summaryrefslogtreecommitdiff
path: root/tests/tls13-cert-key-exchange.c
diff options
context:
space:
mode:
Diffstat (limited to 'tests/tls13-cert-key-exchange.c')
-rw-r--r--tests/tls13-cert-key-exchange.c342
1 files changed, 180 insertions, 162 deletions
diff --git a/tests/tls13-cert-key-exchange.c b/tests/tls13-cert-key-exchange.c
index 5b93dc6a07..874fab8e58 100644
--- a/tests/tls13-cert-key-exchange.c
+++ b/tests/tls13-cert-key-exchange.c
@@ -20,7 +20,7 @@
*/
#ifdef HAVE_CONFIG_H
-# include <config.h>
+#include <config.h>
#endif
/* This program tests the various certificate key exchange methods supported
@@ -40,7 +40,7 @@ void doit(void)
global_init();
server_priority =
- "NORMAL:+ANON-DH:+ANON-ECDH:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519";
+ "NORMAL:+ANON-DH:+ANON-ECDH:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519";
try_x509("TLS 1.3 with ffdhe2048 rsa no-cli-cert / anon on server",
"NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048",
GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
@@ -48,7 +48,7 @@ void doit(void)
/** X.509 tests **/
server_priority =
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519";
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519";
/* TLS 1.3 no client cert */
try_x509("TLS 1.3 with ffdhe2048 rsa no-cli-cert (ctype X.509)",
@@ -80,58 +80,58 @@ void doit(void)
GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
GNUTLS_SIGN_UNKNOWN);
- try_with_key_ks
- ("TLS 1.3 with secp256r1 ecdsa no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_ECDSA_SECP256R1_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_localhost_ecc_cert,
- &server_ca3_ecc_key, NULL, NULL, 0, GNUTLS_GROUP_SECP256R1,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with secp256r1 ecdsa no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_ECDSA_SECP256R1_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_localhost_ecc_cert,
+ &server_ca3_ecc_key, NULL, NULL, 0, GNUTLS_GROUP_SECP256R1,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
/* Test RSA-PSS cert/key combo issues */
- try_with_key_ks
- ("TLS 1.3 with x25519 with rsa-pss-sha256 key no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
- &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_with_key_ks
- ("TLS 1.3 with x25519 with rsa-pss-sha256 key and 1 sig no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA256",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
- &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_with_key_ks
- ("TLS 1.3 with x25519 with rsa-pss-sha256 key and rsa-pss-sha384 first sig no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA256",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
- &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_with_key_ks
- ("TLS 1.3 with x25519 with rsa-pss-sha256 key and rsa-pss-sha512 first sig no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA512:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA256",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
- &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 with rsa-pss-sha256 key no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
+ &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 with rsa-pss-sha256 key and 1 sig no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA256",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
+ &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 with rsa-pss-sha256 key and rsa-pss-sha384 first sig no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA256",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
+ &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 with rsa-pss-sha256 key and rsa-pss-sha512 first sig no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA512:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA256",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss2_cert,
+ &server_ca3_rsa_pss2_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_with_key_ks
- ("TLS 1.3 with x25519 rsa-pss/rsa-pss no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA256",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss_cert,
- &server_ca3_rsa_pss_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_with_key_ks("TLS 1.3 with x25519 ed25519 no-cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-KX-ALL:+ECDHE-ECDSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_EDDSA_ED25519,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_eddsa_cert,
- &server_ca3_eddsa_key, NULL, NULL, 0,
- GNUTLS_GROUP_X25519, GNUTLS_CRT_X509,
- GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 rsa-pss/rsa-pss no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-SHA256",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_SHA256,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_rsa_pss_cert,
+ &server_ca3_rsa_pss_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
+ try_with_key_ks(
+ "TLS 1.3 with x25519 ed25519 no-cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-KX-ALL:+ECDHE-ECDSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_EDDSA_ED25519,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_eddsa_cert,
+ &server_ca3_eddsa_key, NULL, NULL, 0, GNUTLS_GROUP_X25519,
+ GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
/* client authentication */
try_with_key("TLS 1.3 with rsa-pss cli-cert (ctype X.509)",
@@ -155,119 +155,136 @@ void doit(void)
&server_ca3_localhost_ecc_cert, &server_ca3_ecc_key,
&server_ca3_localhost_ecc_cert, &server_ca3_ecc_key,
USE_CERT, GNUTLS_CRT_X509, GNUTLS_CRT_X509);
- try_with_key("TLS 1.3 with x25519 ed25519 cli-cert (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-KX-ALL:+ECDHE-RSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_EDDSA_ED25519,
- GNUTLS_SIGN_EDDSA_ED25519, &server_ca3_eddsa_cert,
- &server_ca3_eddsa_key, &server_ca3_eddsa_cert,
- &server_ca3_eddsa_key, USE_CERT, GNUTLS_CRT_X509,
- GNUTLS_CRT_X509);
+ try_with_key(
+ "TLS 1.3 with x25519 ed25519 cli-cert (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-KX-ALL:+ECDHE-RSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_EDDSA_ED25519,
+ GNUTLS_SIGN_EDDSA_ED25519, &server_ca3_eddsa_cert,
+ &server_ca3_eddsa_key, &server_ca3_eddsa_cert,
+ &server_ca3_eddsa_key, USE_CERT, GNUTLS_CRT_X509,
+ GNUTLS_CRT_X509);
/* TLS 1.3 mis-matching groups */
/* Our policy is to send a key share for the first of each type of groups, so make sure
* the server doesn't support them */
server_priority =
- "NORMAL:-GROUP-ALL:-VERS-TLS-ALL:+VERS-TLS1.3:+GROUP-FFDHE3072:+GROUP-SECP521R1",
- try_x509_ks("TLS 1.3 with default key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+GROUP-FFDHE3072",
- GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
- try_x509_ks("TLS 1.3 with ffdhe2048 key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+GROUP-FFDHE3072",
- GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
- try_x509_ks("TLS 1.3 with ffdhe4096 key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE4096:+GROUP-FFDHE3072",
- GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
- try_x509_ks("TLS 1.3 with secp256r1 key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+GROUP-SECP521R1",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_GROUP_SECP521R1);
- try_x509_ks("TLS 1.3 with secp384r1 key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_GROUP_SECP521R1);
+ "NORMAL:-GROUP-ALL:-VERS-TLS-ALL:+VERS-TLS1.3:+GROUP-FFDHE3072:+GROUP-SECP521R1",
+ try_x509_ks(
+ "TLS 1.3 with default key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+GROUP-FFDHE3072",
+ GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
+ try_x509_ks(
+ "TLS 1.3 with ffdhe2048 key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+GROUP-FFDHE3072",
+ GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
+ try_x509_ks(
+ "TLS 1.3 with ffdhe4096 key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE4096:+GROUP-FFDHE3072",
+ GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
+ try_x509_ks(
+ "TLS 1.3 with secp256r1 key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+GROUP-SECP521R1",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_GROUP_SECP521R1);
+ try_x509_ks(
+ "TLS 1.3 with secp384r1 key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_GROUP_SECP521R1);
try_x509_ks("TLS 1.3 with secp521r1 key share (ctype X.509)",
"NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP521R1",
GNUTLS_KX_ECDHE_RSA, GNUTLS_GROUP_SECP521R1);
- try_x509_ks("TLS 1.3 with x25519 -> ffdhe3072 key share (ctype X.509)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:+GROUP-SECP384R1:+GROUP-FFDHE3072",
- GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
+ try_x509_ks(
+ "TLS 1.3 with x25519 -> ffdhe3072 key share (ctype X.509)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:+GROUP-SECP384R1:+GROUP-FFDHE3072",
+ GNUTLS_KX_DHE_RSA, GNUTLS_GROUP_FFDHE3072);
/* TLS 1.2 fallback */
server_priority =
- "NORMAL:-VERS-ALL:+VERS-TLS1.2:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519",
- try_with_key_ks("TLS 1.2 fallback with x25519 ed25519 no-cli-cert",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-KX-ALL:+ECDHE-ECDSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
