xref: /openssl/test/ssl-tests/04-client_auth.cnf (revision 336d92eb)
1# Generated with generate_ssl_tests.pl
2
3num_tests = 40
4
5test-0 = 0-server-auth-flex
6test-1 = 1-client-auth-flex-request
7test-2 = 2-client-auth-flex-require-fail
8test-3 = 3-client-auth-flex-require
9test-4 = 4-client-auth-flex-rsa-pss
10test-5 = 5-client-auth-flex-rsa-pss-bad
11test-6 = 6-client-auth-flex-require-non-empty-names
12test-7 = 7-client-auth-flex-noroot
13test-8 = 8-server-auth-TLSv1
14test-9 = 9-client-auth-TLSv1-request
15test-10 = 10-client-auth-TLSv1-require-fail
16test-11 = 11-client-auth-TLSv1-require
17test-12 = 12-client-auth-TLSv1-require-non-empty-names
18test-13 = 13-client-auth-TLSv1-noroot
19test-14 = 14-server-auth-TLSv1.1
20test-15 = 15-client-auth-TLSv1.1-request
21test-16 = 16-client-auth-TLSv1.1-require-fail
22test-17 = 17-client-auth-TLSv1.1-require
23test-18 = 18-client-auth-TLSv1.1-require-non-empty-names
24test-19 = 19-client-auth-TLSv1.1-noroot
25test-20 = 20-server-auth-TLSv1.2
26test-21 = 21-client-auth-TLSv1.2-request
27test-22 = 22-client-auth-TLSv1.2-require-fail
28test-23 = 23-client-auth-TLSv1.2-require
29test-24 = 24-client-auth-TLSv1.2-rsa-pss
30test-25 = 25-client-auth-TLSv1.2-rsa-pss-bad
31test-26 = 26-client-auth-TLSv1.2-require-non-empty-names
32test-27 = 27-client-auth-TLSv1.2-noroot
33test-28 = 28-server-auth-DTLSv1
34test-29 = 29-client-auth-DTLSv1-request
35test-30 = 30-client-auth-DTLSv1-require-fail
36test-31 = 31-client-auth-DTLSv1-require
37test-32 = 32-client-auth-DTLSv1-require-non-empty-names
38test-33 = 33-client-auth-DTLSv1-noroot
39test-34 = 34-server-auth-DTLSv1.2
40test-35 = 35-client-auth-DTLSv1.2-request
41test-36 = 36-client-auth-DTLSv1.2-require-fail
42test-37 = 37-client-auth-DTLSv1.2-require
43test-38 = 38-client-auth-DTLSv1.2-require-non-empty-names
44test-39 = 39-client-auth-DTLSv1.2-noroot
45# ===========================================================
46
47[0-server-auth-flex]
48ssl_conf = 0-server-auth-flex-ssl
49
50[0-server-auth-flex-ssl]
51server = 0-server-auth-flex-server
52client = 0-server-auth-flex-client
53
54[0-server-auth-flex-server]
55Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
56CipherString = DEFAULT:@SECLEVEL=0
57PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
58
59[0-server-auth-flex-client]
60CipherString = DEFAULT:@SECLEVEL=0
61VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
62VerifyMode = Peer
63
64[test-0]
65ExpectedResult = Success
66
67
68# ===========================================================
69
70[1-client-auth-flex-request]
71ssl_conf = 1-client-auth-flex-request-ssl
72
73[1-client-auth-flex-request-ssl]
74server = 1-client-auth-flex-request-server
75client = 1-client-auth-flex-request-client
76
77[1-client-auth-flex-request-server]
78Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
79CipherString = DEFAULT:@SECLEVEL=0
80PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
81VerifyMode = Request
82
83[1-client-auth-flex-request-client]
84CipherString = DEFAULT:@SECLEVEL=0
85VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
86VerifyMode = Peer
87
88[test-1]
89ExpectedResult = Success
90
91
92# ===========================================================
93
94[2-client-auth-flex-require-fail]
95ssl_conf = 2-client-auth-flex-require-fail-ssl
96
97[2-client-auth-flex-require-fail-ssl]
98server = 2-client-auth-flex-require-fail-server
99client = 2-client-auth-flex-require-fail-client
100
101[2-client-auth-flex-require-fail-server]
102Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
103CipherString = DEFAULT:@SECLEVEL=0
104PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
105VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
106VerifyMode = Require
107
108[2-client-auth-flex-require-fail-client]
109CipherString = DEFAULT:@SECLEVEL=0
110VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
111VerifyMode = Peer
112
113[test-2]
114ExpectedResult = ServerFail
115ExpectedServerAlert = CertificateRequired
116
117
118# ===========================================================
119
120[3-client-auth-flex-require]
121ssl_conf = 3-client-auth-flex-require-ssl
122
123[3-client-auth-flex-require-ssl]
124server = 3-client-auth-flex-require-server
125client = 3-client-auth-flex-require-client
126
127[3-client-auth-flex-require-server]
128Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
129CipherString = DEFAULT:@SECLEVEL=0
130PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
131VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
132VerifyMode = Request
133
134[3-client-auth-flex-require-client]
135Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
136CipherString = DEFAULT:@SECLEVEL=0
137PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
138VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
139VerifyMode = Peer
140
141[test-3]
142ExpectedClientCANames = empty
143ExpectedClientCertType = RSA
144ExpectedResult = Success
145
146
147# ===========================================================
148
149[4-client-auth-flex-rsa-pss]
150ssl_conf = 4-client-auth-flex-rsa-pss-ssl
151
152[4-client-auth-flex-rsa-pss-ssl]
153server = 4-client-auth-flex-rsa-pss-server
154client = 4-client-auth-flex-rsa-pss-client
