Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

  • 442b1ff
  • /
  • test
  • /
  • ssl-tests
  • /
  • 16-dtls-certstatus.cnf.in
Raw File
Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • content
  • directory
content badge Iframe embedding
swh:1:cnt:b5ae020e6a0c26d9177ac3119cee3e015a7895ff
directory badge Iframe embedding
swh:1:dir:4c369d5fa5496f48932c78bdab7b1d918027a51f
16-dtls-certstatus.cnf.in
# -*- mode: perl; -*-
# Copyright 2016-2021 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License").  You may not use
# this file except in compliance with the License.  You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html


## Test DTLS CertStatus messages

use strict;
use warnings;

package ssltests;
use OpenSSL::Test::Utils;

our $fips_mode;

our @tests = ();

our @tests_standard = (
    {
        name => "certstatus-good",
        server => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
            extra => {
                "CertStatus" => "GoodResponse"
            },
        },
        client => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
        },
        test => {
            "Method" => "DTLS",
            "ExpectedResult" => "Success"
        }
    },
    {
        name => "certstatus-bad",
        server => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
            extra => {
                "CertStatus" => "BadResponse",
            },
        },
        client => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
        },
        test => {
            "Method" => "DTLS",
            "ExpectedResult" => "ClientFail"
        }
    }
);

our @tests_sctp = (
    {
        name => "certstatus-good",
        server => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
            extra => {
                "CertStatus" => "GoodResponse",
            },
        },
        client => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
        },
        test => {
            "Method" => "DTLS",
            "UseSCTP" => "Yes",
            "ExpectedResult" => "Success"
        }
    },
    {
        name => "certstatus-bad",
        server => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
            extra => {
                "CertStatus" => "BadResponse",
            },
        },
        client => {
            "CipherString" => "DEFAULT:\@SECLEVEL=0",
        },
        test => {
            "Method" => "DTLS",
            "UseSCTP" => "Yes",
            "ExpectedResult" => "ClientFail"
        }
    },
);

if  (!$fips_mode || !disabled("dtls1_2")) {
    push @tests, @tests_standard;
    push @tests, @tests_sctp unless disabled("sctp") || disabled("sock");
}

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top