Merge pull request #8561 from ronald-cron-arm/fix-ciphersuites-list-in-ssl-opt
ssl-opt.sh: Fix getting the list of supported ciphersuites.
This commit is contained in:
commit
172c0b930f
1 changed files with 13 additions and 40 deletions
|
@ -358,9 +358,18 @@ requires_protocol_version() {
|
||||||
|
|
||||||
# Space-separated list of ciphersuites supported by this build of
|
# Space-separated list of ciphersuites supported by this build of
|
||||||
# Mbed TLS.
|
# Mbed TLS.
|
||||||
P_CIPHERSUITES=" $($P_CLI --help 2>/dev/null |
|
P_CIPHERSUITES=""
|
||||||
grep 'TLS-\|TLS1-3' |
|
if [ "$LIST_TESTS" -eq 0 ]; then
|
||||||
tr -s ' \n' ' ')"
|
P_CIPHERSUITES=" $($P_CLI help_ciphersuites 2>/dev/null |
|
||||||
|
grep 'TLS-\|TLS1-3' |
|
||||||
|
tr -s ' \n' ' ')"
|
||||||
|
|
||||||
|
if [ -z "${P_CIPHERSUITES# }" ]; then
|
||||||
|
echo >&2 "$0: fatal error: no cipher suites found!"
|
||||||
|
exit 125
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
requires_ciphersuite_enabled() {
|
requires_ciphersuite_enabled() {
|
||||||
case $P_CIPHERSUITES in
|
case $P_CIPHERSUITES in
|
||||||
*" $1 "*) :;;
|
*" $1 "*) :;;
|
||||||
|
@ -2332,7 +2341,6 @@ run_test "Opaque key for server authentication: invalid alg: ecdh with RSA ke
|
||||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_CCM_C
|
|
||||||
run_test "Opaque key for server authentication: invalid alg: ECDHE-ECDSA with ecdh" \
|
run_test "Opaque key for server authentication: invalid alg: ECDHE-ECDSA with ecdh" \
|
||||||
"$P_SRV key_opaque=1 crt_file=data_files/server5.crt \
|
"$P_SRV key_opaque=1 crt_file=data_files/server5.crt \
|
||||||
key_file=data_files/server5.key key_opaque_algs=ecdh,none \
|
key_file=data_files/server5.key key_opaque_algs=ecdh,none \
|
||||||
|
@ -2386,7 +2394,6 @@ run_test "Opaque keys for server authentication: EC keys with different algs,
|
||||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
requires_hash_alg SHA_384
|
requires_hash_alg SHA_384
|
||||||
requires_config_enabled MBEDTLS_CCM_C
|
|
||||||
requires_config_disabled MBEDTLS_X509_REMOVE_INFO
|
requires_config_disabled MBEDTLS_X509_REMOVE_INFO
|
||||||
run_test "Opaque keys for server authentication: EC + RSA, force ECDHE-ECDSA" \
|
run_test "Opaque keys for server authentication: EC + RSA, force ECDHE-ECDSA" \
|
||||||
"$P_SRV key_opaque=1 crt_file=data_files/server5.crt \
|
"$P_SRV key_opaque=1 crt_file=data_files/server5.crt \
|
||||||
|
@ -2566,7 +2573,6 @@ requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_384
|
requires_hash_alg SHA_384
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_config_disabled MBEDTLS_X509_REMOVE_INFO
|
requires_config_disabled MBEDTLS_X509_REMOVE_INFO
|
||||||
run_test "Opaque keys for server authentication: EC + RSA, force DHE-RSA" \
|
run_test "Opaque keys for server authentication: EC + RSA, force DHE-RSA" \
|
||||||
"$P_SRV auth_mode=required key_opaque=1 crt_file=data_files/server5.crt \
|
"$P_SRV auth_mode=required key_opaque=1 crt_file=data_files/server5.crt \
|
||||||
|
@ -9115,8 +9121,6 @@ run_test "SSL async private: renegotiation: server-initiated, decrypt" \
|
||||||
|
|
||||||
# Tests for ECC extensions (rfc 4492)
|
# Tests for ECC extensions (rfc 4492)
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
requires_config_enabled MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||||
run_test "Force a non ECC ciphersuite in the client side" \
|
run_test "Force a non ECC ciphersuite in the client side" \
|
||||||
|
@ -9128,8 +9132,6 @@ run_test "Force a non ECC ciphersuite in the client side" \
|
||||||
-S "found supported elliptic curves extension" \
|
