Reduce the security bits for MD5 and SHA1 based signatures in TLS

This has as effect that SHA1 and MD5+SHA1 are no longer supported at
security level 1, and that TLS < 1.2 is no longer supported at the
default security level of 1, and that you need to set the security
level to 0 to use TLS < 1.2.

Reviewed-by: Tim Hudson <tjh@openssl.org>
GH: #10787
This commit is contained in:
Kurt Roeckx 2020-01-02 23:25:27 +01:00
parent 526f1f1aca
commit aba03ae571
21 changed files with 1918 additions and 1825 deletions

View File

@ -119,6 +119,14 @@ OpenSSL 3.0
*Paul Dale* *Paul Dale*
* The security strength of SHA1 and MD5 based signatures in TLS has been
reduced. This results in SSL 3, TLS 1.0, TLS 1.1 and DTLS 1.0 no longer
working at the default security level of 1 and instead requires security
level 0. The security level can be changed either using the cipher string
with @SECLEVEL, or calling SSL_CTX_set_security_level().
*Kurt Roeckx*
* EVP_PKEY_get0_RSA(), EVP_PKEY_get0_DSA(), EVP_PKEY_get0_DH(), and * EVP_PKEY_get0_RSA(), EVP_PKEY_get0_DSA(), EVP_PKEY_get0_DH(), and
EVP_PKEY_get0_EC_KEY() can now handle EVP_PKEYs with provider side EVP_PKEY_get0_EC_KEY() can now handle EVP_PKEYs with provider side
internal keys, if they correspond to one of those built in types. internal keys, if they correspond to one of those built in types.

View File

@ -63,6 +63,7 @@ OpenSSL 3.0
RC4, RC5 and SEED cipher functions have been deprecated. RC4, RC5 and SEED cipher functions have been deprecated.
* All of the low level DH, DSA, ECDH, ECDSA and RSA public key functions * All of the low level DH, DSA, ECDH, ECDSA and RSA public key functions
have been deprecated. have been deprecated.
* SSL 3, TLS 1.0, TLS 1.1, and DTLS 1.0 only work at security level 0.
OpenSSL 1.1.1 OpenSSL 1.1.1
------------- -------------

View File

@ -1413,8 +1413,26 @@ static int sigalg_security_bits(SSL_CTX *ctx, const SIGALG_LOOKUP *lu)
return 0; return 0;
if (md != NULL) if (md != NULL)
{ {
int md_type = EVP_MD_type(md);
/* Security bits: half digest bits */ /* Security bits: half digest bits */
secbits = EVP_MD_size(md) * 4; secbits = EVP_MD_size(md) * 4;
/*
* SHA1 and MD5 are known to be broken. Reduce security bits so that
* they're no longer accepted at security level 1. The real values don't
* really matter as long as they're lower than 80, which is our
* security level 1.
* https://eprint.iacr.org/2020/014 puts a chosen-prefix attack for
* SHA1 at 2^63.4 and MD5+SHA1 at 2^67.2
* https://documents.epfl.ch/users/l/le/lenstra/public/papers/lat.pdf
* puts a chosen-prefix attack for MD5 at 2^39.
*/
if (md_type == NID_sha1)
secbits = 64;
else if (md_type == NID_md5_sha1)
secbits = 67;
else if (md_type == NID_md5)
secbits = 39;
} else { } else {
/* Values from https://tools.ietf.org/html/rfc8032#section-8.5 */ /* Values from https://tools.ietf.org/html/rfc8032#section-8.5 */
if (lu->sigalg == TLSEXT_SIGALG_ed25519) if (lu->sigalg == TLSEXT_SIGALG_ed25519)

View File

@ -56,7 +56,8 @@ SKIP: {
# handshake # handshake
$proxy->clear(); $proxy->clear();
$proxy->filter(undef); $proxy->filter(undef);
$proxy->clientflags("-no_tls1_3"); $proxy->ciphers("DEFAULT:\@SECLEVEL=0");
$proxy->clientflags("-no_tls1_3 -cipher AES128-SHA:\@SECLEVEL=0");
$proxy->serverflags("-no_tls1_3 -no_tls1_2"); $proxy->serverflags("-no_tls1_3 -no_tls1_2");
$proxy->reneg(1); $proxy->reneg(1);
$proxy->start(); $proxy->start();

View File

@ -206,6 +206,7 @@ SKIP: {
#Test 3: Sending a zero length extension block should pass #Test 3: Sending a zero length extension block should pass
$proxy->clear(); $proxy->clear();
$proxy->filter(\&extension_filter); $proxy->filter(\&extension_filter);
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success, "Zero extension length test"); ok(TLSProxy::Message->success, "Zero extension length test");

