2
0

30-extended-master-secret.cnf.in 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. # -*- mode: perl; -*-
  2. # Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
  3. #
  4. # Licensed under the Apache License 2.0 (the "License"). You may not use
  5. # this file except in compliance with the License. You can obtain a copy
  6. # in the file LICENSE in the source distribution or at
  7. # https://www.openssl.org/source/license.html
  8. ## SSL test configurations
  9. package ssltests;
  10. use OpenSSL::Test::Utils;
  11. our @tests = ();
  12. my @tests_tls1_2 = (
  13. {
  14. name => "disable-extended-master-secret-server-sha",
  15. server => {
  16. "Options" => "-ExtendedMasterSecret",
  17. },
  18. client => {
  19. "CipherString" => "AES128-SHA",
  20. "MaxProtocol" => "TLSv1.2"
  21. },
  22. test => {
  23. "ExpectedResult" => "Success",
  24. },
  25. },
  26. {
  27. name => "disable-extended-master-secret-client-sha",
  28. server => {
  29. },
  30. client => {
  31. "CipherString" => "AES128-SHA",
  32. "Options" => "-ExtendedMasterSecret",
  33. "MaxProtocol" => "TLSv1.2"
  34. },
  35. test => {
  36. "ExpectedResult" => "Success",
  37. },
  38. },
  39. {
  40. name => "disable-extended-master-secret-both-sha",
  41. server => {
  42. "Options" => "-ExtendedMasterSecret",
  43. },
  44. client => {
  45. "CipherString" => "AES128-SHA",
  46. "Options" => "-ExtendedMasterSecret",
  47. "MaxProtocol" => "TLSv1.2"
  48. },
  49. test => {
  50. "ExpectedResult" => "Success",
  51. },
  52. },
  53. {
  54. name => "disable-extended-master-secret-both-resume",
  55. server => {
  56. "Options" => "-ExtendedMasterSecret",
  57. },
  58. resume_server => {
  59. },
  60. client => {
  61. "CipherString" => "AES128-SHA",
  62. "Options" => "-ExtendedMasterSecret",
  63. "MaxProtocol" => "TLSv1.2"
  64. },
  65. resume_client => {
  66. "CipherString" => "AES128-SHA",
  67. "MaxProtocol" => "TLSv1.2"
  68. },
  69. test => {
  70. "HandshakeMode" => "Resume",
  71. "ExpectedResult" => "Success",
  72. },
  73. },
  74. {
  75. name => "disable-extended-master-secret-server-sha2",
  76. server => {
  77. "Options" => "-ExtendedMasterSecret",
  78. },
  79. client => {
  80. "CipherString" => "AES128-SHA256",
  81. "MaxProtocol" => "TLSv1.2"
  82. },
  83. test => {
  84. "ExpectedResult" => "Success",
  85. },
  86. },
  87. {
  88. name => "disable-extended-master-secret-client-sha2",
  89. server => {
  90. },
  91. client => {
  92. "CipherString" => "AES128-SHA256",
  93. "Options" => "-ExtendedMasterSecret",
  94. "MaxProtocol" => "TLSv1.2"
  95. },
  96. test => {
  97. "ExpectedResult" => "Success",
  98. },
  99. },
  100. {
  101. name => "disable-extended-master-secret-both-sha2",
  102. server => {
  103. "Options" => "-ExtendedMasterSecret",
  104. },
  105. client => {
  106. "CipherString" => "AES128-SHA256",
  107. "Options" => "-ExtendedMasterSecret",
  108. "MaxProtocol" => "TLSv1.2"
  109. },
  110. test => {
  111. "ExpectedResult" => "Success",
  112. },
  113. },
  114. );
  115. push @tests, @tests_tls1_2 unless disabled("tls1_2");