Reduce the security bits for MD5 and SHA1 based signatures in TLS
This has as effect that SHA1 and MD5+SHA1 are no longer supported at security level 1, and that TLS < 1.2 is no longer supported at the default security level of 1, and that you need to set the security level to 0 to use TLS < 1.2. Reviewed-by: Tim Hudson <tjh@openssl.org> GH: #10787
This commit is contained in:
parent
526f1f1aca
commit
aba03ae571
@ -119,6 +119,14 @@ OpenSSL 3.0
|
|||||||
|
|
||||||
*Paul Dale*
|
*Paul Dale*
|
||||||
|
|
||||||
|
* The security strength of SHA1 and MD5 based signatures in TLS has been
|
||||||
|
reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer
|
||||||
|
working at the default security level of 1 and instead requires security
|
||||||
|
level 0. The security level can be changed either using the cipher string
|
||||||
|
with @SECLEVEL, or calling SSL_CTX_set_security_level().
|
||||||
|
|
||||||
|
*Kurt Roeckx*
|
||||||
|
|
||||||
* EVP_PKEY_get0_RSA(), EVP_PKEY_get0_DSA(), EVP_PKEY_get0_DH(), and
|
* EVP_PKEY_get0_RSA(), EVP_PKEY_get0_DSA(), EVP_PKEY_get0_DH(), and
|
||||||
EVP_PKEY_get0_EC_KEY() can now handle EVP_PKEYs with provider side
|
EVP_PKEY_get0_EC_KEY() can now handle EVP_PKEYs with provider side
|
||||||
internal keys, if they correspond to one of those built in types.
|
internal keys, if they correspond to one of those built in types.
|
||||||
|
1
NEWS.md
1
NEWS.md
@ -63,6 +63,7 @@ OpenSSL 3.0
|
|||||||
RC4, RC5 and SEED cipher functions have been deprecated.
|
RC4, RC5 and SEED cipher functions have been deprecated.
|
||||||
* All of the low level DH, DSA, ECDH, ECDSA and RSA public key functions
|
* All of the low level DH, DSA, ECDH, ECDSA and RSA public key functions
|
||||||
have been deprecated.
|
have been deprecated.
|
||||||
|
* SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0.
|
||||||
|
|
||||||
OpenSSL 1.1.1
|
OpenSSL 1.1.1
|
||||||
-------------
|
-------------
|
||||||
|
18
ssl/t1_lib.c
18
ssl/t1_lib.c
@ -1413,8 +1413,26 @@ static int sigalg_security_bits(SSL_CTX *ctx, const SIGALG_LOOKUP *lu)
|
|||||||
return 0;
|
return 0;
|
||||||
if (md != NULL)
|
if (md != NULL)
|
||||||
{
|
{
|
||||||
|
int md_type = EVP_MD_type(md);
|
||||||
|
|
||||||
/* Security bits: half digest bits */
|
/* Security bits: half digest bits */
|
||||||
secbits = EVP_MD_size(md) * 4;
|
secbits = EVP_MD_size(md) * 4;
|
||||||
|
/*
|
||||||
|
* SHA1 and MD5 are known to be broken. Reduce security bits so that
|
||||||
|
* they're no longer accepted at security level 1. The real values don't
|
||||||
|
* really matter as long as they're lower than 80, which is our
|
||||||
|
* security level 1.
|
||||||
|
* https://eprint.iacr.org/2020/014 puts a chosen-prefix attack for
|
||||||
|
* SHA1 at 2^63.4 and MD5+SHA1 at 2^67.2
|
||||||
|
* https://documents.epfl.ch/users/l/le/lenstra/public/papers/lat.pdf
|
||||||
|
* puts a chosen-prefix attack for MD5 at 2^39.
|
||||||
|
*/
|
||||||
|
if (md_type == NID_sha1)
|
||||||
|
secbits = 64;
|
||||||
|
else if (md_type == NID_md5_sha1)
|
||||||
|
secbits = 67;
|
||||||
|
else if (md_type == NID_md5)
|
||||||
|
secbits = 39;
|
||||||
} else {
|
} else {
|
||||||
/* Values from https://tools.ietf.org/html/rfc8032#section-8.5 */
|
/* Values from https://tools.ietf.org/html/rfc8032#section-8.5 */
|
||||||
if (lu->sigalg == TLSEXT_SIGALG_ed25519)
|
if (lu->sigalg == TLSEXT_SIGALG_ed25519)
|
||||||
|
@ -56,7 +56,8 @@ SKIP: {
|
|||||||
# handshake
|
# handshake
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->filter(undef);
|
$proxy->filter(undef);
|
||||||
$proxy->clientflags("-no_tls1_3");
|
$proxy->ciphers("DEFAULT:\@SECLEVEL=0");
|
||||||
|
$proxy->clientflags("-no_tls1_3 -cipher AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->serverflags("-no_tls1_3 -no_tls1_2");
|
$proxy->serverflags("-no_tls1_3 -no_tls1_2");
|
||||||
$proxy->reneg(1);
|
$proxy->reneg(1);
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
|
@ -206,6 +206,7 @@ SKIP: {
|
|||||||
#Test 3: Sending a zero length extension block should pass
|
#Test 3: Sending a zero length extension block should pass
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->filter(\&extension_filter);
|
$proxy->filter(\&extension_filter);
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success, "Zero extension length test");
|
ok(TLSProxy::Message->success, "Zero extension length test");
|
||||||
|
|
||||||
|
@ -82,11 +82,17 @@ use constant {
|
|||||||
FRAGMENTED_IN_SSLV2 => 3,
|
FRAGMENTED_IN_SSLV2 => 3,
|
||||||
ALERT_BEFORE_SSLV2 => 4
|
ALERT_BEFORE_SSLV2 => 4
|
||||||
};
|
};
