mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-02-06 12:40:02 +00:00
Merge pull request #8914 from ronald-cron-arm/resumption-early-data-compat-tests
TLS 1.3: Resumption and early data compatibility tests
This commit is contained in:
commit
0edef1cf6d
@ -122,7 +122,8 @@ int main(void)
|
|||||||
#define DFL_SNI NULL
|
#define DFL_SNI NULL
|
||||||
#define DFL_ALPN_STRING NULL
|
#define DFL_ALPN_STRING NULL
|
||||||
#define DFL_GROUPS NULL
|
#define DFL_GROUPS NULL
|
||||||
#define DFL_MAX_EARLY_DATA_SIZE 0
|
#define DFL_EARLY_DATA -1
|
||||||
|
#define DFL_MAX_EARLY_DATA_SIZE ((uint32_t) -1)
|
||||||
#define DFL_SIG_ALGS NULL
|
#define DFL_SIG_ALGS NULL
|
||||||
#define DFL_DHM_FILE NULL
|
#define DFL_DHM_FILE NULL
|
||||||
#define DFL_TRANSPORT MBEDTLS_SSL_TRANSPORT_STREAM
|
#define DFL_TRANSPORT MBEDTLS_SSL_TRANSPORT_STREAM
|
||||||
@ -429,9 +430,10 @@ int main(void)
|
|||||||
|
|
||||||
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
#define USAGE_EARLY_DATA \
|
#define USAGE_EARLY_DATA \
|
||||||
" max_early_data_size=%%d default: -1 (disabled)\n" \
|
" early_data=%%d default: library default\n" \
|
||||||
" options: -1 (disabled), " \
|
" options: 0 (disabled), 1 (enabled)\n" \
|
||||||
" >= 0 (enabled, max amount of early data )\n"
|
" max_early_data_size=%%d default: library default\n" \
|
||||||
|
" options: max amount of early data\n"
|
||||||
#else
|
#else
|
||||||
#define USAGE_EARLY_DATA ""
|
#define USAGE_EARLY_DATA ""
|
||||||
#endif /* MBEDTLS_SSL_EARLY_DATA */
|
#endif /* MBEDTLS_SSL_EARLY_DATA */
|
||||||
@ -694,7 +696,10 @@ struct options {
|
|||||||
const char *cid_val_renego; /* the CID to use for incoming messages
|
const char *cid_val_renego; /* the CID to use for incoming messages
|
||||||
* after renegotiation */
|
* after renegotiation */
|
||||||
int reproducible; /* make communication reproducible */
|
int reproducible; /* make communication reproducible */
|
||||||
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
|
int early_data; /* early data enablement flag */
|
||||||
uint32_t max_early_data_size; /* max amount of early data */
|
uint32_t max_early_data_size; /* max amount of early data */
|
||||||
|
#endif
|
||||||
int query_config_mode; /* whether to read config */
|
int query_config_mode; /* whether to read config */
|
||||||
int use_srtp; /* Support SRTP */
|
int use_srtp; /* Support SRTP */
|
||||||
int force_srtp_profile; /* SRTP protection profile to use or all */
|
int force_srtp_profile; /* SRTP protection profile to use or all */
|
||||||
@ -1609,10 +1614,6 @@ int main(int argc, char *argv[])
|
|||||||
};
|
};
|
||||||
#endif /* MBEDTLS_SSL_DTLS_SRTP */
|
#endif /* MBEDTLS_SSL_DTLS_SRTP */
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
|
||||||
int tls13_early_data_enabled = MBEDTLS_SSL_EARLY_DATA_DISABLED;
|
|
||||||
#endif
|
|
||||||
|
|
||||||
#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
|
#if defined(MBEDTLS_MEMORY_BUFFER_ALLOC_C)
|
||||||
mbedtls_memory_buffer_alloc_init(alloc_buf, sizeof(alloc_buf));
|
mbedtls_memory_buffer_alloc_init(alloc_buf, sizeof(alloc_buf));
|
||||||
#if defined(MBEDTLS_MEMORY_DEBUG)
|
#if defined(MBEDTLS_MEMORY_DEBUG)
|
||||||
@ -1747,7 +1748,10 @@ int main(int argc, char *argv[])
|
|||||||
opt.sni = DFL_SNI;
|
opt.sni = DFL_SNI;
|
||||||
opt.alpn_string = DFL_ALPN_STRING;
|
opt.alpn_string = DFL_ALPN_STRING;
|
||||||
opt.groups = DFL_GROUPS;
|
opt.groups = DFL_GROUPS;
|
||||||