View File

@ -82,11 +82,17 @@ use constant {
FRAGMENTED_IN_SSLV2 => 3, FRAGMENTED_IN_SSLV2 => 3,
ALERT_BEFORE_SSLV2 => 4 ALERT_BEFORE_SSLV2 => 4
}; };
# The TLSv1.2 in SSLv2 ClientHello need to run at security level 0
# because in a SSLv2 ClientHello we can't send extentions to indicate
# which signature algorithm we want to use, and the default is SHA1.
#Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello #Test 5: Inject an SSLv2 style record format for a TLSv1.2 ClientHello
my $sslv2testtype = TLSV1_2_IN_SSLV2; my $sslv2testtype = TLSV1_2_IN_SSLV2;
$proxy->clear(); $proxy->clear();
$proxy->filter(\&add_sslv2_filter); $proxy->filter(\&add_sslv2_filter);
$proxy->serverflags("-tls1_2"); $proxy->serverflags("-tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test"); ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test");
@ -96,6 +102,7 @@ ok(TLSProxy::Message->success(), "TLSv1.2 in SSLv2 ClientHello test");
$sslv2testtype = SSLV2_IN_SSLV2; $sslv2testtype = SSLV2_IN_SSLV2;
$proxy->clear(); $proxy->clear();
$proxy->serverflags("-tls1_2"); $proxy->serverflags("-tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test"); ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
@ -105,6 +112,7 @@ ok(TLSProxy::Message->fail(), "SSLv2 in SSLv2 ClientHello test");
$sslv2testtype = FRAGMENTED_IN_TLSV1_2; $sslv2testtype = FRAGMENTED_IN_TLSV1_2;
$proxy->clear(); $proxy->clear();
$proxy->serverflags("-tls1_2"); $proxy->serverflags("-tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test"); ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
@ -113,6 +121,7 @@ ok(TLSProxy::Message->success(), "Fragmented ClientHello in TLSv1.2 test");
$sslv2testtype = FRAGMENTED_IN_SSLV2; $sslv2testtype = FRAGMENTED_IN_SSLV2;
$proxy->clear(); $proxy->clear();
$proxy->serverflags("-tls1_2"); $proxy->serverflags("-tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test"); ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
@ -121,6 +130,7 @@ ok(TLSProxy::Message->fail(), "Fragmented ClientHello in TLSv1.2/SSLv2 test");
$sslv2testtype = ALERT_BEFORE_SSLV2; $sslv2testtype = ALERT_BEFORE_SSLV2;
$proxy->clear(); $proxy->clear();
$proxy->serverflags("-tls1_2"); $proxy->serverflags("-tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test"); ok(TLSProxy::Message->fail(), "Alert before SSLv2 ClientHello test");
@ -140,7 +150,8 @@ SKIP: {
#Test 11: Sending an unrecognised record type in TLS1.1 should fail #Test 11: Sending an unrecognised record type in TLS1.1 should fail
$fatal_alert = 0; $fatal_alert = 0;
$proxy->clear(); $proxy->clear();
$proxy->clientflags("-tls1_1"); $proxy->clientflags("-tls1_1 -cipher DEFAULT:\@SECLEVEL=0");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok($fatal_alert, "Unrecognised record type in TLS1.1"); ok($fatal_alert, "Unrecognised record type in TLS1.1");
} }

View File

@ -138,33 +138,33 @@ SKIP: {
$proxy->filter(\&sigalgs_filter); $proxy->filter(\&sigalgs_filter);
#Test 10: Sending no sig algs extension in TLSv1.2 should succeed at #Test 10: Sending no sig algs extension in TLSv1.2 will make it use
# security level 1 # SHA1, which is only supported at security level 0.
$proxy->clear(); $proxy->clear();
$testtype = NO_SIG_ALGS_EXT; $testtype = NO_SIG_ALGS_EXT;
$proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=1"); $proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=0");
$proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=1"); $proxy->ciphers("ECDHE-RSA-AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 1"); ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs seclevel 0");
#Test 11: Sending no sig algs extension in TLSv1.2 should fail at security #Test 11: Sending no sig algs extension in TLSv1.2 should fail at security
# level 2 since it will try to use SHA1. Testing client at level 1, # level 1 since it will try to use SHA1. Testing client at level 0,
# server level 2.
$proxy->clear();
$testtype = NO_SIG_ALGS_EXT;
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1");
$proxy->ciphers("DEFAULT:\@SECLEVEL=2");
$proxy->start();
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 2");
#Test 12: Sending no sig algs extension in TLSv1.2 should fail at security
# level 2 since it will try to use SHA1. Testing client at level 2,
# server level 1. # server level 1.
$proxy->clear(); $proxy->clear();
$testtype = NO_SIG_ALGS_EXT; $testtype = NO_SIG_ALGS_EXT;
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=2"); $proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=0");
$proxy->ciphers("DEFAULT:\@SECLEVEL=1"); $proxy->ciphers("DEFAULT:\@SECLEVEL=1");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs server seclevel 1");
#Test 12: Sending no sig algs extension in TLSv1.2 should fail at security
# level 1 since it will try to use SHA1. Testing client at level 1,
# server level 0.
$proxy->clear();
$testtype = NO_SIG_ALGS_EXT;
$proxy->clientflags("-tls1_2 -cipher DEFAULT:\@SECLEVEL=1");
$proxy->ciphers("DEFAULT:\@SECLEVEL=0");
$proxy->start();
ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2"); ok(TLSProxy::Message->fail, "No TLSv1.2 sigalgs client seclevel 2");
#Test 13: Sending an empty sig algs extension in TLSv1.2 should fail #Test 13: Sending an empty sig algs extension in TLSv1.2 should fail
@ -221,15 +221,16 @@ SKIP: {
ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs"); ok(TLSProxy::Message->fail, "No matching TLSv1.2 sigalgs");
$proxy->filter(\&sigalgs_filter); $proxy->filter(\&sigalgs_filter);
#Test 19: No sig algs extension, ECDSA cert, TLSv1.2 should succeed #Test 19: No sig algs extension, ECDSA cert, will use SHA1,
# TLSv1.2 should succeed at security level 0
$proxy->clear(); $proxy->clear();
$testtype = NO_SIG_ALGS_EXT; $testtype = NO_SIG_ALGS_EXT;
$proxy->clientflags("-no_tls1_3"); $proxy->clientflags("-no_tls1_3 -cipher DEFAULT:\@SECLEVEL=0");
$proxy->serverflags("-cert " . srctop_file("test", "certs", $proxy->serverflags("-cert " . srctop_file("test", "certs",
"server-ecdsa-cert.pem") . "server-ecdsa-cert.pem") .
" -key " . srctop_file("test", "certs", " -key " . srctop_file("test", "certs",
"server-ecdsa-key.pem")), "server-ecdsa-key.pem")),
$proxy->ciphers("ECDHE-ECDSA-AES128-SHA"); $proxy->ciphers("ECDHE-ECDSA-AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA"); ok(TLSProxy::Message->success, "No TLSv1.2 sigalgs, ECDSA");
} }
@ -245,7 +246,7 @@ SKIP: {
$proxy->filter(\&modify_sigalgs_filter); $proxy->filter(\&modify_sigalgs_filter);
$proxy->start(); $proxy->start();
ok($dsa_status && $sha1_status && $sha224_status, ok($dsa_status && $sha1_status && $sha224_status,
"DSA/SHA2 sigalg sent for 1.3-only ClientHello"); "DSA and SHA1 sigalgs not sent for 1.3-only ClientHello");
#Test 21: signature_algorithms with backwards compatible ClientHello #Test 21: signature_algorithms with backwards compatible ClientHello
SKIP: { SKIP: {
@ -253,10 +254,11 @@ SKIP: {
$testtype = COMPAT_SIGALGS; $testtype = COMPAT_SIGALGS;
$dsa_status = $sha1_status = $sha224_status = 0; $dsa_status = $sha1_status = $sha224_status = 0;
$proxy->clear(); $proxy->clear();
$proxy->clientflags("-cipher AES128-SHA\@SECLEVEL=0");
$proxy->filter(\&modify_sigalgs_filter); $proxy->filter(\&modify_sigalgs_filter);
$proxy->start(); $proxy->start();
ok($dsa_status && $sha1_status && $sha224_status, ok($dsa_status && $sha1_status && $sha224_status,
"DSA sigalg not sent for compat ClientHello"); "backwards compatible sigalg sent for compat ClientHello");
} }
} }