-S "found supported elliptic curves extension" \
|
||||||
-S "found supported point formats extension"
|
-S "found supported point formats extension"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
requires_config_enabled MBEDTLS_KEY_EXCHANGE_RSA_ENABLED
|
||||||
run_test "Force a non ECC ciphersuite in the server side" \
|
run_test "Force a non ECC ciphersuite in the server side" \
|
||||||
|
@ -9139,8 +9141,6 @@ run_test "Force a non ECC ciphersuite in the server side" \
|
||||||
-C "found supported_point_formats extension" \
|
-C "found supported_point_formats extension" \
|
||||||
-S "server hello, supported_point_formats extension"
|
-S "server hello, supported_point_formats extension"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
run_test "Force an ECC ciphersuite in the client side" \
|
run_test "Force an ECC ciphersuite in the client side" \
|
||||||
"$P_SRV debug_level=3" \
|
"$P_SRV debug_level=3" \
|
||||||
|
@ -9151,8 +9151,6 @@ run_test "Force an ECC ciphersuite in the client side" \
|
||||||
-s "found supported elliptic curves extension" \
|
-s "found supported elliptic curves extension" \
|
||||||
-s "found supported point formats extension"
|
-s "found supported point formats extension"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
run_test "Force an ECC ciphersuite in the server side" \
|
run_test "Force an ECC ciphersuite in the server side" \
|
||||||
"$P_SRV debug_level=3 force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256" \
|
"$P_SRV debug_level=3 force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256" \
|
||||||
|
@ -9677,8 +9675,6 @@ run_test "DTLS fragmenting: both (MTU=1024)" \
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: both (MTU=512)" \
|
run_test "DTLS fragmenting: both (MTU=512)" \
|
||||||
-p "$P_PXY mtu=512" \
|
-p "$P_PXY mtu=512" \
|
||||||
|
@ -9707,8 +9703,6 @@ run_test "DTLS fragmenting: both (MTU=512)" \
|
||||||
not_with_valgrind
|
not_with_valgrind
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU: auto-reduction (not valgrind)" \
|
run_test "DTLS fragmenting: proxy MTU: auto-reduction (not valgrind)" \
|
||||||
-p "$P_PXY mtu=508" \
|
-p "$P_PXY mtu=508" \
|
||||||
|
@ -9730,8 +9724,6 @@ run_test "DTLS fragmenting: proxy MTU: auto-reduction (not valgrind)" \
|
||||||
only_with_valgrind
|
only_with_valgrind
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU: auto-reduction (with valgrind)" \
|
run_test "DTLS fragmenting: proxy MTU: auto-reduction (with valgrind)" \
|
||||||
-p "$P_PXY mtu=508" \
|
-p "$P_PXY mtu=508" \
|
||||||
|
@ -9782,8 +9774,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=1024)" \
|
||||||
not_with_valgrind # spurious autoreduction due to timeout
|
not_with_valgrind # spurious autoreduction due to timeout
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=512)" \
|
run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=512)" \
|
||||||
-p "$P_PXY mtu=512" \
|
-p "$P_PXY mtu=512" \
|
||||||
|
@ -9831,8 +9821,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=1024)" \
|
||||||
not_with_valgrind # spurious autoreduction due to timeout
|
not_with_valgrind # spurious autoreduction due to timeout
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=512)" \
|
run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=512)" \
|
||||||
-p "$P_PXY mtu=512" \
|
-p "$P_PXY mtu=512" \
|
||||||
|
@ -9866,8 +9854,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=512)" \
|
||||||
not_with_valgrind # spurious autoreduction due to timeout
|
not_with_valgrind # spurious autoreduction due to timeout
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, resumed handshake" \
|