155
156[4-client-auth-flex-rsa-pss-server]
157Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
158CipherString = DEFAULT:@SECLEVEL=0
159ClientCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
160PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
161VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
162VerifyMode = Require
163
164[4-client-auth-flex-rsa-pss-client]
165Certificate = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-cert.pem
166CipherString = DEFAULT:@SECLEVEL=0
167Options = StrictCertCheck
168PrivateKey = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-key.pem
169VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
170VerifyMode = Peer
171
172[test-4]
173ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/rootcert.pem
174ExpectedClientCertType = RSA-PSS
175ExpectedResult = Success
176
177
178# ===========================================================
179
180[5-client-auth-flex-rsa-pss-bad]
181ssl_conf = 5-client-auth-flex-rsa-pss-bad-ssl
182
183[5-client-auth-flex-rsa-pss-bad-ssl]
184server = 5-client-auth-flex-rsa-pss-bad-server
185client = 5-client-auth-flex-rsa-pss-bad-client
186
187[5-client-auth-flex-rsa-pss-bad-server]
188Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
189CipherString = DEFAULT:@SECLEVEL=0
190ClientCAFile = ${ENV::TEST_CERTS_DIR}/rootCA.pem
191PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
192VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootCA.pem
193VerifyMode = Require
194
195[5-client-auth-flex-rsa-pss-bad-client]
196Certificate = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-cert.pem
197CipherString = DEFAULT:@SECLEVEL=0
198Options = StrictCertCheck
199PrivateKey = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-key.pem
200VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
201VerifyMode = Peer
202
203[test-5]
204ExpectedResult = ServerFail
205ExpectedServerAlert = CertificateRequired
206
207
208# ===========================================================
209
210[6-client-auth-flex-require-non-empty-names]
211ssl_conf = 6-client-auth-flex-require-non-empty-names-ssl
212
213[6-client-auth-flex-require-non-empty-names-ssl]
214server = 6-client-auth-flex-require-non-empty-names-server
215client = 6-client-auth-flex-require-non-empty-names-client
216
217[6-client-auth-flex-require-non-empty-names-server]
218Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
219CipherString = DEFAULT:@SECLEVEL=0
220ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
221PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
222VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
223VerifyMode = Request
224
225[6-client-auth-flex-require-non-empty-names-client]
226Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
227CipherString = DEFAULT:@SECLEVEL=0
228PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
229VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
230VerifyMode = Peer
231
232[test-6]
233ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
234ExpectedClientCertType = RSA
235ExpectedResult = Success
236
237
238# ===========================================================
239
240[7-client-auth-flex-noroot]
241ssl_conf = 7-client-auth-flex-noroot-ssl
242
243[7-client-auth-flex-noroot-ssl]
244server = 7-client-auth-flex-noroot-server
245client = 7-client-auth-flex-noroot-client
246
247[7-client-auth-flex-noroot-server]
248Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
249CipherString = DEFAULT:@SECLEVEL=0
250PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
251VerifyMode = Require
252
253[7-client-auth-flex-noroot-client]
254Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
255CipherString = DEFAULT:@SECLEVEL=0
256PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
257VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
258VerifyMode = Peer
259
260[test-7]
261ExpectedResult = ServerFail
262ExpectedServerAlert = UnknownCA
263
264
265# ===========================================================
266
267[8-server-auth-TLSv1]
268ssl_conf = 8-server-auth-TLSv1-ssl
269
270[8-server-auth-TLSv1-ssl]
271server = 8-server-auth-TLSv1-server
272client = 8-server-auth-TLSv1-client
273
274[8-server-auth-TLSv1-server]
275Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
276CipherString = DEFAULT:@SECLEVEL=0
277MaxProtocol = TLSv1
278MinProtocol = TLSv1
279PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
280
281[8-server-auth-TLSv1-client]
282CipherString = DEFAULT:@SECLEVEL=0
283MaxProtocol = TLSv1
284MinProtocol = TLSv1
285VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
286VerifyMode = Peer
287
288[test-8]
289ExpectedResult = Success
290
291
292# ===========================================================
293
294[9-client-auth-TLSv1-request]
295ssl_conf = 9-client-auth-TLSv1-request-ssl
296
297[9-client-auth-TLSv1-request-ssl]
298server = 9-client-auth-TLSv1-request-server
299client = 9-client-auth-TLSv1-request-client
300
301[9-client-auth-TLSv1-request-server]
302Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
303CipherString = DEFAULT:@SECLEVEL=0
304MaxProtocol = TLSv1
305MinProtocol = TLSv1
306PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
