 ( 19 )" \
844 -c "Verifying peer X.509 certificate... ok" \
845 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800846
Jerry Yu31018ad2021-11-26 20:36:17 +0800847requires_gnutls_tls1_3
848requires_gnutls_next_no_ticket
849requires_gnutls_next_disable_tls13_compat
850requires_config_enabled MBEDTLS_DEBUG_C
851requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100852requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100853requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200854run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100855 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP521R1:+SHA384:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100856 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800857 0 \
858 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100859 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800860 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
861 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800862 -c "NamedGroup: secp521r1 ( 19 )" \
863 -c "Verifying peer X.509 certificate... ok" \
864 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800865
Jerry Yu31018ad2021-11-26 20:36:17 +0800866requires_openssl_tls1_3
867requires_config_enabled MBEDTLS_DEBUG_C
868requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100869requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100870requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200871run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100872 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100873 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800874 0 \
875 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100876 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800877 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
878 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800879 -c "NamedGroup: x25519 ( 1d )" \
880 -c "Verifying peer X.509 certificate... ok" \
881 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800882
Jerry Yu31018ad2021-11-26 20:36:17 +0800883requires_gnutls_tls1_3
884requires_gnutls_next_no_ticket
885requires_gnutls_next_disable_tls13_compat
886requires_config_enabled MBEDTLS_DEBUG_C
887requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100888requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200890run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100891 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X25519:+SHA384:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100892 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800893 0 \
894 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100895 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800896 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
897 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800898 -c "NamedGroup: x25519 ( 1d )" \
899 -c "Verifying peer X.509 certificate... ok" \
900 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800901
Jerry Yu31018ad2021-11-26 20:36:17 +0800902requires_openssl_tls1_3
903requires_config_enabled MBEDTLS_DEBUG_C
904requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100905requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100906requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200907run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100908 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100909 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800910 0 \
911 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100912 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800913 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
914 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800915 -c "NamedGroup: x448 ( 1e )" \
916 -c "Verifying peer X.509 certificate... ok" \
917 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800918
Jerry Yu31018ad2021-11-26 20:36:17 +0800919requires_gnutls_tls1_3
920requires_gnutls_next_no_ticket
921requires_gnutls_next_disable_tls13_compat
922requires_config_enabled MBEDTLS_DEBUG_C
923requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100924requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100925requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200926run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100927 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X448:+SHA384:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100928 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800929 0 \
930 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100931 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800932 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
933 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800934 -c "NamedGroup: x448 ( 1e )" \
935 -c "Verifying peer X.509 certificate... ok" \
936 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800937
Jerry Yu31018ad2021-11-26 20:36:17 +0800938requires_openssl_tls1_3
939requires_config_enabled MBEDTLS_DEBUG_C
940requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100941requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100942requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200943run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100944 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100945 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800946 0 \
947 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100948 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800949 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
950 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800951 -c "NamedGroup: secp256r1 ( 17 )" \
952 -c "Verifying peer X.509 certificate... ok" \
953 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800954
Jerry Yu31018ad2021-11-26 20:36:17 +0800955requires_gnutls_tls1_3
956requires_gnutls_next_no_ticket
957requires_gnutls_next_disable_tls13_compat
958requires_config_enabled MBEDTLS_DEBUG_C
959requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100960requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100961requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200962run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100963 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP256R1:+SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100964 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800965 0 \
966 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100967 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800968 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
969 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800970 -c "NamedGroup: secp256r1 ( 17 )" \
971 -c "Verifying peer X.509 certificate... ok" \
972 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800973
Jerry Yu31018ad2021-11-26 20:36:17 +0800974requires_openssl_tls1_3
975requires_config_enabled MBEDTLS_DEBUG_C
976requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100977requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100978requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200979run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100980 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100981 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800982 0 \
983 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +0100984 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +0800985 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
986 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +0800987 -c "NamedGroup: secp384r1 ( 18 )" \
988 -c "Verifying peer X.509 certificate... ok" \
989 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +0800990
Jerry Yu31018ad2021-11-26 20:36:17 +0800991requires_gnutls_tls1_3
992requires_gnutls_next_no_ticket
993requires_gnutls_next_disable_tls13_compat
994requires_config_enabled MBEDTLS_DEBUG_C
995requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +0100996requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +0100997requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +0200998run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +0100999 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP384R1:+SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001000 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001001 0 \
1002 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001003 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001004 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1005 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001006 -c "NamedGroup: secp384r1 ( 18 )" \
1007 -c "Verifying peer X.509 certificate... ok" \
1008 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001009
Jerry Yu31018ad2021-11-26 20:36:17 +08001010requires_openssl_tls1_3
1011requires_config_enabled MBEDTLS_DEBUG_C
1012requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001013requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001014requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001015run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001016 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001017 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001018 0 \
1019 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001020 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001021 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1022 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001023 -c "NamedGroup: secp521r1 ( 19 )" \
1024 -c "Verifying peer X.509 certificate... ok" \
1025 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001026
Jerry Yu31018ad2021-11-26 20:36:17 +08001027requires_gnutls_tls1_3
1028requires_gnutls_next_no_ticket
1029requires_gnutls_next_disable_tls13_compat
1030requires_config_enabled MBEDTLS_DEBUG_C
1031requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001032requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001033requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001034run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001035 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP521R1:+SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001036 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001037 0 \
1038 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001039 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001040 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1041 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001042 -c "NamedGroup: secp521r1 ( 19 )" \
1043 -c "Verifying peer X.509 certificate... ok" \
1044 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001045
Jerry Yu31018ad2021-11-26 20:36:17 +08001046requires_openssl_tls1_3
1047requires_config_enabled MBEDTLS_DEBUG_C
1048requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001049requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001050requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001051run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001052 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001053 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001054 0 \
1055 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001056 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001057 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1058 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001059 -c "NamedGroup: x25519 ( 1d )" \
1060 -c "Verifying peer X.509 certificate... ok" \
1061 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001062
Jerry Yu31018ad2021-11-26 20:36:17 +08001063requires_gnutls_tls1_3
1064requires_gnutls_next_no_ticket
1065requires_gnutls_next_disable_tls13_compat
1066requires_config_enabled MBEDTLS_DEBUG_C
1067requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001068requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001069requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001070run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001071 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X25519:+SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001072 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001073 0 \
1074 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001075 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001076 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1077 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001078 -c "NamedGroup: x25519 ( 1d )" \
1079 -c "Verifying peer X.509 certificate... ok" \
1080 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001081
Jerry Yu31018ad2021-11-26 20:36:17 +08001082requires_openssl_tls1_3
1083requires_config_enabled MBEDTLS_DEBUG_C
1084requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001085requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001086requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001087run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001088 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001089 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001090 0 \
1091 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001092 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001093 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1094 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001095 -c "NamedGroup: x448 ( 1e )" \
1096 -c "Verifying peer X.509 certificate... ok" \
1097 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001098
Jerry Yu31018ad2021-11-26 20:36:17 +08001099requires_gnutls_tls1_3
1100requires_gnutls_next_no_ticket
1101requires_gnutls_next_disable_tls13_compat
1102requires_config_enabled MBEDTLS_DEBUG_C
1103requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001104requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001105requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001106run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001107 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X448:+SHA384:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001108 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001109 0 \
1110 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001111 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001112 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1113 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001114 -c "NamedGroup: x448 ( 1e )" \
1115 -c "Verifying peer X.509 certificate... ok" \
1116 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001117
Jerry Yu31018ad2021-11-26 20:36:17 +08001118requires_openssl_tls1_3
1119requires_config_enabled MBEDTLS_DEBUG_C
1120requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001121requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001123run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001124 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001125 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001126 0 \
1127 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001128 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001129 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1130 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001131 -c "NamedGroup: secp256r1 ( 17 )" \
1132 -c "Verifying peer X.509 certificate... ok" \
1133 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001134
Jerry Yu31018ad2021-11-26 20:36:17 +08001135requires_gnutls_tls1_3
1136requires_gnutls_next_no_ticket
1137requires_gnutls_next_disable_tls13_compat
1138requires_config_enabled MBEDTLS_DEBUG_C
1139requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001140requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001142run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001143 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP256R1:+SHA384:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001144 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001145 0 \
1146 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001147 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001148 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1149 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001150 -c "NamedGroup: secp256r1 ( 17 )" \
1151 -c "Verifying peer X.509 certificate... ok" \
1152 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001153
Jerry Yu31018ad2021-11-26 20:36:17 +08001154requires_openssl_tls1_3
1155requires_config_enabled MBEDTLS_DEBUG_C
1156requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001157requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001159run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001160 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001161 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001162 0 \
1163 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001164 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001165 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1166 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001167 -c "NamedGroup: secp384r1 ( 18 )" \
1168 -c "Verifying peer X.509 certificate... ok" \
1169 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001170
Jerry Yu31018ad2021-11-26 20:36:17 +08001171requires_gnutls_tls1_3
1172requires_gnutls_next_no_ticket
1173requires_gnutls_next_disable_tls13_compat
1174requires_config_enabled MBEDTLS_DEBUG_C
1175requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001176requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001177requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001178run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001179 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP384R1:+SHA384:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001180 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001181 0 \
1182 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001183 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001184 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1185 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001186 -c "NamedGroup: secp384r1 ( 18 )" \
1187 -c "Verifying peer X.509 certificate... ok" \
1188 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001189
Jerry Yu31018ad2021-11-26 20:36:17 +08001190requires_openssl_tls1_3
1191requires_config_enabled MBEDTLS_DEBUG_C
1192requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001193requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001194requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001195run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001196 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001197 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001198 0 \
1199 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001200 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001201 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1202 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001203 -c "NamedGroup: secp521r1 ( 19 )" \
1204 -c "Verifying peer X.509 certificate... ok" \
1205 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001206
Jerry Yu31018ad2021-11-26 20:36:17 +08001207requires_gnutls_tls1_3
1208requires_gnutls_next_no_ticket
1209requires_gnutls_next_disable_tls13_compat
1210requires_config_enabled MBEDTLS_DEBUG_C
1211requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001212requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001214run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001215 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP521R1:+SHA384:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001216 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001217 0 \
1218 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001219 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001220 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1221 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001222 -c "NamedGroup: secp521r1 ( 19 )" \
1223 -c "Verifying peer X.509 certificate... ok" \
1224 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001225
Jerry Yu31018ad2021-11-26 20:36:17 +08001226requires_openssl_tls1_3
1227requires_config_enabled MBEDTLS_DEBUG_C
1228requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001229requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001230requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001231run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001232 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001233 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001234 0 \
1235 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001236 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001237 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1238 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001239 -c "NamedGroup: x25519 ( 1d )" \
1240 -c "Verifying peer X.509 certificate... ok" \
1241 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001242
Jerry Yu31018ad2021-11-26 20:36:17 +08001243requires_gnutls_tls1_3
1244requires_gnutls_next_no_ticket
1245requires_gnutls_next_disable_tls13_compat
1246requires_config_enabled MBEDTLS_DEBUG_C
1247requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001248requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001249requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001250run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001251 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X25519:+SHA384:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001252 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001253 0 \
1254 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001255 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001256 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1257 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001258 -c "NamedGroup: x25519 ( 1d )" \
1259 -c "Verifying peer X.509 certificate... ok" \
1260 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001261
Jerry Yu31018ad2021-11-26 20:36:17 +08001262requires_openssl_tls1_3
1263requires_config_enabled MBEDTLS_DEBUG_C
1264requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001265requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001266requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001267run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001268 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001269 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001270 0 \
1271 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001272 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001273 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1274 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001275 -c "NamedGroup: x448 ( 1e )" \
1276 -c "Verifying peer X.509 certificate... ok" \
1277 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001278
