openssl/test/ssl-tests/14-curves.cnf

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

3068 lines
79 KiB
Plaintext
Raw Normal View History

# Generated with generate_ssl_tests.pl
num_tests = 104
test-0 = 0-curve-prime256v1
test-1 = 1-curve-secp384r1
test-2 = 2-curve-secp521r1
test-3 = 3-curve-X25519
test-4 = 4-curve-X448
test-5 = 5-curve-ffdhe2048
test-6 = 6-curve-ffdhe3072
test-7 = 7-curve-ffdhe4096
test-8 = 8-curve-ffdhe6144
test-9 = 9-curve-ffdhe8192
test-10 = 10-curve-brainpoolP256r1tls13
test-11 = 11-curve-brainpoolP384r1tls13
test-12 = 12-curve-brainpoolP512r1tls13
test-13 = 13-curve-sect233k1
test-14 = 14-curve-sect233r1
test-15 = 15-curve-sect283k1
test-16 = 16-curve-sect283r1
test-17 = 17-curve-sect409k1
test-18 = 18-curve-sect409r1
test-19 = 19-curve-sect571k1
test-20 = 20-curve-sect571r1
test-21 = 21-curve-secp224r1
test-22 = 22-curve-sect163k1
test-23 = 23-curve-sect163r2
test-24 = 24-curve-prime192v1
test-25 = 25-curve-sect163r1
test-26 = 26-curve-sect193r1
test-27 = 27-curve-sect193r2
test-28 = 28-curve-sect239k1
test-29 = 29-curve-secp160k1
test-30 = 30-curve-secp160r1
test-31 = 31-curve-secp160r2
test-32 = 32-curve-secp192k1
test-33 = 33-curve-secp224k1
test-34 = 34-curve-secp256k1
test-35 = 35-curve-brainpoolP256r1
test-36 = 36-curve-brainpoolP384r1
test-37 = 37-curve-brainpoolP512r1
test-38 = 38-curve-sect233k1-tls12-in-tls13
test-39 = 39-curve-sect233r1-tls12-in-tls13
test-40 = 40-curve-sect283k1-tls12-in-tls13
test-41 = 41-curve-sect283r1-tls12-in-tls13
test-42 = 42-curve-sect409k1-tls12-in-tls13
test-43 = 43-curve-sect409r1-tls12-in-tls13
test-44 = 44-curve-sect571k1-tls12-in-tls13
test-45 = 45-curve-sect571r1-tls12-in-tls13
test-46 = 46-curve-secp224r1-tls12-in-tls13
test-47 = 47-curve-sect163k1-tls12-in-tls13
test-48 = 48-curve-sect163r2-tls12-in-tls13
test-49 = 49-curve-prime192v1-tls12-in-tls13
test-50 = 50-curve-sect163r1-tls12-in-tls13
test-51 = 51-curve-sect193r1-tls12-in-tls13
test-52 = 52-curve-sect193r2-tls12-in-tls13
test-53 = 53-curve-sect239k1-tls12-in-tls13
test-54 = 54-curve-secp160k1-tls12-in-tls13
test-55 = 55-curve-secp160r1-tls12-in-tls13
test-56 = 56-curve-secp160r2-tls12-in-tls13
test-57 = 57-curve-secp192k1-tls12-in-tls13
test-58 = 58-curve-secp224k1-tls12-in-tls13
test-59 = 59-curve-secp256k1-tls12-in-tls13
test-60 = 60-curve-brainpoolP256r1-tls12-in-tls13
test-61 = 61-curve-brainpoolP384r1-tls12-in-tls13
test-62 = 62-curve-brainpoolP512r1-tls12-in-tls13
test-63 = 63-curve-sect233k1-tls13
test-64 = 64-curve-sect233r1-tls13
test-65 = 65-curve-sect283k1-tls13
test-66 = 66-curve-sect283r1-tls13
test-67 = 67-curve-sect409k1-tls13
test-68 = 68-curve-sect409r1-tls13
test-69 = 69-curve-sect571k1-tls13
test-70 = 70-curve-sect571r1-tls13
test-71 = 71-curve-secp224r1-tls13
test-72 = 72-curve-sect163k1-tls13
test-73 = 73-curve-sect163r2-tls13
test-74 = 74-curve-prime192v1-tls13
test-75 = 75-curve-sect163r1-tls13
test-76 = 76-curve-sect193r1-tls13
test-77 = 77-curve-sect193r2-tls13
test-78 = 78-curve-sect239k1-tls13
test-79 = 79-curve-secp160k1-tls13
test-80 = 80-curve-secp160r1-tls13
test-81 = 81-curve-secp160r2-tls13
test-82 = 82-curve-secp192k1-tls13
test-83 = 83-curve-secp224k1-tls13
test-84 = 84-curve-secp256k1-tls13
test-85 = 85-curve-brainpoolP256r1-tls13
test-86 = 86-curve-brainpoolP384r1-tls13
test-87 = 87-curve-brainpoolP512r1-tls13
test-88 = 88-curve-ffdhe2048-tls13-in-tls12
test-89 = 89-curve-ffdhe2048-tls13-in-tls12-2
test-90 = 90-curve-ffdhe3072-tls13-in-tls12
test-91 = 91-curve-ffdhe3072-tls13-in-tls12-2
test-92 = 92-curve-ffdhe4096-tls13-in-tls12
test-93 = 93-curve-ffdhe4096-tls13-in-tls12-2
test-94 = 94-curve-ffdhe6144-tls13-in-tls12
test-95 = 95-curve-ffdhe6144-tls13-in-tls12-2
test-96 = 96-curve-ffdhe8192-tls13-in-tls12
test-97 = 97-curve-ffdhe8192-tls13-in-tls12-2
test-98 = 98-curve-brainpoolP256r1tls13-tls13-in-tls12
test-99 = 99-curve-brainpoolP256r1tls13-tls13-in-tls12-2
test-100 = 100-curve-brainpoolP384r1tls13-tls13-in-tls12
test-101 = 101-curve-brainpoolP384r1tls13-tls13-in-tls12-2
test-102 = 102-curve-brainpoolP512r1tls13-tls13-in-tls12
test-103 = 103-curve-brainpoolP512r1tls13-tls13-in-tls12-2
# ===========================================================
[0-curve-prime256v1]
ssl_conf = 0-curve-prime256v1-ssl
[0-curve-prime256v1-ssl]
server = 0-curve-prime256v1-server
client = 0-curve-prime256v1-client
[0-curve-prime256v1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = prime256v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-curve-prime256v1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = prime256v1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-0]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = prime256v1
# ===========================================================
[1-curve-secp384r1]
ssl_conf = 1-curve-secp384r1-ssl
[1-curve-secp384r1-ssl]
server = 1-curve-secp384r1-server
client = 1-curve-secp384r1-client
[1-curve-secp384r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[1-curve-secp384r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp384r1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-1]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = secp384r1
# ===========================================================
[2-curve-secp521r1]
ssl_conf = 2-curve-secp521r1-ssl
[2-curve-secp521r1-ssl]
server = 2-curve-secp521r1-server
client = 2-curve-secp521r1-client
[2-curve-secp521r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp521r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[2-curve-secp521r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp521r1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-2]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = secp521r1
# ===========================================================
[3-curve-X25519]
ssl_conf = 3-curve-X25519-ssl
[3-curve-X25519-ssl]
server = 3-curve-X25519-server
client = 3-curve-X25519-client
[3-curve-X25519-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = X25519
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[3-curve-X25519-client]
CipherString = ECDHE@SECLEVEL=1
Curves = X25519
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-3]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = X25519
# ===========================================================
[4-curve-X448]
ssl_conf = 4-curve-X448-ssl
[4-curve-X448-ssl]
server = 4-curve-X448-server
client = 4-curve-X448-client
[4-curve-X448-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = X448