run_test "DTLS fragmenting: proxy MTU, resumed handshake" \
|
||||||
-p "$P_PXY mtu=1450" \
|
-p "$P_PXY mtu=1450" \
|
||||||
|
@ -9895,7 +9881,6 @@ requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
||||||
requires_config_enabled MBEDTLS_CHACHAPOLY_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, ChachaPoly renego" \
|
run_test "DTLS fragmenting: proxy MTU, ChachaPoly renego" \
|
||||||
-p "$P_PXY mtu=512" \
|
-p "$P_PXY mtu=512" \
|
||||||
|
@ -9909,7 +9894,7 @@ run_test "DTLS fragmenting: proxy MTU, ChachaPoly renego" \
|
||||||
crt_file=data_files/server8_int-ca2.crt \
|
crt_file=data_files/server8_int-ca2.crt \
|
||||||
key_file=data_files/server8.key \
|
key_file=data_files/server8.key \
|
||||||
exchanges=2 renegotiation=1 renegotiate=1 \
|
exchanges=2 renegotiation=1 renegotiate=1 \
|
||||||
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256 \
|
force_ciphersuite=TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256 \
|
||||||
hs_timeout=10000-60000 \
|
hs_timeout=10000-60000 \
|
||||||
mtu=512" \
|
mtu=512" \
|
||||||
0 \
|
0 \
|
||||||
|
@ -9925,8 +9910,6 @@ requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, AES-GCM renego" \
|
run_test "DTLS fragmenting: proxy MTU, AES-GCM renego" \
|
||||||
-p "$P_PXY mtu=512" \
|
-p "$P_PXY mtu=512" \
|
||||||
|
@ -9956,8 +9939,6 @@ requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CCM_C
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, AES-CCM renego" \
|
run_test "DTLS fragmenting: proxy MTU, AES-CCM renego" \
|
||||||
-p "$P_PXY mtu=1024" \
|
-p "$P_PXY mtu=1024" \
|
||||||
|
@ -9987,8 +9968,6 @@ requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_config_enabled MBEDTLS_SSL_ENCRYPT_THEN_MAC
|
requires_config_enabled MBEDTLS_SSL_ENCRYPT_THEN_MAC
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, AES-CBC EtM renego" \
|
run_test "DTLS fragmenting: proxy MTU, AES-CBC EtM renego" \
|
||||||
|
@ -10019,8 +9998,6 @@ requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_hash_alg SHA_256
|
requires_hash_alg SHA_256
|
||||||
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
requires_config_enabled MBEDTLS_SSL_RENEGOTIATION
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_CIPHER_MODE_CBC
|
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU, AES-CBC non-EtM renego" \
|
run_test "DTLS fragmenting: proxy MTU, AES-CBC non-EtM renego" \
|
||||||
-p "$P_PXY mtu=1024" \
|
-p "$P_PXY mtu=1024" \
|
||||||
|
@ -10046,8 +10023,6 @@ run_test "DTLS fragmenting: proxy MTU, AES-CBC non-EtM renego" \
|
||||||
# Forcing ciphersuite for this test to fit the MTU of 512 with full config.
|
# Forcing ciphersuite for this test to fit the MTU of 512 with full config.
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
client_needs_more_time 2
|
client_needs_more_time 2
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU + 3d" \
|
run_test "DTLS fragmenting: proxy MTU + 3d" \
|
||||||
|
@ -10069,8 +10044,6 @@ run_test "DTLS fragmenting: proxy MTU + 3d" \
|
||||||
# Forcing ciphersuite for this test to fit the MTU of 512 with full config.
|
# Forcing ciphersuite for this test to fit the MTU of 512 with full config.
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_RSA_C
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
requires_config_enabled MBEDTLS_AES_C
|
|
||||||
requires_config_enabled MBEDTLS_GCM_C
|
|
||||||
client_needs_more_time 2
|
client_needs_more_time 2
|
||||||
requires_max_content_len 2048
|
requires_max_content_len 2048
|
||||||
run_test "DTLS fragmenting: proxy MTU + 3d, nbio" \
|
run_test "DTLS fragmenting: proxy MTU + 3d, nbio" \
|
||||||
|
|
Loading…
Reference in a new issue