Jerry Yu31018ad2021-11-26 20:36:17 +08001279requires_gnutls_tls1_3
1280requires_gnutls_next_no_ticket
1281requires_gnutls_next_disable_tls13_compat
1282requires_config_enabled MBEDTLS_DEBUG_C
1283requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001284requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001286run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001287 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X448:+SHA384:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001288 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001289 0 \
1290 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001291 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001292 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1293 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001294 -c "NamedGroup: x448 ( 1e )" \
1295 -c "Verifying peer X.509 certificate... ok" \
1296 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001297
Jerry Yu31018ad2021-11-26 20:36:17 +08001298requires_openssl_tls1_3
1299requires_config_enabled MBEDTLS_DEBUG_C
1300requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001301requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001303requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001304run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001305 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001306 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001307 0 \
1308 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001309 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001310 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1311 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001312 -c "NamedGroup: secp256r1 ( 17 )" \
1313 -c "Verifying peer X.509 certificate... ok" \
1314 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001315
Jerry Yu31018ad2021-11-26 20:36:17 +08001316requires_gnutls_tls1_3
1317requires_gnutls_next_no_ticket
1318requires_gnutls_next_disable_tls13_compat
1319requires_config_enabled MBEDTLS_DEBUG_C
1320requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001321requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001322requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001323requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001324run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001325 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP256R1:+SHA384:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001326 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001327 0 \
1328 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001329 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001330 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1331 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001332 -c "NamedGroup: secp256r1 ( 17 )" \
1333 -c "Verifying peer X.509 certificate... ok" \
1334 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001335
Jerry Yu31018ad2021-11-26 20:36:17 +08001336requires_openssl_tls1_3
1337requires_config_enabled MBEDTLS_DEBUG_C
1338requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001339requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001340requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001341requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001342run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001343 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001344 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001345 0 \
1346 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001347 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001348 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1349 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001350 -c "NamedGroup: secp384r1 ( 18 )" \
1351 -c "Verifying peer X.509 certificate... ok" \
1352 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001353
Jerry Yu31018ad2021-11-26 20:36:17 +08001354requires_gnutls_tls1_3
1355requires_gnutls_next_no_ticket
1356requires_gnutls_next_disable_tls13_compat
1357requires_config_enabled MBEDTLS_DEBUG_C
1358requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001359requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001361requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001362run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001363 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP384R1:+SHA384:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001364 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001365 0 \
1366 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001367 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001368 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1369 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001370 -c "NamedGroup: secp384r1 ( 18 )" \
1371 -c "Verifying peer X.509 certificate... ok" \
1372 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001373
Jerry Yu31018ad2021-11-26 20:36:17 +08001374requires_openssl_tls1_3
1375requires_config_enabled MBEDTLS_DEBUG_C
1376requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001377requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001378requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001379requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001380run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001381 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001382 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001383 0 \
1384 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001385 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001386 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1387 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001388 -c "NamedGroup: secp521r1 ( 19 )" \
1389 -c "Verifying peer X.509 certificate... ok" \
1390 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001391
Jerry Yu31018ad2021-11-26 20:36:17 +08001392requires_gnutls_tls1_3
1393requires_gnutls_next_no_ticket
1394requires_gnutls_next_disable_tls13_compat
1395requires_config_enabled MBEDTLS_DEBUG_C
1396requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001397requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001398requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001399requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001400run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001401 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-SECP521R1:+SHA384:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001402 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001403 0 \
1404 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001405 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001406 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1407 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001408 -c "NamedGroup: secp521r1 ( 19 )" \
1409 -c "Verifying peer X.509 certificate... ok" \
1410 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001411
Jerry Yu31018ad2021-11-26 20:36:17 +08001412requires_openssl_tls1_3
1413requires_config_enabled MBEDTLS_DEBUG_C
1414requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001415requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001416requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001417requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001418run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001419 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001420 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001421 0 \
1422 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001423 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001424 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1425 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001426 -c "NamedGroup: x25519 ( 1d )" \
1427 -c "Verifying peer X.509 certificate... ok" \
1428 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001429
Jerry Yu31018ad2021-11-26 20:36:17 +08001430requires_gnutls_tls1_3
1431requires_gnutls_next_no_ticket
1432requires_gnutls_next_disable_tls13_compat
1433requires_config_enabled MBEDTLS_DEBUG_C
1434requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001435requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001436requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001437requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001438run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001439 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X25519:+SHA384:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001440 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001441 0 \
1442 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001443 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001444 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1445 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001446 -c "NamedGroup: x25519 ( 1d )" \
1447 -c "Verifying peer X.509 certificate... ok" \
1448 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001449
Jerry Yu31018ad2021-11-26 20:36:17 +08001450requires_openssl_tls1_3
1451requires_config_enabled MBEDTLS_DEBUG_C
1452requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001453requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001454requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001455requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001456run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001457 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001458 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001459 0 \
1460 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001461 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001462 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1463 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001464 -c "NamedGroup: x448 ( 1e )" \
1465 -c "Verifying peer X.509 certificate... ok" \
1466 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001467
Jerry Yu31018ad2021-11-26 20:36:17 +08001468requires_gnutls_tls1_3
1469requires_gnutls_next_no_ticket
1470requires_gnutls_next_disable_tls13_compat
1471requires_config_enabled MBEDTLS_DEBUG_C
1472requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001473requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001474requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08001475requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02001476run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001477 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-256-GCM:+GROUP-X448:+SHA384:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001478 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001479 0 \
1480 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001481 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001482 -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
1483 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001484 -c "NamedGroup: x448 ( 1e )" \
1485 -c "Verifying peer X.509 certificate... ok" \
1486 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001487
Jerry Yu31018ad2021-11-26 20:36:17 +08001488requires_openssl_tls1_3
1489requires_config_enabled MBEDTLS_DEBUG_C
1490requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001491requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001492requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001493run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001494 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001495 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001496 0 \
1497 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001498 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001499 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1500 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001501 -c "NamedGroup: secp256r1 ( 17 )" \
1502 -c "Verifying peer X.509 certificate... ok" \
1503 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001504
Jerry Yu31018ad2021-11-26 20:36:17 +08001505requires_gnutls_tls1_3
1506requires_gnutls_next_no_ticket
1507requires_gnutls_next_disable_tls13_compat
1508requires_config_enabled MBEDTLS_DEBUG_C
1509requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001510requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001511requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001512run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001513 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001514 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001515 0 \
1516 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001517 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001518 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1519 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001520 -c "NamedGroup: secp256r1 ( 17 )" \
1521 -c "Verifying peer X.509 certificate... ok" \
1522 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001523
Jerry Yu31018ad2021-11-26 20:36:17 +08001524requires_openssl_tls1_3
1525requires_config_enabled MBEDTLS_DEBUG_C
1526requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001527requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001528requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001529run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001530 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001531 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001532 0 \
1533 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001534 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001535 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1536 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001537 -c "NamedGroup: secp384r1 ( 18 )" \
1538 -c "Verifying peer X.509 certificate... ok" \
1539 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001540
Jerry Yu31018ad2021-11-26 20:36:17 +08001541requires_gnutls_tls1_3
1542requires_gnutls_next_no_ticket
1543requires_gnutls_next_disable_tls13_compat
1544requires_config_enabled MBEDTLS_DEBUG_C
1545requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001546requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001548run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001549 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001550 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001551 0 \
1552 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001553 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001554 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1555 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001556 -c "NamedGroup: secp384r1 ( 18 )" \
1557 -c "Verifying peer X.509 certificate... ok" \
1558 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001559
Jerry Yu31018ad2021-11-26 20:36:17 +08001560requires_openssl_tls1_3
1561requires_config_enabled MBEDTLS_DEBUG_C
1562requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001563requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001565run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001566 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001567 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001568 0 \
1569 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001570 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001571 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1572 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001573 -c "NamedGroup: secp521r1 ( 19 )" \
1574 -c "Verifying peer X.509 certificate... ok" \
1575 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001576
Jerry Yu31018ad2021-11-26 20:36:17 +08001577requires_gnutls_tls1_3
1578requires_gnutls_next_no_ticket
1579requires_gnutls_next_disable_tls13_compat
1580requires_config_enabled MBEDTLS_DEBUG_C
1581requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001582requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001583requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001584run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001585 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001586 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001587 0 \
1588 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001589 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001590 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1591 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001592 -c "NamedGroup: secp521r1 ( 19 )" \
1593 -c "Verifying peer X.509 certificate... ok" \
1594 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001595
Jerry Yu31018ad2021-11-26 20:36:17 +08001596requires_openssl_tls1_3
1597requires_config_enabled MBEDTLS_DEBUG_C
1598requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001599requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001600requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001601run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001602 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001603 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001604 0 \
1605 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001606 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001607 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1608 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001609 -c "NamedGroup: x25519 ( 1d )" \
1610 -c "Verifying peer X.509 certificate... ok" \
1611 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001612
Jerry Yu31018ad2021-11-26 20:36:17 +08001613requires_gnutls_tls1_3
1614requires_gnutls_next_no_ticket
1615requires_gnutls_next_disable_tls13_compat
1616requires_config_enabled MBEDTLS_DEBUG_C
1617requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001618requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001619requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001620run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001621 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001622 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001623 0 \
1624 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001625 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001626 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1627 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001628 -c "NamedGroup: x25519 ( 1d )" \
1629 -c "Verifying peer X.509 certificate... ok" \
1630 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001631
Jerry Yu31018ad2021-11-26 20:36:17 +08001632requires_openssl_tls1_3
1633requires_config_enabled MBEDTLS_DEBUG_C
1634requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001635requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001636requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001637run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001638 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001639 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001640 0 \
1641 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001642 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001643 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1644 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001645 -c "NamedGroup: x448 ( 1e )" \
1646 -c "Verifying peer X.509 certificate... ok" \
1647 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001648
Jerry Yu31018ad2021-11-26 20:36:17 +08001649requires_gnutls_tls1_3
1650requires_gnutls_next_no_ticket
1651requires_gnutls_next_disable_tls13_compat
1652requires_config_enabled MBEDTLS_DEBUG_C
1653requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001654requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001655requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001656run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001657 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001658 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001659 0 \
1660 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001661 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001662 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1663 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001664 -c "NamedGroup: x448 ( 1e )" \
1665 -c "Verifying peer X.509 certificate... ok" \
1666 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001667
Jerry Yu31018ad2021-11-26 20:36:17 +08001668requires_openssl_tls1_3
1669requires_config_enabled MBEDTLS_DEBUG_C
1670requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001671requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001672requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001673run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001674 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001675 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001676 0 \
1677 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001678 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001679 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1680 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001681 -c "NamedGroup: secp256r1 ( 17 )" \
1682 -c "Verifying peer X.509 certificate... ok" \
1683 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001684
Jerry Yu31018ad2021-11-26 20:36:17 +08001685requires_gnutls_tls1_3
1686requires_gnutls_next_no_ticket
1687requires_gnutls_next_disable_tls13_compat
1688requires_config_enabled MBEDTLS_DEBUG_C
1689requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001690requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001691requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001692run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001693 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001694 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001695 0 \
1696 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001697 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001698 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1699 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001700 -c "NamedGroup: secp256r1 ( 17 )" \
1701 -c "Verifying peer X.509 certificate... ok" \
1702 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001703
Jerry Yu31018ad2021-11-26 20:36:17 +08001704requires_openssl_tls1_3
1705requires_config_enabled MBEDTLS_DEBUG_C
1706requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001707requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001708requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001709run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001710 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001711 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001712 0 \
1713 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001714 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001715 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1716 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001717 -c "NamedGroup: secp384r1 ( 18 )" \