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[4-curve-X448-client]
CipherString = ECDHE@SECLEVEL=1
Curves = X448
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-4]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = X448
# ===========================================================
[5-curve-ffdhe2048]
ssl_conf = 5-curve-ffdhe2048-ssl
[5-curve-ffdhe2048-ssl]
server = 5-curve-ffdhe2048-server
client = 5-curve-ffdhe2048-client
[5-curve-ffdhe2048-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[5-curve-ffdhe2048-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-5]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement
# ===========================================================
[6-curve-ffdhe3072]
ssl_conf = 6-curve-ffdhe3072-ssl
[6-curve-ffdhe3072-ssl]
server = 6-curve-ffdhe3072-server
client = 6-curve-ffdhe3072-client
[6-curve-ffdhe3072-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[6-curve-ffdhe3072-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-6]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement
# ===========================================================
[7-curve-ffdhe4096]
ssl_conf = 7-curve-ffdhe4096-ssl
[7-curve-ffdhe4096-ssl]
server = 7-curve-ffdhe4096-server
client = 7-curve-ffdhe4096-client
[7-curve-ffdhe4096-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[7-curve-ffdhe4096-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-7]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement
# ===========================================================
[8-curve-ffdhe6144]
ssl_conf = 8-curve-ffdhe6144-ssl
[8-curve-ffdhe6144-ssl]
server = 8-curve-ffdhe6144-server
client = 8-curve-ffdhe6144-client
[8-curve-ffdhe6144-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[8-curve-ffdhe6144-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-8]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement
# ===========================================================
[9-curve-ffdhe8192]
ssl_conf = 9-curve-ffdhe8192-ssl
[9-curve-ffdhe8192-ssl]
server = 9-curve-ffdhe8192-server
client = 9-curve-ffdhe8192-client
[9-curve-ffdhe8192-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[9-curve-ffdhe8192-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-9]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement
# ===========================================================
[10-curve-brainpoolP256r1tls13]
ssl_conf = 10-curve-brainpoolP256r1tls13-ssl
[10-curve-brainpoolP256r1tls13-ssl]
server = 10-curve-brainpoolP256r1tls13-server
client = 10-curve-brainpoolP256r1tls13-client
[10-curve-brainpoolP256r1tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[10-curve-brainpoolP256r1tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-10]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP256r1tls13
# ===========================================================
[11-curve-brainpoolP384r1tls13]
ssl_conf = 11-curve-brainpoolP384r1tls13-ssl
[11-curve-brainpoolP384r1tls13-ssl]
server = 11-curve-brainpoolP384r1tls13-server
client = 11-curve-brainpoolP384r1tls13-client
[11-curve-brainpoolP384r1tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[11-curve-brainpoolP384r1tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-11]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP384r1tls13
# ===========================================================
[12-curve-brainpoolP512r1tls13]
ssl_conf = 12-curve-brainpoolP512r1tls13-ssl
[12-curve-brainpoolP512r1tls13-ssl]
server = 12-curve-brainpoolP512r1tls13-server
client = 12-curve-brainpoolP512r1tls13-client
[12-curve-brainpoolP512r1tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[12-curve-brainpoolP512r1tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-12]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP512r1tls13
# ===========================================================
[13-curve-sect233k1]
ssl_conf = 13-curve-sect233k1-ssl
[13-curve-sect233k1-ssl]
server = 13-curve-sect233k1-server
client = 13-curve-sect233k1-client
[13-curve-sect233k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[13-curve-sect233k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-13]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect233k1
# ===========================================================
[14-curve-sect233r1]
ssl_conf = 14-curve-sect233r1-ssl
[14-curve-sect233r1-ssl]
server = 14-curve-sect233r1-server
client = 14-curve-sect233r1-client
[14-curve-sect233r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[14-curve-sect233r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-14]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect233r1
# ===========================================================
[15-curve-sect283k1]
ssl_conf = 15-curve-sect283k1-ssl
[15-curve-sect283k1-ssl]
server = 15-curve-sect283k1-server
client = 15-curve-sect283k1-client
[15-curve-sect283k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[15-curve-sect283k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-15]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect283k1
# ===========================================================
[16-curve-sect283r1]
ssl_conf = 16-curve-sect283r1-ssl
[16-curve-sect283r1-ssl]
server = 16-curve-sect283r1-server
client = 16-curve-sect283r1-client
[16-curve-sect283r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[16-curve-sect283r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-16]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect283r1
# ===========================================================
[17-curve-sect409k1]
ssl_conf = 17-curve-sect409k1-ssl
[17-curve-sect409k1-ssl]
server = 17-curve-sect409k1-server
client = 17-curve-sect409k1-client
[17-curve-sect409k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[17-curve-sect409k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-17]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect409k1
# ===========================================================
[18-curve-sect409r1]
ssl_conf = 18-curve-sect409r1-ssl
[18-curve-sect409r1-ssl]
server = 18-curve-sect409r1-server
client = 18-curve-sect409r1-client
[18-curve-sect409r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[18-curve-sect409r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-18]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect409r1
# ===========================================================
[19-curve-sect571k1]
ssl_conf = 19-curve-sect571k1-ssl
[19-curve-sect571k1-ssl]
server = 19-curve-sect571k1-server
