1[
2    {"server_command": ["@SERVER@", "s_server", "-www",
3                 "-key", "tests/serverX509Key.pem",
4                 "-cert", "tests/serverX509Cert.pem",
5                 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem"],
6     "comment": "Use ANY certificate just to ensure that server tries to authorise a client",
7     "environment": {"PYTHONPATH" : "."},
8     "server_hostname": "localhost",
9     "server_port": @PORT@,
10     "tests" : [
11	 {"name" : "test-tls13-certificate-verify.py",
12          "arguments" : ["-k", "tests/clientX509Key.pem",
13                         "-c", "tests/clientX509Cert.pem",
14			 "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224",
15	                 "-p", "@PORT@"]},
16	 {"name" : "test-tls13-ecdsa-in-certificate-verify.py",
17          "arguments" : ["-k", "tests/serverECKey.pem",
18                         "-c", "tests/serverECCert.pem",
19			 "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224",
20	                 "-p", "@PORT@"]}
21     ]
22    },
23    {"server_command": ["@SERVER@", "s_server", "-www",
24                 "-key", "tests/serverX509Key.pem",
25                 "-cert", "tests/serverX509Cert.pem"],
26     "environment": {"PYTHONPATH" : "."},
27     "server_hostname": "localhost",
28     "server_port": @PORT@,
29     "tests" : [
30	 {"name" : "test-tls13-conversation.py",
31          "arguments" : ["-p", "@PORT@"]},
32	 {"name" : "test-conversation.py",
33          "arguments" : ["-p", "@PORT@",
34		  "-d"]}
35     ]
36    }
37
38]
39