16-dtls-certstatus.cnf 1.4 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162
  1. # Generated with generate_ssl_tests.pl
  2. num_tests = 2
  3. test-0 = 0-certstatus-good
  4. test-1 = 1-certstatus-bad
  5. # ===========================================================
  6. [0-certstatus-good]
  7. ssl_conf = 0-certstatus-good-ssl
  8. [0-certstatus-good-ssl]
  9. server = 0-certstatus-good-server
  10. client = 0-certstatus-good-client
  11. [0-certstatus-good-server]
  12. Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
  13. CipherString = DEFAULT:@SECLEVEL=0
  14. PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
  15. [0-certstatus-good-client]
  16. CipherString = DEFAULT:@SECLEVEL=0
  17. VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
  18. VerifyMode = Peer
  19. [test-0]
  20. ExpectedResult = Success
  21. Method = DTLS
  22. server = 0-certstatus-good-server-extra
  23. [0-certstatus-good-server-extra]
  24. CertStatus = GoodResponse
  25. # ===========================================================
  26. [1-certstatus-bad]
  27. ssl_conf = 1-certstatus-bad-ssl
  28. [1-certstatus-bad-ssl]
  29. server = 1-certstatus-bad-server
  30. client = 1-certstatus-bad-client
  31. [1-certstatus-bad-server]
  32. Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
  33. CipherString = DEFAULT:@SECLEVEL=0
  34. PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
  35. [1-certstatus-bad-client]
  36. CipherString = DEFAULT:@SECLEVEL=0
  37. VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
  38. VerifyMode = Peer
  39. [test-1]
  40. ExpectedResult = ClientFail
  41. Method = DTLS
  42. server = 1-certstatus-bad-server-extra
  43. [1-certstatus-bad-server-extra]
  44. CertStatus = BadResponse