- GNUTLS_KX_ECDHE_ECDSA, GNUTLS_SIGN_EDDSA_ED25519,
- GNUTLS_SIGN_UNKNOWN, &server_ca3_eddsa_cert,
- &server_ca3_eddsa_key, NULL, NULL, 0, 0,
- GNUTLS_CRT_X509, GNUTLS_CRT_UNKNOWN);
- try_x509("TLS 1.2 fallback with secp521r1 rsa no-cli-cert",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-GROUP-ALL:+GROUP-SECP521R1",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_x509("TLS 1.2 fallback with ffdhe2048 rsa no-cli-cert",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-KX-ALL:+DHE-RSA:-GROUP-ALL:+GROUP-FFDHE2048",
- GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_SHA256,
- GNUTLS_SIGN_UNKNOWN);
+ "NORMAL:-VERS-ALL:+VERS-TLS1.2:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519",
+ try_with_key_ks(
+ "TLS 1.2 fallback with x25519 ed25519 no-cli-cert",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-KX-ALL:+ECDHE-ECDSA:-CURVE-ALL:+CURVE-X25519:-SIGN-ALL:+SIGN-EDDSA-ED25519",
+ GNUTLS_KX_ECDHE_ECDSA, GNUTLS_SIGN_EDDSA_ED25519,
+ GNUTLS_SIGN_UNKNOWN, &server_ca3_eddsa_cert,
+ &server_ca3_eddsa_key, NULL, NULL, 0, 0, GNUTLS_CRT_X509,
+ GNUTLS_CRT_UNKNOWN);
+ try_x509(
+ "TLS 1.2 fallback with secp521r1 rsa no-cli-cert",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-GROUP-ALL:+GROUP-SECP521R1",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_x509(
+ "TLS 1.2 fallback with ffdhe2048 rsa no-cli-cert",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:-KX-ALL:+DHE-RSA:-GROUP-ALL:+GROUP-FFDHE2048",
+ GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_SHA256, GNUTLS_SIGN_UNKNOWN);
/** Raw public-key tests **/
server_priority =
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519:+CTYPE-ALL";
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+VERS-TLS1.1:+VERS-TLS1.0:+ECDHE-RSA:+DHE-RSA:+RSA:+ECDHE-ECDSA:+CURVE-X25519:+SIGN-EDDSA-ED25519:+CTYPE-ALL";
- try_rawpk("TLS 1.3 with ffdhe2048 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+CTYPE-ALL",
- GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with ffdhe3072 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE3072:+CTYPE-ALL",
- GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with ffdhe4096 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE4096:+CTYPE-ALL",
- GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with secp256r1 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1:+CTYPE-ALL",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with secp384r1 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP384R1:+CTYPE-ALL",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with secp521r1 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP521R1:+CTYPE-ALL",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
- try_rawpk("TLS 1.3 with x25519 rsa no-cli-cert (ctype Raw PK)",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:+CTYPE-ALL",
- GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
- GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with ffdhe2048 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE2048:+CTYPE-ALL",
+ GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with ffdhe3072 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE3072:+CTYPE-ALL",
+ GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with ffdhe4096 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-FFDHE4096:+CTYPE-ALL",
+ GNUTLS_KX_DHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with secp256r1 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP256R1:+CTYPE-ALL",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with secp384r1 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP384R1:+CTYPE-ALL",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with secp521r1 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-SECP521R1:+CTYPE-ALL",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
+ try_rawpk(
+ "TLS 1.3 with x25519 rsa no-cli-cert (ctype Raw PK)",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:+CTYPE-ALL",
+ GNUTLS_KX_ECDHE_RSA, GNUTLS_SIGN_RSA_PSS_RSAE_SHA256,
+ GNUTLS_SIGN_UNKNOWN);
/** Illegal setups **/
server_priority = "NORMAL:-VERS-ALL:+VERS-TLS1.3";
- try_with_key_fail
- ("TLS 1.3 with rsa cert and only RSA-PSS sig algos in client",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
- GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
- &server_ca3_localhost_cert, &server_ca3_key, NULL, NULL);
+ try_with_key_fail(
+ "TLS 1.3 with rsa cert and only RSA-PSS sig algos in client",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
+ GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
+ &server_ca3_localhost_cert, &server_ca3_key, NULL, NULL);
- try_with_key_fail