View File

@ -95,6 +95,8 @@ ok(TLSProxy::Message->success()
#Test 6: no TLSv1.3 or TLSv1.2 version in supported versions extension, but #Test 6: no TLSv1.3 or TLSv1.2 version in supported versions extension, but
#TLSv1.1 and TLSv1.0 are present. Should just use TLSv1.1 and succeed #TLSv1.1 and TLSv1.0 are present. Should just use TLSv1.1 and succeed
$proxy->clear(); $proxy->clear();
$proxy->clientflags("-cipher DEFAULT:\@SECLEVEL=0");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$testtype = TLS1_1_AND_1_0_ONLY; $testtype = TLS1_1_AND_1_0_ONLY;
$proxy->start(); $proxy->start();
$record = pop @{$proxy->record_list}; $record = pop @{$proxy->record_list};

View File

@ -79,6 +79,7 @@ SKIP: {
$proxy->clear(); $proxy->clear();
$proxy->filter(undef); $proxy->filter(undef);
$proxy->clientflags("-no_tls1_2"); $proxy->clientflags("-no_tls1_2");
$proxy->ciphers("AES128-SHA:\@SECLEVEL=0");
$proxy->start(); $proxy->start();
ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole"); ok(TLSProxy::Message->success(), "TLSv1.2 client-side protocol hole");