|
||||||
|
|
||||||
|
# The TLSv1.2 in SSLv2 ClientHello need to run at security level 0
|
||||||
|
# because in a SSLv2 ClientHello we can't send extentions to indicate
|
||||||
|
# which signature algorithm we want to use, and the default is SHA1.
|
||||||
|
|
||||||
#Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello
|
#Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello
|
||||||
my $sslv2testtype = TLSV1_2_IN_SSLV2;
|
my $sslv2testtype = TLSV1_2_IN_SSLV2;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->filter(\&add_sslv2_filter);
|
$proxy->filter(\&add_sslv2_filter);
|
||||||
$proxy->serverflags("-tls1_2");
|
$proxy->serverflags("-tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test");
|
ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test");
|
||||||
|
|
||||||
@ -96,6 +102,7 @@ ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test");
|
|||||||
$sslv2testtype = SSLV2_IN_SSLV2;
|
$sslv2testtype = SSLV2_IN_SSLV2;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->serverflags("-tls1_2");
|
$proxy->serverflags("-tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
|
ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
|
||||||
|
|
||||||
@ -105,6 +112,7 @@ ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
|
|||||||
$sslv2testtype = FRAGMENTED_IN_TLSV1_2;
|
$sslv2testtype = FRAGMENTED_IN_TLSV1_2;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->serverflags("-tls1_2");
|
$proxy->serverflags("-tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
|
ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
|
||||||
|
|
||||||
@ -113,6 +121,7 @@ ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
|
|||||||
$sslv2testtype = FRAGMENTED_IN_SSLV2;
|
$sslv2testtype = FRAGMENTED_IN_SSLV2;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->serverflags("-tls1_2");
|
$proxy->serverflags("-tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
|
ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
|
||||||
|
|
||||||
@ -121,6 +130,7 @@ ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
|
|||||||
$sslv2testtype = ALERT_BEFORE_SSLV2;
|
$sslv2testtype = ALERT_BEFORE_SSLV2;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->serverflags("-tls1_2");
|
$proxy->serverflags("-tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test");
|
ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test");
|
||||||
|
|
||||||
@ -140,7 +150,8 @@ SKIP: {
|
|||||||
#Test 11: Sending an unrecognised record type in TLS1.1 should fail
|
#Test 11: Sending an unrecognised record type in TLS1.1 should fail
|
||||||
$fatal_alert = 0;
|
$fatal_alert = 0;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->clientflags("-tls1_1");
|
$proxy->clientflags("-tls1_1 -cipher DEFAULT:\@SECLEVEL=0");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok($fatal_alert, "Unrecognised record type in TLS1.1");
|
ok($fatal_alert, "Unrecognised record type in TLS1.1");
|
||||||
}
|
}
|
||||||
|
@ -138,33 +138,33 @@ SKIP: {
|
|||||||
|
|
||||||
$proxy->filter(\&sigalgs_filter);
|
$proxy->filter(\&sigalgs_filter);
|
||||||
|
|
||||||
#Test 10: Sending no sig algs extension in TLSv1.2 should succeed at
|
#Test 10: Sending no sig algs extension in TLSv1.2 will make it use
|
||||||
# security level 1
|
# SHA1, which is only supported at security level 0.
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$testtype = NO_SIG_ALGS_EXT;
|
$testtype = NO_SIG_ALGS_EXT;
|
||||||
$proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=1");
|
$proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=0");
|
||||||
$proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=1");
|
$proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1");
|
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
|
||||||
|
|
||||||
#Test 11: Sending no sig algs extension in TLSv1.2 should fail at security
|
#Test 11: Sending no sig algs extension in TLSv1.2 should fail at security
|
||||||
# level 2 since it will try to use SHA1. Testing client at level 1,
|
# level 1 since it will try to use SHA1. Testing client at level 0,
|
||||||
# server level 2.
|
|
||||||
$proxy->clear();
|
|
||||||
$testtype = NO_SIG_ALGS_EXT;
|
|
||||||
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1");
|
|
||||||
$proxy->ciphers("DEFAULT:\@SECLEVEL=2");
|
|
||||||
$proxy->start();
|
|
||||||
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 2");
|
|
||||||
|
|
||||||
#Test 12: Sending no sig algs extension in TLSv1.2 should fail at security
|
|
||||||
# level 2 since it will try to use SHA1. Testing client at level 2,
|
|
||||||
# server level 1.
|
# server level 1.
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$testtype = NO_SIG_ALGS_EXT;
|
$testtype = NO_SIG_ALGS_EXT;
|
||||||
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=2");
|
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=0");
|
||||||
$proxy->ciphers("DEFAULT:\@SECLEVEL=1");
|
$proxy->ciphers("DEFAULT:\@SECLEVEL=1");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
|
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1");
|
||||||
|
|
||||||
|
#Test 12: Sending no sig algs extension in TLSv1.2 should fail at security
|
||||||
|
# level 1 since it will try to use SHA1. Testing client at level 1,
|
||||||
|
# server level 0.
|
||||||
|
$proxy->clear();
|
||||||
|
$testtype = NO_SIG_ALGS_EXT;
|
||||||
|
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1");
|
||||||
|
$proxy->ciphers("DEFAULT:\@SECLEVEL=0");
|
||||||
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
|
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
|
||||||
|
|
||||||
#Test 13: Sending an empty sig algs extension in TLSv1.2 should fail
|
#Test 13: Sending an empty sig algs extension in TLSv1.2 should fail
|
||||||
@ -221,15 +221,16 @@ SKIP: {
|
|||||||
ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
|
ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
|
||||||
$proxy->filter(\&sigalgs_filter);
|
$proxy->filter(\&sigalgs_filter);
|
||||||
|
|
||||||
#Test 19: No sig algs extension, ECDSA cert, TLSv1.2 should succeed
|
#Test 19: No sig algs extension, ECDSA cert, will use SHA1,
|
||||||
|
# TLSv1.2 should succeed at security level 0
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$testtype = NO_SIG_ALGS_EXT;
|
$testtype = NO_SIG_ALGS_EXT;
|
||||||
$proxy->clientflags("-no_tls1_3");
|
$proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=0");
|
||||||
$proxy->serverflags("-cert " . srctop_file("test", "certs",
|
$proxy->serverflags("-cert " . srctop_file("test", "certs",
|
||||||
"server-ecdsa-cert.pem") .
|
"server-ecdsa-cert.pem") .
|
||||||
" -key " . srctop_file("test", "certs",
|
" -key " . srctop_file("test", "certs",
|
||||||
"server-ecdsa-key.pem")),
|
"server-ecdsa-key.pem")),
|
||||||
$proxy->ciphers("ECDHE-ECDSA-AES128-SHA");
|
$proxy->ciphers("ECDHE-ECDSA-AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
|
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
|
||||||
}
|
}
|
||||||
@ -245,7 +246,7 @@ SKIP: {
|
|||||||
$proxy->filter(\&modify_sigalgs_filter);
|
$proxy->filter(\&modify_sigalgs_filter);
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok($dsa_status && $sha1_status && $sha224_status,
|
ok($dsa_status && $sha1_status && $sha224_status,
|
||||||
"DSA/SHA2 sigalg sent for 1.3-only ClientHello");
|
"DSA and SHA1 sigalgs not sent for 1.3-only ClientHello");
|
||||||
|
|
||||||
#Test 21: signature_algorithms with backwards compatible ClientHello
|
#Test 21: signature_algorithms with backwards compatible ClientHello
|
||||||
SKIP: {
|
SKIP: {
|
||||||
@ -253,10 +254,11 @@ SKIP: {
|
|||||||
$testtype = COMPAT_SIGALGS;
|
$testtype = COMPAT_SIGALGS;
|
||||||
$dsa_status = $sha1_status = $sha224_status = 0;
|
$dsa_status = $sha1_status = $sha224_status = 0;
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
|
$proxy->clientflags("-cipher AES128-SHA\@SECLEVEL=0");
|
||||||
$proxy->filter(\&modify_sigalgs_filter);
|
$proxy->filter(\&modify_sigalgs_filter);
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok($dsa_status && $sha1_status && $sha224_status,
|
ok($dsa_status && $sha1_status && $sha224_status,
|
||||||
"DSA sigalg not sent for compat ClientHello");
|