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
|
opt.early_data = DFL_EARLY_DATA;
|
||||||
opt.max_early_data_size = DFL_MAX_EARLY_DATA_SIZE;
|
opt.max_early_data_size = DFL_MAX_EARLY_DATA_SIZE;
|
||||||
|
#endif
|
||||||
opt.sig_algs = DFL_SIG_ALGS;
|
opt.sig_algs = DFL_SIG_ALGS;
|
||||||
opt.dhm_file = DFL_DHM_FILE;
|
opt.dhm_file = DFL_DHM_FILE;
|
||||||
opt.transport = DFL_TRANSPORT;
|
opt.transport = DFL_TRANSPORT;
|
||||||
@ -1980,14 +1984,18 @@ usage:
|
|||||||
}
|
}
|
||||||
#endif
|
#endif
|
||||||
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
else if (strcmp(p, "max_early_data_size") == 0) {
|
else if (strcmp(p, "early_data") == 0) {
|
||||||
long long value = atoll(q);
|
switch (atoi(q)) {
|
||||||
tls13_early_data_enabled =
|
case 0:
|
||||||
value >= 0 ? MBEDTLS_SSL_EARLY_DATA_ENABLED :
|
opt.early_data = MBEDTLS_SSL_EARLY_DATA_DISABLED;
|
||||||
MBEDTLS_SSL_EARLY_DATA_DISABLED;
|
break;
|
||||||
if (tls13_early_data_enabled) {
|
case 1:
|
||||||
opt.max_early_data_size = atoi(q);
|
opt.early_data = MBEDTLS_SSL_EARLY_DATA_ENABLED;
|
||||||
|
break;
|
||||||
|
default: goto usage;
|
||||||
}
|
}
|
||||||
|
} else if (strcmp(p, "max_early_data_size") == 0) {
|
||||||
|
opt.max_early_data_size = (uint32_t) atoll(q);
|
||||||
}
|
}
|
||||||
#endif /* MBEDTLS_SSL_EARLY_DATA */
|
#endif /* MBEDTLS_SSL_EARLY_DATA */
|
||||||
else if (strcmp(p, "renegotiation") == 0) {
|
else if (strcmp(p, "renegotiation") == 0) {
|
||||||
@ -2805,8 +2813,10 @@ usage:
|
|||||||
}
|
}
|
||||||
|
|
||||||
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
#if defined(MBEDTLS_SSL_EARLY_DATA)
|
||||||
mbedtls_ssl_conf_early_data(&conf, tls13_early_data_enabled);
|
if (opt.early_data != DFL_EARLY_DATA) {
|
||||||
if (tls13_early_data_enabled == MBEDTLS_SSL_EARLY_DATA_ENABLED) {
|
mbedtls_ssl_conf_early_data(&conf, opt.early_data);
|
||||||
|
}
|
||||||
|
if (opt.max_early_data_size != DFL_MAX_EARLY_DATA_SIZE) {
|
||||||
mbedtls_ssl_conf_max_early_data_size(
|
mbedtls_ssl_conf_max_early_data_size(
|
||||||
&conf, opt.max_early_data_size);
|
&conf, opt.max_early_data_size);
|
||||||
}
|
}
|
||||||
|
File diff suppressed because it is too large
Load Diff
219
tests/ssl-opt.sh
219
tests/ssl-opt.sh
@ -13413,180 +13413,6 @@ run_test "TLS 1.3: Check client no signature algorithm, m->m" \
|
|||||||
1 \
|
1 \
|
||||||
-c "no suitable signature algorithm"
|
-c "no suitable signature algorithm"
|
||||||
|
|
||||||
requires_openssl_tls1_3_with_compatible_ephemeral
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check, m->O" \
|
|
||||||
"$O_NEXT_SRV -msg -tls1_3 -no_resume_ephemeral -no_cache --num_tickets 4" \
|
|
||||||
"$P_CLI debug_level=1 reco_mode=1 reconnect=1" \
|
|
||||||
0 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "got new session ticket." \
|
|
||||||
-c "Saving session for reuse... ok" \
|
|
||||||
-c "Reconnecting with saved session" \
|
|
||||||
-c "HTTP/1.0 200 ok"
|
|
||||||
|
|
||||||
requires_gnutls_tls1_3
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check, m->G" \
|
|
||||||
"$G_NEXT_SRV -d 10 --priority=NORMAL:-VERS-ALL:+VERS-TLS1.3 --disable-client-cert" \
|
|
||||||
"$P_CLI debug_level=1 reco_mode=1 reconnect=1" \
|
|
||||||
0 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "got new session ticket." \
|
|
||||||
-c "Saving session for reuse... ok" \
|
|
||||||
-c "Reconnecting with saved session" \
|
|
||||||
-c "HTTP/1.0 200 OK" \
|
|
||||||
-s "This is a resumed session"