client = 19-curve-sect571k1-client
[19-curve-sect571k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[19-curve-sect571k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-19]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect571k1
# ===========================================================
[20-curve-sect571r1]
ssl_conf = 20-curve-sect571r1-ssl
[20-curve-sect571r1-ssl]
server = 20-curve-sect571r1-server
client = 20-curve-sect571r1-client
[20-curve-sect571r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[20-curve-sect571r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-20]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect571r1
# ===========================================================
[21-curve-secp224r1]
ssl_conf = 21-curve-secp224r1-ssl
[21-curve-secp224r1-ssl]
server = 21-curve-secp224r1-server
client = 21-curve-secp224r1-client
[21-curve-secp224r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[21-curve-secp224r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-21]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp224r1
# ===========================================================
[22-curve-sect163k1]
ssl_conf = 22-curve-sect163k1-ssl
[22-curve-sect163k1-ssl]
server = 22-curve-sect163k1-server
client = 22-curve-sect163k1-client
[22-curve-sect163k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[22-curve-sect163k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-22]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163k1
# ===========================================================
[23-curve-sect163r2]
ssl_conf = 23-curve-sect163r2-ssl
[23-curve-sect163r2-ssl]
server = 23-curve-sect163r2-server
client = 23-curve-sect163r2-client
[23-curve-sect163r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[23-curve-sect163r2-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-23]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163r2
# ===========================================================
[24-curve-prime192v1]
ssl_conf = 24-curve-prime192v1-ssl
[24-curve-prime192v1-ssl]
server = 24-curve-prime192v1-server
client = 24-curve-prime192v1-client
[24-curve-prime192v1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = prime192v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[24-curve-prime192v1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = prime192v1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-24]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = prime192v1
# ===========================================================
[25-curve-sect163r1]
ssl_conf = 25-curve-sect163r1-ssl
[25-curve-sect163r1-ssl]
server = 25-curve-sect163r1-server
client = 25-curve-sect163r1-client
[25-curve-sect163r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[25-curve-sect163r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-25]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163r1
# ===========================================================
[26-curve-sect193r1]
ssl_conf = 26-curve-sect193r1-ssl
[26-curve-sect193r1-ssl]
server = 26-curve-sect193r1-server
client = 26-curve-sect193r1-client
[26-curve-sect193r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[26-curve-sect193r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-26]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect193r1
# ===========================================================
[27-curve-sect193r2]
ssl_conf = 27-curve-sect193r2-ssl
[27-curve-sect193r2-ssl]
server = 27-curve-sect193r2-server
client = 27-curve-sect193r2-client
[27-curve-sect193r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[27-curve-sect193r2-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-27]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect193r2
# ===========================================================
[28-curve-sect239k1]
ssl_conf = 28-curve-sect239k1-ssl
[28-curve-sect239k1-ssl]
server = 28-curve-sect239k1-server
client = 28-curve-sect239k1-client
[28-curve-sect239k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect239k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[28-curve-sect239k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect239k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-28]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect239k1
# ===========================================================
[29-curve-secp160k1]
ssl_conf = 29-curve-secp160k1-ssl
[29-curve-secp160k1-ssl]
server = 29-curve-secp160k1-server
client = 29-curve-secp160k1-client
[29-curve-secp160k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[29-curve-secp160k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-29]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160k1
# ===========================================================
[30-curve-secp160r1]
ssl_conf = 30-curve-secp160r1-ssl
[30-curve-secp160r1-ssl]
server = 30-curve-secp160r1-server
client = 30-curve-secp160r1-client
[30-curve-secp160r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[30-curve-secp160r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-30]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160r1
# ===========================================================
[31-curve-secp160r2]
ssl_conf = 31-curve-secp160r2-ssl
[31-curve-secp160r2-ssl]
server = 31-curve-secp160r2-server
client = 31-curve-secp160r2-client
[31-curve-secp160r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[31-curve-secp160r2-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-31]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160r2
# ===========================================================
[32-curve-secp192k1]
ssl_conf = 32-curve-secp192k1-ssl
[32-curve-secp192k1-ssl]
server = 32-curve-secp192k1-server
client = 32-curve-secp192k1-client
[32-curve-secp192k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp192k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[32-curve-secp192k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp192k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-32]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp192k1
# ===========================================================
[33-curve-secp224k1]
ssl_conf = 33-curve-secp224k1-ssl
[33-curve-secp224k1-ssl]
server = 33-curve-secp224k1-server
client = 33-curve-secp224k1-client
[33-curve-secp224k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[33-curve-secp224k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-33]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp224k1