"backwards compatible sigalg sent for compat ClientHello");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -95,6 +95,8 @@ ok(TLSProxy::Message->success()
|
|||||||
#Test 6: no TLSv1.3 or TLSv1.2 version in supported versions extension, but
|
#Test 6: no TLSv1.3 or TLSv1.2 version in supported versions extension, but
|
||||||
#TLSv1.1 and TLSv1.0 are present. Should just use TLSv1.1 and succeed
|
#TLSv1.1 and TLSv1.0 are present. Should just use TLSv1.1 and succeed
|
||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
|
$proxy->clientflags("-cipher DEFAULT:\@SECLEVEL=0");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$testtype = TLS1_1_AND_1_0_ONLY;
|
$testtype = TLS1_1_AND_1_0_ONLY;
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
$record = pop @{$proxy->record_list};
|
$record = pop @{$proxy->record_list};
|
||||||
|
@ -79,6 +79,7 @@ SKIP: {
|
|||||||
$proxy->clear();
|
$proxy->clear();
|
||||||
$proxy->filter(undef);
|
$proxy->filter(undef);
|
||||||
$proxy->clientflags("-no_tls1_2");
|
$proxy->clientflags("-no_tls1_2");
|
||||||
|
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
|
||||||
$proxy->start();
|
$proxy->start();
|
||||||
ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole");
|
ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole");
|
||||||
|
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -49,11 +49,11 @@ client = 0-server-auth-flex-client
|
|||||||
|
|
||||||
[0-server-auth-flex-server]
|
[0-server-auth-flex-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[0-server-auth-flex-client]
|
[0-server-auth-flex-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -72,12 +72,12 @@ client = 1-client-auth-flex-request-client
|
|||||||
|
|
||||||
[1-client-auth-flex-request-server]
|
[1-client-auth-flex-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[1-client-auth-flex-request-client]
|
[1-client-auth-flex-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -96,13 +96,13 @@ client = 2-client-auth-flex-require-fail-client
|
|||||||
|
|
||||||
[2-client-auth-flex-require-fail-server]
|
[2-client-auth-flex-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[2-client-auth-flex-require-fail-client]
|
[2-client-auth-flex-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -122,14 +122,14 @@ client = 3-client-auth-flex-require-client
|
|||||||
|
|
||||||
[3-client-auth-flex-require-server]
|
[3-client-auth-flex-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[3-client-auth-flex-require-client]
|
[3-client-auth-flex-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -151,7 +151,7 @@ client = 4-client-auth-flex-require-non-empty-names-client
|
|||||||
|
|
||||||
[4-client-auth-flex-require-non-empty-names-server]
|
[4-client-auth-flex-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
@ -159,7 +159,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[4-client-auth-flex-require-non-empty-names-client]
|
[4-client-auth-flex-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -181,13 +181,13 @@ client = 5-client-auth-flex-noroot-client
|
|||||||
|
|
||||||
[5-client-auth-flex-noroot-server]
|
[5-client-auth-flex-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[5-client-auth-flex-noroot-client]
|
[5-client-auth-flex-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -208,13 +208,13 @@ client = 6-server-auth-TLSv1-client
|
|||||||
|
|
||||||
[6-server-auth-TLSv1-server]
|
[6-server-auth-TLSv1-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[6-server-auth-TLSv1-client]
|
[6-server-auth-TLSv1-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -235,14 +235,14 @@ client = 7-client-auth-TLSv1-request-client
|
|||||||
|
|
||||||
[7-client-auth-TLSv1-request-server]
|
[7-client-auth-TLSv1-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[7-client-auth-TLSv1-request-client]
|
[7-client-auth-TLSv1-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -263,7 +263,7 @@ client = 8-client-auth-TLSv1-require-fail-client
|
|||||||
|
|
||||||
[8-client-auth-TLSv1-require-fail-server]
|
[8-client-auth-TLSv1-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -271,7 +271,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[8-client-auth-TLSv1-require-fail-client]
|
[8-client-auth-TLSv1-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -293,7 +293,7 @@ client = 9-client-auth-TLSv1-require-client
|
|||||||
|
|
||||||
[9-client-auth-TLSv1-require-server]
|
[9-client-auth-TLSv1-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -302,7 +302,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[9-client-auth-TLSv1-require-client]
|
[9-client-auth-TLSv1-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -326,7 +326,7 @@ client = 10-client-auth-TLSv1-require-non-empty-names-client
|
|||||||
|
|
||||||
[10-client-auth-TLSv1-require-non-empty-names-server]
|
[10-client-auth-TLSv1-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
@ -336,7 +336,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[10-client-auth-TLSv1-require-non-empty-names-client]
|
[10-client-auth-TLSv1-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -360,7 +360,7 @@ client = 11-client-auth-TLSv1-noroot-client
|
|||||||
|
|
||||||
[11-client-auth-TLSv1-noroot-server]
|
[11-client-auth-TLSv1-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -368,7 +368,7 @@ VerifyMode = Require
|
|||||||
|
|
||||||
[11-client-auth-TLSv1-noroot-client]
|
[11-client-auth-TLSv1-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1
|
MaxProtocol = TLSv1
|
||||||
MinProtocol = TLSv1
|
MinProtocol = TLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -391,13 +391,13 @@ client = 12-server-auth-TLSv1.1-client
|
|||||||
|
|
||||||
[12-server-auth-TLSv1.1-server]
|
[12-server-auth-TLSv1.1-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[12-server-auth-TLSv1.1-client]
|
[12-server-auth-TLSv1.1-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -418,14 +418,14 @@ client = 13-client-auth-TLSv1.1-request-client
|
|||||||
|
|
||||||
[13-client-auth-TLSv1.1-request-server]
|
[13-client-auth-TLSv1.1-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[13-client-auth-TLSv1.1-request-client]
|
[13-client-auth-TLSv1.1-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -446,7 +446,7 @@ client = 14-client-auth-TLSv1.1-require-fail-client
|
|||||||
|
|
||||||
[14-client-auth-TLSv1.1-require-fail-server]
|
[14-client-auth-TLSv1.1-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -454,7 +454,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[14-client-auth-TLSv1.1-require-fail-client]
|
[14-client-auth-TLSv1.1-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -476,7 +476,7 @@ client = 15-client-auth-TLSv1.1-require-client
|
|||||||
|
|
||||||
[15-client-auth-TLSv1.1-require-server]
|
[15-client-auth-TLSv1.1-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -485,7 +485,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[15-client-auth-TLSv1.1-require-client]
|
[15-client-auth-TLSv1.1-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -509,7 +509,7 @@ client = 16-client-auth-TLSv1.1-require-non-empty-names-client
|
|||||||
|
|
||||||
[16-client-auth-TLSv1.1-require-non-empty-names-server]
|
[16-client-auth-TLSv1.1-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
@ -519,7 +519,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[16-client-auth-TLSv1.1-require-non-empty-names-client]
|
[16-client-auth-TLSv1.1-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -543,7 +543,7 @@ client = 17-client-auth-TLSv1.1-noroot-client
|
|||||||
|
|
||||||
[17-client-auth-TLSv1.1-noroot-server]
|
[17-client-auth-TLSv1.1-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -551,7 +551,7 @@ VerifyMode = Require
|
|||||||
|
|
||||||
[17-client-auth-TLSv1.1-noroot-client]
|
[17-client-auth-TLSv1.1-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.1
|
MaxProtocol = TLSv1.1
|
||||||
MinProtocol = TLSv1.1
|
MinProtocol = TLSv1.1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -574,13 +574,13 @@ client = 18-server-auth-TLSv1.2-client
|
|||||||
|
|
||||||
[18-server-auth-TLSv1.2-server]
|
[18-server-auth-TLSv1.2-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[18-server-auth-TLSv1.2-client]
|
[18-server-auth-TLSv1.2-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -601,14 +601,14 @@ client = 19-client-auth-TLSv1.2-request-client
|
|||||||
|
|