1718 -c "Verifying peer X.509 certificate... ok" \
1719 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001720
Jerry Yu31018ad2021-11-26 20:36:17 +08001721requires_gnutls_tls1_3
1722requires_gnutls_next_no_ticket
1723requires_gnutls_next_disable_tls13_compat
1724requires_config_enabled MBEDTLS_DEBUG_C
1725requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001726requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001728run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001729 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001730 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001731 0 \
1732 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001733 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001734 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1735 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001736 -c "NamedGroup: secp384r1 ( 18 )" \
1737 -c "Verifying peer X.509 certificate... ok" \
1738 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001739
Jerry Yu31018ad2021-11-26 20:36:17 +08001740requires_openssl_tls1_3
1741requires_config_enabled MBEDTLS_DEBUG_C
1742requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001743requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001744requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001745run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001746 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001747 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001748 0 \
1749 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001750 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001751 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1752 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001753 -c "NamedGroup: secp521r1 ( 19 )" \
1754 -c "Verifying peer X.509 certificate... ok" \
1755 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001756
Jerry Yu31018ad2021-11-26 20:36:17 +08001757requires_gnutls_tls1_3
1758requires_gnutls_next_no_ticket
1759requires_gnutls_next_disable_tls13_compat
1760requires_config_enabled MBEDTLS_DEBUG_C
1761requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001762requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001763requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001764run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001765 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001766 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001767 0 \
1768 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001769 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001770 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1771 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001772 -c "NamedGroup: secp521r1 ( 19 )" \
1773 -c "Verifying peer X.509 certificate... ok" \
1774 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001775
Jerry Yu31018ad2021-11-26 20:36:17 +08001776requires_openssl_tls1_3
1777requires_config_enabled MBEDTLS_DEBUG_C
1778requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001779requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001780requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001781run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001782 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001783 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001784 0 \
1785 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001786 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001787 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1788 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001789 -c "NamedGroup: x25519 ( 1d )" \
1790 -c "Verifying peer X.509 certificate... ok" \
1791 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001792
Jerry Yu31018ad2021-11-26 20:36:17 +08001793requires_gnutls_tls1_3
1794requires_gnutls_next_no_ticket
1795requires_gnutls_next_disable_tls13_compat
1796requires_config_enabled MBEDTLS_DEBUG_C
1797requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001798requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001799requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001800run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001801 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001802 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001803 0 \
1804 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001805 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001806 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1807 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001808 -c "NamedGroup: x25519 ( 1d )" \
1809 -c "Verifying peer X.509 certificate... ok" \
1810 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001811
Jerry Yu31018ad2021-11-26 20:36:17 +08001812requires_openssl_tls1_3
1813requires_config_enabled MBEDTLS_DEBUG_C
1814requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001815requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001817run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001818 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001819 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001820 0 \
1821 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001822 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001823 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1824 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001825 -c "NamedGroup: x448 ( 1e )" \
1826 -c "Verifying peer X.509 certificate... ok" \
1827 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001828
Jerry Yu31018ad2021-11-26 20:36:17 +08001829requires_gnutls_tls1_3
1830requires_gnutls_next_no_ticket
1831requires_gnutls_next_disable_tls13_compat
1832requires_config_enabled MBEDTLS_DEBUG_C
1833requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001834requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001836run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001837 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001838 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001839 0 \
1840 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001841 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001842 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1843 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001844 -c "NamedGroup: x448 ( 1e )" \
1845 -c "Verifying peer X.509 certificate... ok" \
1846 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001847
Jerry Yu31018ad2021-11-26 20:36:17 +08001848requires_openssl_tls1_3
1849requires_config_enabled MBEDTLS_DEBUG_C
1850requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001853run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001854 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001855 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001856 0 \
1857 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001858 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001859 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1860 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001861 -c "NamedGroup: secp256r1 ( 17 )" \
1862 -c "Verifying peer X.509 certificate... ok" \
1863 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001864
Jerry Yu31018ad2021-11-26 20:36:17 +08001865requires_gnutls_tls1_3
1866requires_gnutls_next_no_ticket
1867requires_gnutls_next_disable_tls13_compat
1868requires_config_enabled MBEDTLS_DEBUG_C
1869requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001870requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001871requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001872run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001873 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001874 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001875 0 \
1876 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001877 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001878 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1879 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001880 -c "NamedGroup: secp256r1 ( 17 )" \
1881 -c "Verifying peer X.509 certificate... ok" \
1882 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001883
Jerry Yu31018ad2021-11-26 20:36:17 +08001884requires_openssl_tls1_3
1885requires_config_enabled MBEDTLS_DEBUG_C
1886requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001887requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001888requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001889run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001890 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001891 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001892 0 \
1893 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001894 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001895 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1896 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001897 -c "NamedGroup: secp384r1 ( 18 )" \
1898 -c "Verifying peer X.509 certificate... ok" \
1899 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001900
Jerry Yu31018ad2021-11-26 20:36:17 +08001901requires_gnutls_tls1_3
1902requires_gnutls_next_no_ticket
1903requires_gnutls_next_disable_tls13_compat
1904requires_config_enabled MBEDTLS_DEBUG_C
1905requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001906requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001907requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001908run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001909 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001910 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001911 0 \
1912 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001913 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001914 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1915 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001916 -c "NamedGroup: secp384r1 ( 18 )" \
1917 -c "Verifying peer X.509 certificate... ok" \
1918 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001919
Jerry Yu31018ad2021-11-26 20:36:17 +08001920requires_openssl_tls1_3
1921requires_config_enabled MBEDTLS_DEBUG_C
1922requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001923requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001924requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001925run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001926 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001927 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001928 0 \
1929 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001930 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001931 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1932 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001933 -c "NamedGroup: secp521r1 ( 19 )" \
1934 -c "Verifying peer X.509 certificate... ok" \
1935 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001936
Jerry Yu31018ad2021-11-26 20:36:17 +08001937requires_gnutls_tls1_3
1938requires_gnutls_next_no_ticket
1939requires_gnutls_next_disable_tls13_compat
1940requires_config_enabled MBEDTLS_DEBUG_C
1941requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001942requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001944run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001945 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001946 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001947 0 \
1948 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001949 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001950 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1951 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001952 -c "NamedGroup: secp521r1 ( 19 )" \
1953 -c "Verifying peer X.509 certificate... ok" \
1954 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001955
Jerry Yu31018ad2021-11-26 20:36:17 +08001956requires_openssl_tls1_3
1957requires_config_enabled MBEDTLS_DEBUG_C
1958requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001959requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001960requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001961run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001962 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001963 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001964 0 \
1965 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001966 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001967 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1968 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001969 -c "NamedGroup: x25519 ( 1d )" \
1970 -c "Verifying peer X.509 certificate... ok" \
1971 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001972
Jerry Yu31018ad2021-11-26 20:36:17 +08001973requires_gnutls_tls1_3
1974requires_gnutls_next_no_ticket
1975requires_gnutls_next_disable_tls13_compat
1976requires_config_enabled MBEDTLS_DEBUG_C
1977requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001978requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001979requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001980run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001981 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001982 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001983 0 \
1984 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001985 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08001986 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
1987 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08001988 -c "NamedGroup: x25519 ( 1d )" \
1989 -c "Verifying peer X.509 certificate... ok" \
1990 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08001991
Jerry Yu31018ad2021-11-26 20:36:17 +08001992requires_openssl_tls1_3
1993requires_config_enabled MBEDTLS_DEBUG_C
1994requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01001995requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01001996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02001997run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01001998 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01001999 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002000 0 \
2001 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002002 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002003 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2004 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002005 -c "NamedGroup: x448 ( 1e )" \
2006 -c "Verifying peer X.509 certificate... ok" \
2007 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002008
Jerry Yu31018ad2021-11-26 20:36:17 +08002009requires_gnutls_tls1_3
2010requires_gnutls_next_no_ticket
2011requires_gnutls_next_disable_tls13_compat
2012requires_config_enabled MBEDTLS_DEBUG_C
2013requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002014requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002015requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002016run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002017 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002018 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002019 0 \
2020 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002021 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002022 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2023 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002024 -c "NamedGroup: x448 ( 1e )" \
2025 -c "Verifying peer X.509 certificate... ok" \
2026 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002027
Jerry Yu31018ad2021-11-26 20:36:17 +08002028requires_openssl_tls1_3
2029requires_config_enabled MBEDTLS_DEBUG_C
2030requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002031requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002033requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002034run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002035 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002036 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002037 0 \
2038 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002039 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002040 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2041 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002042 -c "NamedGroup: secp256r1 ( 17 )" \
2043 -c "Verifying peer X.509 certificate... ok" \
2044 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002045
Jerry Yu31018ad2021-11-26 20:36:17 +08002046requires_gnutls_tls1_3
2047requires_gnutls_next_no_ticket
2048requires_gnutls_next_disable_tls13_compat
2049requires_config_enabled MBEDTLS_DEBUG_C
2050requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002051requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002052requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002053requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002054run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002055 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP256R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002056 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002057 0 \
2058 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002059 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002060 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2061 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002062 -c "NamedGroup: secp256r1 ( 17 )" \
2063 -c "Verifying peer X.509 certificate... ok" \
2064 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002065
Jerry Yu31018ad2021-11-26 20:36:17 +08002066requires_openssl_tls1_3
2067requires_config_enabled MBEDTLS_DEBUG_C
2068requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002069requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002070requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002071requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002072run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002073 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002074 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002075 0 \
2076 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002077 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002078 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2079 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002080 -c "NamedGroup: secp384r1 ( 18 )" \
2081 -c "Verifying peer X.509 certificate... ok" \
2082 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002083
Jerry Yu31018ad2021-11-26 20:36:17 +08002084requires_gnutls_tls1_3
2085requires_gnutls_next_no_ticket
2086requires_gnutls_next_disable_tls13_compat
2087requires_config_enabled MBEDTLS_DEBUG_C
2088requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002089requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002090requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002091requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002092run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002093 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP384R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002094 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002095 0 \
2096 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002097 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002098 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2099 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002100 -c "NamedGroup: secp384r1 ( 18 )" \
2101 -c "Verifying peer X.509 certificate... ok" \
2102 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002103
Jerry Yu31018ad2021-11-26 20:36:17 +08002104requires_openssl_tls1_3
2105requires_config_enabled MBEDTLS_DEBUG_C
2106requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002107requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002108requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002109requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002110run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002111 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002112 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002113 0 \
2114 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002115 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002116 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2117 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002118 -c "NamedGroup: secp521r1 ( 19 )" \
2119 -c "Verifying peer X.509 certificate... ok" \
2120 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002121
Jerry Yu31018ad2021-11-26 20:36:17 +08002122requires_gnutls_tls1_3
2123requires_gnutls_next_no_ticket
2124requires_gnutls_next_disable_tls13_compat
2125requires_config_enabled MBEDTLS_DEBUG_C
2126requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002127requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002128requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002129requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002130run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002131 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-SECP521R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002132 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002133 0 \
2134 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002135 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002136 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2137 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002138 -c "NamedGroup: secp521r1 ( 19 )" \
2139 -c "Verifying peer X.509 certificate... ok" \
2140 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002141
Jerry Yu31018ad2021-11-26 20:36:17 +08002142requires_openssl_tls1_3
2143requires_config_enabled MBEDTLS_DEBUG_C
2144requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002145requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002146requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002147requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002148run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002149 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002150 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002151 0 \
2152 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002153 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002154 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2155 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002156 -c "NamedGroup: x25519 ( 1d )" \
2157 -c "Verifying peer X.509 certificate... ok" \
2158 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002159
Jerry Yu31018ad2021-11-26 20:36:17 +08002160requires_gnutls_tls1_3
2161requires_gnutls_next_no_ticket
2162requires_gnutls_next_disable_tls13_compat
2163requires_config_enabled MBEDTLS_DEBUG_C
