Lines Matching +full:p +full:- +full:384
1 # -*- mode: perl; -*-
16 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
17 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
18 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
19 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
20 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
21 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
26 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
27 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
28 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
29 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
30 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
31 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
32 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
33 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
38 "Certificate" => test_pem("server-pss-cert.pem"),
39 "PrivateKey" => test_pem("server-pss-key.pem"),
43 "Certificate" => test_pem("server-pss-restrict-cert.pem"),
44 "PrivateKey" => test_pem("server-pss-restrict-key.pem"),
56 "PSS.Certificate" => test_pem("server-pss-cert.pem"),
57 "PSS.PrivateKey" => test_pem("server-pss-key.pem"),
70 "RequestCAFile" => test_pem("root-cert.pem"),
73 "ExpectedServerCertType" =>, "P-256",
83 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
84 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
88 "Groups" => "P-384"
93 "Groups" => "P-256:P-384",
94 "RequestCAFile" => test_pem("root-cert.pem"),
97 "ExpectedServerCertType" =>, "P-256",
107 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
108 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
110 "Groups" => "P-256:P-384"
117 "Groups" => "P-384",
118 "RequestCAFile" => test_pem("root-cert.pem"),
133 "ExpectedServerSignType" =>, "RSA-PSS",
138 name => "P-256 CipherString and Signature Algorithm Selection",
146 "ExpectedServerCertType" => "P-256",
172 "ExpectedServerCertType" => "P-256",
185 "ExpectedServerCertType" => "P-256",
194 "ECDSA.Certificate" => test_pem("server-cecdsa-cert.pem"),
195 "ECDSA.PrivateKey" => test_pem("server-cecdsa-key.pem"),
202 "ExpectedServerCertType" => "P-256",
234 name => "RSA-PSS Signature Algorithm Selection",
237 "SignatureAlgorithms" => "RSA-PSS+SHA256",
242 "ExpectedServerSignType" => "RSA-PSS",
259 name => "Suite B P-256 Hash Algorithm Selection",
261 "ECDSA.Certificate" => test_pem("p256-server-cert.pem"),
262 "ECDSA.PrivateKey" => test_pem("p256-server-key.pem"),
267 "VerifyCAFile" => test_pem("p384-root.pem"),
271 "ExpectedServerCertType" => "P-256",
278 name => "Suite B P-384 Hash Algorithm Selection",
280 "ECDSA.Certificate" => test_pem("p384-server-cert.pem"),
281 "ECDSA.PrivateKey" => test_pem("p384-server-key.pem"),
286 "VerifyCAFile" => test_pem("p384-root.pem"),
290 "ExpectedServerCertType" => "P-384",
303 "RequestCAFile" => test_pem("root-cert.pem"),
320 "RequestCAFile" => test_pem("root-ed448-cert.pem"),
321 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
334 "VerifyCAFile" => test_pem("root-cert.pem"),
338 "Ed25519.Certificate" => test_pem("client-ed25519-cert.pem"),
339 "Ed25519.PrivateKey" => test_pem("client-ed25519-key.pem"),
352 "VerifyCAFile" => test_pem("root-cert.pem"),
356 "Ed448.Certificate" => test_pem("client-ed448-cert.pem"),
357 "Ed448.PrivateKey" => test_pem("client-ed448-key.pem"),
374 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
375 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
376 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
377 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
378 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
379 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
387 "ExpectedServerCertType" => "P-256",
396 "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
397 "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
403 "RequestCAFile" => test_pem("root-cert.pem"),
421 # Excluding P-256 from the supported curves list means server
422 # certificate should be Ed25519 and not P-256
438 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
439 # Excluding P-256 from the supported curves list means server
440 # certificate should be Ed25519 and not P-256
453 name => "RSA-PSS Certificate CipherString Selection",
460 "ExpectedServerCertType" =>, "RSA-PSS",
461 "ExpectedServerSignType" =>, "RSA-PSS",
466 name => "RSA-PSS Certificate Legacy Signature Algorithm Selection",
469 "SignatureAlgorithms" => "RSA-PSS+SHA256",
474 "ExpectedServerSignType" => "RSA-PSS",
479 name => "RSA-PSS Certificate Unified Signature Algorithm Selection",
485 "ExpectedServerCertType" => "RSA-PSS",