||||||
[19-client-auth-TLSv1.2-request-server]
|
[19-client-auth-TLSv1.2-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[19-client-auth-TLSv1.2-request-client]
|
[19-client-auth-TLSv1.2-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -629,7 +629,7 @@ client = 20-client-auth-TLSv1.2-require-fail-client
|
|||||||
|
|
||||||
[20-client-auth-TLSv1.2-require-fail-server]
|
[20-client-auth-TLSv1.2-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -637,7 +637,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[20-client-auth-TLSv1.2-require-fail-client]
|
[20-client-auth-TLSv1.2-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -659,7 +659,7 @@ client = 21-client-auth-TLSv1.2-require-client
|
|||||||
|
|
||||||
[21-client-auth-TLSv1.2-require-server]
|
[21-client-auth-TLSv1.2-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientSignatureAlgorithms = SHA256+RSA
|
ClientSignatureAlgorithms = SHA256+RSA
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
@ -669,7 +669,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[21-client-auth-TLSv1.2-require-client]
|
[21-client-auth-TLSv1.2-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -695,7 +695,7 @@ client = 22-client-auth-TLSv1.2-require-non-empty-names-client
|
|||||||
|
|
||||||
[22-client-auth-TLSv1.2-require-non-empty-names-server]
|
[22-client-auth-TLSv1.2-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
ClientSignatureAlgorithms = SHA256+RSA
|
ClientSignatureAlgorithms = SHA256+RSA
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
@ -706,7 +706,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[22-client-auth-TLSv1.2-require-non-empty-names-client]
|
[22-client-auth-TLSv1.2-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -732,7 +732,7 @@ client = 23-client-auth-TLSv1.2-noroot-client
|
|||||||
|
|
||||||
[23-client-auth-TLSv1.2-noroot-server]
|
[23-client-auth-TLSv1.2-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -740,7 +740,7 @@ VerifyMode = Require
|
|||||||
|
|
||||||
[23-client-auth-TLSv1.2-noroot-client]
|
[23-client-auth-TLSv1.2-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = TLSv1.2
|
MaxProtocol = TLSv1.2
|
||||||
MinProtocol = TLSv1.2
|
MinProtocol = TLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -763,13 +763,13 @@ client = 24-server-auth-DTLSv1-client
|
|||||||
|
|
||||||
[24-server-auth-DTLSv1-server]
|
[24-server-auth-DTLSv1-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[24-server-auth-DTLSv1-client]
|
[24-server-auth-DTLSv1-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -791,14 +791,14 @@ client = 25-client-auth-DTLSv1-request-client
|
|||||||
|
|
||||||
[25-client-auth-DTLSv1-request-server]
|
[25-client-auth-DTLSv1-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[25-client-auth-DTLSv1-request-client]
|
[25-client-auth-DTLSv1-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -820,7 +820,7 @@ client = 26-client-auth-DTLSv1-require-fail-client
|
|||||||
|
|
||||||
[26-client-auth-DTLSv1-require-fail-server]
|
[26-client-auth-DTLSv1-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -828,7 +828,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[26-client-auth-DTLSv1-require-fail-client]
|
[26-client-auth-DTLSv1-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -851,7 +851,7 @@ client = 27-client-auth-DTLSv1-require-client
|
|||||||
|
|
||||||
[27-client-auth-DTLSv1-require-server]
|
[27-client-auth-DTLSv1-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -860,7 +860,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[27-client-auth-DTLSv1-require-client]
|
[27-client-auth-DTLSv1-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -885,7 +885,7 @@ client = 28-client-auth-DTLSv1-require-non-empty-names-client
|
|||||||
|
|
||||||
[28-client-auth-DTLSv1-require-non-empty-names-server]
|
[28-client-auth-DTLSv1-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
@ -895,7 +895,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[28-client-auth-DTLSv1-require-non-empty-names-client]
|
[28-client-auth-DTLSv1-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -920,7 +920,7 @@ client = 29-client-auth-DTLSv1-noroot-client
|
|||||||
|
|
||||||
[29-client-auth-DTLSv1-noroot-server]
|
[29-client-auth-DTLSv1-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -928,7 +928,7 @@ VerifyMode = Require
|
|||||||
|
|
||||||
[29-client-auth-DTLSv1-noroot-client]
|
[29-client-auth-DTLSv1-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -952,13 +952,13 @@ client = 30-server-auth-DTLSv1.2-client
|
|||||||
|
|
||||||
[30-server-auth-DTLSv1.2-server]
|
[30-server-auth-DTLSv1.2-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[30-server-auth-DTLSv1.2-client]
|
[30-server-auth-DTLSv1.2-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -980,14 +980,14 @@ client = 31-client-auth-DTLSv1.2-request-client
|
|||||||
|
|
||||||
[31-client-auth-DTLSv1.2-request-server]
|
[31-client-auth-DTLSv1.2-request-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
VerifyMode = Request
|
VerifyMode = Request
|
||||||
|
|
||||||
[31-client-auth-DTLSv1.2-request-client]
|
[31-client-auth-DTLSv1.2-request-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1009,7 +1009,7 @@ client = 32-client-auth-DTLSv1.2-require-fail-client
|
|||||||
|
|
||||||
[32-client-auth-DTLSv1.2-require-fail-server]
|
[32-client-auth-DTLSv1.2-require-fail-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -1017,7 +1017,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
|||||||
VerifyMode = Require
|
VerifyMode = Require
|
||||||
|
|
||||||
[32-client-auth-DTLSv1.2-require-fail-client]
|
[32-client-auth-DTLSv1.2-require-fail-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1040,7 +1040,7 @@ client = 33-client-auth-DTLSv1.2-require-client
|
|||||||
|
|
||||||
[33-client-auth-DTLSv1.2-require-server]
|
[33-client-auth-DTLSv1.2-require-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -1049,7 +1049,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[33-client-auth-DTLSv1.2-require-client]
|
[33-client-auth-DTLSv1.2-require-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -1074,7 +1074,7 @@ client = 34-client-auth-DTLSv1.2-require-non-empty-names-client
|
|||||||
|
|
||||||
[34-client-auth-DTLSv1.2-require-non-empty-names-server]
|
[34-client-auth-DTLSv1.2-require-non-empty-names-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
@ -1084,7 +1084,7 @@ VerifyMode = Request
|
|||||||
|
|
||||||
[34-client-auth-DTLSv1.2-require-non-empty-names-client]
|
[34-client-auth-DTLSv1.2-require-non-empty-names-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
@ -1109,7 +1109,7 @@ client = 35-client-auth-DTLSv1.2-noroot-client
|
|||||||
|
|
||||||
[35-client-auth-DTLSv1.2-noroot-server]
|
[35-client-auth-DTLSv1.2-noroot-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
@ -1117,7 +1117,7 @@ VerifyMode = Require
|
|||||||
|
|
||||||
[35-client-auth-DTLSv1.2-noroot-client]
|
[35-client-auth-DTLSv1.2-noroot-client]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
|
||||||
|
@ -58,10 +58,12 @@ sub generate_tests() {
|
|||||||
name => "server-auth-${protocol_name}"
|
name => "server-auth-${protocol_name}"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol
|
"MaxProtocol" => $protocol
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol
|
"MaxProtocol" => $protocol
|
||||||
},
|
},
|
||||||
@ -77,11 +79,13 @@ sub generate_tests() {
|
|||||||
name => "client-auth-${protocol_name}-request"
|
name => "client-auth-${protocol_name}-request"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"VerifyMode" => "Request"
|
"VerifyMode" => "Request"
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol
|
"MaxProtocol" => $protocol
|
||||||
},
|
},
|
||||||
@ -97,12 +101,14 @@ sub generate_tests() {
|
|||||||
name => "client-auth-${protocol_name}-require-fail"
|
name => "client-auth-${protocol_name}-require-fail"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"VerifyCAFile" => test_pem("root-cert.pem"),
|
"VerifyCAFile" => test_pem("root-cert.pem"),
|
||||||
"VerifyMode" => "Require",
|
"VerifyMode" => "Require",
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol
|
"MaxProtocol" => $protocol
|
||||||
},
|
},
|
||||||
@ -121,6 +127,7 @@ sub generate_tests() {
|
|||||||