# ===========================================================
[34-curve-secp256k1]
ssl_conf = 34-curve-secp256k1-ssl
[34-curve-secp256k1-ssl]
server = 34-curve-secp256k1-server
client = 34-curve-secp256k1-client
[34-curve-secp256k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp256k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[34-curve-secp256k1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp256k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-34]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp256k1
# ===========================================================
[35-curve-brainpoolP256r1]
ssl_conf = 35-curve-brainpoolP256r1-ssl
[35-curve-brainpoolP256r1-ssl]
server = 35-curve-brainpoolP256r1-server
client = 35-curve-brainpoolP256r1-client
[35-curve-brainpoolP256r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[35-curve-brainpoolP256r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-35]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP256r1
# ===========================================================
[36-curve-brainpoolP384r1]
ssl_conf = 36-curve-brainpoolP384r1-ssl
[36-curve-brainpoolP384r1-ssl]
server = 36-curve-brainpoolP384r1-server
client = 36-curve-brainpoolP384r1-client
[36-curve-brainpoolP384r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[36-curve-brainpoolP384r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-36]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP384r1
# ===========================================================
[37-curve-brainpoolP512r1]
ssl_conf = 37-curve-brainpoolP512r1-ssl
[37-curve-brainpoolP512r1-ssl]
server = 37-curve-brainpoolP512r1-server
client = 37-curve-brainpoolP512r1-client
[37-curve-brainpoolP512r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[37-curve-brainpoolP512r1-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-37]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP512r1
# ===========================================================
[38-curve-sect233k1-tls12-in-tls13]
ssl_conf = 38-curve-sect233k1-tls12-in-tls13-ssl
[38-curve-sect233k1-tls12-in-tls13-ssl]
server = 38-curve-sect233k1-tls12-in-tls13-server
client = 38-curve-sect233k1-tls12-in-tls13-client
[38-curve-sect233k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[38-curve-sect233k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-38]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[39-curve-sect233r1-tls12-in-tls13]
ssl_conf = 39-curve-sect233r1-tls12-in-tls13-ssl
[39-curve-sect233r1-tls12-in-tls13-ssl]
server = 39-curve-sect233r1-tls12-in-tls13-server
client = 39-curve-sect233r1-tls12-in-tls13-client
[39-curve-sect233r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[39-curve-sect233r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-39]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[40-curve-sect283k1-tls12-in-tls13]
ssl_conf = 40-curve-sect283k1-tls12-in-tls13-ssl
[40-curve-sect283k1-tls12-in-tls13-ssl]
server = 40-curve-sect283k1-tls12-in-tls13-server
client = 40-curve-sect283k1-tls12-in-tls13-client
[40-curve-sect283k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[40-curve-sect283k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-40]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[41-curve-sect283r1-tls12-in-tls13]
ssl_conf = 41-curve-sect283r1-tls12-in-tls13-ssl
[41-curve-sect283r1-tls12-in-tls13-ssl]
server = 41-curve-sect283r1-tls12-in-tls13-server
client = 41-curve-sect283r1-tls12-in-tls13-client
[41-curve-sect283r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[41-curve-sect283r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-41]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[42-curve-sect409k1-tls12-in-tls13]
ssl_conf = 42-curve-sect409k1-tls12-in-tls13-ssl
[42-curve-sect409k1-tls12-in-tls13-ssl]
server = 42-curve-sect409k1-tls12-in-tls13-server
client = 42-curve-sect409k1-tls12-in-tls13-client
[42-curve-sect409k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[42-curve-sect409k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-42]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[43-curve-sect409r1-tls12-in-tls13]
ssl_conf = 43-curve-sect409r1-tls12-in-tls13-ssl
[43-curve-sect409r1-tls12-in-tls13-ssl]
server = 43-curve-sect409r1-tls12-in-tls13-server
client = 43-curve-sect409r1-tls12-in-tls13-client
[43-curve-sect409r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[43-curve-sect409r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-43]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[44-curve-sect571k1-tls12-in-tls13]
ssl_conf = 44-curve-sect571k1-tls12-in-tls13-ssl
[44-curve-sect571k1-tls12-in-tls13-ssl]
server = 44-curve-sect571k1-tls12-in-tls13-server
client = 44-curve-sect571k1-tls12-in-tls13-client
[44-curve-sect571k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[44-curve-sect571k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-44]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[45-curve-sect571r1-tls12-in-tls13]
ssl_conf = 45-curve-sect571r1-tls12-in-tls13-ssl
[45-curve-sect571r1-tls12-in-tls13-ssl]
server = 45-curve-sect571r1-tls12-in-tls13-server
client = 45-curve-sect571r1-tls12-in-tls13-client
[45-curve-sect571r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[45-curve-sect571r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-45]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[46-curve-secp224r1-tls12-in-tls13]
ssl_conf = 46-curve-secp224r1-tls12-in-tls13-ssl
[46-curve-secp224r1-tls12-in-tls13-ssl]
server = 46-curve-secp224r1-tls12-in-tls13-server
client = 46-curve-secp224r1-tls12-in-tls13-client
[46-curve-secp224r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[46-curve-secp224r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-46]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[47-curve-sect163k1-tls12-in-tls13]
ssl_conf = 47-curve-sect163k1-tls12-in-tls13-ssl
[47-curve-sect163k1-tls12-in-tls13-ssl]
server = 47-curve-sect163k1-tls12-in-tls13-server
client = 47-curve-sect163k1-tls12-in-tls13-client
[47-curve-sect163k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[47-curve-sect163k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-47]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[48-curve-sect163r2-tls12-in-tls13]
ssl_conf = 48-curve-sect163r2-tls12-in-tls13-ssl
[48-curve-sect163r2-tls12-in-tls13-ssl]
server = 48-curve-sect163r2-tls12-in-tls13-server
client = 48-curve-sect163r2-tls12-in-tls13-client