487 "ExpectedServerSignType" => "RSA-PSS",
492 name => "Only RSA-PSS Certificate",
496 "ExpectedServerCertType" => "RSA-PSS",
498 "ExpectedServerSignType" => "RSA-PSS",
503 name => "Only RSA-PSS Certificate Valid Signature Algorithms",
509 "ExpectedServerCertType" => "RSA-PSS",
511 "ExpectedServerSignType" => "RSA-PSS",
516 name => "RSA-PSS Certificate, no PSS signature algorithms",
526 name => "Only RSA-PSS Restricted Certificate",
530 "ExpectedServerCertType" => "RSA-PSS",
532 "ExpectedServerSignType" => "RSA-PSS",
537 name => "RSA-PSS Restricted Certificate Valid Signature Algorithms",
543 "ExpectedServerCertType" => "RSA-PSS",
545 "ExpectedServerSignType" => "RSA-PSS",
550 name => "RSA-PSS Restricted Cert client prefers invalid Signature Algorithm",
556 "ExpectedServerCertType" => "RSA-PSS",
558 "ExpectedServerSignType" => "RSA-PSS",
563 name => "RSA-PSS Restricted Certificate Invalid Signature Algorithms",
573 name => "RSA key exchange with only RSA-PSS certificate",
587 name => "Only RSA-PSS Certificate, TLS v1.1",
606 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
607 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
613 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
614 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
615 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
616 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
617 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
618 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
625 "RSA.Certificate" => test_pem("ee-client-chain.pem"),
626 "RSA.PrivateKey" => test_pem("ee-key.pem"),
627 "ECDSA.Certificate" => test_pem("ee-ecdsa-client-chain.pem"),
628 "ECDSA.PrivateKey" => test_pem("ee-ecdsa-key.pem"),
641 "ExpectedServerCertType" => "P-256",
651 "ECDSA.Certificate" => test_pem("server-cecdsa-cert.pem"),
652 "ECDSA.PrivateKey" => test_pem("server-cecdsa-key.pem"),
660 "ExpectedServerCertType" => "P-256",
671 "ECDSA.Certificate" => test_pem("server-ecdsa-cert.pem"),
672 "ECDSA.PrivateKey" => test_pem("server-ecdsa-key.pem"),
673 "Ed25519.Certificate" => test_pem("server-ed25519-cert.pem"),
674 "Ed25519.PrivateKey" => test_pem("server-ed25519-key.pem"),
675 "Ed448.Certificate" => test_pem("server-ed448-cert.pem"),
676 "Ed448.PrivateKey" => test_pem("server-ed448-key.pem"),
692 "SignatureAlgorithms" => "ECDSA+SHA256:RSA-PSS+SHA256",
693 "RequestCAFile" => test_pem("root-cert.pem"),
696 "ExpectedServerCertType" => "P-256",
699 "ExpectedServerCANames" => test_pem("root-cert.pem"),
707 "SignatureAlgorithms" => "ECDSA+SHA384:RSA-PSS+SHA384",
712 "ExpectedServerSignType" => "RSA-PSS",
740 name => "TLS 1.3 RSA-PSS Signature Algorithm Selection",
743 "SignatureAlgorithms" => "RSA-PSS+SHA256",
748 "ExpectedServerSignType" => "RSA-PSS",
756 "VerifyCAFile" => test_pem("root-cert.pem"),
763 "ExpectedClientSignType" => "RSA-PSS",
769 name => "TLS 1.3 RSA Client Auth Signature Algorithm Selection non-empty CA Names",
772 "VerifyCAFile" => test_pem("root-cert.pem"),
773 "RequestCAFile" => test_pem("root-cert.pem"),
780 "ExpectedClientSignType" => "RSA-PSS",
781 "ExpectedClientCANames" => test_pem("root-cert.pem"),
789 "VerifyCAFile" => test_pem("root-cert.pem"),
794 "ExpectedClientCertType" => "P-256",
820 "VerifyCAFile" => test_pem("root-ed448-cert.pem"),
833 # Excluding P-256 from the supported groups list should
834 # mean server still uses a P-256 certificate because supported
839 "ExpectedServerCertType" =>, "P-256",
849 # Excluding P-256 from the supported groups list should
850 # mean server still uses a P-256 certificate because supported
855 "ExpectedServerCertType" =>, "P-256",
863 "VerifyCAFile" => test_pem("root-cert.pem"),
867 "EdDSA.Certificate" => test_pem("client-ed25519-cert.pem"),
868 "EdDSA.PrivateKey" => test_pem("client-ed25519-key.pem"),
881 "VerifyCAFile" => test_pem("root-cert.pem"),
885 "EdDSA.Certificate" => test_pem("client-ed448-cert.pem"),
886 "EdDSA.PrivateKey" => test_pem("client-ed448-key.pem"),
899 "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
900 "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
905 "RequestCAFile" => test_pem("root-cert.pem"),
918 "Certificate" => test_pem("server-ecdsa-brainpoolP256r1-cert.pem"),
919 "PrivateKey" => test_pem("server-ecdsa-brainpoolP256r1-key.pem"),
922 "RequestCAFile" => test_pem("root-cert.pem"),
939 "DSA.Certificate" => test_pem("server-dsa-cert.pem"),
940 "DSA.PrivateKey" => test_pem("server-dsa-key.pem"),
961 "VerifyCAFile" => test_pem("root-cert.pem"),
972 "DSA.Certificate" => test_pem("server-dsa-cert.pem"),
973 "DSA.PrivateKey" => test_pem("server-dsa-key.pem"),