307VerifyMode = Request
308
309[9-client-auth-TLSv1-request-client]
310CipherString = DEFAULT:@SECLEVEL=0
311MaxProtocol = TLSv1
312MinProtocol = TLSv1
313VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
314VerifyMode = Peer
315
316[test-9]
317ExpectedResult = Success
318
319
320# ===========================================================
321
322[10-client-auth-TLSv1-require-fail]
323ssl_conf = 10-client-auth-TLSv1-require-fail-ssl
324
325[10-client-auth-TLSv1-require-fail-ssl]
326server = 10-client-auth-TLSv1-require-fail-server
327client = 10-client-auth-TLSv1-require-fail-client
328
329[10-client-auth-TLSv1-require-fail-server]
330Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
331CipherString = DEFAULT:@SECLEVEL=0
332MaxProtocol = TLSv1
333MinProtocol = TLSv1
334PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
335VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
336VerifyMode = Require
337
338[10-client-auth-TLSv1-require-fail-client]
339CipherString = DEFAULT:@SECLEVEL=0
340MaxProtocol = TLSv1
341MinProtocol = TLSv1
342VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
343VerifyMode = Peer
344
345[test-10]
346ExpectedResult = ServerFail
347ExpectedServerAlert = HandshakeFailure
348
349
350# ===========================================================
351
352[11-client-auth-TLSv1-require]
353ssl_conf = 11-client-auth-TLSv1-require-ssl
354
355[11-client-auth-TLSv1-require-ssl]
356server = 11-client-auth-TLSv1-require-server
357client = 11-client-auth-TLSv1-require-client
358
359[11-client-auth-TLSv1-require-server]
360Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
361CipherString = DEFAULT:@SECLEVEL=0
362MaxProtocol = TLSv1
363MinProtocol = TLSv1
364PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
365VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
366VerifyMode = Request
367
368[11-client-auth-TLSv1-require-client]
369Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
370CipherString = DEFAULT:@SECLEVEL=0
371MaxProtocol = TLSv1
372MinProtocol = TLSv1
373PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
374VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
375VerifyMode = Peer
376
377[test-11]
378ExpectedClientCANames = empty
379ExpectedClientCertType = RSA
380ExpectedResult = Success
381
382
383# ===========================================================
384
385[12-client-auth-TLSv1-require-non-empty-names]
386ssl_conf = 12-client-auth-TLSv1-require-non-empty-names-ssl
387
388[12-client-auth-TLSv1-require-non-empty-names-ssl]
389server = 12-client-auth-TLSv1-require-non-empty-names-server
390client = 12-client-auth-TLSv1-require-non-empty-names-client
391
392[12-client-auth-TLSv1-require-non-empty-names-server]
393Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
394CipherString = DEFAULT:@SECLEVEL=0
395ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
396MaxProtocol = TLSv1
397MinProtocol = TLSv1
398PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
399VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
400VerifyMode = Request
401
402[12-client-auth-TLSv1-require-non-empty-names-client]
403Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
404CipherString = DEFAULT:@SECLEVEL=0
405MaxProtocol = TLSv1
406MinProtocol = TLSv1
407PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
408VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
409VerifyMode = Peer
410
411[test-12]
412ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
413ExpectedClientCertType = RSA
414ExpectedResult = Success
415
416
417# ===========================================================
418
419[13-client-auth-TLSv1-noroot]
420ssl_conf = 13-client-auth-TLSv1-noroot-ssl
421
422[13-client-auth-TLSv1-noroot-ssl]
423server = 13-client-auth-TLSv1-noroot-server
424client = 13-client-auth-TLSv1-noroot-client
425
426[13-client-auth-TLSv1-noroot-server]
427Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
428CipherString = DEFAULT:@SECLEVEL=0
429MaxProtocol = TLSv1
430MinProtocol = TLSv1
431PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
432VerifyMode = Require
433
434[13-client-auth-TLSv1-noroot-client]
435Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
436CipherString = DEFAULT:@SECLEVEL=0
437MaxProtocol = TLSv1
438MinProtocol = TLSv1
439PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
440VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
441VerifyMode = Peer
442
443[test-13]
444ExpectedResult = ServerFail
445ExpectedServerAlert = UnknownCA
446
447
448# ===========================================================
449
450[14-server-auth-TLSv1.1]
451ssl_conf = 14-server-auth-TLSv1.1-ssl
452
453[14-server-auth-TLSv1.1-ssl]
454server = 14-server-auth-TLSv1.1-server
455client = 14-server-auth-TLSv1.1-client
456
457[14-server-auth-TLSv1.1-server]
458Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
459CipherString = DEFAULT:@SECLEVEL=0
460MaxProtocol = TLSv1.1
461MinProtocol = TLSv1.1
462PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
463
464[14-server-auth-TLSv1.1-client]
465CipherString = DEFAULT:@SECLEVEL=0
466MaxProtocol = TLSv1.1
467MinProtocol = TLSv1.1
468VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
469VerifyMode = Peer
470