- ("TLS 1.3 with x25519 with rsa-pss cert and RSAE signatures",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-RSAE-SHA256:+SIGN-RSA-PSS-RSAE-SHA384",
- GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
- &server_ca3_rsa_pss2_cert, &server_ca3_rsa_pss2_key, NULL, NULL);
+ try_with_key_fail(
+ "TLS 1.3 with x25519 with rsa-pss cert and RSAE signatures",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-GROUP-ALL:+GROUP-X25519:-SIGN-ALL:+SIGN-RSA-PSS-RSAE-SHA256:+SIGN-RSA-PSS-RSAE-SHA384",
+ GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
+ &server_ca3_rsa_pss2_cert, &server_ca3_rsa_pss2_key, NULL,
+ NULL);
server_priority = NULL;
- try_with_key_fail("TLS 1.3 with rsa cert and only RSA-PSS sig algos",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
- GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
- &server_ca3_localhost_cert, &server_ca3_key, NULL,
- NULL);
+ try_with_key_fail(
+ "TLS 1.3 with rsa cert and only RSA-PSS sig algos",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
+ GNUTLS_E_NO_CIPHER_SUITES, GNUTLS_E_AGAIN,
+ &server_ca3_localhost_cert, &server_ca3_key, NULL, NULL);
- try_with_key_fail
- ("TLS 1.3 with rsa-pss cert and rsa cli cert with only RSA-PSS sig algos",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
- GNUTLS_E_CERTIFICATE_REQUIRED, GNUTLS_E_SUCCESS,
- &server_ca3_rsa_pss_cert, &server_ca3_rsa_pss_key, &cli_ca3_cert,
- &cli_ca3_key);
+ try_with_key_fail(
+ "TLS 1.3 with rsa-pss cert and rsa cli cert with only RSA-PSS sig algos",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:-SIGN-ALL:+SIGN-RSA-PSS-SHA256:+SIGN-RSA-PSS-SHA384:+SIGN-RSA-PSS-SHA512",
+ GNUTLS_E_CERTIFICATE_REQUIRED, GNUTLS_E_SUCCESS,
+ &server_ca3_rsa_pss_cert, &server_ca3_rsa_pss_key,
+ &cli_ca3_cert, &cli_ca3_key);
try_with_key_fail("TLS 1.3 with rsa encryption cert",
"NORMAL:-VERS-ALL:+VERS-TLS1.3",
@@ -281,26 +298,26 @@ void doit(void)
&server_ca3_localhost_rsa_decrypt_cert,
&server_ca3_key, NULL, NULL);
- try_with_key_fail
- ("TLS 1.3 with (forced) rsa encryption cert - client should detect",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:%DEBUG_ALLOW_KEY_USAGE_VIOLATIONS",
- GNUTLS_E_AGAIN, GNUTLS_E_KEY_USAGE_VIOLATION,
- &server_ca3_localhost_rsa_decrypt_cert, &server_ca3_key, NULL,
- NULL);
+ try_with_key_fail(
+ "TLS 1.3 with (forced) rsa encryption cert - client should detect",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:%DEBUG_ALLOW_KEY_USAGE_VIOLATIONS",
+ GNUTLS_E_AGAIN, GNUTLS_E_KEY_USAGE_VIOLATION,
+ &server_ca3_localhost_rsa_decrypt_cert, &server_ca3_key, NULL,
+ NULL);
try_with_key_fail("TLS 1.3 with client rsa encryption cert",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3",
- GNUTLS_E_AGAIN, GNUTLS_E_INSUFFICIENT_CREDENTIALS,
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3", GNUTLS_E_AGAIN,
+ GNUTLS_E_INSUFFICIENT_CREDENTIALS,
&server_ca3_rsa_pss_cert, &server_ca3_rsa_pss_key,
&server_ca3_localhost_rsa_decrypt_cert,
&server_ca3_key);
- try_with_key_fail
- ("TLS 1.3 with (forced) client rsa encryption cert - server should detect",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:%DEBUG_ALLOW_KEY_USAGE_VIOLATIONS",
- GNUTLS_E_KEY_USAGE_VIOLATION, GNUTLS_E_SUCCESS,
- &server_ca3_rsa_pss_cert, &server_ca3_rsa_pss_key,
- &server_ca3_localhost_rsa_decrypt_cert, &server_ca3_key);
+ try_with_key_fail(
+ "TLS 1.3 with (forced) client rsa encryption cert - server should detect",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:%DEBUG_ALLOW_KEY_USAGE_VIOLATIONS",
+ GNUTLS_E_KEY_USAGE_VIOLATION, GNUTLS_E_SUCCESS,
+ &server_ca3_rsa_pss_cert, &server_ca3_rsa_pss_key,
+ &server_ca3_localhost_rsa_decrypt_cert, &server_ca3_key);
try_with_rawpk_key_fail("rawpk TLS 1.3 with rsa encryption cert",
"NORMAL:-VERS-ALL:+VERS-TLS1.3:+CTYPE-RAWPK",
@@ -308,11 +325,12 @@ void doit(void)
&rawpk_public_key1, &rawpk_private_key1,
GNUTLS_KEY_KEY_ENCIPHERMENT, NULL, NULL, 0);
- try_with_rawpk_key_fail
- ("rawpk TLS 1.3 and TLS 1.2 with rsa encryption cert",
- "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+CTYPE-RAWPK",
- GNUTLS_E_SUCCESS, GNUTLS_E_SUCCESS, &rawpk_public_key1,
- &rawpk_private_key1, GNUTLS_KEY_KEY_ENCIPHERMENT, NULL, NULL, 0);
+ try_with_rawpk_key_fail(
+ "rawpk TLS 1.3 and TLS 1.2 with rsa encryption cert",
+ "NORMAL:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2:+CTYPE-RAWPK",
+ GNUTLS_E_SUCCESS, GNUTLS_E_SUCCESS, &rawpk_public_key1,
+ &rawpk_private_key1, GNUTLS_KEY_KEY_ENCIPHERMENT, NULL, NULL,
+ 0);
try_with_rawpk_key_fail("rawpk TLS 1.3 with client rsa encryption cert",
"NORMAL:-VERS-ALL:+VERS-TLS1.3:+CTYPE-RAWPK",