File diff suppressed because it is too large Load Diff

View File

@ -49,11 +49,11 @@ client = 0-server-auth-flex-client
[0-server-auth-flex-server] [0-server-auth-flex-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-server-auth-flex-client] [0-server-auth-flex-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -72,12 +72,12 @@ client = 1-client-auth-flex-request-client
[1-client-auth-flex-request-server] [1-client-auth-flex-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[1-client-auth-flex-request-client] [1-client-auth-flex-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -96,13 +96,13 @@ client = 2-client-auth-flex-require-fail-client
[2-client-auth-flex-require-fail-server] [2-client-auth-flex-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[2-client-auth-flex-require-fail-client] [2-client-auth-flex-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -122,14 +122,14 @@ client = 3-client-auth-flex-require-client
[3-client-auth-flex-require-server] [3-client-auth-flex-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Request VerifyMode = Request
[3-client-auth-flex-require-client] [3-client-auth-flex-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -151,7 +151,7 @@ client = 4-client-auth-flex-require-non-empty-names-client
[4-client-auth-flex-require-non-empty-names-server] [4-client-auth-flex-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
@ -159,7 +159,7 @@ VerifyMode = Request
[4-client-auth-flex-require-non-empty-names-client] [4-client-auth-flex-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -181,13 +181,13 @@ client = 5-client-auth-flex-noroot-client
[5-client-auth-flex-noroot-server] [5-client-auth-flex-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Require VerifyMode = Require
[5-client-auth-flex-noroot-client] [5-client-auth-flex-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -208,13 +208,13 @@ client = 6-server-auth-TLSv1-client
[6-server-auth-TLSv1-server] [6-server-auth-TLSv1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[6-server-auth-TLSv1-client] [6-server-auth-TLSv1-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -235,14 +235,14 @@ client = 7-client-auth-TLSv1-request-client
[7-client-auth-TLSv1-request-server] [7-client-auth-TLSv1-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[7-client-auth-TLSv1-request-client] [7-client-auth-TLSv1-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -263,7 +263,7 @@ client = 8-client-auth-TLSv1-require-fail-client
[8-client-auth-TLSv1-require-fail-server] [8-client-auth-TLSv1-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -271,7 +271,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[8-client-auth-TLSv1-require-fail-client] [8-client-auth-TLSv1-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -293,7 +293,7 @@ client = 9-client-auth-TLSv1-require-client
[9-client-auth-TLSv1-require-server] [9-client-auth-TLSv1-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -302,7 +302,7 @@ VerifyMode = Request
[9-client-auth-TLSv1-require-client] [9-client-auth-TLSv1-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -326,7 +326,7 @@ client = 10-client-auth-TLSv1-require-non-empty-names-client
[10-client-auth-TLSv1-require-non-empty-names-server] [10-client-auth-TLSv1-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
@ -336,7 +336,7 @@ VerifyMode = Request
[10-client-auth-TLSv1-require-non-empty-names-client] [10-client-auth-TLSv1-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -360,7 +360,7 @@ client = 11-client-auth-TLSv1-noroot-client
[11-client-auth-TLSv1-noroot-server] [11-client-auth-TLSv1-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -368,7 +368,7 @@ VerifyMode = Require
[11-client-auth-TLSv1-noroot-client] [11-client-auth-TLSv1-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1 MaxProtocol = TLSv1
MinProtocol = TLSv1 MinProtocol = TLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -391,13 +391,13 @@ client = 12-server-auth-TLSv1.1-client
[12-server-auth-TLSv1.1-server] [12-server-auth-TLSv1.1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[12-server-auth-TLSv1.1-client] [12-server-auth-TLSv1.1-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -418,14 +418,14 @@ client = 13-client-auth-TLSv1.1-request-client
[13-client-auth-TLSv1.1-request-server] [13-client-auth-TLSv1.1-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[13-client-auth-TLSv1.1-request-client] [13-client-auth-TLSv1.1-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -446,7 +446,7 @@ client = 14-client-auth-TLSv1.1-require-fail-client
[14-client-auth-TLSv1.1-require-fail-server] [14-client-auth-TLSv1.1-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -454,7 +454,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[14-client-auth-TLSv1.1-require-fail-client] [14-client-auth-TLSv1.1-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -476,7 +476,7 @@ client = 15-client-auth-TLSv1.1-require-client
[15-client-auth-TLSv1.1-require-server] [15-client-auth-TLSv1.1-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -485,7 +485,7 @@ VerifyMode = Request
[15-client-auth-TLSv1.1-require-client] [15-client-auth-TLSv1.1-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -509,7 +509,7 @@ client = 16-client-auth-TLSv1.1-require-non-empty-names-client
[16-client-auth-TLSv1.1-require-non-empty-names-server] [16-client-auth-TLSv1.1-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
@ -519,7 +519,7 @@ VerifyMode = Request
[16-client-auth-TLSv1.1-require-non-empty-names-client] [16-client-auth-TLSv1.1-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -543,7 +543,7 @@ client = 17-client-auth-TLSv1.1-noroot-client
[17-client-auth-TLSv1.1-noroot-server] [17-client-auth-TLSv1.1-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -551,7 +551,7 @@ VerifyMode = Require
[17-client-auth-TLSv1.1-noroot-client] [17-client-auth-TLSv1.1-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.1 MaxProtocol = TLSv1.1
MinProtocol = TLSv1.1 MinProtocol = TLSv1.1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -574,13 +574,13 @@ client = 18-server-auth-TLSv1.2-client
[18-server-auth-TLSv1.2-server] [18-server-auth-TLSv1.2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[18-server-auth-TLSv1.2-client] [18-server-auth-TLSv1.2-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -601,14 +601,14 @@ client = 19-client-auth-TLSv1.2-request-client
[19-client-auth-TLSv1.2-request-server] [19-client-auth-TLSv1.2-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[19-client-auth-TLSv1.2-request-client] [19-client-auth-TLSv1.2-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -629,7 +629,7 @@ client = 20-client-auth-TLSv1.2-require-fail-client
[20-client-auth-TLSv1.2-require-fail-server] [20-client-auth-TLSv1.2-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -637,7 +637,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[20-client-auth-TLSv1.2-require-fail-client] [20-client-auth-TLSv1.2-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -659,7 +659,7 @@ client = 21-client-auth-TLSv1.2-require-client
[21-client-auth-TLSv1.2-require-server] [21-client-auth-TLSv1.2-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientSignatureAlgorithms = SHA256+RSA ClientSignatureAlgorithms = SHA256+RSA
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
@ -669,7 +669,7 @@ VerifyMode = Request
[21-client-auth-TLSv1.2-require-client] [21-client-auth-TLSv1.2-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -695,7 +695,7 @@ client = 22-client-auth-TLSv1.2-require-non-empty-names-client
[22-client-auth-TLSv1.2-require-non-empty-names-server] [22-client-auth-TLSv1.2-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
ClientSignatureAlgorithms = SHA256+RSA ClientSignatureAlgorithms = SHA256+RSA
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
@ -706,7 +706,7 @@ VerifyMode = Request
[22-client-auth-TLSv1.2-require-non-empty-names-client] [22-client-auth-TLSv1.2-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -732,7 +732,7 @@ client = 23-client-auth-TLSv1.2-noroot-client
[23-client-auth-TLSv1.2-noroot-server] [23-client-auth-TLSv1.2-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -740,7 +740,7 @@ VerifyMode = Require
[23-client-auth-TLSv1.2-noroot-client] [23-client-auth-TLSv1.2-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = TLSv1.2 MaxProtocol = TLSv1.2
MinProtocol = TLSv1.2 MinProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -763,13 +763,13 @@ client = 24-server-auth-DTLSv1-client
[24-server-auth-DTLSv1-server] [24-server-auth-DTLSv1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[24-server-auth-DTLSv1-client] [24-server-auth-DTLSv1-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -791,14 +791,14 @@ client = 25-client-auth-DTLSv1-request-client
[25-client-auth-DTLSv1-request-server] [25-client-auth-DTLSv1-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[25-client-auth-DTLSv1-request-client] [25-client-auth-DTLSv1-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -820,7 +820,7 @@ client = 26-client-auth-DTLSv1-require-fail-client
[26-client-auth-DTLSv1-require-fail-server] [26-client-auth-DTLSv1-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -828,7 +828,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[26-client-auth-DTLSv1-require-fail-client] [26-client-auth-DTLSv1-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -851,7 +851,7 @@ client = 27-client-auth-DTLSv1-require-client
[27-client-auth-DTLSv1-require-server] [27-client-auth-DTLSv1-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -860,7 +860,7 @@ VerifyMode = Request
[27-client-auth-DTLSv1-require-client] [27-client-auth-DTLSv1-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -885,7 +885,7 @@ client = 28-client-auth-DTLSv1-require-non-empty-names-client
[28-client-auth-DTLSv1-require-non-empty-names-server] [28-client-auth-DTLSv1-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
@ -895,7 +895,7 @@ VerifyMode = Request
[28-client-auth-DTLSv1-require-non-empty-names-client] [28-client-auth-DTLSv1-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -920,7 +920,7 @@ client = 29-client-auth-DTLSv1-noroot-client
[29-client-auth-DTLSv1-noroot-server] [29-client-auth-DTLSv1-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -928,7 +928,7 @@ VerifyMode = Require
[29-client-auth-DTLSv1-noroot-client] [29-client-auth-DTLSv1-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -952,13 +952,13 @@ client = 30-server-auth-DTLSv1.2-client
[30-server-auth-DTLSv1.2-server] [30-server-auth-DTLSv1.2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[30-server-auth-DTLSv1.2-client] [30-server-auth-DTLSv1.2-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -980,14 +980,14 @@ client = 31-client-auth-DTLSv1.2-request-client
[31-client-auth-DTLSv1.2-request-server] [31-client-auth-DTLSv1.2-request-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
VerifyMode = Request VerifyMode = Request
[31-client-auth-DTLSv1.2-request-client] [31-client-auth-DTLSv1.2-request-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1009,7 +1009,7 @@ client = 32-client-auth-DTLSv1.2-require-fail-client
[32-client-auth-DTLSv1.2-require-fail-server] [32-client-auth-DTLSv1.2-require-fail-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -1017,7 +1017,7 @@ VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
VerifyMode = Require VerifyMode = Require
[32-client-auth-DTLSv1.2-require-fail-client] [32-client-auth-DTLSv1.2-require-fail-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1040,7 +1040,7 @@ client = 33-client-auth-DTLSv1.2-require-client
[33-client-auth-DTLSv1.2-require-server] [33-client-auth-DTLSv1.2-require-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -1049,7 +1049,7 @@ VerifyMode = Request
[33-client-auth-DTLSv1.2-require-client] [33-client-auth-DTLSv1.2-require-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -1074,7 +1074,7 @@ client = 34-client-auth-DTLSv1.2-require-non-empty-names-client
[34-client-auth-DTLSv1.2-require-non-empty-names-server] [34-client-auth-DTLSv1.2-require-non-empty-names-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
@ -1084,7 +1084,7 @@ VerifyMode = Request
[34-client-auth-DTLSv1.2-require-non-empty-names-client] [34-client-auth-DTLSv1.2-require-non-empty-names-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
@ -1109,7 +1109,7 @@ client = 35-client-auth-DTLSv1.2-noroot-client
[35-client-auth-DTLSv1.2-noroot-server] [35-client-auth-DTLSv1.2-noroot-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
@ -1117,7 +1117,7 @@ VerifyMode = Require
[35-client-auth-DTLSv1.2-noroot-client] [35-client-auth-DTLSv1.2-noroot-client]
Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem

