xref: /freebsd/crypto/openssl/test/recipes/95-test_external_tlsfuzzer_data/cert.json.in (revision e7be843b4a162e68651d3911f0357ed464915629)
1*e7be843bSPierre Pronchery[
2*e7be843bSPierre Pronchery    {"server_command": ["@SERVER@", "s_server", "-www",
3*e7be843bSPierre Pronchery                        "-key", "tests/serverX509Key.pem",
4*e7be843bSPierre Pronchery                        "-cert", "tests/serverX509Cert.pem",
5*e7be843bSPierre Pronchery                        "-verify", "1",
6*e7be843bSPierre Pronchery                        "-CAfile", "tests/clientX509Cert.pem"],
7*e7be843bSPierre Pronchery     "comment": "Use ANY certificate just to ensure that server tries to authorise a client",
8*e7be843bSPierre Pronchery     "environment": {"PYTHONPATH" : "."},
9*e7be843bSPierre Pronchery     "server_hostname": "localhost",
10*e7be843bSPierre Pronchery     "server_port": @PORT@,
11*e7be843bSPierre Pronchery     "tests" : [
12*e7be843bSPierre Pronchery       {"name" : "test-tls13-certificate-verify.py",
13*e7be843bSPierre Pronchery        "arguments" : ["-k", "tests/clientX509Key.pem",
14*e7be843bSPierre Pronchery                       "-c", "tests/clientX509Cert.pem",
15*e7be843bSPierre Pronchery                       "-s", "9+5 9+6 9+4 ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512",
16*e7be843bSPierre Pronchery                       "-p", "@PORT@"]},
17*e7be843bSPierre Pronchery       {"name" : "test-tls13-ecdsa-in-certificate-verify.py",
18*e7be843bSPierre Pronchery          "arguments" : ["-k", "tests/serverECKey.pem",
19*e7be843bSPierre Pronchery                         "-c", "tests/serverECCert.pem",
20*e7be843bSPierre Pronchery                         "-s", "9+5 9+6 9+4 ecdsa_secp256r1_sha256 ecdsa_secp384r1_sha384 ecdsa_secp521r1_sha512 ed25519 ed448 8+26 8+27 8+28 rsa_pss_pss_sha256 rsa_pss_pss_sha384 rsa_pss_pss_sha512 rsa_pss_rsae_sha256 rsa_pss_rsae_sha384 rsa_pss_rsae_sha512 rsa_pkcs1_sha256 rsa_pkcs1_sha384 rsa_pkcs1_sha512",
21*e7be843bSPierre Pronchery                         "-p", "@PORT@"]}
22*e7be843bSPierre Pronchery     ]
23*e7be843bSPierre Pronchery    },
24*e7be843bSPierre Pronchery    {"server_command": ["@SERVER@", "s_server", "-www",
25*e7be843bSPierre Pronchery                 "-key", "tests/serverX509Key.pem",
26*e7be843bSPierre Pronchery                 "-cert", "tests/serverX509Cert.pem",
27*e7be843bSPierre Pronchery                 "-verify", "1", "-CAfile", "tests/clientX509Cert.pem",
28*e7be843bSPierre Pronchery                 "-client_sigalgs", "RSA+SHA384:rsa_pss_rsae_sha384:rsa_pss_pss_sha384"],
29*e7be843bSPierre Pronchery     "comment": "set -client_sigalgs because of https://github.com/openssl/openssl/issues/25277",
30*e7be843bSPierre Pronchery     "environment": {"PYTHONPATH" : "."},
31*e7be843bSPierre Pronchery     "server_hostname": "localhost",
32*e7be843bSPierre Pronchery     "server_port": @PORT@,
33*e7be843bSPierre Pronchery     "tests" : [
34*e7be843bSPierre Pronchery       {"name" : "test-certificate-verify-malformed.py",
35*e7be843bSPierre Pronchery        "arguments" : ["-d", "-k", "tests/clientX509Key.pem",
36*e7be843bSPierre Pronchery                       "-c", "tests/clientX509Cert.pem",
37*e7be843bSPierre Pronchery                       "-p", "@PORT@"]}
38*e7be843bSPierre Pronchery     ]
39*e7be843bSPierre Pronchery    },
40*e7be843bSPierre Pronchery    {"server_command": ["@SERVER@", "s_server", "-www",
41*e7be843bSPierre Pronchery                 "-key", "tests/serverX509Key.pem",
42*e7be843bSPierre Pronchery                 "-cert", "tests/serverX509Cert.pem"],
43*e7be843bSPierre Pronchery     "environment": {"PYTHONPATH" : "."},
44*e7be843bSPierre Pronchery     "server_hostname": "localhost",
45*e7be843bSPierre Pronchery     "server_port": @PORT@,
46*e7be843bSPierre Pronchery     "tests" : [
47*e7be843bSPierre Pronchery       {"name" : "test-tls13-conversation.py",
48*e7be843bSPierre Pronchery        "arguments" : ["-p", "@PORT@"]},
49*e7be843bSPierre Pronchery       {"name" : "test-conversation.py",
50*e7be843bSPierre Pronchery        "arguments" : ["-p", "@PORT@",
51*e7be843bSPierre Pronchery                       "-d"]},
52*e7be843bSPierre Pronchery       {"name" : "test-invalid-client-hello-w-record-overflow.py",
53*e7be843bSPierre Pronchery        "arguments" : ["-n", "0", "-C",
54*e7be843bSPierre Pronchery                       "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "-d",
55*e7be843bSPierre Pronchery                       "--ems", "session ID len fuzz to 5 w/ext"]}
56*e7be843bSPierre Pronchery     ]
57*e7be843bSPierre Pronchery    }
58*e7be843bSPierre Pronchery]
59