name => "client-auth-${protocol_name}-require"
|
name => "client-auth-${protocol_name}-require"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"ClientSignatureAlgorithms" => $clisigalgs,
|
"ClientSignatureAlgorithms" => $clisigalgs,
|
||||||
@ -128,6 +135,7 @@ sub generate_tests() {
|
|||||||
"VerifyMode" => "Request",
|
"VerifyMode" => "Request",
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"Certificate" => test_pem("ee-client-chain.pem"),
|
"Certificate" => test_pem("ee-client-chain.pem"),
|
||||||
@ -149,6 +157,7 @@ sub generate_tests() {
|
|||||||
name => "client-auth-${protocol_name}-require-non-empty-names"
|
name => "client-auth-${protocol_name}-require-non-empty-names"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"ClientSignatureAlgorithms" => $clisigalgs,
|
"ClientSignatureAlgorithms" => $clisigalgs,
|
||||||
@ -157,6 +166,7 @@ sub generate_tests() {
|
|||||||
"VerifyMode" => "Request",
|
"VerifyMode" => "Request",
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"Certificate" => test_pem("ee-client-chain.pem"),
|
"Certificate" => test_pem("ee-client-chain.pem"),
|
||||||
@ -178,11 +188,13 @@ sub generate_tests() {
|
|||||||
name => "client-auth-${protocol_name}-noroot"
|
name => "client-auth-${protocol_name}-noroot"
|
||||||
.($sctp ? "-sctp" : ""),
|
.($sctp ? "-sctp" : ""),
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"VerifyMode" => "Require",
|
"VerifyMode" => "Require",
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocol,
|
"MinProtocol" => $protocol,
|
||||||
"MaxProtocol" => $protocol,
|
"MaxProtocol" => $protocol,
|
||||||
"Certificate" => test_pem("ee-client-chain.pem"),
|
"Certificate" => test_pem("ee-client-chain.pem"),
|
||||||
|
@ -284,11 +284,11 @@ server2 = 8-SNI-clienthello-disable-v12-server
|
|||||||
|
|
||||||
[8-SNI-clienthello-disable-v12-server]
|
[8-SNI-clienthello-disable-v12-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[8-SNI-clienthello-disable-v12-client]
|
[8-SNI-clienthello-disable-v12-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
|
@ -152,11 +152,13 @@ our @tests_tls_1_1 = (
|
|||||||
{
|
{
|
||||||
name => "SNI-clienthello-disable-v12",
|
name => "SNI-clienthello-disable-v12",
|
||||||
server => {
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
extra => {
|
extra => {
|
||||||
"ServerNameCallback" => "ClientHelloNoV12",
|
"ServerNameCallback" => "ClientHelloNoV12",
|
||||||
},
|
},
|
||||||
},
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
extra => {
|
extra => {
|
||||||
"ServerName" => "server2",
|
"ServerName" => "server2",
|
||||||
},
|
},
|
||||||
|
@ -77,12 +77,12 @@ client = 0-version-negotiation-client
|
|||||||
|
|
||||||
[0-version-negotiation-server]
|
[0-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[0-version-negotiation-client]
|
[0-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -104,12 +104,12 @@ client = 1-version-negotiation-client
|
|||||||
|
|
||||||
[1-version-negotiation-server]
|
[1-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[1-version-negotiation-client]
|
[1-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -131,11 +131,11 @@ client = 2-version-negotiation-client
|
|||||||
|
|
||||||
[2-version-negotiation-server]
|
[2-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[2-version-negotiation-client]
|
[2-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -157,13 +157,13 @@ client = 3-version-negotiation-client
|
|||||||
|
|
||||||
[3-version-negotiation-server]
|
[3-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[3-version-negotiation-client]
|
[3-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -185,13 +185,13 @@ client = 4-version-negotiation-client
|
|||||||
|
|
||||||
[4-version-negotiation-server]
|
[4-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[4-version-negotiation-client]
|
[4-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -213,12 +213,12 @@ client = 5-version-negotiation-client
|
|||||||
|
|
||||||
[5-version-negotiation-server]
|
[5-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[5-version-negotiation-client]
|
[5-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -240,13 +240,13 @@ client = 6-version-negotiation-client
|
|||||||
|
|
||||||
[6-version-negotiation-server]
|
[6-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[6-version-negotiation-client]
|
[6-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -267,12 +267,12 @@ client = 7-version-negotiation-client
|
|||||||
|
|
||||||
[7-version-negotiation-server]
|
[7-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[7-version-negotiation-client]
|
[7-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -293,12 +293,12 @@ client = 8-version-negotiation-client
|
|||||||
|
|
||||||
[8-version-negotiation-server]
|
[8-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[8-version-negotiation-client]
|
[8-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -320,12 +320,12 @@ client = 9-version-negotiation-client
|
|||||||
|
|
||||||
[9-version-negotiation-server]
|
[9-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[9-version-negotiation-client]
|
[9-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -347,11 +347,11 @@ client = 10-version-negotiation-client
|
|||||||
|
|
||||||
[10-version-negotiation-server]
|
[10-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[10-version-negotiation-client]
|
[10-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -373,13 +373,13 @@ client = 11-version-negotiation-client
|
|||||||
|
|
||||||
[11-version-negotiation-server]
|
[11-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[11-version-negotiation-client]
|
[11-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -401,13 +401,13 @@ client = 12-version-negotiation-client
|
|||||||
|
|
||||||
[12-version-negotiation-server]
|
[12-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[12-version-negotiation-client]
|
[12-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -429,12 +429,12 @@ client = 13-version-negotiation-client
|
|||||||
|
|
||||||
[13-version-negotiation-server]
|
[13-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[13-version-negotiation-client]
|
[13-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -456,13 +456,13 @@ client = 14-version-negotiation-client
|
|||||||
|
|
||||||
[14-version-negotiation-server]
|
[14-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[14-version-negotiation-client]
|
[14-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -484,12 +484,12 @@ client = 15-version-negotiation-client
|
|||||||
|
|
||||||
[15-version-negotiation-server]
|
[15-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[15-version-negotiation-client]
|
[15-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -511,12 +511,12 @@ client = 16-version-negotiation-client
|
|||||||
|
|
||||||
[16-version-negotiation-server]
|
[16-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[16-version-negotiation-client]
|
[16-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -537,12 +537,12 @@ client = 17-version-negotiation-client
|
|||||||
|
|
||||||
[17-version-negotiation-server]
|
[17-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[17-version-negotiation-client]
|
[17-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -563,11 +563,11 @@ client = 18-version-negotiation-client
|
|||||||
|
|
||||||
[18-version-negotiation-server]
|
[18-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[18-version-negotiation-client]
|
[18-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -588,13 +588,13 @@ client = 19-version-negotiation-client
|
|||||||
|
|
||||||
[19-version-negotiation-server]
|
[19-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[19-version-negotiation-client]
|
[19-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -615,13 +615,13 @@ client = 20-version-negotiation-client
|
|||||||
|
|
||||||
[20-version-negotiation-server]
|
[20-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[20-version-negotiation-client]
|
[20-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -642,12 +642,12 @@ client = 21-version-negotiation-client
|
|||||||
|
|
||||||
[21-version-negotiation-server]
|
[21-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[21-version-negotiation-client]
|