|
|
||||||
|
|
||||||
requires_openssl_tls1_3_with_compatible_ephemeral
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
# https://github.com/openssl/openssl/issues/10714
|
|
||||||
# Until now, OpenSSL client does not support reconnect.
|
|
||||||
skip_next_test
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check, O->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key tickets=4" \
|
|
||||||
"$O_NEXT_CLI -msg -debug -tls1_3 -reconnect" \
|
|
||||||
0 \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH"
|
|
||||||
|
|
||||||
requires_gnutls_tls1_3
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check, G->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key tickets=4" \
|
|
||||||
"$G_NEXT_CLI localhost -d 4 --priority=NORMAL:-VERS-ALL:+VERS-TLS1.3 -V -r" \
|
|
||||||
0 \
|
|
||||||
-c "Connecting again- trying to resume previous session" \
|
|
||||||
-c "NEW SESSION TICKET (4) was received" \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH" \
|
|
||||||
-s "key exchange mode: ephemeral" \
|
|
||||||
-s "key exchange mode: psk_ephemeral" \
|
|
||||||
-s "found pre_shared_key extension"
|
|
||||||
|
|
||||||
requires_gnutls_tls1_3
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
# Test the session resumption when the cipher suite for the original session is
|
|
||||||
# TLS1-3-AES-256-GCM-SHA384. In that case, the PSK is 384 bits long and not
|
|
||||||
# 256 bits long as with all the other TLS 1.3 cipher suites.
|
|
||||||
requires_ciphersuite_enabled TLS1-3-AES-256-GCM-SHA384
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check with AES-256-GCM only, G->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key force_version=tls13 tickets=4" \
|
|
||||||
"$G_NEXT_CLI localhost -d 4 --priority=NORMAL:-VERS-ALL:+VERS-TLS1.3:-CIPHER-ALL:+AES-256-GCM -V -r" \
|
|
||||||
0 \
|
|
||||||
-c "Connecting again- trying to resume previous session" \
|
|
||||||
-c "NEW SESSION TICKET (4) was received" \
|
|
||||||
-s "Ciphersuite is TLS1-3-AES-256-GCM-SHA384" \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH" \
|
|
||||||
-s "key exchange mode: ephemeral" \
|
|
||||||
-s "key exchange mode: psk_ephemeral" \
|
|
||||||
-s "found pre_shared_key extension"
|
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: Basic check, m->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key tickets=4" \
|
|
||||||
"$P_CLI debug_level=4 reco_mode=1 reconnect=1" \
|
|
||||||
0 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "got new session ticket ( 3 )" \
|
|
||||||
-c "Saving session for reuse... ok" \
|
|
||||||
-c "Reconnecting with saved session" \
|
|
||||||
-c "HTTP/1.0 200 OK" \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH" \
|
|
||||||
-s "key exchange mode: ephemeral" \
|
|
||||||
-s "key exchange mode: psk_ephemeral" \
|
|
||||||
-s "found pre_shared_key extension"
|
|
||||||
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_PROTO_TLS1_3 \
|
|
||||||
MBEDTLS_SSL_CLI_C MBEDTLS_SSL_SRV_C \
|
|
||||||
MBEDTLS_SSL_SESSION_TICKETS MBEDTLS_HAVE_TIME \
|
|
||||||
MBEDTLS_DEBUG_C \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
||||||
requires_any_configs_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3 m->m: NewSessionTicket: Ticket lifetime max value (7d)" \
|
|
||||||
"$P_SRV debug_level=1 crt_file=data_files/server5.crt key_file=data_files/server5.key ticket_timeout=604800 tickets=1" \
|
|
||||||
"$P_CLI reco_mode=1 reconnect=1" \
|
|
||||||
0 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "HTTP/1.0 200 OK" \
|
|
||||||
-c "got new session ticket" \
|
|
||||||
-c "Reconnecting with saved session... ok" \
|
|
||||||
-s "Protocol is TLSv1.3" \
|
|
||||||
-S "Ticket lifetime (604800) is greater than 7 days."
|
|
||||||
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_PROTO_TLS1_3 \
|
|
||||||
MBEDTLS_SSL_CLI_C MBEDTLS_SSL_SRV_C \
|
|
||||||
MBEDTLS_SSL_SESSION_TICKETS MBEDTLS_HAVE_TIME \
|
|
||||||
MBEDTLS_DEBUG_C \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
||||||
requires_any_configs_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3 m->m: NewSessionTicket: Ticket lifetime too long (7d + 1s)" \
|
|
||||||
"$P_SRV debug_level=1 crt_file=data_files/server5.crt key_file=data_files/server5.key ticket_timeout=604801 tickets=1" \
|
|
||||||
"$P_CLI reco_mode=1 reconnect=1" \
|
|
||||||
1 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-C "HTTP/1.0 200 OK" \
|
|
||||||
-C "got new session ticket" \
|
|
||||||
-C "Reconnecting with saved session... ok" \
|
|
||||||
-S "Protocol is TLSv1.3" \
|
|
||||||
-s "Ticket lifetime (604801) is greater than 7 days."