[48-curve-sect163r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[48-curve-sect163r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-48]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[49-curve-prime192v1-tls12-in-tls13]
ssl_conf = 49-curve-prime192v1-tls12-in-tls13-ssl
[49-curve-prime192v1-tls12-in-tls13-ssl]
server = 49-curve-prime192v1-tls12-in-tls13-server
client = 49-curve-prime192v1-tls12-in-tls13-client
[49-curve-prime192v1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = prime192v1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[49-curve-prime192v1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = prime192v1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-49]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[50-curve-sect163r1-tls12-in-tls13]
ssl_conf = 50-curve-sect163r1-tls12-in-tls13-ssl
[50-curve-sect163r1-tls12-in-tls13-ssl]
server = 50-curve-sect163r1-tls12-in-tls13-server
client = 50-curve-sect163r1-tls12-in-tls13-client
[50-curve-sect163r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[50-curve-sect163r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-50]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[51-curve-sect193r1-tls12-in-tls13]
ssl_conf = 51-curve-sect193r1-tls12-in-tls13-ssl
[51-curve-sect193r1-tls12-in-tls13-ssl]
server = 51-curve-sect193r1-tls12-in-tls13-server
client = 51-curve-sect193r1-tls12-in-tls13-client
[51-curve-sect193r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[51-curve-sect193r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-51]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[52-curve-sect193r2-tls12-in-tls13]
ssl_conf = 52-curve-sect193r2-tls12-in-tls13-ssl
[52-curve-sect193r2-tls12-in-tls13-ssl]
server = 52-curve-sect193r2-tls12-in-tls13-server
client = 52-curve-sect193r2-tls12-in-tls13-client
[52-curve-sect193r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[52-curve-sect193r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-52]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[53-curve-sect239k1-tls12-in-tls13]
ssl_conf = 53-curve-sect239k1-tls12-in-tls13-ssl
[53-curve-sect239k1-tls12-in-tls13-ssl]
server = 53-curve-sect239k1-tls12-in-tls13-server
client = 53-curve-sect239k1-tls12-in-tls13-client
[53-curve-sect239k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect239k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[53-curve-sect239k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect239k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-53]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[54-curve-secp160k1-tls12-in-tls13]
ssl_conf = 54-curve-secp160k1-tls12-in-tls13-ssl
[54-curve-secp160k1-tls12-in-tls13-ssl]
server = 54-curve-secp160k1-tls12-in-tls13-server
client = 54-curve-secp160k1-tls12-in-tls13-client
[54-curve-secp160k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[54-curve-secp160k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-54]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[55-curve-secp160r1-tls12-in-tls13]
ssl_conf = 55-curve-secp160r1-tls12-in-tls13-ssl
[55-curve-secp160r1-tls12-in-tls13-ssl]
server = 55-curve-secp160r1-tls12-in-tls13-server
client = 55-curve-secp160r1-tls12-in-tls13-client
[55-curve-secp160r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[55-curve-secp160r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-55]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[56-curve-secp160r2-tls12-in-tls13]
ssl_conf = 56-curve-secp160r2-tls12-in-tls13-ssl
[56-curve-secp160r2-tls12-in-tls13-ssl]
server = 56-curve-secp160r2-tls12-in-tls13-server
client = 56-curve-secp160r2-tls12-in-tls13-client
[56-curve-secp160r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[56-curve-secp160r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-56]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[57-curve-secp192k1-tls12-in-tls13]
ssl_conf = 57-curve-secp192k1-tls12-in-tls13-ssl
[57-curve-secp192k1-tls12-in-tls13-ssl]
server = 57-curve-secp192k1-tls12-in-tls13-server
client = 57-curve-secp192k1-tls12-in-tls13-client
[57-curve-secp192k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp192k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[57-curve-secp192k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp192k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-57]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[58-curve-secp224k1-tls12-in-tls13]
ssl_conf = 58-curve-secp224k1-tls12-in-tls13-ssl
[58-curve-secp224k1-tls12-in-tls13-ssl]
server = 58-curve-secp224k1-tls12-in-tls13-server
client = 58-curve-secp224k1-tls12-in-tls13-client
[58-curve-secp224k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[58-curve-secp224k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-58]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[59-curve-secp256k1-tls12-in-tls13]
ssl_conf = 59-curve-secp256k1-tls12-in-tls13-ssl
[59-curve-secp256k1-tls12-in-tls13-ssl]
server = 59-curve-secp256k1-tls12-in-tls13-server
client = 59-curve-secp256k1-tls12-in-tls13-client
[59-curve-secp256k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp256k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[59-curve-secp256k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp256k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-59]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[60-curve-brainpoolP256r1-tls12-in-tls13]
ssl_conf = 60-curve-brainpoolP256r1-tls12-in-tls13-ssl
[60-curve-brainpoolP256r1-tls12-in-tls13-ssl]
server = 60-curve-brainpoolP256r1-tls12-in-tls13-server
client = 60-curve-brainpoolP256r1-tls12-in-tls13-client
[60-curve-brainpoolP256r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[60-curve-brainpoolP256r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-60]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[61-curve-brainpoolP384r1-tls12-in-tls13]
ssl_conf = 61-curve-brainpoolP384r1-tls12-in-tls13-ssl
[61-curve-brainpoolP384r1-tls12-in-tls13-ssl]
server = 61-curve-brainpoolP384r1-tls12-in-tls13-server
client = 61-curve-brainpoolP384r1-tls12-in-tls13-client
[61-curve-brainpoolP384r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[61-curve-brainpoolP384r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-61]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[62-curve-brainpoolP512r1-tls12-in-tls13]
ssl_conf = 62-curve-brainpoolP512r1-tls12-in-tls13-ssl
[62-curve-brainpoolP512r1-tls12-in-tls13-ssl]
server = 62-curve-brainpoolP512r1-tls12-in-tls13-server
