123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197 |
- # ----- secp256k1 ------
- # server TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -d
- # client TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -A ./certs/ecc/server-secp256k1-cert.pem
- -x
- -C
- # server TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -d
- # client TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -A ./certs/ecc/server-secp256k1-cert.pem
- -x
- -C
- # server TLSv1.3 TLS13-AES128-GCM-SHA256
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -d
- # client TLSv1.3 TLS13-AES128-GCM-SHA256
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -A ./certs/ecc/server-secp256k1-cert.pem
- -x
- -C
- # server TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 (mutual auth)
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/client-secp256k1-cert.pem
- -V
- # client TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 (mutal auth)
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/client-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/server-secp256k1-cert.pem
- -C
- # server TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static - mutual auth)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/client-secp256k1-cert.pem
- -V
- # client TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static - mutal auth)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/client-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/server-secp256k1-cert.pem
- -C
- # server TLSv1.3 TLS13-AES128-GCM-SHA256 (mutal auth)
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/server-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/client-secp256k1-cert.pem
- -V
- # client TLSv1.3 TLS13-AES128-GCM-SHA256 (mutal auth)
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/client-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-key.pem
- -A ./certs/ecc/server-secp256k1-cert.pem
- -C
- # ----- bp256r1 ------
- # server TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -d
- # client TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -A ./certs/ecc/server-bp256r1-cert.pem
- -x
- -C
- # server TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -d
- # client TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -A ./certs/ecc/server-bp256r1-cert.pem
- -x
- -C
- # server TLSv1.3 TLS13-AES128-GCM-SHA256
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -d
- # client TLSv1.3 TLS13-AES128-GCM-SHA256
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -A ./certs/ecc/server-bp256r1-cert.pem
- -x
- -C
- # server TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 (mutual auth)
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/client-bp256r1-cert.pem
- -V
- # client TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256 (mutal auth)
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/client-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/server-bp256r1-cert.pem
- -C
- # server TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static - mutual auth)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/client-bp256r1-cert.pem
- -V
- # client TLSv1.2 ECDH-ECDSA-AES128-GCM-SHA256 (static - mutal auth)
- -v 3
- -l ECDH-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/client-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/server-bp256r1-cert.pem
- -C
- # server TLSv1.3 TLS13-AES128-GCM-SHA256 (mutal auth)
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/server-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/client-bp256r1-cert.pem
- -V
- # client TLSv1.3 TLS13-AES128-GCM-SHA256 (mutal auth)
- -v 4
- -l TLS13-AES128-GCM-SHA256
- -c ./certs/ecc/client-bp256r1-cert.pem
- -k ./certs/ecc/bp256r1-key.pem
- -A ./certs/ecc/server-bp256r1-cert.pem
- -C
- # -- SECP256K1 without OID inside PKCS#8 --
- # server TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -c ./certs/ecc/server2-secp256k1-cert.pem
- -k ./certs/ecc/secp256k1-privkey.pem
- -d
- # client TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
- -v 3
- -l ECDHE-ECDSA-AES128-GCM-SHA256
- -A ./certs/ecc/ca-secp256k1-cert.pem
- -x
- -C
|