View File

@ -58,10 +58,12 @@ sub generate_tests() {
name => "server-auth-${protocol_name}" name => "server-auth-${protocol_name}"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol "MaxProtocol" => $protocol
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol "MaxProtocol" => $protocol
}, },
@ -77,11 +79,13 @@ sub generate_tests() {
name => "client-auth-${protocol_name}-request" name => "client-auth-${protocol_name}-request"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"VerifyMode" => "Request" "VerifyMode" => "Request"
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol "MaxProtocol" => $protocol
}, },
@ -97,12 +101,14 @@ sub generate_tests() {
name => "client-auth-${protocol_name}-require-fail" name => "client-auth-${protocol_name}-require-fail"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"VerifyCAFile" => test_pem("root-cert.pem"), "VerifyCAFile" => test_pem("root-cert.pem"),
"VerifyMode" => "Require", "VerifyMode" => "Require",
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol "MaxProtocol" => $protocol
}, },
@ -121,6 +127,7 @@ sub generate_tests() {
name => "client-auth-${protocol_name}-require" name => "client-auth-${protocol_name}-require"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"ClientSignatureAlgorithms" => $clisigalgs, "ClientSignatureAlgorithms" => $clisigalgs,
@ -128,6 +135,7 @@ sub generate_tests() {
"VerifyMode" => "Request", "VerifyMode" => "Request",
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"Certificate" => test_pem("ee-client-chain.pem"), "Certificate" => test_pem("ee-client-chain.pem"),
@ -149,6 +157,7 @@ sub generate_tests() {
name => "client-auth-${protocol_name}-require-non-empty-names" name => "client-auth-${protocol_name}-require-non-empty-names"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"ClientSignatureAlgorithms" => $clisigalgs, "ClientSignatureAlgorithms" => $clisigalgs,
@ -157,6 +166,7 @@ sub generate_tests() {
"VerifyMode" => "Request", "VerifyMode" => "Request",
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"Certificate" => test_pem("ee-client-chain.pem"), "Certificate" => test_pem("ee-client-chain.pem"),
@ -178,11 +188,13 @@ sub generate_tests() {
name => "client-auth-${protocol_name}-noroot" name => "client-auth-${protocol_name}-noroot"
.($sctp ? "-sctp" : ""), .($sctp ? "-sctp" : ""),
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"VerifyMode" => "Require", "VerifyMode" => "Require",
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocol, "MinProtocol" => $protocol,
"MaxProtocol" => $protocol, "MaxProtocol" => $protocol,
"Certificate" => test_pem("ee-client-chain.pem"), "Certificate" => test_pem("ee-client-chain.pem"),

View File

@ -284,11 +284,11 @@ server2 = 8-SNI-clienthello-disable-v12-server
[8-SNI-clienthello-disable-v12-server] [8-SNI-clienthello-disable-v12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[8-SNI-clienthello-disable-v12-client] [8-SNI-clienthello-disable-v12-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer

View File

@ -152,11 +152,13 @@ our @tests_tls_1_1 = (
{ {
name => "SNI-clienthello-disable-v12", name => "SNI-clienthello-disable-v12",
server => { server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
extra => { extra => {
"ServerNameCallback" => "ClientHelloNoV12", "ServerNameCallback" => "ClientHelloNoV12",
}, },
}, },
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
extra => { extra => {
"ServerName" => "server2", "ServerName" => "server2",
}, },