[21-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -668,13 +668,13 @@ client = 22-version-negotiation-client
|
|||||||
|
|
||||||
[22-version-negotiation-server]
|
[22-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[22-version-negotiation-client]
|
[22-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -695,12 +695,12 @@ client = 23-version-negotiation-client
|
|||||||
|
|
||||||
[23-version-negotiation-server]
|
[23-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[23-version-negotiation-client]
|
[23-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -721,12 +721,12 @@ client = 24-version-negotiation-client
|
|||||||
|
|
||||||
[24-version-negotiation-server]
|
[24-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[24-version-negotiation-client]
|
[24-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -749,12 +749,12 @@ client = 25-version-negotiation-client
|
|||||||
|
|
||||||
[25-version-negotiation-server]
|
[25-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[25-version-negotiation-client]
|
[25-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -777,11 +777,11 @@ client = 26-version-negotiation-client
|
|||||||
|
|
||||||
[26-version-negotiation-server]
|
[26-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[26-version-negotiation-client]
|
[26-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -804,13 +804,13 @@ client = 27-version-negotiation-client
|
|||||||
|
|
||||||
[27-version-negotiation-server]
|
[27-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[27-version-negotiation-client]
|
[27-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -833,13 +833,13 @@ client = 28-version-negotiation-client
|
|||||||
|
|
||||||
[28-version-negotiation-server]
|
[28-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[28-version-negotiation-client]
|
[28-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -862,12 +862,12 @@ client = 29-version-negotiation-client
|
|||||||
|
|
||||||
[29-version-negotiation-server]
|
[29-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[29-version-negotiation-client]
|
[29-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -890,13 +890,13 @@ client = 30-version-negotiation-client
|
|||||||
|
|
||||||
[30-version-negotiation-server]
|
[30-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[30-version-negotiation-client]
|
[30-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -918,12 +918,12 @@ client = 31-version-negotiation-client
|
|||||||
|
|
||||||
[31-version-negotiation-server]
|
[31-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[31-version-negotiation-client]
|
[31-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -945,12 +945,12 @@ client = 32-version-negotiation-client
|
|||||||
|
|
||||||
[32-version-negotiation-server]
|
[32-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[32-version-negotiation-client]
|
[32-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -973,12 +973,12 @@ client = 33-version-negotiation-client
|
|||||||
|
|
||||||
[33-version-negotiation-server]
|
[33-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[33-version-negotiation-client]
|
[33-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1001,11 +1001,11 @@ client = 34-version-negotiation-client
|
|||||||
|
|
||||||
[34-version-negotiation-server]
|
[34-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[34-version-negotiation-client]
|
[34-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1028,13 +1028,13 @@ client = 35-version-negotiation-client
|
|||||||
|
|
||||||
[35-version-negotiation-server]
|
[35-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[35-version-negotiation-client]
|
[35-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1057,13 +1057,13 @@ client = 36-version-negotiation-client
|
|||||||
|
|
||||||
[36-version-negotiation-server]
|
[36-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[36-version-negotiation-client]
|
[36-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1086,12 +1086,12 @@ client = 37-version-negotiation-client
|
|||||||
|
|
||||||
[37-version-negotiation-server]
|
[37-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[37-version-negotiation-client]
|
[37-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1114,13 +1114,13 @@ client = 38-version-negotiation-client
|
|||||||
|
|
||||||
[38-version-negotiation-server]
|
[38-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[38-version-negotiation-client]
|
[38-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1143,12 +1143,12 @@ client = 39-version-negotiation-client
|
|||||||
|
|
||||||
[39-version-negotiation-server]
|
[39-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[39-version-negotiation-client]
|
[39-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1171,12 +1171,12 @@ client = 40-version-negotiation-client
|
|||||||
|
|
||||||
[40-version-negotiation-server]
|
[40-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[40-version-negotiation-client]
|
[40-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1198,12 +1198,12 @@ client = 41-version-negotiation-client
|
|||||||
|
|
||||||
[41-version-negotiation-server]
|
[41-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[41-version-negotiation-client]
|
[41-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1225,11 +1225,11 @@ client = 42-version-negotiation-client
|
|||||||
|
|
||||||
[42-version-negotiation-server]
|
[42-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[42-version-negotiation-client]
|
[42-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1251,13 +1251,13 @@ client = 43-version-negotiation-client
|
|||||||
|
|
||||||
[43-version-negotiation-server]
|
[43-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[43-version-negotiation-client]
|
[43-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1279,13 +1279,13 @@ client = 44-version-negotiation-client
|
|||||||
|
|
||||||
[44-version-negotiation-server]
|
[44-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[44-version-negotiation-client]
|
[44-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1307,12 +1307,12 @@ client = 45-version-negotiation-client
|
|||||||
|
|
||||||
[45-version-negotiation-server]
|
[45-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[45-version-negotiation-client]
|
[45-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1334,13 +1334,13 @@ client = 46-version-negotiation-client
|
|||||||
|
|
||||||
[46-version-negotiation-server]
|
[46-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[46-version-negotiation-client]
|
[46-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1362,12 +1362,12 @@ client = 47-version-negotiation-client
|
|||||||
|
|
||||||
[47-version-negotiation-server]
|
[47-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[47-version-negotiation-client]
|
[47-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1389,12 +1389,12 @@ client = 48-version-negotiation-client
|
|||||||
|
|
||||||
[48-version-negotiation-server]
|
[48-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[48-version-negotiation-client]
|
[48-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1416,12 +1416,12 @@ client = 49-version-negotiation-client
|
|||||||
|
|
||||||
[49-version-negotiation-server]
|
[49-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[49-version-negotiation-client]
|
[49-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1444,11 +1444,11 @@ client = 50-version-negotiation-client
|
|||||||
|
|
||||||
[50-version-negotiation-server]
|
[50-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[50-version-negotiation-client]
|
[50-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1471,13 +1471,13 @@ client = 51-version-negotiation-client
|
|||||||
|
|
||||||
[51-version-negotiation-server]
|
[51-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[51-version-negotiation-client]
|
[51-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1499,13 +1499,13 @@ client = 52-version-negotiation-client
|
|||||||
|
|
||||||
[52-version-negotiation-server]
|
[52-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[52-version-negotiation-client]
|
[52-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1528,12 +1528,12 @@ client = 53-version-negotiation-client
|
|||||||
|
|
||||||
[53-version-negotiation-server]