471[test-14]
472ExpectedResult = Success
473
474
475# ===========================================================
476
477[15-client-auth-TLSv1.1-request]
478ssl_conf = 15-client-auth-TLSv1.1-request-ssl
479
480[15-client-auth-TLSv1.1-request-ssl]
481server = 15-client-auth-TLSv1.1-request-server
482client = 15-client-auth-TLSv1.1-request-client
483
484[15-client-auth-TLSv1.1-request-server]
485Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
486CipherString = DEFAULT:@SECLEVEL=0
487MaxProtocol = TLSv1.1
488MinProtocol = TLSv1.1
489PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
490VerifyMode = Request
491
492[15-client-auth-TLSv1.1-request-client]
493CipherString = DEFAULT:@SECLEVEL=0
494MaxProtocol = TLSv1.1
495MinProtocol = TLSv1.1
496VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
497VerifyMode = Peer
498
499[test-15]
500ExpectedResult = Success
501
502
503# ===========================================================
504
505[16-client-auth-TLSv1.1-require-fail]
506ssl_conf = 16-client-auth-TLSv1.1-require-fail-ssl
507
508[16-client-auth-TLSv1.1-require-fail-ssl]
509server = 16-client-auth-TLSv1.1-require-fail-server
510client = 16-client-auth-TLSv1.1-require-fail-client
511
512[16-client-auth-TLSv1.1-require-fail-server]
513Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
514CipherString = DEFAULT:@SECLEVEL=0
515MaxProtocol = TLSv1.1
516MinProtocol = TLSv1.1
517PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
518VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
519VerifyMode = Require
520
521[16-client-auth-TLSv1.1-require-fail-client]
522CipherString = DEFAULT:@SECLEVEL=0
523MaxProtocol = TLSv1.1
524MinProtocol = TLSv1.1
525VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
526VerifyMode = Peer
527
528[test-16]
529ExpectedResult = ServerFail
530ExpectedServerAlert = HandshakeFailure
531
532
533# ===========================================================
534
535[17-client-auth-TLSv1.1-require]
536ssl_conf = 17-client-auth-TLSv1.1-require-ssl
537
538[17-client-auth-TLSv1.1-require-ssl]
539server = 17-client-auth-TLSv1.1-require-server
540client = 17-client-auth-TLSv1.1-require-client
541
542[17-client-auth-TLSv1.1-require-server]
543Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
544CipherString = DEFAULT:@SECLEVEL=0
545MaxProtocol = TLSv1.1
546MinProtocol = TLSv1.1
547PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
548VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
549VerifyMode = Request
550
551[17-client-auth-TLSv1.1-require-client]
552Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
553CipherString = DEFAULT:@SECLEVEL=0
554MaxProtocol = TLSv1.1
555MinProtocol = TLSv1.1
556PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
557VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
558VerifyMode = Peer
559
560[test-17]
561ExpectedClientCANames = empty
562ExpectedClientCertType = RSA
563ExpectedResult = Success
564
565
566# ===========================================================
567
568[18-client-auth-TLSv1.1-require-non-empty-names]
569ssl_conf = 18-client-auth-TLSv1.1-require-non-empty-names-ssl
570
571[18-client-auth-TLSv1.1-require-non-empty-names-ssl]
572server = 18-client-auth-TLSv1.1-require-non-empty-names-server
573client = 18-client-auth-TLSv1.1-require-non-empty-names-client
574
575[18-client-auth-TLSv1.1-require-non-empty-names-server]
576Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
577CipherString = DEFAULT:@SECLEVEL=0
578ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
579MaxProtocol = TLSv1.1
580MinProtocol = TLSv1.1
581PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
582VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
583VerifyMode = Request
584
585[18-client-auth-TLSv1.1-require-non-empty-names-client]
586Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
587CipherString = DEFAULT:@SECLEVEL=0
588MaxProtocol = TLSv1.1
589MinProtocol = TLSv1.1
590PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
591VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
592VerifyMode = Peer
593
594[test-18]
595ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
596ExpectedClientCertType = RSA
597ExpectedResult = Success
598
599
600# ===========================================================
601
602[19-client-auth-TLSv1.1-noroot]
603ssl_conf = 19-client-auth-TLSv1.1-noroot-ssl
604
605[19-client-auth-TLSv1.1-noroot-ssl]
606server = 19-client-auth-TLSv1.1-noroot-server
607client = 19-client-auth-TLSv1.1-noroot-client
608
609[19-client-auth-TLSv1.1-noroot-server]
610Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
611CipherString = DEFAULT:@SECLEVEL=0
612MaxProtocol = TLSv1.1
613MinProtocol = TLSv1.1
614PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
615VerifyMode = Require
616
617[19-client-auth-TLSv1.1-noroot-client]
618Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
619CipherString = DEFAULT:@SECLEVEL=0
620MaxProtocol = TLSv1.1
621MinProtocol = TLSv1.1
622PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
623VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
624VerifyMode = Peer
625
626[test-19]
627ExpectedResult = ServerFail
628ExpectedServerAlert = UnknownCA
629
630