client = 62-curve-brainpoolP512r1-tls12-in-tls13-client
[62-curve-brainpoolP512r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[62-curve-brainpoolP512r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-62]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256
# ===========================================================
[63-curve-sect233k1-tls13]
ssl_conf = 63-curve-sect233k1-tls13-ssl
[63-curve-sect233k1-tls13-ssl]
server = 63-curve-sect233k1-tls13-server
client = 63-curve-sect233k1-tls13-client
[63-curve-sect233k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[63-curve-sect233k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-63]
ExpectedResult = ClientFail
# ===========================================================
[64-curve-sect233r1-tls13]
ssl_conf = 64-curve-sect233r1-tls13-ssl
[64-curve-sect233r1-tls13-ssl]
server = 64-curve-sect233r1-tls13-server
client = 64-curve-sect233r1-tls13-client
[64-curve-sect233r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[64-curve-sect233r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-64]
ExpectedResult = ClientFail
# ===========================================================
[65-curve-sect283k1-tls13]
ssl_conf = 65-curve-sect283k1-tls13-ssl
[65-curve-sect283k1-tls13-ssl]
server = 65-curve-sect283k1-tls13-server
client = 65-curve-sect283k1-tls13-client
[65-curve-sect283k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[65-curve-sect283k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-65]
ExpectedResult = ClientFail
# ===========================================================
[66-curve-sect283r1-tls13]
ssl_conf = 66-curve-sect283r1-tls13-ssl
[66-curve-sect283r1-tls13-ssl]
server = 66-curve-sect283r1-tls13-server
client = 66-curve-sect283r1-tls13-client
[66-curve-sect283r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[66-curve-sect283r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-66]
ExpectedResult = ClientFail
# ===========================================================
[67-curve-sect409k1-tls13]
ssl_conf = 67-curve-sect409k1-tls13-ssl
[67-curve-sect409k1-tls13-ssl]
server = 67-curve-sect409k1-tls13-server
client = 67-curve-sect409k1-tls13-client
[67-curve-sect409k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[67-curve-sect409k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-67]
ExpectedResult = ClientFail
# ===========================================================
[68-curve-sect409r1-tls13]
ssl_conf = 68-curve-sect409r1-tls13-ssl
[68-curve-sect409r1-tls13-ssl]
server = 68-curve-sect409r1-tls13-server
client = 68-curve-sect409r1-tls13-client
[68-curve-sect409r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[68-curve-sect409r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-68]
ExpectedResult = ClientFail
# ===========================================================
[69-curve-sect571k1-tls13]
ssl_conf = 69-curve-sect571k1-tls13-ssl
[69-curve-sect571k1-tls13-ssl]
server = 69-curve-sect571k1-tls13-server
client = 69-curve-sect571k1-tls13-client
[69-curve-sect571k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[69-curve-sect571k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-69]
ExpectedResult = ClientFail
# ===========================================================
[70-curve-sect571r1-tls13]
ssl_conf = 70-curve-sect571r1-tls13-ssl
[70-curve-sect571r1-tls13-ssl]
server = 70-curve-sect571r1-tls13-server
client = 70-curve-sect571r1-tls13-client
[70-curve-sect571r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[70-curve-sect571r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-70]
ExpectedResult = ClientFail
# ===========================================================
[71-curve-secp224r1-tls13]
ssl_conf = 71-curve-secp224r1-tls13-ssl
[71-curve-secp224r1-tls13-ssl]
server = 71-curve-secp224r1-tls13-server
client = 71-curve-secp224r1-tls13-client
[71-curve-secp224r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[71-curve-secp224r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-71]
ExpectedResult = ClientFail
# ===========================================================
[72-curve-sect163k1-tls13]
ssl_conf = 72-curve-sect163k1-tls13-ssl
[72-curve-sect163k1-tls13-ssl]
server = 72-curve-sect163k1-tls13-server
client = 72-curve-sect163k1-tls13-client
[72-curve-sect163k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[72-curve-sect163k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-72]
ExpectedResult = ClientFail
# ===========================================================
[73-curve-sect163r2-tls13]
ssl_conf = 73-curve-sect163r2-tls13-ssl
[73-curve-sect163r2-tls13-ssl]
server = 73-curve-sect163r2-tls13-server
client = 73-curve-sect163r2-tls13-client
[73-curve-sect163r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[73-curve-sect163r2-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-73]
ExpectedResult = ClientFail
# ===========================================================
[74-curve-prime192v1-tls13]
ssl_conf = 74-curve-prime192v1-tls13-ssl
[74-curve-prime192v1-tls13-ssl]
server = 74-curve-prime192v1-tls13-server
client = 74-curve-prime192v1-tls13-client
[74-curve-prime192v1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = prime192v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[74-curve-prime192v1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = prime192v1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-74]
ExpectedResult = ClientFail
# ===========================================================
[75-curve-sect163r1-tls13]
ssl_conf = 75-curve-sect163r1-tls13-ssl
[75-curve-sect163r1-tls13-ssl]
server = 75-curve-sect163r1-tls13-server
client = 75-curve-sect163r1-tls13-client
[75-curve-sect163r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[75-curve-sect163r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-75]
ExpectedResult = ClientFail
# ===========================================================
[76-curve-sect193r1-tls13]
ssl_conf = 76-curve-sect193r1-tls13-ssl
[76-curve-sect193r1-tls13-ssl]
server = 76-curve-sect193r1-tls13-server
client = 76-curve-sect193r1-tls13-client
[76-curve-sect193r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[76-curve-sect193r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-76]
ExpectedResult = ClientFail
# ===========================================================
[77-curve-sect193r2-tls13]
ssl_conf = 77-curve-sect193r2-tls13-ssl
[77-curve-sect193r2-tls13-ssl]
server = 77-curve-sect193r2-tls13-server
client = 77-curve-sect193r2-tls13-client
