1[ 2 {"server_command": ["@SERVER@", "s_server", "-www", 3 "-key", "tests/serverX509Key.pem", 4 "-cert", "tests/serverX509Cert.pem", 5 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem"], 6 "comment": "Use ANY certificate just to ensure that server tries to authorise a client", 7 "environment": {"PYTHONPATH" : "."}, 8 "server_hostname": "localhost", 9 "server_port": @PORT@, 10 "tests" : [ 11 {"name" : "test-tls13-certificate-verify.py", 12 "arguments" : ["-k", "tests/clientX509Key.pem", 13 "-c", "tests/clientX509Cert.pem", 14 "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224", 15 "-p", "@PORT@"]}, 16 {"name" : "test-tls13-ecdsa-in-certificate-verify.py", 17 "arguments" : ["-k", "tests/serverECKey.pem", 18 "-c", "tests/serverECCert.pem", 19 "-s", "ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512 ecdsa_sha224 rsa_pkcs1_sha224", 20 "-p", "@PORT@"]} 21 ] 22 }, 23 {"server_command": ["@SERVER@", "s_server", "-www", 24 "-key", "tests/serverX509Key.pem", 25 "-cert", "tests/serverX509Cert.pem"], 26 "environment": {"PYTHONPATH" : "."}, 27 "server_hostname": "localhost", 28 "server_port": @PORT@, 29 "tests" : [ 30 {"name" : "test-tls13-conversation.py", 31 "arguments" : ["-p", "@PORT@"]}, 32 {"name" : "test-conversation.py", 33 "arguments" : ["-p", "@PORT@", 34 "-d"]} 35 ] 36 } 37 38] 39