631# ===========================================================
632
633[20-server-auth-TLSv1.2]
634ssl_conf = 20-server-auth-TLSv1.2-ssl
635
636[20-server-auth-TLSv1.2-ssl]
637server = 20-server-auth-TLSv1.2-server
638client = 20-server-auth-TLSv1.2-client
639
640[20-server-auth-TLSv1.2-server]
641Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
642CipherString = DEFAULT:@SECLEVEL=0
643MaxProtocol = TLSv1.2
644MinProtocol = TLSv1.2
645PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
646
647[20-server-auth-TLSv1.2-client]
648CipherString = DEFAULT:@SECLEVEL=0
649MaxProtocol = TLSv1.2
650MinProtocol = TLSv1.2
651VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
652VerifyMode = Peer
653
654[test-20]
655ExpectedResult = Success
656
657
658# ===========================================================
659
660[21-client-auth-TLSv1.2-request]
661ssl_conf = 21-client-auth-TLSv1.2-request-ssl
662
663[21-client-auth-TLSv1.2-request-ssl]
664server = 21-client-auth-TLSv1.2-request-server
665client = 21-client-auth-TLSv1.2-request-client
666
667[21-client-auth-TLSv1.2-request-server]
668Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
669CipherString = DEFAULT:@SECLEVEL=0
670MaxProtocol = TLSv1.2
671MinProtocol = TLSv1.2
672PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
673VerifyMode = Request
674
675[21-client-auth-TLSv1.2-request-client]
676CipherString = DEFAULT:@SECLEVEL=0
677MaxProtocol = TLSv1.2
678MinProtocol = TLSv1.2
679VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
680VerifyMode = Peer
681
682[test-21]
683ExpectedResult = Success
684
685
686# ===========================================================
687
688[22-client-auth-TLSv1.2-require-fail]
689ssl_conf = 22-client-auth-TLSv1.2-require-fail-ssl
690
691[22-client-auth-TLSv1.2-require-fail-ssl]
692server = 22-client-auth-TLSv1.2-require-fail-server
693client = 22-client-auth-TLSv1.2-require-fail-client
694
695[22-client-auth-TLSv1.2-require-fail-server]
696Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
697CipherString = DEFAULT:@SECLEVEL=0
698MaxProtocol = TLSv1.2
699MinProtocol = TLSv1.2
700PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
701VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
702VerifyMode = Require
703
704[22-client-auth-TLSv1.2-require-fail-client]
705CipherString = DEFAULT:@SECLEVEL=0
706MaxProtocol = TLSv1.2
707MinProtocol = TLSv1.2
708VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
709VerifyMode = Peer
710
711[test-22]
712ExpectedResult = ServerFail
713ExpectedServerAlert = HandshakeFailure
714
715
716# ===========================================================
717
718[23-client-auth-TLSv1.2-require]
719ssl_conf = 23-client-auth-TLSv1.2-require-ssl
720
721[23-client-auth-TLSv1.2-require-ssl]
722server = 23-client-auth-TLSv1.2-require-server
723client = 23-client-auth-TLSv1.2-require-client
724
725[23-client-auth-TLSv1.2-require-server]
726Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
727CipherString = DEFAULT:@SECLEVEL=0
728ClientSignatureAlgorithms = SHA256+RSA
729MaxProtocol = TLSv1.2
730MinProtocol = TLSv1.2
731PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
732VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
733VerifyMode = Request
734
735[23-client-auth-TLSv1.2-require-client]
736Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
737CipherString = DEFAULT:@SECLEVEL=0
738MaxProtocol = TLSv1.2
739MinProtocol = TLSv1.2
740PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
741VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
742VerifyMode = Peer
743
744[test-23]
745ExpectedClientCANames = empty
746ExpectedClientCertType = RSA
747ExpectedClientSignHash = SHA256
748ExpectedClientSignType = RSA
749ExpectedResult = Success
750
751
752# ===========================================================
753
754[24-client-auth-TLSv1.2-rsa-pss]
755ssl_conf = 24-client-auth-TLSv1.2-rsa-pss-ssl
756
757[24-client-auth-TLSv1.2-rsa-pss-ssl]
758server = 24-client-auth-TLSv1.2-rsa-pss-server
759client = 24-client-auth-TLSv1.2-rsa-pss-client
760
761[24-client-auth-TLSv1.2-rsa-pss-server]
762Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
763CipherString = DEFAULT:@SECLEVEL=0
764ClientCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
765MaxProtocol = TLSv1.2
766MinProtocol = TLSv1.2
767PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
768VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
769VerifyMode = Require
770
771[24-client-auth-TLSv1.2-rsa-pss-client]
772Certificate = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-cert.pem
773CipherString = DEFAULT:@SECLEVEL=0
774MaxProtocol = TLSv1.2
775MinProtocol = TLSv1.2
776Options = StrictCertCheck
777PrivateKey = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-key.pem
778VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
779VerifyMode = Peer
780
781[test-24]
782ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/rootcert.pem
783ExpectedClientCertType = RSA-PSS
784ExpectedResult = Success
785
786
787# ===========================================================
788
789[25-client-auth-TLSv1.2-rsa-pss-bad]
790ssl_conf = 25-client-auth-TLSv1.2-rsa-pss-bad-ssl
791
792[25-client-auth-TLSv1.2-rsa-pss-bad-ssl]