|
|
||||||
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_PROTO_TLS1_3 \
|
|
||||||
MBEDTLS_SSL_CLI_C MBEDTLS_SSL_SRV_C \
|
|
||||||
MBEDTLS_SSL_SESSION_TICKETS MBEDTLS_HAVE_TIME \
|
|
||||||
MBEDTLS_DEBUG_C \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
|
||||||
requires_any_configs_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3 m->m: NewSessionTicket: ticket lifetime=0" \
|
|
||||||
"$P_SRV debug_level=2 crt_file=data_files/server5.crt key_file=data_files/server5.key ticket_timeout=0 tickets=1" \
|
|
||||||
"$P_CLI debug_level=2 reco_mode=1 reconnect=1" \
|
|
||||||
1 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "HTTP/1.0 200 OK" \
|
|
||||||
-c "Discard new session ticket" \
|
|
||||||
-C "got new session ticket" \
|
|
||||||
-c "Reconnecting with saved session... failed" \
|
|
||||||
-s "Protocol is TLSv1.3" \
|
|
||||||
-s "<= write new session ticket"
|
|
||||||
|
|
||||||
requires_openssl_tls1_3_with_compatible_ephemeral
|
requires_openssl_tls1_3_with_compatible_ephemeral
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
requires_config_enabled MBEDTLS_DEBUG_C
|
||||||
@ -13618,51 +13444,6 @@ run_test "TLS 1.2: Check rsa_pss_rsae compatibility issue, m->G" \
|
|||||||
-c "Protocol is TLSv1.2" \
|
-c "Protocol is TLSv1.2" \
|
||||||
-c "HTTP/1.0 200 [Oo][Kk]"
|
-c "HTTP/1.0 200 [Oo][Kk]"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: servername check, m->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key tickets=4 \
|
|
||||||
sni=localhost,data_files/server2.crt,data_files/server2.key,-,-,-,polarssl.example,data_files/server1-nospace.crt,data_files/server1.key,-,-,-" \
|
|
||||||
"$P_CLI debug_level=4 server_name=localhost reco_mode=1 reconnect=1" \
|
|
||||||
0 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "got new session ticket." \
|
|
||||||
-c "Saving session for reuse... ok" \
|
|
||||||
-c "Reconnecting with saved session" \
|
|
||||||
-c "HTTP/1.0 200 OK" \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH" \
|
|
||||||
-s "key exchange mode: ephemeral" \
|
|
||||||
-s "key exchange mode: psk_ephemeral" \
|
|
||||||
-s "found pre_shared_key extension"
|
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SESSION_TICKETS
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
|
||||||
requires_config_enabled MBEDTLS_SSL_CLI_C
|
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
|
||||||
requires_all_configs_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED \
|
|
||||||
MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_PSK_EPHEMERAL_ENABLED
|
|
||||||
run_test "TLS 1.3: NewSessionTicket: servername negative check, m->m" \
|
|
||||||
"$P_SRV debug_level=4 crt_file=data_files/server5.crt key_file=data_files/server5.key tickets=4 \
|
|
||||||
sni=localhost,data_files/server2.crt,data_files/server2.key,-,-,-,polarssl.example,data_files/server1-nospace.crt,data_files/server1.key,-,-,-" \
|
|
||||||
"$P_CLI debug_level=4 server_name=localhost reco_server_name=remote reco_mode=1 reconnect=1" \
|
|
||||||
1 \
|
|
||||||
-c "Protocol is TLSv1.3" \
|
|
||||||
-c "got new session ticket." \
|
|
||||||
-c "Saving session for reuse... ok" \
|
|
||||||
-c "Reconnecting with saved session" \
|
|
||||||
-c "Hostname mismatch the session ticket, disable session resumption." \
|
|
||||||
-s "=> write NewSessionTicket msg" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET" \
|
|
||||||
-s "server state: MBEDTLS_SSL_TLS1_3_NEW_SESSION_TICKET_FLUSH"
|
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_SRV_C
|
requires_config_enabled MBEDTLS_SSL_SRV_C
|
||||||
requires_config_enabled MBEDTLS_DEBUG_C
|
requires_config_enabled MBEDTLS_DEBUG_C
|
||||||
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
|
||||||
|
Loading…
x
Reference in New Issue
Block a user