[77-curve-sect193r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[77-curve-sect193r2-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-77]
ExpectedResult = ClientFail
# ===========================================================
[78-curve-sect239k1-tls13]
ssl_conf = 78-curve-sect239k1-tls13-ssl
[78-curve-sect239k1-tls13-ssl]
server = 78-curve-sect239k1-tls13-server
client = 78-curve-sect239k1-tls13-client
[78-curve-sect239k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect239k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[78-curve-sect239k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect239k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-78]
ExpectedResult = ClientFail
# ===========================================================
[79-curve-secp160k1-tls13]
ssl_conf = 79-curve-secp160k1-tls13-ssl
[79-curve-secp160k1-tls13-ssl]
server = 79-curve-secp160k1-tls13-server
client = 79-curve-secp160k1-tls13-client
[79-curve-secp160k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[79-curve-secp160k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-79]
ExpectedResult = ClientFail
# ===========================================================
[80-curve-secp160r1-tls13]
ssl_conf = 80-curve-secp160r1-tls13-ssl
[80-curve-secp160r1-tls13-ssl]
server = 80-curve-secp160r1-tls13-server
client = 80-curve-secp160r1-tls13-client
[80-curve-secp160r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[80-curve-secp160r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-80]
ExpectedResult = ClientFail
# ===========================================================
[81-curve-secp160r2-tls13]
ssl_conf = 81-curve-secp160r2-tls13-ssl
[81-curve-secp160r2-tls13-ssl]
server = 81-curve-secp160r2-tls13-server
client = 81-curve-secp160r2-tls13-client
[81-curve-secp160r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[81-curve-secp160r2-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-81]
ExpectedResult = ClientFail
# ===========================================================
[82-curve-secp192k1-tls13]
ssl_conf = 82-curve-secp192k1-tls13-ssl
[82-curve-secp192k1-tls13-ssl]
server = 82-curve-secp192k1-tls13-server
client = 82-curve-secp192k1-tls13-client
[82-curve-secp192k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp192k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[82-curve-secp192k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp192k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-82]
ExpectedResult = ClientFail
# ===========================================================
[83-curve-secp224k1-tls13]
ssl_conf = 83-curve-secp224k1-tls13-ssl
[83-curve-secp224k1-tls13-ssl]
server = 83-curve-secp224k1-tls13-server
client = 83-curve-secp224k1-tls13-client
[83-curve-secp224k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[83-curve-secp224k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-83]
ExpectedResult = ClientFail
# ===========================================================
[84-curve-secp256k1-tls13]
ssl_conf = 84-curve-secp256k1-tls13-ssl
[84-curve-secp256k1-tls13-ssl]
server = 84-curve-secp256k1-tls13-server
client = 84-curve-secp256k1-tls13-client
[84-curve-secp256k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp256k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[84-curve-secp256k1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp256k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-84]
ExpectedResult = ClientFail
# ===========================================================
[85-curve-brainpoolP256r1-tls13]
ssl_conf = 85-curve-brainpoolP256r1-tls13-ssl
[85-curve-brainpoolP256r1-tls13-ssl]
server = 85-curve-brainpoolP256r1-tls13-server
client = 85-curve-brainpoolP256r1-tls13-client
[85-curve-brainpoolP256r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[85-curve-brainpoolP256r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-85]
ExpectedResult = ClientFail
# ===========================================================
[86-curve-brainpoolP384r1-tls13]
ssl_conf = 86-curve-brainpoolP384r1-tls13-ssl
[86-curve-brainpoolP384r1-tls13-ssl]
server = 86-curve-brainpoolP384r1-tls13-server
client = 86-curve-brainpoolP384r1-tls13-client
[86-curve-brainpoolP384r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[86-curve-brainpoolP384r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-86]
ExpectedResult = ClientFail
# ===========================================================
[87-curve-brainpoolP512r1-tls13]
ssl_conf = 87-curve-brainpoolP512r1-tls13-ssl
[87-curve-brainpoolP512r1-tls13-ssl]
server = 87-curve-brainpoolP512r1-tls13-server
client = 87-curve-brainpoolP512r1-tls13-client
[87-curve-brainpoolP512r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[87-curve-brainpoolP512r1-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-87]
ExpectedResult = ClientFail
# ===========================================================
[88-curve-ffdhe2048-tls13-in-tls12]
ssl_conf = 88-curve-ffdhe2048-tls13-in-tls12-ssl
[88-curve-ffdhe2048-tls13-in-tls12-ssl]
server = 88-curve-ffdhe2048-tls13-in-tls12-server
client = 88-curve-ffdhe2048-tls13-in-tls12-client
[88-curve-ffdhe2048-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[88-curve-ffdhe2048-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-88]
ExpectedResult = ServerFail
# ===========================================================
[89-curve-ffdhe2048-tls13-in-tls12-2]
ssl_conf = 89-curve-ffdhe2048-tls13-in-tls12-2-ssl
[89-curve-ffdhe2048-tls13-in-tls12-2-ssl]
server = 89-curve-ffdhe2048-tls13-in-tls12-2-server
client = 89-curve-ffdhe2048-tls13-in-tls12-2-client
[89-curve-ffdhe2048-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[89-curve-ffdhe2048-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-89]
ExpectedResult = Success
# ===========================================================
[90-curve-ffdhe3072-tls13-in-tls12]
ssl_conf = 90-curve-ffdhe3072-tls13-in-tls12-ssl
[90-curve-ffdhe3072-tls13-in-tls12-ssl]
server = 90-curve-ffdhe3072-tls13-in-tls12-server
client = 90-curve-ffdhe3072-tls13-in-tls12-client
[90-curve-ffdhe3072-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[90-curve-ffdhe3072-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-90]
ExpectedResult = ServerFail
# ===========================================================
[91-curve-ffdhe3072-tls13-in-tls12-2]
ssl_conf = 91-curve-ffdhe3072-tls13-in-tls12-2-ssl
[91-curve-ffdhe3072-tls13-in-tls12-2-ssl]
server = 91-curve-ffdhe3072-tls13-in-tls12-2-server