2164requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002165requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002166requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002167requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002168run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002169 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X25519:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002170 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002171 0 \
2172 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002173 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002174 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2175 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002176 -c "NamedGroup: x25519 ( 1d )" \
2177 -c "Verifying peer X.509 certificate... ok" \
2178 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002179
Jerry Yu31018ad2021-11-26 20:36:17 +08002180requires_openssl_tls1_3
2181requires_config_enabled MBEDTLS_DEBUG_C
2182requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002183requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002184requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002185requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002186run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002187 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002188 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002189 0 \
2190 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002191 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002192 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2193 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002194 -c "NamedGroup: x448 ( 1e )" \
2195 -c "Verifying peer X.509 certificate... ok" \
2196 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002197
Jerry Yu31018ad2021-11-26 20:36:17 +08002198requires_gnutls_tls1_3
2199requires_gnutls_next_no_ticket
2200requires_gnutls_next_disable_tls13_compat
2201requires_config_enabled MBEDTLS_DEBUG_C
2202requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002205requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002206run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002207 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+CHACHA20-POLY1305:+GROUP-X448:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002208 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002209 0 \
2210 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002211 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002212 -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
2213 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002214 -c "NamedGroup: x448 ( 1e )" \
2215 -c "Verifying peer X.509 certificate... ok" \
2216 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002217
Jerry Yu31018ad2021-11-26 20:36:17 +08002218requires_openssl_tls1_3
2219requires_config_enabled MBEDTLS_DEBUG_C
2220requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002221requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002222requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002223run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002224 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002225 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002226 0 \
2227 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002228 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002229 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2230 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002231 -c "NamedGroup: secp256r1 ( 17 )" \
2232 -c "Verifying peer X.509 certificate... ok" \
2233 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002234
Jerry Yu31018ad2021-11-26 20:36:17 +08002235requires_gnutls_tls1_3
2236requires_gnutls_next_no_ticket
2237requires_gnutls_next_disable_tls13_compat
2238requires_config_enabled MBEDTLS_DEBUG_C
2239requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002240requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002242run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002243 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002244 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002245 0 \
2246 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002247 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002248 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2249 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002250 -c "NamedGroup: secp256r1 ( 17 )" \
2251 -c "Verifying peer X.509 certificate... ok" \
2252 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002253
Jerry Yu31018ad2021-11-26 20:36:17 +08002254requires_openssl_tls1_3
2255requires_config_enabled MBEDTLS_DEBUG_C
2256requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002257requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002258requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002259run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002260 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002261 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002262 0 \
2263 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002264 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002265 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2266 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002267 -c "NamedGroup: secp384r1 ( 18 )" \
2268 -c "Verifying peer X.509 certificate... ok" \
2269 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002270
Jerry Yu31018ad2021-11-26 20:36:17 +08002271requires_gnutls_tls1_3
2272requires_gnutls_next_no_ticket
2273requires_gnutls_next_disable_tls13_compat
2274requires_config_enabled MBEDTLS_DEBUG_C
2275requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002276requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002277requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002278run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002279 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002280 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002281 0 \
2282 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002283 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002284 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2285 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002286 -c "NamedGroup: secp384r1 ( 18 )" \
2287 -c "Verifying peer X.509 certificate... ok" \
2288 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002289
Jerry Yu31018ad2021-11-26 20:36:17 +08002290requires_openssl_tls1_3
2291requires_config_enabled MBEDTLS_DEBUG_C
2292requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002293requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002294requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002295run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002296 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002297 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002298 0 \
2299 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002300 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002301 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2302 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002303 -c "NamedGroup: secp521r1 ( 19 )" \
2304 -c "Verifying peer X.509 certificate... ok" \
2305 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002306
Jerry Yu31018ad2021-11-26 20:36:17 +08002307requires_gnutls_tls1_3
2308requires_gnutls_next_no_ticket
2309requires_gnutls_next_disable_tls13_compat
2310requires_config_enabled MBEDTLS_DEBUG_C
2311requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002312requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002313requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002314run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002315 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002316 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002317 0 \
2318 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002319 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002320 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2321 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002322 -c "NamedGroup: secp521r1 ( 19 )" \
2323 -c "Verifying peer X.509 certificate... ok" \
2324 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002325
Jerry Yu31018ad2021-11-26 20:36:17 +08002326requires_openssl_tls1_3
2327requires_config_enabled MBEDTLS_DEBUG_C
2328requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002329requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002330requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002331run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002332 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002333 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002334 0 \
2335 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002336 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002337 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2338 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002339 -c "NamedGroup: x25519 ( 1d )" \
2340 -c "Verifying peer X.509 certificate... ok" \
2341 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002342
Jerry Yu31018ad2021-11-26 20:36:17 +08002343requires_gnutls_tls1_3
2344requires_gnutls_next_no_ticket
2345requires_gnutls_next_disable_tls13_compat
2346requires_config_enabled MBEDTLS_DEBUG_C
2347requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002348requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002349requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002350run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002351 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002352 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002353 0 \
2354 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002355 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002356 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2357 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002358 -c "NamedGroup: x25519 ( 1d )" \
2359 -c "Verifying peer X.509 certificate... ok" \
2360 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002361
Jerry Yu31018ad2021-11-26 20:36:17 +08002362requires_openssl_tls1_3
2363requires_config_enabled MBEDTLS_DEBUG_C
2364requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002365requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002367run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002368 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002369 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002370 0 \
2371 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002372 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002373 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2374 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002375 -c "NamedGroup: x448 ( 1e )" \
2376 -c "Verifying peer X.509 certificate... ok" \
2377 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002378
Jerry Yu31018ad2021-11-26 20:36:17 +08002379requires_gnutls_tls1_3
2380requires_gnutls_next_no_ticket
2381requires_gnutls_next_disable_tls13_compat
2382requires_config_enabled MBEDTLS_DEBUG_C
2383requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002384requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002385requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002386run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002387 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002388 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002389 0 \
2390 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002391 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002392 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2393 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002394 -c "NamedGroup: x448 ( 1e )" \
2395 -c "Verifying peer X.509 certificate... ok" \
2396 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002397
Jerry Yu31018ad2021-11-26 20:36:17 +08002398requires_openssl_tls1_3
2399requires_config_enabled MBEDTLS_DEBUG_C
2400requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002401requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002402requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002403run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002404 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002405 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002406 0 \
2407 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002408 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002409 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2410 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002411 -c "NamedGroup: secp256r1 ( 17 )" \
2412 -c "Verifying peer X.509 certificate... ok" \
2413 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002414
Jerry Yu31018ad2021-11-26 20:36:17 +08002415requires_gnutls_tls1_3
2416requires_gnutls_next_no_ticket
2417requires_gnutls_next_disable_tls13_compat
2418requires_config_enabled MBEDTLS_DEBUG_C
2419requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002420requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002421requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002422run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002423 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002424 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002425 0 \
2426 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002427 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002428 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2429 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002430 -c "NamedGroup: secp256r1 ( 17 )" \
2431 -c "Verifying peer X.509 certificate... ok" \
2432 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002433
Jerry Yu31018ad2021-11-26 20:36:17 +08002434requires_openssl_tls1_3
2435requires_config_enabled MBEDTLS_DEBUG_C
2436requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002437requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002438requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002439run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002440 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002441 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002442 0 \
2443 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002444 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002445 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2446 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002447 -c "NamedGroup: secp384r1 ( 18 )" \
2448 -c "Verifying peer X.509 certificate... ok" \
2449 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002450
Jerry Yu31018ad2021-11-26 20:36:17 +08002451requires_gnutls_tls1_3
2452requires_gnutls_next_no_ticket
2453requires_gnutls_next_disable_tls13_compat
2454requires_config_enabled MBEDTLS_DEBUG_C
2455requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002456requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002458run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002459 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002460 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002461 0 \
2462 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002463 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002464 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2465 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002466 -c "NamedGroup: secp384r1 ( 18 )" \
2467 -c "Verifying peer X.509 certificate... ok" \
2468 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002469
Jerry Yu31018ad2021-11-26 20:36:17 +08002470requires_openssl_tls1_3
2471requires_config_enabled MBEDTLS_DEBUG_C
2472requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002473requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002474requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002475run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002476 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002477 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002478 0 \
2479 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002480 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002481 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2482 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002483 -c "NamedGroup: secp521r1 ( 19 )" \
2484 -c "Verifying peer X.509 certificate... ok" \
2485 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002486
Jerry Yu31018ad2021-11-26 20:36:17 +08002487requires_gnutls_tls1_3
2488requires_gnutls_next_no_ticket
2489requires_gnutls_next_disable_tls13_compat
2490requires_config_enabled MBEDTLS_DEBUG_C
2491requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002492requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002493requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002494run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002495 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002496 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002497 0 \
2498 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002499 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002500 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2501 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002502 -c "NamedGroup: secp521r1 ( 19 )" \
2503 -c "Verifying peer X.509 certificate... ok" \
2504 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002505
Jerry Yu31018ad2021-11-26 20:36:17 +08002506requires_openssl_tls1_3
2507requires_config_enabled MBEDTLS_DEBUG_C
2508requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002509requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002510requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002511run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002512 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002513 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002514 0 \
2515 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002516 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002517 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2518 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002519 -c "NamedGroup: x25519 ( 1d )" \
2520 -c "Verifying peer X.509 certificate... ok" \
2521 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002522
Jerry Yu31018ad2021-11-26 20:36:17 +08002523requires_gnutls_tls1_3
2524requires_gnutls_next_no_ticket
2525requires_gnutls_next_disable_tls13_compat
2526requires_config_enabled MBEDTLS_DEBUG_C
2527requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002528requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002529requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002530run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002531 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002532 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002533 0 \
2534 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002535 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002536 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2537 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002538 -c "NamedGroup: x25519 ( 1d )" \
2539 -c "Verifying peer X.509 certificate... ok" \
2540 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002541
Jerry Yu31018ad2021-11-26 20:36:17 +08002542requires_openssl_tls1_3
2543requires_config_enabled MBEDTLS_DEBUG_C
2544requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002545requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002547run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002548 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002549 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002550 0 \
2551 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002552 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002553 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2554 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002555 -c "NamedGroup: x448 ( 1e )" \
2556 -c "Verifying peer X.509 certificate... ok" \
2557 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002558
Jerry Yu31018ad2021-11-26 20:36:17 +08002559requires_gnutls_tls1_3
2560requires_gnutls_next_no_ticket
2561requires_gnutls_next_disable_tls13_compat
2562requires_config_enabled MBEDTLS_DEBUG_C
2563requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002564requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002565requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002566run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002567 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002568 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002569 0 \
2570 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002571 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002572 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2573 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002574 -c "NamedGroup: x448 ( 1e )" \
2575 -c "Verifying peer X.509 certificate... ok" \
2576 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002577
Jerry Yu31018ad2021-11-26 20:36:17 +08002578requires_openssl_tls1_3
2579requires_config_enabled MBEDTLS_DEBUG_C
2580requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002581requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002583run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002584 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002585 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002586 0 \
2587 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002588 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002589 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2590 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002591 -c "NamedGroup: secp256r1 ( 17 )" \
2592 -c "Verifying peer X.509 certificate... ok" \
2593 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002594
Jerry Yu31018ad2021-11-26 20:36:17 +08002595requires_gnutls_tls1_3
2596requires_gnutls_next_no_ticket
2597requires_gnutls_next_disable_tls13_compat
2598requires_config_enabled MBEDTLS_DEBUG_C
2599requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002600requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002602run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002603 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002604 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002605 0 \
2606 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002607 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002608 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2609 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002610 -c "NamedGroup: secp256r1 ( 17 )" \
2611 -c "Verifying peer X.509 certificate... ok" \