View File

@ -77,12 +77,12 @@ client = 0-version-negotiation-client
[0-version-negotiation-server] [0-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-version-negotiation-client] [0-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -104,12 +104,12 @@ client = 1-version-negotiation-client
[1-version-negotiation-server] [1-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[1-version-negotiation-client] [1-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -131,11 +131,11 @@ client = 2-version-negotiation-client
[2-version-negotiation-server] [2-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[2-version-negotiation-client] [2-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -157,13 +157,13 @@ client = 3-version-negotiation-client
[3-version-negotiation-server] [3-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[3-version-negotiation-client] [3-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -185,13 +185,13 @@ client = 4-version-negotiation-client
[4-version-negotiation-server] [4-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[4-version-negotiation-client] [4-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -213,12 +213,12 @@ client = 5-version-negotiation-client
[5-version-negotiation-server] [5-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[5-version-negotiation-client] [5-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -240,13 +240,13 @@ client = 6-version-negotiation-client
[6-version-negotiation-server] [6-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[6-version-negotiation-client] [6-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -267,12 +267,12 @@ client = 7-version-negotiation-client
[7-version-negotiation-server] [7-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[7-version-negotiation-client] [7-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -293,12 +293,12 @@ client = 8-version-negotiation-client
[8-version-negotiation-server] [8-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[8-version-negotiation-client] [8-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -320,12 +320,12 @@ client = 9-version-negotiation-client
[9-version-negotiation-server] [9-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[9-version-negotiation-client] [9-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -347,11 +347,11 @@ client = 10-version-negotiation-client
[10-version-negotiation-server] [10-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[10-version-negotiation-client] [10-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -373,13 +373,13 @@ client = 11-version-negotiation-client
[11-version-negotiation-server] [11-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[11-version-negotiation-client] [11-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -401,13 +401,13 @@ client = 12-version-negotiation-client
[12-version-negotiation-server] [12-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[12-version-negotiation-client] [12-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -429,12 +429,12 @@ client = 13-version-negotiation-client
[13-version-negotiation-server] [13-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[13-version-negotiation-client] [13-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -456,13 +456,13 @@ client = 14-version-negotiation-client
[14-version-negotiation-server] [14-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[14-version-negotiation-client] [14-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -484,12 +484,12 @@ client = 15-version-negotiation-client
[15-version-negotiation-server] [15-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[15-version-negotiation-client] [15-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -511,12 +511,12 @@ client = 16-version-negotiation-client
[16-version-negotiation-server] [16-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[16-version-negotiation-client] [16-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -537,12 +537,12 @@ client = 17-version-negotiation-client
[17-version-negotiation-server] [17-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[17-version-negotiation-client] [17-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -563,11 +563,11 @@ client = 18-version-negotiation-client
[18-version-negotiation-server] [18-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[18-version-negotiation-client] [18-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -588,13 +588,13 @@ client = 19-version-negotiation-client
[19-version-negotiation-server] [19-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[19-version-negotiation-client] [19-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -615,13 +615,13 @@ client = 20-version-negotiation-client
[20-version-negotiation-server] [20-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[20-version-negotiation-client] [20-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -642,12 +642,12 @@ client = 21-version-negotiation-client
[21-version-negotiation-server] [21-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[21-version-negotiation-client] [21-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -668,13 +668,13 @@ client = 22-version-negotiation-client
[22-version-negotiation-server] [22-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[22-version-negotiation-client] [22-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -695,12 +695,12 @@ client = 23-version-negotiation-client
[23-version-negotiation-server] [23-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[23-version-negotiation-client] [23-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -721,12 +721,12 @@ client = 24-version-negotiation-client
[24-version-negotiation-server] [24-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[24-version-negotiation-client] [24-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -749,12 +749,12 @@ client = 25-version-negotiation-client
[25-version-negotiation-server] [25-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[25-version-negotiation-client] [25-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -777,11 +777,11 @@ client = 26-version-negotiation-client
[26-version-negotiation-server] [26-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[26-version-negotiation-client] [26-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -804,13 +804,13 @@ client = 27-version-negotiation-client
[27-version-negotiation-server] [27-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[27-version-negotiation-client] [27-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -833,13 +833,13 @@ client = 28-version-negotiation-client
[28-version-negotiation-server] [28-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[28-version-negotiation-client] [28-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -862,12 +862,12 @@ client = 29-version-negotiation-client
[29-version-negotiation-server] [29-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[29-version-negotiation-client] [29-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -890,13 +890,13 @@ client = 30-version-negotiation-client
[30-version-negotiation-server] [30-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[30-version-negotiation-client] [30-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -918,12 +918,12 @@ client = 31-version-negotiation-client
[31-version-negotiation-server] [31-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[31-version-negotiation-client] [31-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -945,12 +945,12 @@ client = 32-version-negotiation-client
[32-version-negotiation-server] [32-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[32-version-negotiation-client] [32-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -973,12 +973,12 @@ client = 33-version-negotiation-client
[33-version-negotiation-server] [33-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[33-version-negotiation-client] [33-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1001,11 +1001,11 @@ client = 34-version-negotiation-client
[34-version-negotiation-server] [34-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[34-version-negotiation-client] [34-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1028,13 +1028,13 @@ client = 35-version-negotiation-client
[35-version-negotiation-server] [35-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[35-version-negotiation-client] [35-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1057,13 +1057,13 @@ client = 36-version-negotiation-client
[36-version-negotiation-server] [36-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[36-version-negotiation-client] [36-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1086,12 +1086,12 @@ client = 37-version-negotiation-client
[37-version-negotiation-server] [37-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[37-version-negotiation-client] [37-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1114,13 +1114,13 @@ client = 38-version-negotiation-client
[38-version-negotiation-server] [38-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[38-version-negotiation-client] [38-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1143,12 +1143,12 @@ client = 39-version-negotiation-client
[39-version-negotiation-server] [39-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[39-version-negotiation-client] [39-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1171,12 +1171,12 @@ client = 40-version-negotiation-client
[40-version-negotiation-server] [40-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[40-version-negotiation-client] [40-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1198,12 +1198,12 @@ client = 41-version-negotiation-client
[41-version-negotiation-server] [41-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[41-version-negotiation-client] [41-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1225,11 +1225,11 @@ client = 42-version-negotiation-client
[42-version-negotiation-server] [42-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[42-version-negotiation-client] [42-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1251,13 +1251,13 @@ client = 43-version-negotiation-client
[43-version-negotiation-server] [43-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[43-version-negotiation-client] [43-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1279,13 +1279,13 @@ client = 44-version-negotiation-client
[44-version-negotiation-server] [44-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[44-version-negotiation-client] [44-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1307,12 +1307,12 @@ client = 45-version-negotiation-client
[45-version-negotiation-server] [45-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[45-version-negotiation-client] [45-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1334,13 +1334,13 @@ client = 46-version-negotiation-client
[46-version-negotiation-server] [46-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[46-version-negotiation-client] [46-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1362,12 +1362,12 @@ client = 47-version-negotiation-client
[47-version-negotiation-server] [47-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[47-version-negotiation-client] [47-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1389,12 +1389,12 @@ client = 48-version-negotiation-client
[48-version-negotiation-server] [48-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[48-version-negotiation-client] [48-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1416,12 +1416,12 @@ client = 49-version-negotiation-client
[49-version-negotiation-server] [49-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[49-version-negotiation-client] [49-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1444,11 +1444,11 @@ client = 50-version-negotiation-client
[50-version-negotiation-server] [50-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[50-version-negotiation-client] [50-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1471,13 +1471,13 @@ client = 51-version-negotiation-client
[51-version-negotiation-server] [51-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[51-version-negotiation-client] [51-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1499,13 +1499,13 @@ client = 52-version-negotiation-client
[52-version-negotiation-server] [52-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[52-version-negotiation-client] [52-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1528,12 +1528,12 @@ client = 53-version-negotiation-client
[53-version-negotiation-server] [53-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[53-version-negotiation-client] [53-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1556,13 +1556,13 @@ client = 54-version-negotiation-client
[54-version-negotiation-server] [54-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[54-version-negotiation-client] [54-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1585,12 +1585,12 @@ client = 55-version-negotiation-client
[55-version-negotiation-server] [55-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[55-version-negotiation-client] [55-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
@ -1613,12 +1613,12 @@ client = 56-version-negotiation-client
[56-version-negotiation-server] [56-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[56-version-negotiation-client] [56-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1639,12 +1639,12 @@ client = 57-version-negotiation-client
[57-version-negotiation-server] [57-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[57-version-negotiation-client] [57-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1666,11 +1666,11 @@ client = 58-version-negotiation-client
[58-version-negotiation-server] [58-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[58-version-negotiation-client] [58-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1692,13 +1692,13 @@ client = 59-version-negotiation-client
[59-version-negotiation-server] [59-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[59-version-negotiation-client] [59-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1719,13 +1719,13 @@ client = 60-version-negotiation-client
[60-version-negotiation-server] [60-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[60-version-negotiation-client] [60-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1747,12 +1747,12 @@ client = 61-version-negotiation-client
[61-version-negotiation-server] [61-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1 MinProtocol = DTLSv1
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[61-version-negotiation-client] [61-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1774,13 +1774,13 @@ client = 62-version-negotiation-client
[62-version-negotiation-server] [62-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[62-version-negotiation-client] [62-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1802,12 +1802,12 @@ client = 63-version-negotiation-client
[63-version-negotiation-server] [63-version-negotiation-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[63-version-negotiation-client] [63-version-negotiation-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer

File diff suppressed because it is too large Load Diff

View File

@ -31,7 +31,7 @@ resume-client = 0-resumption-client
[0-resumption-server] [0-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
Options = SessionTicket Options = SessionTicket
@ -39,13 +39,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-resumption-resume-server] [0-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-resumption-client] [0-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -69,7 +69,7 @@ resume-client = 1-resumption-client
[1-resumption-server] [1-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
Options = -SessionTicket Options = -SessionTicket
@ -77,13 +77,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[1-resumption-resume-server] [1-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[1-resumption-client] [1-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -107,7 +107,7 @@ resume-client = 2-resumption-client
[2-resumption-server] [2-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
Options = SessionTicket Options = SessionTicket
@ -115,13 +115,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[2-resumption-resume-server] [2-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[2-resumption-client] [2-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -145,7 +145,7 @@ resume-client = 3-resumption-client
[3-resumption-server] [3-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
Options = -SessionTicket Options = -SessionTicket
@ -153,13 +153,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[3-resumption-resume-server] [3-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[3-resumption-client] [3-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -183,7 +183,7 @@ resume-client = 4-resumption-client
[4-resumption-server] [4-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
Options = SessionTicket Options = SessionTicket
@ -191,13 +191,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[4-resumption-resume-server] [4-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[4-resumption-client] [4-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -221,7 +221,7 @@ resume-client = 5-resumption-client
[5-resumption-server] [5-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
Options = -SessionTicket Options = -SessionTicket
@ -229,13 +229,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[5-resumption-resume-server] [5-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[5-resumption-client] [5-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -259,7 +259,7 @@ resume-client = 6-resumption-client
[6-resumption-server] [6-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
Options = SessionTicket Options = SessionTicket
@ -267,13 +267,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[6-resumption-resume-server] [6-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[6-resumption-client] [6-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -297,7 +297,7 @@ resume-client = 7-resumption-client
[7-resumption-server] [7-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
Options = -SessionTicket Options = -SessionTicket
@ -305,13 +305,13 @@ PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[7-resumption-resume-server] [7-resumption-resume-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[7-resumption-client] [7-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -335,19 +335,19 @@ resume-client = 8-resumption-resume-client
[8-resumption-server] [8-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[8-resumption-client] [8-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[8-resumption-resume-client] [8-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -372,19 +372,19 @@ resume-client = 9-resumption-resume-client
[9-resumption-server] [9-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[9-resumption-client] [9-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[9-resumption-resume-client] [9-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -409,19 +409,19 @@ resume-client = 10-resumption-resume-client
[10-resumption-server] [10-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[10-resumption-client] [10-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[10-resumption-resume-client] [10-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -446,19 +446,19 @@ resume-client = 11-resumption-resume-client
[11-resumption-server] [11-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[11-resumption-client] [11-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
MinProtocol = DTLSv1 MinProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[11-resumption-resume-client] [11-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -483,19 +483,19 @@ resume-client = 12-resumption-resume-client
[12-resumption-server] [12-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[12-resumption-client] [12-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[12-resumption-resume-client] [12-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -520,19 +520,19 @@ resume-client = 13-resumption-resume-client
[13-resumption-server] [13-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[13-resumption-client] [13-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[13-resumption-resume-client] [13-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1 MaxProtocol = DTLSv1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -557,19 +557,19 @@ resume-client = 14-resumption-resume-client
[14-resumption-server] [14-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = SessionTicket Options = SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[14-resumption-client] [14-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[14-resumption-resume-client] [14-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -594,19 +594,19 @@ resume-client = 15-resumption-resume-client
[15-resumption-server] [15-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
Options = -SessionTicket Options = -SessionTicket
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[15-resumption-client] [15-resumption-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
MinProtocol = DTLSv1.2 MinProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
[15-resumption-resume-client] [15-resumption-resume-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
MaxProtocol = DTLSv1.2 MaxProtocol = DTLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer

View File

@ -328,7 +328,7 @@ client = 8-ECDSA Signature Algorithm Selection SHA1-client
[8-ECDSA Signature Algorithm Selection SHA1-server] [8-ECDSA Signature Algorithm Selection SHA1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
@ -339,7 +339,7 @@ MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[8-ECDSA Signature Algorithm Selection SHA1-client] [8-ECDSA Signature Algorithm Selection SHA1-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
SignatureAlgorithms = ECDSA+SHA1 SignatureAlgorithms = ECDSA+SHA1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer
@ -1209,7 +1209,7 @@ client = 37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-server] [37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem ECDSA.Certificate = ${ENV::TEST_CERTS_DIR}/server-ecdsa-cert.pem
ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem ECDSA.PrivateKey = ${ENV::TEST_CERTS_DIR}/server-ecdsa-key.pem
Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem Ed25519.Certificate = ${ENV::TEST_CERTS_DIR}/server-ed25519-cert.pem
@ -1221,7 +1221,7 @@ MinProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client] [37-TLS 1.3 ECDSA Signature Algorithm Selection SHA1-client]
CipherString = DEFAULT CipherString = DEFAULT:@SECLEVEL=0
SignatureAlgorithms = ECDSA+SHA1 SignatureAlgorithms = ECDSA+SHA1
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer VerifyMode = Peer

View File

@ -201,8 +201,18 @@ our @tests = (
}, },
{ {
name => "ECDSA Signature Algorithm Selection SHA1", name => "ECDSA Signature Algorithm Selection SHA1",
server => $server, server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
"ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
"Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
"Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
"Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
"Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
"MaxProtocol" => "TLSv1.2"
},
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"SignatureAlgorithms" => "ECDSA+SHA1", "SignatureAlgorithms" => "ECDSA+SHA1",
}, },
test => { test => {
@ -669,8 +679,19 @@ my @tests_tls_1_3 = (
}, },
{ {
name => "TLS 1.3 ECDSA Signature Algorithm Selection SHA1", name => "TLS 1.3 ECDSA Signature Algorithm Selection SHA1",
server => $server_tls_1_3, server => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
"ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
"Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
"Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
"Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
"Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
"MinProtocol" => "TLSv1.3",
"MaxProtocol" => "TLSv1.3"
},
client => { client => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"SignatureAlgorithms" => "ECDSA+SHA1", "SignatureAlgorithms" => "ECDSA+SHA1",
}, },
test => { test => {

View File

@ -151,10 +151,12 @@ sub generate_version_tests {
push @tests, { push @tests, {
"name" => "version-negotiation", "name" => "version-negotiation",
"client" => { "client" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $min_protocols[$c_min], "MinProtocol" => $min_protocols[$c_min],
"MaxProtocol" => $max_protocols[$c_max], "MaxProtocol" => $max_protocols[$c_max],
}, },
"server" => { "server" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $min_protocols[$s_min], "MinProtocol" => $min_protocols[$s_min],
"MaxProtocol" => $max_protocols[$s_max], "MaxProtocol" => $max_protocols[$s_max],
}, },
@ -254,13 +256,17 @@ sub generate_resumption_tests {
# Client is flexible, server upgrades/downgrades. # Client is flexible, server upgrades/downgrades.
push @server_tests, { push @server_tests, {
"name" => "resumption", "name" => "resumption",
"client" => { }, "client" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
},
"server" => { "server" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocols[$original_protocol], "MinProtocol" => $protocols[$original_protocol],
"MaxProtocol" => $protocols[$original_protocol], "MaxProtocol" => $protocols[$original_protocol],
"Options" => $ticket, "Options" => $ticket,
}, },
"resume_server" => { "resume_server" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MaxProtocol" => $protocols[$resume_protocol], "MaxProtocol" => $protocols[$resume_protocol],
"Options" => $ticket, "Options" => $ticket,
}, },
@ -276,13 +282,16 @@ sub generate_resumption_tests {
push @client_tests, { push @client_tests, {
"name" => "resumption", "name" => "resumption",
"client" => { "client" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MinProtocol" => $protocols[$original_protocol], "MinProtocol" => $protocols[$original_protocol],
"MaxProtocol" => $protocols[$original_protocol], "MaxProtocol" => $protocols[$original_protocol],
}, },
"server" => { "server" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"Options" => $ticket, "Options" => $ticket,
}, },
"resume_client" => { "resume_client" => {
"CipherString" => "DEFAULT:\@SECLEVEL=0",
"MaxProtocol" => $protocols[$resume_protocol], "MaxProtocol" => $protocols[$resume_protocol],
}, },
"test" => { "test" => {

View File

@ -5567,6 +5567,10 @@ static int test_export_key_mat(int tst)
OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols)); OPENSSL_assert(tst >= 0 && (size_t)tst < OSSL_NELEM(protocols));
SSL_CTX_set_max_proto_version(cctx, protocols[tst]); SSL_CTX_set_max_proto_version(cctx, protocols[tst]);
SSL_CTX_set_min_proto_version(cctx, protocols[tst]); SSL_CTX_set_min_proto_version(cctx, protocols[tst]);
if ((protocols[tst] < TLS1_2_VERSION) &&
(!SSL_CTX_set_cipher_list(cctx, "DEFAULT:@SECLEVEL=0")
|| !SSL_CTX_set_cipher_list(sctx, "DEFAULT:@SECLEVEL=0")))
goto end;
if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL, if (!TEST_true(create_ssl_objects(sctx, cctx, &serverssl, &clientssl, NULL,
NULL)) NULL))