client = 91-curve-ffdhe3072-tls13-in-tls12-2-client
[91-curve-ffdhe3072-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[91-curve-ffdhe3072-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-91]
ExpectedResult = Success
# ===========================================================
[92-curve-ffdhe4096-tls13-in-tls12]
ssl_conf = 92-curve-ffdhe4096-tls13-in-tls12-ssl
[92-curve-ffdhe4096-tls13-in-tls12-ssl]
server = 92-curve-ffdhe4096-tls13-in-tls12-server
client = 92-curve-ffdhe4096-tls13-in-tls12-client
[92-curve-ffdhe4096-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[92-curve-ffdhe4096-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-92]
ExpectedResult = ServerFail
# ===========================================================
[93-curve-ffdhe4096-tls13-in-tls12-2]
ssl_conf = 93-curve-ffdhe4096-tls13-in-tls12-2-ssl
[93-curve-ffdhe4096-tls13-in-tls12-2-ssl]
server = 93-curve-ffdhe4096-tls13-in-tls12-2-server
client = 93-curve-ffdhe4096-tls13-in-tls12-2-client
[93-curve-ffdhe4096-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[93-curve-ffdhe4096-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-93]
ExpectedResult = Success
# ===========================================================
[94-curve-ffdhe6144-tls13-in-tls12]
ssl_conf = 94-curve-ffdhe6144-tls13-in-tls12-ssl
[94-curve-ffdhe6144-tls13-in-tls12-ssl]
server = 94-curve-ffdhe6144-tls13-in-tls12-server
client = 94-curve-ffdhe6144-tls13-in-tls12-client
[94-curve-ffdhe6144-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[94-curve-ffdhe6144-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-94]
ExpectedResult = ServerFail
# ===========================================================
[95-curve-ffdhe6144-tls13-in-tls12-2]
ssl_conf = 95-curve-ffdhe6144-tls13-in-tls12-2-ssl
[95-curve-ffdhe6144-tls13-in-tls12-2-ssl]
server = 95-curve-ffdhe6144-tls13-in-tls12-2-server
client = 95-curve-ffdhe6144-tls13-in-tls12-2-client
[95-curve-ffdhe6144-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[95-curve-ffdhe6144-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-95]
ExpectedResult = Success
# ===========================================================
[96-curve-ffdhe8192-tls13-in-tls12]
ssl_conf = 96-curve-ffdhe8192-tls13-in-tls12-ssl
[96-curve-ffdhe8192-tls13-in-tls12-ssl]
server = 96-curve-ffdhe8192-tls13-in-tls12-server
client = 96-curve-ffdhe8192-tls13-in-tls12-client
[96-curve-ffdhe8192-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[96-curve-ffdhe8192-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-96]
ExpectedResult = ServerFail
# ===========================================================
[97-curve-ffdhe8192-tls13-in-tls12-2]
ssl_conf = 97-curve-ffdhe8192-tls13-in-tls12-2-ssl
[97-curve-ffdhe8192-tls13-in-tls12-2-ssl]
server = 97-curve-ffdhe8192-tls13-in-tls12-2-server
client = 97-curve-ffdhe8192-tls13-in-tls12-2-client
[97-curve-ffdhe8192-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[97-curve-ffdhe8192-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-97]
ExpectedResult = Success
# ===========================================================
[98-curve-brainpoolP256r1tls13-tls13-in-tls12]
ssl_conf = 98-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl
[98-curve-brainpoolP256r1tls13-tls13-in-tls12-ssl]
server = 98-curve-brainpoolP256r1tls13-tls13-in-tls12-server
client = 98-curve-brainpoolP256r1tls13-tls13-in-tls12-client
[98-curve-brainpoolP256r1tls13-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[98-curve-brainpoolP256r1tls13-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-98]
ExpectedResult = ServerFail
# ===========================================================
[99-curve-brainpoolP256r1tls13-tls13-in-tls12-2]
ssl_conf = 99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-ssl
[99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-ssl]
server = 99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-server
client = 99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-client
[99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[99-curve-brainpoolP256r1tls13-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-99]
ExpectedResult = Success
# ===========================================================
[100-curve-brainpoolP384r1tls13-tls13-in-tls12]
ssl_conf = 100-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl
[100-curve-brainpoolP384r1tls13-tls13-in-tls12-ssl]
server = 100-curve-brainpoolP384r1tls13-tls13-in-tls12-server
client = 100-curve-brainpoolP384r1tls13-tls13-in-tls12-client
[100-curve-brainpoolP384r1tls13-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[100-curve-brainpoolP384r1tls13-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-100]
ExpectedResult = ServerFail
# ===========================================================
[101-curve-brainpoolP384r1tls13-tls13-in-tls12-2]
ssl_conf = 101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-ssl
[101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-ssl]
server = 101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-server
client = 101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-client
[101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[101-curve-brainpoolP384r1tls13-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-101]
ExpectedResult = Success
# ===========================================================
[102-curve-brainpoolP512r1tls13-tls13-in-tls12]
ssl_conf = 102-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl
[102-curve-brainpoolP512r1tls13-tls13-in-tls12-ssl]
server = 102-curve-brainpoolP512r1tls13-tls13-in-tls12-server
client = 102-curve-brainpoolP512r1tls13-tls13-in-tls12-client
[102-curve-brainpoolP512r1tls13-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[102-curve-brainpoolP512r1tls13-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-102]
ExpectedResult = ServerFail
# ===========================================================
[103-curve-brainpoolP512r1tls13-tls13-in-tls12-2]
ssl_conf = 103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-ssl
[103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-ssl]
server = 103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-server
client = 103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-client
[103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[103-curve-brainpoolP512r1tls13-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1tls13
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
[test-103]
ExpectedResult = Success