2612 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002613
Jerry Yu31018ad2021-11-26 20:36:17 +08002614requires_openssl_tls1_3
2615requires_config_enabled MBEDTLS_DEBUG_C
2616requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002617requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002619run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002620 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002621 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002622 0 \
2623 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002624 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002625 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2626 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002627 -c "NamedGroup: secp384r1 ( 18 )" \
2628 -c "Verifying peer X.509 certificate... ok" \
2629 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002630
Jerry Yu31018ad2021-11-26 20:36:17 +08002631requires_gnutls_tls1_3
2632requires_gnutls_next_no_ticket
2633requires_gnutls_next_disable_tls13_compat
2634requires_config_enabled MBEDTLS_DEBUG_C
2635requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002636requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002638run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002639 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002640 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002641 0 \
2642 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002643 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002644 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2645 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002646 -c "NamedGroup: secp384r1 ( 18 )" \
2647 -c "Verifying peer X.509 certificate... ok" \
2648 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002649
Jerry Yu31018ad2021-11-26 20:36:17 +08002650requires_openssl_tls1_3
2651requires_config_enabled MBEDTLS_DEBUG_C
2652requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002653requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002655run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002656 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002657 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002658 0 \
2659 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002660 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002661 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2662 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002663 -c "NamedGroup: secp521r1 ( 19 )" \
2664 -c "Verifying peer X.509 certificate... ok" \
2665 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002666
Jerry Yu31018ad2021-11-26 20:36:17 +08002667requires_gnutls_tls1_3
2668requires_gnutls_next_no_ticket
2669requires_gnutls_next_disable_tls13_compat
2670requires_config_enabled MBEDTLS_DEBUG_C
2671requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002672requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002674run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002675 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002676 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002677 0 \
2678 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002679 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002680 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2681 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002682 -c "NamedGroup: secp521r1 ( 19 )" \
2683 -c "Verifying peer X.509 certificate... ok" \
2684 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002685
Jerry Yu31018ad2021-11-26 20:36:17 +08002686requires_openssl_tls1_3
2687requires_config_enabled MBEDTLS_DEBUG_C
2688requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002689requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002690requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002691run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002692 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002693 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002694 0 \
2695 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002696 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002697 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2698 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002699 -c "NamedGroup: x25519 ( 1d )" \
2700 -c "Verifying peer X.509 certificate... ok" \
2701 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002702
Jerry Yu31018ad2021-11-26 20:36:17 +08002703requires_gnutls_tls1_3
2704requires_gnutls_next_no_ticket
2705requires_gnutls_next_disable_tls13_compat
2706requires_config_enabled MBEDTLS_DEBUG_C
2707requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002708requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002709requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002710run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002711 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002712 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002713 0 \
2714 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002715 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002716 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2717 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002718 -c "NamedGroup: x25519 ( 1d )" \
2719 -c "Verifying peer X.509 certificate... ok" \
2720 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002721
Jerry Yu31018ad2021-11-26 20:36:17 +08002722requires_openssl_tls1_3
2723requires_config_enabled MBEDTLS_DEBUG_C
2724requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002725requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002726requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002727run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002728 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002729 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002730 0 \
2731 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002732 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002733 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2734 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002735 -c "NamedGroup: x448 ( 1e )" \
2736 -c "Verifying peer X.509 certificate... ok" \
2737 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002738
Jerry Yu31018ad2021-11-26 20:36:17 +08002739requires_gnutls_tls1_3
2740requires_gnutls_next_no_ticket
2741requires_gnutls_next_disable_tls13_compat
2742requires_config_enabled MBEDTLS_DEBUG_C
2743requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002744requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002745requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002746run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002747 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002748 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002749 0 \
2750 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002751 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002752 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2753 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002754 -c "NamedGroup: x448 ( 1e )" \
2755 -c "Verifying peer X.509 certificate... ok" \
2756 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002757
Jerry Yu31018ad2021-11-26 20:36:17 +08002758requires_openssl_tls1_3
2759requires_config_enabled MBEDTLS_DEBUG_C
2760requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002761requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002762requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002763requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002764run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002765 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002766 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002767 0 \
2768 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002769 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002770 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2771 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002772 -c "NamedGroup: secp256r1 ( 17 )" \
2773 -c "Verifying peer X.509 certificate... ok" \
2774 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002775
Jerry Yu31018ad2021-11-26 20:36:17 +08002776requires_gnutls_tls1_3
2777requires_gnutls_next_no_ticket
2778requires_gnutls_next_disable_tls13_compat
2779requires_config_enabled MBEDTLS_DEBUG_C
2780requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002781requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002782requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002783requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002784run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002785 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP256R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002786 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002787 0 \
2788 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002789 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002790 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2791 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002792 -c "NamedGroup: secp256r1 ( 17 )" \
2793 -c "Verifying peer X.509 certificate... ok" \
2794 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002795
Jerry Yu31018ad2021-11-26 20:36:17 +08002796requires_openssl_tls1_3
2797requires_config_enabled MBEDTLS_DEBUG_C
2798requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002799requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002800requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002801requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002802run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002803 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002804 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002805 0 \
2806 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002807 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002808 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2809 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002810 -c "NamedGroup: secp384r1 ( 18 )" \
2811 -c "Verifying peer X.509 certificate... ok" \
2812 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002813
Jerry Yu31018ad2021-11-26 20:36:17 +08002814requires_gnutls_tls1_3
2815requires_gnutls_next_no_ticket
2816requires_gnutls_next_disable_tls13_compat
2817requires_config_enabled MBEDTLS_DEBUG_C
2818requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002819requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002821requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002822run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002823 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP384R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002824 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002825 0 \
2826 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002827 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002828 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2829 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002830 -c "NamedGroup: secp384r1 ( 18 )" \
2831 -c "Verifying peer X.509 certificate... ok" \
2832 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002833
Jerry Yu31018ad2021-11-26 20:36:17 +08002834requires_openssl_tls1_3
2835requires_config_enabled MBEDTLS_DEBUG_C
2836requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002837requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002838requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002839requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002840run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002841 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002842 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002843 0 \
2844 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002845 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002846 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2847 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002848 -c "NamedGroup: secp521r1 ( 19 )" \
2849 -c "Verifying peer X.509 certificate... ok" \
2850 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002851
Jerry Yu31018ad2021-11-26 20:36:17 +08002852requires_gnutls_tls1_3
2853requires_gnutls_next_no_ticket
2854requires_gnutls_next_disable_tls13_compat
2855requires_config_enabled MBEDTLS_DEBUG_C
2856requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002857requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002858requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002859requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002860run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002861 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-SECP521R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002862 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002863 0 \
2864 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002865 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002866 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2867 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002868 -c "NamedGroup: secp521r1 ( 19 )" \
2869 -c "Verifying peer X.509 certificate... ok" \
2870 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002871
Jerry Yu31018ad2021-11-26 20:36:17 +08002872requires_openssl_tls1_3
2873requires_config_enabled MBEDTLS_DEBUG_C
2874requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002875requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002877requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002878run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002879 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002880 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002881 0 \
2882 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002883 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002884 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2885 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002886 -c "NamedGroup: x25519 ( 1d )" \
2887 -c "Verifying peer X.509 certificate... ok" \
2888 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002889
Jerry Yu31018ad2021-11-26 20:36:17 +08002890requires_gnutls_tls1_3
2891requires_gnutls_next_no_ticket
2892requires_gnutls_next_disable_tls13_compat
2893requires_config_enabled MBEDTLS_DEBUG_C
2894requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002895requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002896requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002897requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002898run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002899 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X25519:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002900 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002901 0 \
2902 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002903 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002904 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2905 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002906 -c "NamedGroup: x25519 ( 1d )" \
2907 -c "Verifying peer X.509 certificate... ok" \
2908 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002909
Jerry Yu31018ad2021-11-26 20:36:17 +08002910requires_openssl_tls1_3
2911requires_config_enabled MBEDTLS_DEBUG_C
2912requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002913requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002914requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002915requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002916run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002917 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002918 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002919 0 \
2920 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002921 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002922 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2923 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002924 -c "NamedGroup: x448 ( 1e )" \
2925 -c "Verifying peer X.509 certificate... ok" \
2926 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002927
Jerry Yu31018ad2021-11-26 20:36:17 +08002928requires_gnutls_tls1_3
2929requires_gnutls_next_no_ticket
2930requires_gnutls_next_disable_tls13_compat
2931requires_config_enabled MBEDTLS_DEBUG_C
2932requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002933requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002934requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08002935requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02002936run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002937 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM:+GROUP-X448:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002938 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002939 0 \
2940 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002941 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002942 -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
2943 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002944 -c "NamedGroup: x448 ( 1e )" \
2945 -c "Verifying peer X.509 certificate... ok" \
2946 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002947
Jerry Yu31018ad2021-11-26 20:36:17 +08002948requires_openssl_tls1_3
2949requires_config_enabled MBEDTLS_DEBUG_C
2950requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002951requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002952requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002953run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002954 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002955 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002956 0 \
2957 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002958 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002959 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
2960 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002961 -c "NamedGroup: secp256r1 ( 17 )" \
2962 -c "Verifying peer X.509 certificate... ok" \
2963 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002964
Jerry Yu31018ad2021-11-26 20:36:17 +08002965requires_gnutls_tls1_3
2966requires_gnutls_next_no_ticket
2967requires_gnutls_next_disable_tls13_compat
2968requires_config_enabled MBEDTLS_DEBUG_C
2969requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002972run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002973 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002974 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002975 0 \
2976 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002977 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002978 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
2979 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002980 -c "NamedGroup: secp256r1 ( 17 )" \
2981 -c "Verifying peer X.509 certificate... ok" \
2982 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08002983
Jerry Yu31018ad2021-11-26 20:36:17 +08002984requires_openssl_tls1_3
2985requires_config_enabled MBEDTLS_DEBUG_C
2986requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01002987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01002988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02002989run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01002990 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002991 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002992 0 \
2993 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01002994 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08002995 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
2996 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08002997 -c "NamedGroup: secp384r1 ( 18 )" \
2998 -c "Verifying peer X.509 certificate... ok" \
2999 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003000
Jerry Yu31018ad2021-11-26 20:36:17 +08003001requires_gnutls_tls1_3
3002requires_gnutls_next_no_ticket
3003requires_gnutls_next_disable_tls13_compat
3004requires_config_enabled MBEDTLS_DEBUG_C
3005requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003006requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003007requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003008run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003009 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003010 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003011 0 \
3012 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003013 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003014 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3015 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003016 -c "NamedGroup: secp384r1 ( 18 )" \
3017 -c "Verifying peer X.509 certificate... ok" \
3018 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003019
Jerry Yu31018ad2021-11-26 20:36:17 +08003020requires_openssl_tls1_3
3021requires_config_enabled MBEDTLS_DEBUG_C
3022requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003023requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003024requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003025run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003026 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003027 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003028 0 \
3029 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003030 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003031 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3032 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003033 -c "NamedGroup: secp521r1 ( 19 )" \
3034 -c "Verifying peer X.509 certificate... ok" \
3035 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003036
Jerry Yu31018ad2021-11-26 20:36:17 +08003037requires_gnutls_tls1_3
3038requires_gnutls_next_no_ticket
3039requires_gnutls_next_disable_tls13_compat
3040requires_config_enabled MBEDTLS_DEBUG_C
3041requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003042requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003043requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003044run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003045 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003046 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003047 0 \
3048 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003049 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003050 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3051 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003052 -c "NamedGroup: secp521r1 ( 19 )" \
3053 -c "Verifying peer X.509 certificate... ok" \
3054 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003055
Jerry Yu31018ad2021-11-26 20:36:17 +08003056requires_openssl_tls1_3