793server = 25-client-auth-TLSv1.2-rsa-pss-bad-server
794client = 25-client-auth-TLSv1.2-rsa-pss-bad-client
795
796[25-client-auth-TLSv1.2-rsa-pss-bad-server]
797Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
798CipherString = DEFAULT:@SECLEVEL=0
799ClientCAFile = ${ENV::TEST_CERTS_DIR}/rootCA.pem
800MaxProtocol = TLSv1.2
801MinProtocol = TLSv1.2
802PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
803VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootCA.pem
804VerifyMode = Require
805
806[25-client-auth-TLSv1.2-rsa-pss-bad-client]
807Certificate = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-cert.pem
808CipherString = DEFAULT:@SECLEVEL=0
809MaxProtocol = TLSv1.2
810MinProtocol = TLSv1.2
811Options = StrictCertCheck
812PrivateKey = ${ENV::TEST_CERTS_DIR}/client-pss-restrict-key.pem
813VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
814VerifyMode = Peer
815
816[test-25]
817ExpectedResult = ServerFail
818ExpectedServerAlert = HandshakeFailure
819
820
821# ===========================================================
822
823[26-client-auth-TLSv1.2-require-non-empty-names]
824ssl_conf = 26-client-auth-TLSv1.2-require-non-empty-names-ssl
825
826[26-client-auth-TLSv1.2-require-non-empty-names-ssl]
827server = 26-client-auth-TLSv1.2-require-non-empty-names-server
828client = 26-client-auth-TLSv1.2-require-non-empty-names-client
829
830[26-client-auth-TLSv1.2-require-non-empty-names-server]
831Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
832CipherString = DEFAULT:@SECLEVEL=0
833ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
834ClientSignatureAlgorithms = SHA256+RSA
835MaxProtocol = TLSv1.2
836MinProtocol = TLSv1.2
837PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
838VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
839VerifyMode = Request
840
841[26-client-auth-TLSv1.2-require-non-empty-names-client]
842Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
843CipherString = DEFAULT:@SECLEVEL=0
844MaxProtocol = TLSv1.2
845MinProtocol = TLSv1.2
846PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
847VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
848VerifyMode = Peer
849
850[test-26]
851ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
852ExpectedClientCertType = RSA
853ExpectedClientSignHash = SHA256
854ExpectedClientSignType = RSA
855ExpectedResult = Success
856
857
858# ===========================================================
859
860[27-client-auth-TLSv1.2-noroot]
861ssl_conf = 27-client-auth-TLSv1.2-noroot-ssl
862
863[27-client-auth-TLSv1.2-noroot-ssl]
864server = 27-client-auth-TLSv1.2-noroot-server
865client = 27-client-auth-TLSv1.2-noroot-client
866
867[27-client-auth-TLSv1.2-noroot-server]
868Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
869CipherString = DEFAULT:@SECLEVEL=0
870MaxProtocol = TLSv1.2
871MinProtocol = TLSv1.2
872PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
873VerifyMode = Require
874
875[27-client-auth-TLSv1.2-noroot-client]
876Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
877CipherString = DEFAULT:@SECLEVEL=0
878MaxProtocol = TLSv1.2
879MinProtocol = TLSv1.2
880PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
881VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
882VerifyMode = Peer
883
884[test-27]
885ExpectedResult = ServerFail
886ExpectedServerAlert = UnknownCA
887
888
889# ===========================================================
890
891[28-server-auth-DTLSv1]
892ssl_conf = 28-server-auth-DTLSv1-ssl
893
894[28-server-auth-DTLSv1-ssl]
895server = 28-server-auth-DTLSv1-server
896client = 28-server-auth-DTLSv1-client
897
898[28-server-auth-DTLSv1-server]
899Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
900CipherString = DEFAULT:@SECLEVEL=0
901MaxProtocol = DTLSv1
902MinProtocol = DTLSv1
903PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
904
905[28-server-auth-DTLSv1-client]
906CipherString = DEFAULT:@SECLEVEL=0
907MaxProtocol = DTLSv1
908MinProtocol = DTLSv1
909VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
910VerifyMode = Peer
911
912[test-28]
913ExpectedResult = Success
914Method = DTLS
915
916
917# ===========================================================
918
919[29-client-auth-DTLSv1-request]
920ssl_conf = 29-client-auth-DTLSv1-request-ssl
921
922[29-client-auth-DTLSv1-request-ssl]
923server = 29-client-auth-DTLSv1-request-server
924client = 29-client-auth-DTLSv1-request-client
925
926[29-client-auth-DTLSv1-request-server]
927Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
928CipherString = DEFAULT:@SECLEVEL=0
929MaxProtocol = DTLSv1
930MinProtocol = DTLSv1
931PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
932VerifyMode = Request
933
934[29-client-auth-DTLSv1-request-client]
935CipherString = DEFAULT:@SECLEVEL=0
936MaxProtocol = DTLSv1
937MinProtocol = DTLSv1
938VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
939VerifyMode = Peer
940
941[test-29]
942ExpectedResult = Success
943Method = DTLS
944
945
946# ===========================================================
947
948[30-client-auth-DTLSv1-require-fail]
949ssl_conf = 30-client-auth-DTLSv1-require-fail-ssl
950
951[30-client-auth-DTLSv1-require-fail-ssl]
952server = 30-client-auth-DTLSv1-require-fail-server
