Home | History | Annotate | Line # | Download | only in 95-test_external_tlsfuzzer_data
      1 [
      2     {"server_command": ["@SERVER@", "s_server", "-www",
      3                         "-key", "tests/serverX509Key.pem",
      4                         "-cert", "tests/serverX509Cert.pem",
      5                         "-verify", "1",
      6                         "-CAfile", "tests/clientX509Cert.pem"],
      7      "comment": "Use ANY certificate just to ensure that server tries to authorise a client",
      8      "environment": {"PYTHONPATH" : "."},
      9      "server_hostname": "localhost",
     10      "server_port": @PORT@,
     11      "tests" : [
     12        {"name" : "test-tls13-certificate-verify.py",
     13         "arguments" : ["-k", "tests/clientX509Key.pem",
     14                        "-c", "tests/clientX509Cert.pem",
     15                        "-s", "9+5 9+6 9+4 ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512",
     16                        "-p", "@PORT@"]},
     17        {"name" : "test-tls13-ecdsa-in-certificate-verify.py",
     18           "arguments" : ["-k", "tests/serverECKey.pem",
     19                          "-c", "tests/serverECCert.pem",
     20                          "-s", "9+5 9+6 9+4 ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512",
     21                          "-p", "@PORT@"]}
     22      ]
     23     },
     24     {"server_command": ["@SERVER@", "s_server", "-www",
     25                  "-key", "tests/serverX509Key.pem",
     26                  "-cert", "tests/serverX509Cert.pem",
     27                  "-verify", "1", "-CAfile", "tests/clientX509Cert.pem",
     28                  "-client_sigalgs", "RSA+SHA384:rsa_pss_rsae_sha384:rsa_pss_pss_sha384"],
     29      "comment": "set -client_sigalgs because of https://github.com/openssl/openssl/issues/25277",
     30      "environment": {"PYTHONPATH" : "."},
     31      "server_hostname": "localhost",
     32      "server_port": @PORT@,
     33      "tests" : [
     34        {"name" : "test-certificate-verify-malformed.py",
     35         "arguments" : ["-d", "-k", "tests/clientX509Key.pem",
     36                        "-c", "tests/clientX509Cert.pem",
     37                        "-p", "@PORT@"]}
     38      ]
     39     },
     40     {"server_command": ["@SERVER@", "s_server", "-www",
     41                  "-key", "tests/serverX509Key.pem",
     42                  "-cert", "tests/serverX509Cert.pem"],
     43      "environment": {"PYTHONPATH" : "."},
     44      "server_hostname": "localhost",
     45      "server_port": @PORT@,
     46      "tests" : [
     47        {"name" : "test-tls13-conversation.py",
     48         "arguments" : ["-p", "@PORT@"]},
     49        {"name" : "test-conversation.py",
     50         "arguments" : ["-p", "@PORT@",
     51                        "-d"]},
     52        {"name" : "test-invalid-client-hello-w-record-overflow.py",
     53         "arguments" : ["-n", "0", "-C",
     54                        "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "-d",
     55                        "--ems", "session ID len fuzz to 5 w/ext"]}
     56      ]
     57     }
     58 ]
     59