3057requires_config_enabled MBEDTLS_DEBUG_C
3058requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003059requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003060requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003061run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003062 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003063 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003064 0 \
3065 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003066 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003067 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3068 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003069 -c "NamedGroup: x25519 ( 1d )" \
3070 -c "Verifying peer X.509 certificate... ok" \
3071 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003072
Jerry Yu31018ad2021-11-26 20:36:17 +08003073requires_gnutls_tls1_3
3074requires_gnutls_next_no_ticket
3075requires_gnutls_next_disable_tls13_compat
3076requires_config_enabled MBEDTLS_DEBUG_C
3077requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003078requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003079requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003080run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003081 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003082 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003083 0 \
3084 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003085 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003086 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3087 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003088 -c "NamedGroup: x25519 ( 1d )" \
3089 -c "Verifying peer X.509 certificate... ok" \
3090 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003091
Jerry Yu31018ad2021-11-26 20:36:17 +08003092requires_openssl_tls1_3
3093requires_config_enabled MBEDTLS_DEBUG_C
3094requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003095requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003097run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003098 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003099 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003100 0 \
3101 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003102 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003103 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3104 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003105 -c "NamedGroup: x448 ( 1e )" \
3106 -c "Verifying peer X.509 certificate... ok" \
3107 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003108
Jerry Yu31018ad2021-11-26 20:36:17 +08003109requires_gnutls_tls1_3
3110requires_gnutls_next_no_ticket
3111requires_gnutls_next_disable_tls13_compat
3112requires_config_enabled MBEDTLS_DEBUG_C
3113requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003114requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003116run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003117 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP256R1-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003118 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003119 0 \
3120 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003121 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003122 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3123 -c "Certificate Verify: Signature algorithm ( 0403 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003124 -c "NamedGroup: x448 ( 1e )" \
3125 -c "Verifying peer X.509 certificate... ok" \
3126 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003127
Jerry Yu31018ad2021-11-26 20:36:17 +08003128requires_openssl_tls1_3
3129requires_config_enabled MBEDTLS_DEBUG_C
3130requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003131requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003132requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003133run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003134 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003135 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003136 0 \
3137 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003138 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003139 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3140 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003141 -c "NamedGroup: secp256r1 ( 17 )" \
3142 -c "Verifying peer X.509 certificate... ok" \
3143 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003144
Jerry Yu31018ad2021-11-26 20:36:17 +08003145requires_gnutls_tls1_3
3146requires_gnutls_next_no_ticket
3147requires_gnutls_next_disable_tls13_compat
3148requires_config_enabled MBEDTLS_DEBUG_C
3149requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003150requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003151requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003152run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003153 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003154 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003155 0 \
3156 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003157 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003158 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3159 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003160 -c "NamedGroup: secp256r1 ( 17 )" \
3161 -c "Verifying peer X.509 certificate... ok" \
3162 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003163
Jerry Yu31018ad2021-11-26 20:36:17 +08003164requires_openssl_tls1_3
3165requires_config_enabled MBEDTLS_DEBUG_C
3166requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003167requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003169run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003170 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003171 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003172 0 \
3173 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003174 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003175 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3176 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003177 -c "NamedGroup: secp384r1 ( 18 )" \
3178 -c "Verifying peer X.509 certificate... ok" \
3179 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003180
Jerry Yu31018ad2021-11-26 20:36:17 +08003181requires_gnutls_tls1_3
3182requires_gnutls_next_no_ticket
3183requires_gnutls_next_disable_tls13_compat
3184requires_config_enabled MBEDTLS_DEBUG_C
3185requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003186requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003187requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003188run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003189 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003190 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003191 0 \
3192 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003193 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003194 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3195 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003196 -c "NamedGroup: secp384r1 ( 18 )" \
3197 -c "Verifying peer X.509 certificate... ok" \
3198 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003199
Jerry Yu31018ad2021-11-26 20:36:17 +08003200requires_openssl_tls1_3
3201requires_config_enabled MBEDTLS_DEBUG_C
3202requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003203requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003205run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003206 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003207 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003208 0 \
3209 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003210 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003211 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3212 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003213 -c "NamedGroup: secp521r1 ( 19 )" \
3214 -c "Verifying peer X.509 certificate... ok" \
3215 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003216
Jerry Yu31018ad2021-11-26 20:36:17 +08003217requires_gnutls_tls1_3
3218requires_gnutls_next_no_ticket
3219requires_gnutls_next_disable_tls13_compat
3220requires_config_enabled MBEDTLS_DEBUG_C
3221requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003222requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003223requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003224run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003225 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003226 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003227 0 \
3228 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003229 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003230 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3231 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003232 -c "NamedGroup: secp521r1 ( 19 )" \
3233 -c "Verifying peer X.509 certificate... ok" \
3234 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003235
Jerry Yu31018ad2021-11-26 20:36:17 +08003236requires_openssl_tls1_3
3237requires_config_enabled MBEDTLS_DEBUG_C
3238requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003239requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003240requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003241run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003242 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003243 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003244 0 \
3245 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003246 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003247 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3248 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003249 -c "NamedGroup: x25519 ( 1d )" \
3250 -c "Verifying peer X.509 certificate... ok" \
3251 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003252
Jerry Yu31018ad2021-11-26 20:36:17 +08003253requires_gnutls_tls1_3
3254requires_gnutls_next_no_ticket
3255requires_gnutls_next_disable_tls13_compat
3256requires_config_enabled MBEDTLS_DEBUG_C
3257requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003258requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003259requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003260run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003261 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003262 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003263 0 \
3264 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003265 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003266 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3267 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003268 -c "NamedGroup: x25519 ( 1d )" \
3269 -c "Verifying peer X.509 certificate... ok" \
3270 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003271
Jerry Yu31018ad2021-11-26 20:36:17 +08003272requires_openssl_tls1_3
3273requires_config_enabled MBEDTLS_DEBUG_C
3274requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003275requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003277run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003278 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp384r1.crt -key data_files/ecdsa_secp384r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003279 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003280 0 \
3281 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003282 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003283 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3284 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003285 -c "NamedGroup: x448 ( 1e )" \
3286 -c "Verifying peer X.509 certificate... ok" \
3287 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003288
Jerry Yu31018ad2021-11-26 20:36:17 +08003289requires_gnutls_tls1_3
3290requires_gnutls_next_no_ticket
3291requires_gnutls_next_disable_tls13_compat
3292requires_config_enabled MBEDTLS_DEBUG_C
3293requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003294requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003295requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003296run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003297 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp384r1.crt --x509keyfile data_files/ecdsa_secp384r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP384R1-SHA384:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003298 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003299 0 \
3300 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003301 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003302 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3303 -c "Certificate Verify: Signature algorithm ( 0503 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003304 -c "NamedGroup: x448 ( 1e )" \
3305 -c "Verifying peer X.509 certificate... ok" \
3306 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003307
Jerry Yu31018ad2021-11-26 20:36:17 +08003308requires_openssl_tls1_3
3309requires_config_enabled MBEDTLS_DEBUG_C
3310requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003311requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003312requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003313run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003314 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003315 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003316 0 \
3317 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003318 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003319 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3320 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003321 -c "NamedGroup: secp256r1 ( 17 )" \
3322 -c "Verifying peer X.509 certificate... ok" \
3323 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003324
Jerry Yu31018ad2021-11-26 20:36:17 +08003325requires_gnutls_tls1_3
3326requires_gnutls_next_no_ticket
3327requires_gnutls_next_disable_tls13_compat
3328requires_config_enabled MBEDTLS_DEBUG_C
3329requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003330requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003332run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003333 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP256R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003334 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003335 0 \
3336 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003337 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003338 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3339 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003340 -c "NamedGroup: secp256r1 ( 17 )" \
3341 -c "Verifying peer X.509 certificate... ok" \
3342 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003343
Jerry Yu31018ad2021-11-26 20:36:17 +08003344requires_openssl_tls1_3
3345requires_config_enabled MBEDTLS_DEBUG_C
3346requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003347requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003348requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003349run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003350 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003351 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003352 0 \
3353 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003354 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003355 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3356 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003357 -c "NamedGroup: secp384r1 ( 18 )" \
3358 -c "Verifying peer X.509 certificate... ok" \
3359 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003360
Jerry Yu31018ad2021-11-26 20:36:17 +08003361requires_gnutls_tls1_3
3362requires_gnutls_next_no_ticket
3363requires_gnutls_next_disable_tls13_compat
3364requires_config_enabled MBEDTLS_DEBUG_C
3365requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003366requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003367requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003368run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003369 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP384R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003370 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003371 0 \
3372 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003373 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003374 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3375 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003376 -c "NamedGroup: secp384r1 ( 18 )" \
3377 -c "Verifying peer X.509 certificate... ok" \
3378 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003379
Jerry Yu31018ad2021-11-26 20:36:17 +08003380requires_openssl_tls1_3
3381requires_config_enabled MBEDTLS_DEBUG_C
3382requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003383requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003384requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003385run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003386 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003387 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003388 0 \
3389 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003390 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003391 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3392 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003393 -c "NamedGroup: secp521r1 ( 19 )" \
3394 -c "Verifying peer X.509 certificate... ok" \
3395 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003396
Jerry Yu31018ad2021-11-26 20:36:17 +08003397requires_gnutls_tls1_3
3398requires_gnutls_next_no_ticket
3399requires_gnutls_next_disable_tls13_compat
3400requires_config_enabled MBEDTLS_DEBUG_C
3401requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003402requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003403requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003404run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003405 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP521R1:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003406 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003407 0 \
3408 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003409 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003410 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3411 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003412 -c "NamedGroup: secp521r1 ( 19 )" \
3413 -c "Verifying peer X.509 certificate... ok" \
3414 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003415
Jerry Yu31018ad2021-11-26 20:36:17 +08003416requires_openssl_tls1_3
3417requires_config_enabled MBEDTLS_DEBUG_C
3418requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003419requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003421run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003422 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003423 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003424 0 \
3425 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003426 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003427 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3428 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003429 -c "NamedGroup: x25519 ( 1d )" \
3430 -c "Verifying peer X.509 certificate... ok" \
3431 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003432
Jerry Yu31018ad2021-11-26 20:36:17 +08003433requires_gnutls_tls1_3
3434requires_gnutls_next_no_ticket
3435requires_gnutls_next_disable_tls13_compat
3436requires_config_enabled MBEDTLS_DEBUG_C
3437requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003438requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003439requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003440run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003441 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X25519:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003442 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003443 0 \
3444 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003445 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003446 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3447 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003448 -c "NamedGroup: x25519 ( 1d )" \
3449 -c "Verifying peer X.509 certificate... ok" \
3450 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003451
Jerry Yu31018ad2021-11-26 20:36:17 +08003452requires_openssl_tls1_3
3453requires_config_enabled MBEDTLS_DEBUG_C
3454requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003455requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003456requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003457run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003458 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp521r1.crt -key data_files/ecdsa_secp521r1.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003459 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003460 0 \
3461 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003462 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003463 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3464 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003465 -c "NamedGroup: x448 ( 1e )" \
3466 -c "Verifying peer X.509 certificate... ok" \
3467 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003468
Jerry Yu31018ad2021-11-26 20:36:17 +08003469requires_gnutls_tls1_3
3470requires_gnutls_next_no_ticket
3471requires_gnutls_next_disable_tls13_compat
3472requires_config_enabled MBEDTLS_DEBUG_C
3473requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003474requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003475requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Ronald Crondf5f8682022-04-05 16:01:03 +02003476run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003477 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp521r1.crt --x509keyfile data_files/ecdsa_secp521r1.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X448:+SHA256:+SIGN-ECDSA-SECP521R1-SHA512:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003478 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003479 0 \
3480 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003481 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003482 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3483 -c "Certificate Verify: Signature algorithm ( 0603 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003484 -c "NamedGroup: x448 ( 1e )" \
3485 -c "Verifying peer X.509 certificate... ok" \
3486 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003487