953client = 30-client-auth-DTLSv1-require-fail-client
954
955[30-client-auth-DTLSv1-require-fail-server]
956Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
957CipherString = DEFAULT:@SECLEVEL=0
958MaxProtocol = DTLSv1
959MinProtocol = DTLSv1
960PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
961VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
962VerifyMode = Require
963
964[30-client-auth-DTLSv1-require-fail-client]
965CipherString = DEFAULT:@SECLEVEL=0
966MaxProtocol = DTLSv1
967MinProtocol = DTLSv1
968VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
969VerifyMode = Peer
970
971[test-30]
972ExpectedResult = ServerFail
973ExpectedServerAlert = HandshakeFailure
974Method = DTLS
975
976
977# ===========================================================
978
979[31-client-auth-DTLSv1-require]
980ssl_conf = 31-client-auth-DTLSv1-require-ssl
981
982[31-client-auth-DTLSv1-require-ssl]
983server = 31-client-auth-DTLSv1-require-server
984client = 31-client-auth-DTLSv1-require-client
985
986[31-client-auth-DTLSv1-require-server]
987Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
988CipherString = DEFAULT:@SECLEVEL=0
989MaxProtocol = DTLSv1
990MinProtocol = DTLSv1
991PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
992VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
993VerifyMode = Request
994
995[31-client-auth-DTLSv1-require-client]
996Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
997CipherString = DEFAULT:@SECLEVEL=0
998MaxProtocol = DTLSv1
999MinProtocol = DTLSv1
1000PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1001VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1002VerifyMode = Peer
1003
1004[test-31]
1005ExpectedClientCANames = empty
1006ExpectedClientCertType = RSA
1007ExpectedResult = Success
1008Method = DTLS
1009
1010
1011# ===========================================================
1012
1013[32-client-auth-DTLSv1-require-non-empty-names]
1014ssl_conf = 32-client-auth-DTLSv1-require-non-empty-names-ssl
1015
1016[32-client-auth-DTLSv1-require-non-empty-names-ssl]
1017server = 32-client-auth-DTLSv1-require-non-empty-names-server
1018client = 32-client-auth-DTLSv1-require-non-empty-names-client
1019
1020[32-client-auth-DTLSv1-require-non-empty-names-server]
1021Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1022CipherString = DEFAULT:@SECLEVEL=0
1023ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1024MaxProtocol = DTLSv1
1025MinProtocol = DTLSv1
1026PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1027VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1028VerifyMode = Request
1029
1030[32-client-auth-DTLSv1-require-non-empty-names-client]
1031Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
1032CipherString = DEFAULT:@SECLEVEL=0
1033MaxProtocol = DTLSv1
1034MinProtocol = DTLSv1
1035PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1036VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1037VerifyMode = Peer
1038
1039[test-32]
1040ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1041ExpectedClientCertType = RSA
1042ExpectedResult = Success
1043Method = DTLS
1044
1045
1046# ===========================================================
1047
1048[33-client-auth-DTLSv1-noroot]
1049ssl_conf = 33-client-auth-DTLSv1-noroot-ssl
1050
1051[33-client-auth-DTLSv1-noroot-ssl]
1052server = 33-client-auth-DTLSv1-noroot-server
1053client = 33-client-auth-DTLSv1-noroot-client
1054
1055[33-client-auth-DTLSv1-noroot-server]
1056Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1057CipherString = DEFAULT:@SECLEVEL=0
1058MaxProtocol = DTLSv1
1059MinProtocol = DTLSv1
1060PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1061VerifyMode = Require
1062
1063[33-client-auth-DTLSv1-noroot-client]
1064Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
1065CipherString = DEFAULT:@SECLEVEL=0
1066MaxProtocol = DTLSv1
1067MinProtocol = DTLSv1
1068PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1069VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1070VerifyMode = Peer
1071
1072[test-33]
1073ExpectedResult = ServerFail
1074ExpectedServerAlert = UnknownCA
1075Method = DTLS
1076
1077
1078# ===========================================================
1079
1080[34-server-auth-DTLSv1.2]
1081ssl_conf = 34-server-auth-DTLSv1.2-ssl
1082
1083[34-server-auth-DTLSv1.2-ssl]
1084server = 34-server-auth-DTLSv1.2-server
1085client = 34-server-auth-DTLSv1.2-client
1086
1087[34-server-auth-DTLSv1.2-server]
1088Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1089CipherString = DEFAULT:@SECLEVEL=0
1090MaxProtocol = DTLSv1.2
1091MinProtocol = DTLSv1.2
1092PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1093
1094[34-server-auth-DTLSv1.2-client]
1095CipherString = DEFAULT:@SECLEVEL=0
1096MaxProtocol = DTLSv1.2
1097MinProtocol = DTLSv1.2
1098VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1099VerifyMode = Peer
1100
1101[test-34]
1102ExpectedResult = Success
1103Method = DTLS
1104
1105
1106# ===========================================================
1107
1108[35-client-auth-DTLSv1.2-request]
1109ssl_conf = 35-client-auth-DTLSv1.2-request-ssl
1110
1111[35-client-auth-DTLSv1.2-request-ssl]
1112server = 35-client-auth-DTLSv1.2-request-server