|
[53-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[53-version-negotiation-client]
|
[53-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1556,13 +1556,13 @@ client = 54-version-negotiation-client
|
|||||||
|
|
||||||
[54-version-negotiation-server]
|
[54-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[54-version-negotiation-client]
|
[54-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1585,12 +1585,12 @@ client = 55-version-negotiation-client
|
|||||||
|
|
||||||
[55-version-negotiation-server]
|
[55-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[55-version-negotiation-client]
|
[55-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
@ -1613,12 +1613,12 @@ client = 56-version-negotiation-client
|
|||||||
|
|
||||||
[56-version-negotiation-server]
|
[56-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[56-version-negotiation-client]
|
[56-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1639,12 +1639,12 @@ client = 57-version-negotiation-client
|
|||||||
|
|
||||||
[57-version-negotiation-server]
|
[57-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[57-version-negotiation-client]
|
[57-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1666,11 +1666,11 @@ client = 58-version-negotiation-client
|
|||||||
|
|
||||||
[58-version-negotiation-server]
|
[58-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[58-version-negotiation-client]
|
[58-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1692,13 +1692,13 @@ client = 59-version-negotiation-client
|
|||||||
|
|
||||||
[59-version-negotiation-server]
|
[59-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[59-version-negotiation-client]
|
[59-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1719,13 +1719,13 @@ client = 60-version-negotiation-client
|
|||||||
|
|
||||||
[60-version-negotiation-server]
|
[60-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[60-version-negotiation-client]
|
[60-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1747,12 +1747,12 @@ client = 61-version-negotiation-client
|
|||||||
|
|
||||||
[61-version-negotiation-server]
|
[61-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[61-version-negotiation-client]
|
[61-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1774,13 +1774,13 @@ client = 62-version-negotiation-client
|
|||||||
|
|
||||||
[62-version-negotiation-server]
|
[62-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[62-version-negotiation-client]
|
[62-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1802,12 +1802,12 @@ client = 63-version-negotiation-client
|
|||||||
|
|
||||||
[63-version-negotiation-server]
|
[63-version-negotiation-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[63-version-negotiation-client]
|
[63-version-negotiation-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
File diff suppressed because it is too large
Load Diff
@ -31,7 +31,7 @@ resume-client = 0-resumption-client
|
|||||||
|
|
||||||
[0-resumption-server]
|
[0-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
@ -39,13 +39,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[0-resumption-resume-server]
|
[0-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[0-resumption-client]
|
[0-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -69,7 +69,7 @@ resume-client = 1-resumption-client
|
|||||||
|
|
||||||
[1-resumption-server]
|
[1-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
@ -77,13 +77,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[1-resumption-resume-server]
|
[1-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[1-resumption-client]
|
[1-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -107,7 +107,7 @@ resume-client = 2-resumption-client
|
|||||||
|
|
||||||
[2-resumption-server]
|
[2-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
@ -115,13 +115,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[2-resumption-resume-server]
|
[2-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[2-resumption-client]
|
[2-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -145,7 +145,7 @@ resume-client = 3-resumption-client
|
|||||||
|
|
||||||
[3-resumption-server]
|
[3-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
@ -153,13 +153,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[3-resumption-resume-server]
|
[3-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[3-resumption-client]
|
[3-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -183,7 +183,7 @@ resume-client = 4-resumption-client
|
|||||||
|
|
||||||
[4-resumption-server]
|
[4-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
@ -191,13 +191,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[4-resumption-resume-server]
|
[4-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[4-resumption-client]
|
[4-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -221,7 +221,7 @@ resume-client = 5-resumption-client
|
|||||||
|
|
||||||
[5-resumption-server]
|
[5-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
@ -229,13 +229,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[5-resumption-resume-server]
|
[5-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[5-resumption-client]
|
[5-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -259,7 +259,7 @@ resume-client = 6-resumption-client
|
|||||||
|
|
||||||
[6-resumption-server]
|
[6-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
@ -267,13 +267,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[6-resumption-resume-server]
|
[6-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[6-resumption-client]
|
[6-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -297,7 +297,7 @@ resume-client = 7-resumption-client
|
|||||||
|
|
||||||
[7-resumption-server]
|
[7-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
@ -305,13 +305,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
|||||||
|
|
||||||
[7-resumption-resume-server]
|
[7-resumption-resume-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[7-resumption-client]
|
[7-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
@ -335,19 +335,19 @@ resume-client = 8-resumption-resume-client
|
|||||||
|
|
||||||
[8-resumption-server]
|
[8-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[8-resumption-client]
|
[8-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[8-resumption-resume-client]
|
[8-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -372,19 +372,19 @@ resume-client = 9-resumption-resume-client
|
|||||||
|
|
||||||
[9-resumption-server]
|
[9-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[9-resumption-client]
|
[9-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[9-resumption-resume-client]
|
[9-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -409,19 +409,19 @@ resume-client = 10-resumption-resume-client
|
|||||||
|
|
||||||
[10-resumption-server]
|
[10-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[10-resumption-client]
|
[10-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[10-resumption-resume-client]
|
[10-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -446,19 +446,19 @@ resume-client = 11-resumption-resume-client
|
|||||||
|
|
||||||
[11-resumption-server]
|
[11-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[11-resumption-client]
|
[11-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
MinProtocol = DTLSv1
|
MinProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[11-resumption-resume-client]
|
[11-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -483,19 +483,19 @@ resume-client = 12-resumption-resume-client
|
|||||||
|
|
||||||
[12-resumption-server]
|
[12-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[12-resumption-client]
|
[12-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[12-resumption-resume-client]
|
[12-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -520,19 +520,19 @@ resume-client = 13-resumption-resume-client
|
|||||||
|
|
||||||
[13-resumption-server]
|
[13-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[13-resumption-client]
|
[13-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[13-resumption-resume-client]
|
[13-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1
|
MaxProtocol = DTLSv1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -557,19 +557,19 @@ resume-client = 14-resumption-resume-client