Jerry Yu31018ad2021-11-26 20:36:17 +08003488requires_openssl_tls1_3
3489requires_config_enabled MBEDTLS_DEBUG_C
3490requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003491requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003492requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003493requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003494run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003495 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003496 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003497 0 \
3498 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003499 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003500 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3501 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003502 -c "NamedGroup: secp256r1 ( 17 )" \
3503 -c "Verifying peer X.509 certificate... ok" \
3504 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003505
Jerry Yu31018ad2021-11-26 20:36:17 +08003506requires_gnutls_tls1_3
3507requires_gnutls_next_no_ticket
3508requires_gnutls_next_disable_tls13_compat
3509requires_config_enabled MBEDTLS_DEBUG_C
3510requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003511requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003512requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003513requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003514run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003515 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP256R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003516 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp256r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003517 0 \
3518 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003519 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003520 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3521 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003522 -c "NamedGroup: secp256r1 ( 17 )" \
3523 -c "Verifying peer X.509 certificate... ok" \
3524 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003525
Jerry Yu31018ad2021-11-26 20:36:17 +08003526requires_openssl_tls1_3
3527requires_config_enabled MBEDTLS_DEBUG_C
3528requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003529requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003530requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003531requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003532run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003533 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003534 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003535 0 \
3536 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003537 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003538 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3539 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003540 -c "NamedGroup: secp384r1 ( 18 )" \
3541 -c "Verifying peer X.509 certificate... ok" \
3542 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003543
Jerry Yu31018ad2021-11-26 20:36:17 +08003544requires_gnutls_tls1_3
3545requires_gnutls_next_no_ticket
3546requires_gnutls_next_disable_tls13_compat
3547requires_config_enabled MBEDTLS_DEBUG_C
3548requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003549requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003551requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003552run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003553 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP384R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003554 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp384r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003555 0 \
3556 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003557 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003558 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3559 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003560 -c "NamedGroup: secp384r1 ( 18 )" \
3561 -c "Verifying peer X.509 certificate... ok" \
3562 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003563
Jerry Yu31018ad2021-11-26 20:36:17 +08003564requires_openssl_tls1_3
3565requires_config_enabled MBEDTLS_DEBUG_C
3566requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003567requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003569requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003570run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003571 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003572 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003573 0 \
3574 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003575 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003576 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3577 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003578 -c "NamedGroup: secp521r1 ( 19 )" \
3579 -c "Verifying peer X.509 certificate... ok" \
3580 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003581
Jerry Yu31018ad2021-11-26 20:36:17 +08003582requires_gnutls_tls1_3
3583requires_gnutls_next_no_ticket
3584requires_gnutls_next_disable_tls13_compat
3585requires_config_enabled MBEDTLS_DEBUG_C
3586requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003587requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003588requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003589requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003590run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003591 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-SECP521R1:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003592 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=secp521r1" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003593 0 \
3594 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003595 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003596 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3597 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003598 -c "NamedGroup: secp521r1 ( 19 )" \
3599 -c "Verifying peer X.509 certificate... ok" \
3600 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003601
Jerry Yu31018ad2021-11-26 20:36:17 +08003602requires_openssl_tls1_3
3603requires_config_enabled MBEDTLS_DEBUG_C
3604requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003605requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003606requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003607requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003608run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003609 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003610 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003611 0 \
3612 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003613 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003614 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3615 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003616 -c "NamedGroup: x25519 ( 1d )" \
3617 -c "Verifying peer X.509 certificate... ok" \
3618 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003619
Jerry Yu31018ad2021-11-26 20:36:17 +08003620requires_gnutls_tls1_3
3621requires_gnutls_next_no_ticket
3622requires_gnutls_next_disable_tls13_compat
3623requires_config_enabled MBEDTLS_DEBUG_C
3624requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003625requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003626requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003627requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003628run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003629 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X25519:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003630 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x25519" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003631 0 \
3632 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003633 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003634 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3635 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003636 -c "NamedGroup: x25519 ( 1d )" \
3637 -c "Verifying peer X.509 certificate... ok" \
3638 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003639
Jerry Yu31018ad2021-11-26 20:36:17 +08003640requires_openssl_tls1_3
3641requires_config_enabled MBEDTLS_DEBUG_C
3642requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003643requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003644requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003645requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003646run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003647 "$O_NEXT_SRV_NO_CERT -cert data_files/server2-sha256.crt -key data_files/server2.key -accept $SRV_PORT -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003648 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003649 0 \
3650 -c "HTTP/1.0 200 ok" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003651 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003652 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
3653 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003654 -c "NamedGroup: x448 ( 1e )" \
3655 -c "Verifying peer X.509 certificate... ok" \
3656 -C "received HelloRetryRequest message"
Jerry Yudda036d2021-11-30 11:19:41 +08003657
Jerry Yu31018ad2021-11-26 20:36:17 +08003658requires_gnutls_tls1_3
3659requires_gnutls_next_no_ticket
3660requires_gnutls_next_disable_tls13_compat
3661requires_config_enabled MBEDTLS_DEBUG_C
3662requires_config_enabled MBEDTLS_SSL_CLI_C
Ronald Cron6f135e12021-12-08 16:57:54 +01003663requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
Ronald Cronae937252021-12-10 09:55:15 +01003664requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
Jerry Yu31018ad2021-11-26 20:36:17 +08003665requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
Ronald Crondf5f8682022-04-05 16:01:03 +02003666run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
Ronald Cronfdb0e3f2021-12-09 10:39:19 +01003667 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/server2-sha256.crt --x509keyfile data_files/server2.key --priority=NONE:+AEAD:+AES-128-CCM-8:+GROUP-X448:+SHA256:+SIGN-RSA-PSS-RSAE-SHA256:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003668 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca_cat12.crt force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 curves=x448" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003669 0 \
3670 -c "HTTP/1.0 200 OK" \
Ronald Crona1b8f6e2022-03-18 14:04:12 +01003671 -c "Protocol is TLSv1.3" \
Jerry Yucdcb6832021-11-29 16:50:13 +08003672 -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
XiaokangQian8031ba72022-03-22 12:53:45 +00003673 -c "Certificate Verify: Signature algorithm ( 0804 )" \
Jerry Yu7de79852022-03-23 16:50:47 +08003674 -c "NamedGroup: x448 ( 1e )" \
3675 -c "Verifying peer X.509 certificate... ok" \
XiaokangQian8031ba72022-03-22 12:53:45 +00003676 -C "received HelloRetryRequest message"
XiaokangQian83f81882022-03-17 06:26:36 +00003677
3678requires_openssl_tls1_3
3679requires_config_enabled MBEDTLS_DEBUG_C
3680requires_config_enabled MBEDTLS_SSL_CLI_C
3681requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQiana1931442022-03-25 11:58:22 +00003683run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003684 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003685 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQiana1931442022-03-25 11:58:22 +00003686 0 \
3687 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003688 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00003689 -c "NamedGroup: secp256r1 ( 17 )" \
3690 -c "NamedGroup: secp384r1 ( 18 )" \
3691 -c "Verifying peer X.509 certificate... ok" \
3692 -c "received HelloRetryRequest message" \
3693 -c "selected_group ( 24 )"
XiaokangQian83f81882022-03-17 06:26:36 +00003694
XiaokangQian83f81882022-03-17 06:26:36 +00003695requires_openssl_tls1_3
3696requires_config_enabled MBEDTLS_DEBUG_C
3697requires_config_enabled MBEDTLS_SSL_CLI_C
3698requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00003700run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003701 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003702 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian83f81882022-03-17 06:26:36 +00003703 0 \
3704 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003705 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00003706 -c "NamedGroup: secp256r1 ( 17 )" \
3707 -c "NamedGroup: secp521r1 ( 19 )" \
3708 -c "Verifying peer X.509 certificate... ok" \
3709 -c "received HelloRetryRequest message" \
3710 -c "selected_group ( 25 )"
XiaokangQian83f81882022-03-17 06:26:36 +00003711
XiaokangQian83f81882022-03-17 06:26:36 +00003712requires_openssl_tls1_3
3713requires_config_enabled MBEDTLS_DEBUG_C
3714requires_config_enabled MBEDTLS_SSL_CLI_C
3715requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3716requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00003717run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003718 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003719 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian83f81882022-03-17 06:26:36 +00003720 0 \
3721 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003722 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00003723 -c "NamedGroup: secp256r1 ( 17 )" \
3724 -c "NamedGroup: x25519 ( 1d )" \
3725 -c "Verifying peer X.509 certificate... ok" \
3726 -c "received HelloRetryRequest message" \
3727 -c "selected_group ( 29 )"
XiaokangQian83f81882022-03-17 06:26:36 +00003728
XiaokangQian83f81882022-03-17 06:26:36 +00003729requires_openssl_tls1_3
3730requires_config_enabled MBEDTLS_DEBUG_C
3731requires_config_enabled MBEDTLS_SSL_CLI_C
3732requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3733requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00003734run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
XiaokangQiana1931442022-03-25 11:58:22 +00003735 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003736 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +00003737 0 \
3738 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003739 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00003740 -c "NamedGroup: secp256r1 ( 17 )" \
3741 -c "NamedGroup: x448 ( 1e )" \
3742 -c "Verifying peer X.509 certificate... ok" \
3743 -c "received HelloRetryRequest message" \
3744 -c "selected_group ( 30 )"
XiaokangQian83f81882022-03-17 06:26:36 +00003745
XiaokangQian2e17fb82022-03-28 03:30:05 +00003746requires_openssl_tls1_3
3747requires_config_enabled MBEDTLS_DEBUG_C
3748requires_config_enabled MBEDTLS_SSL_CLI_C
3749requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3750requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3751run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
3752 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003753 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003754 0 \
3755 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003756 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003757 -c "NamedGroup: secp384r1 ( 18 )" \
3758 -c "NamedGroup: secp256r1 ( 17 )" \
3759 -c "Verifying peer X.509 certificate... ok" \
3760 -c "received HelloRetryRequest message" \
3761 -c "selected_group ( 23 )"
3762
3763requires_openssl_tls1_3
3764requires_config_enabled MBEDTLS_DEBUG_C
3765requires_config_enabled MBEDTLS_SSL_CLI_C
3766requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3767requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3768run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
3769 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003770 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003771 0 \
3772 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003773 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003774 -c "NamedGroup: secp384r1 ( 18 )" \
3775 -c "NamedGroup: secp521r1 ( 19 )" \
3776 -c "Verifying peer X.509 certificate... ok" \
3777 -c "received HelloRetryRequest message" \
3778 -c "selected_group ( 25 )"
3779
3780requires_openssl_tls1_3
3781requires_config_enabled MBEDTLS_DEBUG_C
3782requires_config_enabled MBEDTLS_SSL_CLI_C
3783requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3784requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3785run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
3786 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003787 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003788 0 \
3789 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003790 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003791 -c "NamedGroup: secp384r1 ( 18 )" \
3792 -c "NamedGroup: x25519 ( 1d )" \
3793 -c "Verifying peer X.509 certificate... ok" \
3794 -c "received HelloRetryRequest message" \
3795 -c "selected_group ( 29 )"
3796
3797requires_openssl_tls1_3
3798requires_config_enabled MBEDTLS_DEBUG_C
3799requires_config_enabled MBEDTLS_SSL_CLI_C
3800requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3801requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3802run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
3803 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003804 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003805 0 \
3806 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003807 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003808 -c "NamedGroup: secp384r1 ( 18 )" \
3809 -c "NamedGroup: x448 ( 1e )" \
3810 -c "Verifying peer X.509 certificate... ok" \
3811 -c "received HelloRetryRequest message" \
3812 -c "selected_group ( 30 )"
3813
3814requires_openssl_tls1_3
3815requires_config_enabled MBEDTLS_DEBUG_C
3816requires_config_enabled MBEDTLS_SSL_CLI_C
3817requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3818requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3819run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
3820 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003821 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003822 0 \
3823 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003824 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003825 -c "NamedGroup: secp521r1 ( 19 )" \
3826 -c "NamedGroup: secp256r1 ( 17 )" \
3827 -c "Verifying peer X.509 certificate... ok" \
3828 -c "received HelloRetryRequest message" \
3829 -c "selected_group ( 23 )"
3830
3831requires_openssl_tls1_3
3832requires_config_enabled MBEDTLS_DEBUG_C
3833requires_config_enabled MBEDTLS_SSL_CLI_C
3834requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3836run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
3837 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003838 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003839 0 \
3840 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003841 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003842 -c "NamedGroup: secp521r1 ( 19 )" \
3843 -c "NamedGroup: secp384r1 ( 18 )" \
3844 -c "Verifying peer X.509 certificate... ok" \
3845 -c "received HelloRetryRequest message" \
3846 -c "selected_group ( 24 )"
3847
3848requires_openssl_tls1_3
3849requires_config_enabled MBEDTLS_DEBUG_C
3850requires_config_enabled MBEDTLS_SSL_CLI_C
3851requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3852requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3853run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
3854 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003855 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003856 0 \
3857 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003858 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003859 -c "NamedGroup: secp521r1 ( 19 )" \
3860 -c "NamedGroup: x25519 ( 1d )" \
3861 -c "Verifying peer X.509 certificate... ok" \
3862 -c "received HelloRetryRequest message" \
3863 -c "selected_group ( 29 )"
3864
3865requires_openssl_tls1_3
3866requires_config_enabled MBEDTLS_DEBUG_C
3867requires_config_enabled MBEDTLS_SSL_CLI_C
3868requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3869requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3870run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
3871 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003872 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003873 0 \
3874 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003875 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003876 -c "NamedGroup: secp521r1 ( 19 )" \
3877 -c "NamedGroup: x448 ( 1e )" \
3878 -c "Verifying peer X.509 certificate... ok" \
3879 -c "received HelloRetryRequest message" \
3880 -c "selected_group ( 30 )"
3881
3882requires_openssl_tls1_3
3883requires_config_enabled MBEDTLS_DEBUG_C
3884requires_config_enabled MBEDTLS_SSL_CLI_C
3885requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3886requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3887run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
3888 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003889 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003890 0 \
3891 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003892 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003893 -c "NamedGroup: x25519 ( 1d )" \
3894 -c "NamedGroup: secp256r1 ( 17 )" \
3895 -c "Verifying peer X.509 certificate... ok" \
3896 -c "received HelloRetryRequest message" \
3897 -c "selected_group ( 23 )"
3898
3899requires_openssl_tls1_3
3900requires_config_enabled MBEDTLS_DEBUG_C
3901requires_config_enabled MBEDTLS_SSL_CLI_C
3902requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3903requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3904run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
3905 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003906 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003907 0 \
3908 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003909 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003910 -c "NamedGroup: x25519 ( 1d )" \
3911 -c "NamedGroup: secp384r1 ( 18 )" \
3912 -c "Verifying peer X.509 certificate... ok" \
3913 -c "received HelloRetryRequest message" \
3914 -c "selected_group ( 24 )"
3915
3916requires_openssl_tls1_3
3917requires_config_enabled MBEDTLS_DEBUG_C
3918requires_config_enabled MBEDTLS_SSL_CLI_C
3919requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3920requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3921run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
3922 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003923 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003924 0 \
3925 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003926 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003927 -c "NamedGroup: x25519 ( 1d )" \
3928 -c "NamedGroup: secp521r1 ( 19 )" \
