mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-04-10 06:44:28 +00:00
Add DHE-RSA Opaque PK key tests variants in ssl-opt.sh
Signed-off-by: Neil Armstrong <narmstrong@baylibre.com>
This commit is contained in:
parent
3e9a142017
commit
a4dbfddba2
@ -1585,6 +1585,24 @@ run_test "TLS-ECDHE-RSA Opaque key for client authentication" \
|
|||||||
-S "error" \
|
-S "error" \
|
||||||
-C "error"
|
-C "error"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
|
requires_config_enabled MBEDTLS_SHA256_C
|
||||||
|
run_test "TLS-DHE-RSA Opaque key for client authentication" \
|
||||||
|
"$P_SRV auth_mode=required crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key" \
|
||||||
|
"$P_CLI key_opaque=1 crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key force_ciphersuite=TLS-DHE-RSA-WITH-AES-128-CBC-SHA" \
|
||||||
|
0 \
|
||||||
|
-c "key type: Opaque" \
|
||||||
|
-c "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-s "Verifying peer X.509 certificate... ok" \
|
||||||
|
-s "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-S "error" \
|
||||||
|
-C "error"
|
||||||
|
|
||||||
# Test using an EC opaque private key for server authentication
|
# Test using an EC opaque private key for server authentication
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
@ -1642,6 +1660,25 @@ run_test "TLS-ECDHE-RSA Opaque key for server authentication" \
|
|||||||
-S "error" \
|
-S "error" \
|
||||||
-C "error"
|
-C "error"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
|
requires_config_enabled MBEDTLS_ECDSA_C
|
||||||
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
|
requires_config_enabled MBEDTLS_SHA256_C
|
||||||
|
run_test "TLS-DHE-RSA Opaque key for server authentication" \
|
||||||
|
"$P_SRV auth_mode=required key_opaque=1 crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key" \
|
||||||
|
"$P_CLI crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key force_ciphersuite=TLS-DHE-RSA-WITH-AES-128-CBC-SHA" \
|
||||||
|
0 \
|
||||||
|
-c "Verifying peer X.509 certificate... ok" \
|
||||||
|
-c "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-s "key types: Opaque, none" \
|
||||||
|
-s "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-S "error" \
|
||||||
|
-C "error"
|
||||||
|
|
||||||
# Test using an EC opaque private key for client/server authentication
|
# Test using an EC opaque private key for client/server authentication
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
@ -1685,6 +1722,27 @@ run_test "TLS-ECDHE-RSA Opaque key for client/server authentication" \
|
|||||||
-S "error" \
|
-S "error" \
|
||||||
-C "error"
|
-C "error"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
|
||||||
|
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||||
|
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||||
|
requires_config_enabled MBEDTLS_ECDSA_C
|
||||||
|
requires_config_enabled MBEDTLS_RSA_C
|
||||||
|
requires_config_enabled MBEDTLS_SHA256_C
|
||||||
|
run_test "TLS-DHE-RSA Opaque key for client/server authentication" \
|
||||||
|
"$P_SRV auth_mode=required key_opaque=1 crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key" \
|
||||||
|
"$P_CLI key_opaque=1 crt_file=data_files/server2-sha256.crt \
|
||||||
|
key_file=data_files/server2.key force_ciphersuite=TLS-DHE-RSA-WITH-AES-128-CBC-SHA" \
|
||||||
|
0 \
|
||||||
|
-c "key type: Opaque" \
|
||||||
|
-c "Verifying peer X.509 certificate... ok" \
|
||||||
|
-c "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-s "key types: Opaque, none" \
|
||||||
|
-s "Verifying peer X.509 certificate... ok" \
|
||||||
|
-s "Ciphersuite is TLS-DHE-RSA" \
|
||||||
|
-S "error" \
|
||||||
|
-C "error"
|
||||||
|
|
||||||
# Test ciphersuites which we expect to be fully supported by PSA Crypto
|
# Test ciphersuites which we expect to be fully supported by PSA Crypto
|
||||||
# and check that we don't fall back to Mbed TLS' internal crypto primitives.
|
# and check that we don't fall back to Mbed TLS' internal crypto primitives.
|
||||||
run_test_psa TLS-ECDHE-ECDSA-WITH-AES-128-CCM
|
run_test_psa TLS-ECDHE-ECDSA-WITH-AES-128-CCM
|
||||||
|
Loading…
x
Reference in New Issue
Block a user