|
|||||||
|
|
||||||
[14-resumption-server]
|
[14-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = SessionTicket
|
Options = SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[14-resumption-client]
|
[14-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[14-resumption-resume-client]
|
[14-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -594,19 +594,19 @@ resume-client = 15-resumption-resume-client
|
|||||||
|
|
||||||
[15-resumption-server]
|
[15-resumption-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
Options = -SessionTicket
|
Options = -SessionTicket
|
||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[15-resumption-client]
|
[15-resumption-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
MinProtocol = DTLSv1.2
|
MinProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
|
||||||
[15-resumption-resume-client]
|
[15-resumption-resume-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
MaxProtocol = DTLSv1.2
|
MaxProtocol = DTLSv1.2
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
@ -328,7 +328,7 @@ client = 8-ECDSA Signature Algorithm Selection SHA1-client
|
|||||||
|
|
||||||
[8-ECDSA Signature Algorithm Selection SHA1-server]
|
[8-ECDSA Signature Algorithm Selection SHA1-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
||||||
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
||||||
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
|
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
|
||||||
@ -339,7 +339,7 @@ MaxProtocol = TLSv1.2
|
|||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[8-ECDSA Signature Algorithm Selection SHA1-client]
|
[8-ECDSA Signature Algorithm Selection SHA1-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
SignatureAlgorithms = ECDSA+SHA1
|
SignatureAlgorithms = ECDSA+SHA1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
@ -1209,7 +1209,7 @@ client = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client
|
|||||||
|
|
||||||
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-server]
|
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-server]
|
||||||
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
|
||||||
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
|
||||||
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
|
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
|
||||||
@ -1221,7 +1221,7 @@ MinProtocol = TLSv1.3
|
|||||||
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
|
||||||
|
|
||||||
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client]
|
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client]
|
||||||
CipherString = DEFAULT
|
CipherString = DEFAULT:@SECLEVEL=0
|
||||||
SignatureAlgorithms = ECDSA+SHA1
|
SignatureAlgorithms = ECDSA+SHA1
|
||||||
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
|
||||||
VerifyMode = Peer
|
VerifyMode = Peer
|
||||||
|
@ -201,8 +201,18 @@ our @tests = (
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
name => "ECDSA Signature Algorithm Selection SHA1",
|
name => "ECDSA Signature Algorithm Selection SHA1",
|
||||||
server => $server,
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
|
"ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
|
||||||
|
"ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
||||||
|
"Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
|
||||||
|
"Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
|
||||||
|
"Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
|
||||||
|
"Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
|
||||||
|
"MaxProtocol" => "TLSv1.2"
|
||||||
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"SignatureAlgorithms" => "ECDSA+SHA1",
|
"SignatureAlgorithms" => "ECDSA+SHA1",
|
||||||
},
|
},
|
||||||
test => {
|
test => {
|
||||||
@ -669,8 +679,19 @@ my @tests_tls_1_3 = (
|
|||||||
},
|
},
|
||||||
{
|
{
|
||||||
name => "TLS 1.3 ECDSA Signature Algorithm Selection SHA1",
|
name => "TLS 1.3 ECDSA Signature Algorithm Selection SHA1",
|
||||||
server => $server_tls_1_3,
|
server => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
|
"ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
|
||||||
|
"ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
|
||||||
|
"Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
|
||||||
|
"Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
|
||||||
|
"Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
|
||||||
|
"Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
|
||||||
|
"MinProtocol" => "TLSv1.3",
|
||||||
|
"MaxProtocol" => "TLSv1.3"
|
||||||
|
},
|
||||||
client => {
|
client => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"SignatureAlgorithms" => "ECDSA+SHA1",
|
"SignatureAlgorithms" => "ECDSA+SHA1",
|
||||||
},
|
},
|
||||||
test => {
|
test => {
|
||||||
|
@ -151,10 +151,12 @@ sub generate_version_tests {
|
|||||||
push @tests, {
|
push @tests, {
|
||||||
"name" => "version-negotiation",
|
"name" => "version-negotiation",
|
||||||
"client" => {
|
"client" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $min_protocols[$c_min],
|
"MinProtocol" => $min_protocols[$c_min],
|
||||||
"MaxProtocol" => $max_protocols[$c_max],
|
"MaxProtocol" => $max_protocols[$c_max],
|
||||||
},
|
},
|
||||||
"server" => {
|
"server" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $min_protocols[$s_min],
|
"MinProtocol" => $min_protocols[$s_min],
|
||||||
"MaxProtocol" => $max_protocols[$s_max],
|
"MaxProtocol" => $max_protocols[$s_max],
|
||||||
},
|
},
|
||||||
@ -254,13 +256,17 @@ sub generate_resumption_tests {
|
|||||||
# Client is flexible, server upgrades/downgrades.
|
# Client is flexible, server upgrades/downgrades.
|
||||||
push @server_tests, {
|
push @server_tests, {
|
||||||
"name" => "resumption",
|
"name" => "resumption",
|
||||||
"client" => { },
|
"client" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
|
},
|
||||||
"server" => {
|
"server" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocols[$original_protocol],
|
"MinProtocol" => $protocols[$original_protocol],
|
||||||
"MaxProtocol" => $protocols[$original_protocol],
|
"MaxProtocol" => $protocols[$original_protocol],
|
||||||
"Options" => $ticket,
|
"Options" => $ticket,
|
||||||
},
|
},
|
||||||
"resume_server" => {
|
"resume_server" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MaxProtocol" => $protocols[$resume_protocol],
|
"MaxProtocol" => $protocols[$resume_protocol],
|
||||||
"Options" => $ticket,
|
"Options" => $ticket,
|
||||||
},
|
},
|
||||||
@ -276,13 +282,16 @@ sub generate_resumption_tests {
|
|||||||
push @client_tests, {
|
push @client_tests, {
|
||||||
"name" => "resumption",
|
"name" => "resumption",
|
||||||
"client" => {
|
"client" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MinProtocol" => $protocols[$original_protocol],
|
"MinProtocol" => $protocols[$original_protocol],
|
||||||
"MaxProtocol" => $protocols[$original_protocol],
|
"MaxProtocol" => $protocols[$original_protocol],
|
||||||
},
|
},
|
||||||
"server" => {
|
"server" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"Options" => $ticket,
|
"Options" => $ticket,
|
||||||
},
|
},
|
||||||
"resume_client" => {
|
"resume_client" => {
|
||||||
|
"CipherString" => "DEFAULT:\@SECLEVEL=0",
|
||||||
"MaxProtocol" => $protocols[$resume_protocol],
|
"MaxProtocol" => $protocols[$resume_protocol],
|
||||||
},
|
},
|
||||||
"test" => {
|
"test" => {
|
||||||
|
@ -5567,6 +5567,10 @@ static int test_export_key_mat(int tst)
|
|||||||
OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols));
|
OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols));
|
||||||
SSL_CTX_set_max_proto_version(cctx, protocols[tst]);
|
SSL_CTX_set_max_proto_version(cctx, protocols[tst]);
|
||||||
SSL_CTX_set_min_proto_version(cctx, protocols[tst]);
|
SSL_CTX_set_min_proto_version(cctx, protocols[tst]);
|
||||||
|
if ((protocols[tst] < TLS1_2_VERSION) &&
|
||||||
|
(!SSL_CTX_set_cipher_list(cctx, "DEFAULT:@SECLEVEL=0")
|
||||||
|
|| !SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")))
|
||||||
|
goto end;
|
||||||
|
|
||||||
if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL,
|
if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL,
|
||||||
NULL))
|
NULL))
|
||||||
|
Loading…
x
Reference in New Issue
Block a user