3929 -c "Verifying peer X.509 certificate... ok" \
3930 -c "received HelloRetryRequest message" \
3931 -c "selected_group ( 25 )"
3932
3933requires_openssl_tls1_3
3934requires_config_enabled MBEDTLS_DEBUG_C
3935requires_config_enabled MBEDTLS_SSL_CLI_C
3936requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3937requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3938run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
3939 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003940 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003941 0 \
3942 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003943 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003944 -c "NamedGroup: x25519 ( 1d )" \
3945 -c "NamedGroup: x448 ( 1e )" \
3946 -c "Verifying peer X.509 certificate... ok" \
3947 -c "received HelloRetryRequest message" \
3948 -c "selected_group ( 30 )"
3949
3950requires_openssl_tls1_3
3951requires_config_enabled MBEDTLS_DEBUG_C
3952requires_config_enabled MBEDTLS_SSL_CLI_C
3953requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3954requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3955run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
3956 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003957 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003958 0 \
3959 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003960 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003961 -c "NamedGroup: x448 ( 1e )" \
3962 -c "NamedGroup: secp256r1 ( 17 )" \
3963 -c "Verifying peer X.509 certificate... ok" \
3964 -c "received HelloRetryRequest message" \
3965 -c "selected_group ( 23 )"
3966
3967requires_openssl_tls1_3
3968requires_config_enabled MBEDTLS_DEBUG_C
3969requires_config_enabled MBEDTLS_SSL_CLI_C
3970requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3971requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3972run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
3973 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003974 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003975 0 \
3976 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003977 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003978 -c "NamedGroup: x448 ( 1e )" \
3979 -c "NamedGroup: secp384r1 ( 18 )" \
3980 -c "Verifying peer X.509 certificate... ok" \
3981 -c "received HelloRetryRequest message" \
3982 -c "selected_group ( 24 )"
3983
3984requires_openssl_tls1_3
3985requires_config_enabled MBEDTLS_DEBUG_C
3986requires_config_enabled MBEDTLS_SSL_CLI_C
3987requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
3988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3989run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
3990 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003991 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003992 0 \
3993 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02003994 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00003995 -c "NamedGroup: x448 ( 1e )" \
3996 -c "NamedGroup: secp521r1 ( 19 )" \
3997 -c "Verifying peer X.509 certificate... ok" \
3998 -c "received HelloRetryRequest message" \
3999 -c "selected_group ( 25 )"
4000
4001requires_openssl_tls1_3
4002requires_config_enabled MBEDTLS_DEBUG_C
4003requires_config_enabled MBEDTLS_SSL_CLI_C
4004requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4005requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4006run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
4007 "$O_NEXT_SRV_NO_CERT -cert data_files/ecdsa_secp256r1.crt -key data_files/ecdsa_secp256r1.key -accept $SRV_PORT -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004008 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004009 0 \
4010 -c "HTTP/1.0 200 ok" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004011 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004012 -c "NamedGroup: x448 ( 1e )" \
4013 -c "NamedGroup: x25519 ( 1d )" \
4014 -c "Verifying peer X.509 certificate... ok" \
4015 -c "received HelloRetryRequest message" \
4016 -c "selected_group ( 29 )"
4017
4018requires_gnutls_tls1_3
4019requires_gnutls_next_no_ticket
4020requires_gnutls_next_disable_tls13_compat
4021requires_config_enabled MBEDTLS_DEBUG_C
4022requires_config_enabled MBEDTLS_SSL_CLI_C
4023requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4024requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4025run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
4026 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP384R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004027 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004028 0 \
4029 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004030 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004031 -c "NamedGroup: secp256r1 ( 17 )" \
4032 -c "NamedGroup: secp384r1 ( 18 )" \
4033 -c "Verifying peer X.509 certificate... ok" \
4034 -c "received HelloRetryRequest message" \
4035 -c "selected_group ( 24 )"
4036
4037requires_gnutls_tls1_3
4038requires_gnutls_next_no_ticket
4039requires_gnutls_next_disable_tls13_compat
4040requires_config_enabled MBEDTLS_DEBUG_C
4041requires_config_enabled MBEDTLS_SSL_CLI_C
4042requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4043requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4044run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
4045 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP521R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004046 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004047 0 \
4048 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004049 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004050 -c "NamedGroup: secp256r1 ( 17 )" \
4051 -c "NamedGroup: secp521r1 ( 19 )" \
4052 -c "Verifying peer X.509 certificate... ok" \
4053 -c "received HelloRetryRequest message" \
4054 -c "selected_group ( 25 )"
4055
4056requires_gnutls_tls1_3
4057requires_gnutls_next_no_ticket
4058requires_gnutls_next_disable_tls13_compat
4059requires_config_enabled MBEDTLS_DEBUG_C
4060requires_config_enabled MBEDTLS_SSL_CLI_C
4061requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4063run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
4064 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X25519:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004065 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004066 0 \
4067 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004068 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004069 -c "NamedGroup: secp256r1 ( 17 )" \
4070 -c "NamedGroup: x25519 ( 1d )" \
4071 -c "Verifying peer X.509 certificate... ok" \
4072 -c "received HelloRetryRequest message" \
4073 -c "selected_group ( 29 )"
4074
XiaokangQian83f81882022-03-17 06:26:36 +00004075requires_gnutls_tls1_3
4076requires_gnutls_next_no_ticket
4077requires_gnutls_next_disable_tls13_compat
4078requires_config_enabled MBEDTLS_DEBUG_C
4079requires_config_enabled MBEDTLS_SSL_CLI_C
4080requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
XiaokangQian8031ba72022-03-22 12:53:45 +00004082run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
XiaokangQiana1931442022-03-25 11:58:22 +00004083 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X448:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004084 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp256r1,x448" \
XiaokangQian83f81882022-03-17 06:26:36 +00004085 0 \
4086 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004087 -c "Protocol is TLSv1.3" \
XiaokangQiana1931442022-03-25 11:58:22 +00004088 -c "NamedGroup: secp256r1 ( 17 )" \
4089 -c "NamedGroup: x448 ( 1e )" \
4090 -c "Verifying peer X.509 certificate... ok" \
4091 -c "received HelloRetryRequest message" \
4092 -c "selected_group ( 30 )"
XiaokangQian2e17fb82022-03-28 03:30:05 +00004093
4094requires_gnutls_tls1_3
4095requires_gnutls_next_no_ticket
4096requires_gnutls_next_disable_tls13_compat
4097requires_config_enabled MBEDTLS_DEBUG_C
4098requires_config_enabled MBEDTLS_SSL_CLI_C
4099requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4101run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
4102 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP256R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004103 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004104 0 \
4105 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004106 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004107 -c "NamedGroup: secp384r1 ( 18 )" \
4108 -c "NamedGroup: secp256r1 ( 17 )" \
4109 -c "Verifying peer X.509 certificate... ok" \
4110 -c "received HelloRetryRequest message" \
4111 -c "selected_group ( 23 )"
4112
4113requires_gnutls_tls1_3
4114requires_gnutls_next_no_ticket
4115requires_gnutls_next_disable_tls13_compat
4116requires_config_enabled MBEDTLS_DEBUG_C
4117requires_config_enabled MBEDTLS_SSL_CLI_C
4118requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4119requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4120run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
4121 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP521R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004122 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004123 0 \
4124 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004125 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004126 -c "NamedGroup: secp384r1 ( 18 )" \
4127 -c "NamedGroup: secp521r1 ( 19 )" \
4128 -c "Verifying peer X.509 certificate... ok" \
4129 -c "received HelloRetryRequest message" \
4130 -c "selected_group ( 25 )"
4131
4132requires_gnutls_tls1_3
4133requires_gnutls_next_no_ticket
4134requires_gnutls_next_disable_tls13_compat
4135requires_config_enabled MBEDTLS_DEBUG_C
4136requires_config_enabled MBEDTLS_SSL_CLI_C
4137requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4138requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4139run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
4140 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X25519:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004141 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004142 0 \
4143 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004144 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004145 -c "NamedGroup: secp384r1 ( 18 )" \
4146 -c "NamedGroup: x25519 ( 1d )" \
4147 -c "Verifying peer X.509 certificate... ok" \
4148 -c "received HelloRetryRequest message" \
4149 -c "selected_group ( 29 )"
4150
4151requires_gnutls_tls1_3
4152requires_gnutls_next_no_ticket
4153requires_gnutls_next_disable_tls13_compat
4154requires_config_enabled MBEDTLS_DEBUG_C
4155requires_config_enabled MBEDTLS_SSL_CLI_C
4156requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4157requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4158run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
4159 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X448:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004160 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp384r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004161 0 \
4162 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004163 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004164 -c "NamedGroup: secp384r1 ( 18 )" \
4165 -c "NamedGroup: x448 ( 1e )" \
4166 -c "Verifying peer X.509 certificate... ok" \
4167 -c "received HelloRetryRequest message" \
4168 -c "selected_group ( 30 )"
4169
4170requires_gnutls_tls1_3
4171requires_gnutls_next_no_ticket
4172requires_gnutls_next_disable_tls13_compat
4173requires_config_enabled MBEDTLS_DEBUG_C
4174requires_config_enabled MBEDTLS_SSL_CLI_C
4175requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4176requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4177run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
4178 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP256R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004179 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004180 0 \
4181 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004182 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004183 -c "NamedGroup: secp521r1 ( 19 )" \
4184 -c "NamedGroup: secp256r1 ( 17 )" \
4185 -c "Verifying peer X.509 certificate... ok" \
4186 -c "received HelloRetryRequest message" \
4187 -c "selected_group ( 23 )"
4188
4189requires_gnutls_tls1_3
4190requires_gnutls_next_no_ticket
4191requires_gnutls_next_disable_tls13_compat
4192requires_config_enabled MBEDTLS_DEBUG_C
4193requires_config_enabled MBEDTLS_SSL_CLI_C
4194requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4195requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4196run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
4197 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP384R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004198 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004199 0 \
4200 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004201 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004202 -c "NamedGroup: secp521r1 ( 19 )" \
4203 -c "NamedGroup: secp384r1 ( 18 )" \
4204 -c "Verifying peer X.509 certificate... ok" \
4205 -c "received HelloRetryRequest message" \
4206 -c "selected_group ( 24 )"
4207
4208requires_gnutls_tls1_3
4209requires_gnutls_next_no_ticket
4210requires_gnutls_next_disable_tls13_compat
4211requires_config_enabled MBEDTLS_DEBUG_C
4212requires_config_enabled MBEDTLS_SSL_CLI_C
4213requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4214requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4215run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
4216 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X25519:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004217 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004218 0 \
4219 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004220 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004221 -c "NamedGroup: secp521r1 ( 19 )" \
4222 -c "NamedGroup: x25519 ( 1d )" \
4223 -c "Verifying peer X.509 certificate... ok" \
4224 -c "received HelloRetryRequest message" \
4225 -c "selected_group ( 29 )"
4226
4227requires_gnutls_tls1_3
4228requires_gnutls_next_no_ticket
4229requires_gnutls_next_disable_tls13_compat
4230requires_config_enabled MBEDTLS_DEBUG_C
4231requires_config_enabled MBEDTLS_SSL_CLI_C
4232requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4234run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
4235 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X448:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004236 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=secp521r1,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004237 0 \
4238 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004239 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004240 -c "NamedGroup: secp521r1 ( 19 )" \
4241 -c "NamedGroup: x448 ( 1e )" \
4242 -c "Verifying peer X.509 certificate... ok" \
4243 -c "received HelloRetryRequest message" \
4244 -c "selected_group ( 30 )"
4245
4246requires_gnutls_tls1_3
4247requires_gnutls_next_no_ticket
4248requires_gnutls_next_disable_tls13_compat
4249requires_config_enabled MBEDTLS_DEBUG_C
4250requires_config_enabled MBEDTLS_SSL_CLI_C
4251requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4252requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4253run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
4254 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP256R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004255 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004256 0 \
4257 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004258 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004259 -c "NamedGroup: x25519 ( 1d )" \
4260 -c "NamedGroup: secp256r1 ( 17 )" \
4261 -c "Verifying peer X.509 certificate... ok" \
4262 -c "received HelloRetryRequest message" \
4263 -c "selected_group ( 23 )"
4264
4265requires_gnutls_tls1_3
4266requires_gnutls_next_no_ticket
4267requires_gnutls_next_disable_tls13_compat
4268requires_config_enabled MBEDTLS_DEBUG_C
4269requires_config_enabled MBEDTLS_SSL_CLI_C
4270requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4271requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4272run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
4273 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP384R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004274 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004275 0 \
4276 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004277 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004278 -c "NamedGroup: x25519 ( 1d )" \
4279 -c "NamedGroup: secp384r1 ( 18 )" \
4280 -c "Verifying peer X.509 certificate... ok" \
4281 -c "received HelloRetryRequest message" \
4282 -c "selected_group ( 24 )"
4283
4284requires_gnutls_tls1_3
4285requires_gnutls_next_no_ticket
4286requires_gnutls_next_disable_tls13_compat
4287requires_config_enabled MBEDTLS_DEBUG_C
4288requires_config_enabled MBEDTLS_SSL_CLI_C
4289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4290requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4291run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
4292 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP521R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004293 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004294 0 \
4295 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004296 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004297 -c "NamedGroup: x25519 ( 1d )" \
4298 -c "NamedGroup: secp521r1 ( 19 )" \
4299 -c "Verifying peer X.509 certificate... ok" \
4300 -c "received HelloRetryRequest message" \
4301 -c "selected_group ( 25 )"
4302
4303requires_gnutls_tls1_3
4304requires_gnutls_next_no_ticket
4305requires_gnutls_next_disable_tls13_compat
4306requires_config_enabled MBEDTLS_DEBUG_C
4307requires_config_enabled MBEDTLS_SSL_CLI_C
4308requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4309requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4310run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
4311 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X448:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004312 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x25519,x448" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004313 0 \
4314 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004315 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004316 -c "NamedGroup: x25519 ( 1d )" \
4317 -c "NamedGroup: x448 ( 1e )" \
4318 -c "Verifying peer X.509 certificate... ok" \
4319 -c "received HelloRetryRequest message" \
4320 -c "selected_group ( 30 )"
4321
4322requires_gnutls_tls1_3
4323requires_gnutls_next_no_ticket
4324requires_gnutls_next_disable_tls13_compat
4325requires_config_enabled MBEDTLS_DEBUG_C
4326requires_config_enabled MBEDTLS_SSL_CLI_C
4327requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4328requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4329run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
4330 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP256R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004331 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp256r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004332 0 \
4333 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004334 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004335 -c "NamedGroup: x448 ( 1e )" \
4336 -c "NamedGroup: secp256r1 ( 17 )" \
4337 -c "Verifying peer X.509 certificate... ok" \
4338 -c "received HelloRetryRequest message" \
4339 -c "selected_group ( 23 )"
4340
4341requires_gnutls_tls1_3
4342requires_gnutls_next_no_ticket
4343requires_gnutls_next_disable_tls13_compat
4344requires_config_enabled MBEDTLS_DEBUG_C
4345requires_config_enabled MBEDTLS_SSL_CLI_C
4346requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4347requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4348run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
4349 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP384R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004350 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp384r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004351 0 \
4352 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004353 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004354 -c "NamedGroup: x448 ( 1e )" \
4355 -c "NamedGroup: secp384r1 ( 18 )" \
4356 -c "Verifying peer X.509 certificate... ok" \
4357 -c "received HelloRetryRequest message" \
4358 -c "selected_group ( 24 )"
4359
4360requires_gnutls_tls1_3
4361requires_gnutls_next_no_ticket
4362requires_gnutls_next_disable_tls13_compat
4363requires_config_enabled MBEDTLS_DEBUG_C
4364requires_config_enabled MBEDTLS_SSL_CLI_C
4365requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4367run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
4368 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-SECP521R1:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004369 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,secp521r1" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004370 0 \
4371 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004372 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004373 -c "NamedGroup: x448 ( 1e )" \
4374 -c "NamedGroup: secp521r1 ( 19 )" \
4375 -c "Verifying peer X.509 certificate... ok" \
4376 -c "received HelloRetryRequest message" \
4377 -c "selected_group ( 25 )"
4378
4379requires_gnutls_tls1_3
4380requires_gnutls_next_no_ticket
4381requires_gnutls_next_disable_tls13_compat
4382requires_config_enabled MBEDTLS_DEBUG_C
4383requires_config_enabled MBEDTLS_SSL_CLI_C
4384requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
4385requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4386run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
4387 "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile data_files/ecdsa_secp256r1.crt --x509keyfile data_files/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+GROUP-X25519:+MAC-ALL:+SIGN-ALL:+VERS-TLS1.3:%NO_TICKETS" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004388 "$P_CLI server_addr=127.0.0.1 server_port=$SRV_PORT debug_level=4 ca_file=data_files/test-ca2.crt sig_algs=ecdsa_secp256r1_sha256 curves=x448,x25519" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004389 0 \
4390 -c "HTTP/1.0 200 OK" \
Ronald Crondf5f8682022-04-05 16:01:03 +02004391 -c "Protocol is TLSv1.3" \
XiaokangQian2e17fb82022-03-28 03:30:05 +00004392 -c "NamedGroup: x448 ( 1e )" \
4393 -c "NamedGroup: x25519 ( 1d )" \
4394 -c "Verifying peer X.509 certificate... ok" \
4395 -c "received HelloRetryRequest message" \
4396 -c "selected_group ( 29 )"