Added mis-removed test and removed unneeded tests
Signed-off-by: TRodziewicz <tomasz.rodziewicz@mobica.com>
This commit is contained in:
parent
299510e889
commit
c3366a4185
2 changed files with 4 additions and 25 deletions
|
@ -4703,31 +4703,6 @@ run_test "Not supported version check: srv max TLS 1.1" \
|
||||||
-S "Version: TLS1.1" \
|
-S "Version: TLS1.1" \
|
||||||
-C "Protocol is TLSv1.1"
|
-C "Protocol is TLSv1.1"
|
||||||
|
|
||||||
## ClientHello generated with
|
|
||||||
## "openssl s_client -CAfile tests/data_files/test-ca.crt -tls1_1 -connect localhost:4433 -cipher ..."
|
|
||||||
## then manually twiddling the ciphersuite list.
|
|
||||||
## The ClientHello content is spelled out below as a hex string as
|
|
||||||
## "prefix ciphersuite1 ciphersuite2 ciphersuite3 ciphersuite4 suffix".
|
|
||||||
## The expected response is an inappropriate_fallback alert.
|
|
||||||
|
|
||||||
requires_openssl_with_fallback_scsv
|
|
||||||
run_test "Fallback SCSV: beginning of list" \
|
|
||||||
"$P_SRV debug_level=2" \
|
|
||||||
"$TCP_CLIENT localhost $SRV_PORT '160301003e0100003a03022aafb94308dc22ca1086c65acc00e414384d76b61ecab37df1633b1ae1034dbe000008 5600 0031 0032 0033 0100000900230000000f000101' '15030200020246'" \
|
|
||||||
0 \
|
|
||||||
-s "client only supports ssl smaller than minimum" \
|
|
||||||
-S "received FALLBACK_SCSV" \
|
|
||||||
-S "inapropriate fallback"
|
|
||||||
|
|
||||||
requires_openssl_with_fallback_scsv
|
|
||||||
run_test "Fallback SCSV: end of list" \
|
|
||||||
"$P_SRV debug_level=2" \
|
|
||||||
"$TCP_CLIENT localhost $SRV_PORT '160301003e0100003a03022aafb94308dc22ca1086c65acc00e414384d76b61ecab37df1633b1ae1034dbe000008 0031 0032 0033 5600 0100000900230000000f000101' '15030200020246'" \
|
|
||||||
0 \
|
|
||||||
-s "client only supports ssl smaller than minimum" \
|
|
||||||
-S "received FALLBACK_SCSV" \
|
|
||||||
-S "inapropriate fallback"
|
|
||||||
|
|
||||||
# Tests for ALPN extension
|
# Tests for ALPN extension
|
||||||
|
|
||||||
run_test "ALPN: none" \
|
run_test "ALPN: none" \
|
||||||
|
|
|
@ -239,6 +239,10 @@ Handshake, PSK-WITH-AES-128-CBC-SHA
|
||||||
depends_on:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
depends_on:MBEDTLS_AES_C:MBEDTLS_CIPHER_MODE_CBC:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED
|
||||||
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":0
|
handshake_psk_cipher:"TLS-PSK-WITH-AES-128-CBC-SHA":MBEDTLS_PK_RSA:"abc123":0
|
||||||
|
|
||||||
|
DTLS Handshake, tls1_2
|
||||||
|
depends_on:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_SSL_PROTO_DTLS
|
||||||
|
handshake_version:1:MBEDTLS_SSL_MINOR_VERSION_3:MBEDTLS_SSL_MINOR_VERSION_3:MBEDTLS_SSL_MINOR_VERSION_3:MBEDTLS_SSL_MINOR_VERSION_3:MBEDTLS_SSL_MINOR_VERSION_3
|
||||||
|
|
||||||
DTLS Handshake, ECDHE-RSA-WITH-AES-256-GCM-SHA384
|
DTLS Handshake, ECDHE-RSA-WITH-AES-256-GCM-SHA384
|
||||||
depends_on:MBEDTLS_SHA384_C:MBEDTLS_AES_C:MBEDTLS_GCM_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED:MBEDTLS_SSL_PROTO_DTLS
|
depends_on:MBEDTLS_SHA384_C:MBEDTLS_AES_C:MBEDTLS_GCM_C:MBEDTLS_RSA_C:MBEDTLS_ECP_DP_SECP384R1_ENABLED:MBEDTLS_KEY_EXCHANGE_ECDHE_RSA_ENABLED:MBEDTLS_SSL_PROTO_DTLS
|
||||||
handshake_cipher:"TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384":MBEDTLS_PK_RSA:1
|
handshake_cipher:"TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384":MBEDTLS_PK_RSA:1
|
||||||
|
|
Loading…
Reference in a new issue