1113client = 35-client-auth-DTLSv1.2-request-client
1114
1115[35-client-auth-DTLSv1.2-request-server]
1116Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1117CipherString = DEFAULT:@SECLEVEL=0
1118MaxProtocol = DTLSv1.2
1119MinProtocol = DTLSv1.2
1120PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1121VerifyMode = Request
1122
1123[35-client-auth-DTLSv1.2-request-client]
1124CipherString = DEFAULT:@SECLEVEL=0
1125MaxProtocol = DTLSv1.2
1126MinProtocol = DTLSv1.2
1127VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1128VerifyMode = Peer
1129
1130[test-35]
1131ExpectedResult = Success
1132Method = DTLS
1133
1134
1135# ===========================================================
1136
1137[36-client-auth-DTLSv1.2-require-fail]
1138ssl_conf = 36-client-auth-DTLSv1.2-require-fail-ssl
1139
1140[36-client-auth-DTLSv1.2-require-fail-ssl]
1141server = 36-client-auth-DTLSv1.2-require-fail-server
1142client = 36-client-auth-DTLSv1.2-require-fail-client
1143
1144[36-client-auth-DTLSv1.2-require-fail-server]
1145Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1146CipherString = DEFAULT:@SECLEVEL=0
1147MaxProtocol = DTLSv1.2
1148MinProtocol = DTLSv1.2
1149PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1150VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1151VerifyMode = Require
1152
1153[36-client-auth-DTLSv1.2-require-fail-client]
1154CipherString = DEFAULT:@SECLEVEL=0
1155MaxProtocol = DTLSv1.2
1156MinProtocol = DTLSv1.2
1157VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1158VerifyMode = Peer
1159
1160[test-36]
1161ExpectedResult = ServerFail
1162ExpectedServerAlert = HandshakeFailure
1163Method = DTLS
1164
1165
1166# ===========================================================
1167
1168[37-client-auth-DTLSv1.2-require]
1169ssl_conf = 37-client-auth-DTLSv1.2-require-ssl
1170
1171[37-client-auth-DTLSv1.2-require-ssl]
1172server = 37-client-auth-DTLSv1.2-require-server
1173client = 37-client-auth-DTLSv1.2-require-client
1174
1175[37-client-auth-DTLSv1.2-require-server]
1176Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1177CipherString = DEFAULT:@SECLEVEL=0
1178MaxProtocol = DTLSv1.2
1179MinProtocol = DTLSv1.2
1180PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1181VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1182VerifyMode = Request
1183
1184[37-client-auth-DTLSv1.2-require-client]
1185Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
1186CipherString = DEFAULT:@SECLEVEL=0
1187MaxProtocol = DTLSv1.2
1188MinProtocol = DTLSv1.2
1189PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1190VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1191VerifyMode = Peer
1192
1193[test-37]
1194ExpectedClientCANames = empty
1195ExpectedClientCertType = RSA
1196ExpectedResult = Success
1197Method = DTLS
1198
1199
1200# ===========================================================
1201
1202[38-client-auth-DTLSv1.2-require-non-empty-names]
1203ssl_conf = 38-client-auth-DTLSv1.2-require-non-empty-names-ssl
1204
1205[38-client-auth-DTLSv1.2-require-non-empty-names-ssl]
1206server = 38-client-auth-DTLSv1.2-require-non-empty-names-server
1207client = 38-client-auth-DTLSv1.2-require-non-empty-names-client
1208
1209[38-client-auth-DTLSv1.2-require-non-empty-names-server]
1210Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1211CipherString = DEFAULT:@SECLEVEL=0
1212ClientCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1213MaxProtocol = DTLSv1.2
1214MinProtocol = DTLSv1.2
1215PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1216VerifyCAFile = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1217VerifyMode = Request
1218
1219[38-client-auth-DTLSv1.2-require-non-empty-names-client]
1220Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
1221CipherString = DEFAULT:@SECLEVEL=0
1222MaxProtocol = DTLSv1.2
1223MinProtocol = DTLSv1.2
1224PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1225VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1226VerifyMode = Peer
1227
1228[test-38]
1229ExpectedClientCANames = ${ENV::TEST_CERTS_DIR}/root-cert.pem
1230ExpectedClientCertType = RSA
1231ExpectedResult = Success
1232Method = DTLS
1233
1234
1235# ===========================================================
1236
1237[39-client-auth-DTLSv1.2-noroot]
1238ssl_conf = 39-client-auth-DTLSv1.2-noroot-ssl
1239
1240[39-client-auth-DTLSv1.2-noroot-ssl]
1241server = 39-client-auth-DTLSv1.2-noroot-server
1242client = 39-client-auth-DTLSv1.2-noroot-client
1243
1244[39-client-auth-DTLSv1.2-noroot-server]
1245Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
1246CipherString = DEFAULT:@SECLEVEL=0
1247MaxProtocol = DTLSv1.2
1248MinProtocol = DTLSv1.2
1249PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
1250VerifyMode = Require
1251
1252[39-client-auth-DTLSv1.2-noroot-client]
1253Certificate = ${ENV::TEST_CERTS_DIR}/ee-client-chain.pem
1254CipherString = DEFAULT:@SECLEVEL=0
1255MaxProtocol = DTLSv1.2
1256MinProtocol = DTLSv1.2
1257PrivateKey = ${ENV::TEST_CERTS_DIR}/ee-key.pem
1258VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
1259VerifyMode = Peer
1260
1261[test-39]
1262ExpectedResult = ServerFail
1263ExpectedServerAlert = UnknownCA
1264Method = DTLS
1265
1266
1267