2
0

cert.json.in 1.9 KB

1234567891011121314151617181920212223242526272829303132333435363738
  1. [
  2. {"server_command": ["@SERVER@", "s_server", "-www",
  3. "-key", "tests/serverX509Key.pem",
  4. "-cert", "tests/serverX509Cert.pem",
  5. "-verify", "1", "-CAfile", "tests/clientX509Cert.pem"],
  6. "comment": "Use ANY certificate just to ensure that server tries to authorise a client",
  7. "environment": {"PYTHONPATH" : "."},
  8. "server_hostname": "localhost",
  9. "server_port": @PORT@,
  10. "tests" : [
  11. {"name" : "test-tls13-certificate-verify.py",
  12. "arguments" : ["-k", "tests/clientX509Key.pem",
  13. "-c", "tests/clientX509Cert.pem",
  14. "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224",
  15. "-p", "@PORT@"]},
  16. {"name" : "test-tls13-ecdsa-in-certificate-verify.py",
  17. "arguments" : ["-k", "tests/serverECKey.pem",
  18. "-c", "tests/serverECCert.pem",
  19. "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224",
  20. "-p", "@PORT@"]}
  21. ]
  22. },
  23. {"server_command": ["@SERVER@", "s_server", "-www",
  24. "-key", "tests/serverX509Key.pem",
  25. "-cert", "tests/serverX509Cert.pem"],
  26. "environment": {"PYTHONPATH" : "."},
  27. "server_hostname": "localhost",
  28. "server_port": @PORT@,
  29. "tests" : [
  30. {"name" : "test-tls13-conversation.py",
  31. "arguments" : ["-p", "@PORT@"]},
  32. {"name" : "test-conversation.py",
  33. "arguments" : ["-p", "@PORT@",
  34. "-d"]}
  35. ]
  36. }
  37. ]