Skip to main content
  • Home
  • login
  • Browse the archive

    swh mirror partner logo
swh logo
SoftwareHeritage
Software
Heritage
Mirror
Features
  • Search

  • Downloads

  • Save code now

  • Add forge now

  • Help

Revision e88dfd5ee50f9d934edd966369339ee5573c67d4 authored by erbsland-dev on 10 September 2024, 19:24:59 UTC, committed by Tomas Mraz on 13 September 2024, 08:13:32 UTC
Add Missing Error Messages for AES-OCB Tag Length Validation
Related to #8331
Addressing found issues by adding specific error messages to improve
feedback when tag length checks fail for the `EVP_CTRL_AEAD_SET_TAG`
parameter in the AES-OCB algorithm.

- Added PROV_R_INVALID_TAG_LENGTH error to indicate when the current tag
  length exceeds the maximum tag length of the algorithm.
- Added `PROV_R_INVALID_TAG_LENGTH` error to indicate when the current tag
  length in the context does not match a custom tag length provided as
  a parameter.
- Added `ERR_R_PASSED_INVALID_ARGUMENT` error to handle cases where an
  invalid pointer is passed in encryption mode.

Reviewed-by: Paul Dale <ppzgs1@gmail.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/25425)

(cherry picked from commit 645edf50f0274448174d9739543bf01b1708b2f5)
1 parent 1727cbb
  • Files
  • Changes
  • 237708f
  • /
  • test
  • /
  • ssl-tests
  • /
  • 14-curves.cnf
Raw File
Cook and download a directory from the Software Heritage Vault

You have requested the cooking of the directory with identifier None into a standard tar.gz archive.

Are you sure you want to continue ?

Download a directory from the Software Heritage Vault

You have requested the download of the directory with identifier None as a standard tar.gz archive.

Are you sure you want to continue ?

Cook and download a revision from the Software Heritage Vault

You have requested the cooking of the history heading to revision with identifier swh:1:rev:e88dfd5ee50f9d934edd966369339ee5573c67d4 into a bare git archive.

Are you sure you want to continue ?

Download a revision from the Software Heritage Vault

You have requested the download of the history heading to revision with identifier swh:1:rev:e88dfd5ee50f9d934edd966369339ee5573c67d4 as a bare git archive.

Are you sure you want to continue ?

Invalid Email !

The provided email is not well-formed.

Download link has expired

The requested archive is no longer available for download from the Software Heritage Vault.

Do you want to cook it again ?

Permalinks

To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.

  • revision
  • content
revision badge
swh:1:rev:e88dfd5ee50f9d934edd966369339ee5573c67d4
content badge Iframe embedding
swh:1:cnt:75635d29bd0f7a3cd20ae860954562464bb682b4
14-curves.cnf
# Generated with generate_ssl_tests.pl

num_tests = 95

test-0 = 0-curve-prime256v1
test-1 = 1-curve-secp384r1
test-2 = 2-curve-secp521r1
test-3 = 3-curve-X25519
test-4 = 4-curve-X448
test-5 = 5-curve-ffdhe2048
test-6 = 6-curve-ffdhe3072
test-7 = 7-curve-ffdhe4096
test-8 = 8-curve-ffdhe6144
test-9 = 9-curve-ffdhe8192
test-10 = 10-curve-sect233k1
test-11 = 11-curve-sect233r1
test-12 = 12-curve-sect283k1
test-13 = 13-curve-sect283r1
test-14 = 14-curve-sect409k1
test-15 = 15-curve-sect409r1
test-16 = 16-curve-sect571k1
test-17 = 17-curve-sect571r1
test-18 = 18-curve-secp224r1
test-19 = 19-curve-sect163k1
test-20 = 20-curve-sect163r2
test-21 = 21-curve-prime192v1
test-22 = 22-curve-sect163r1
test-23 = 23-curve-sect193r1
test-24 = 24-curve-sect193r2
test-25 = 25-curve-sect239k1
test-26 = 26-curve-secp160k1
test-27 = 27-curve-secp160r1
test-28 = 28-curve-secp160r2
test-29 = 29-curve-secp192k1
test-30 = 30-curve-secp224k1
test-31 = 31-curve-secp256k1
test-32 = 32-curve-brainpoolP256r1
test-33 = 33-curve-brainpoolP384r1
test-34 = 34-curve-brainpoolP512r1
test-35 = 35-curve-sect233k1-tls12-in-tls13
test-36 = 36-curve-sect233r1-tls12-in-tls13
test-37 = 37-curve-sect283k1-tls12-in-tls13
test-38 = 38-curve-sect283r1-tls12-in-tls13
test-39 = 39-curve-sect409k1-tls12-in-tls13
test-40 = 40-curve-sect409r1-tls12-in-tls13
test-41 = 41-curve-sect571k1-tls12-in-tls13
test-42 = 42-curve-sect571r1-tls12-in-tls13
test-43 = 43-curve-secp224r1-tls12-in-tls13
test-44 = 44-curve-sect163k1-tls12-in-tls13
test-45 = 45-curve-sect163r2-tls12-in-tls13
test-46 = 46-curve-prime192v1-tls12-in-tls13
test-47 = 47-curve-sect163r1-tls12-in-tls13
test-48 = 48-curve-sect193r1-tls12-in-tls13
test-49 = 49-curve-sect193r2-tls12-in-tls13
test-50 = 50-curve-sect239k1-tls12-in-tls13
test-51 = 51-curve-secp160k1-tls12-in-tls13
test-52 = 52-curve-secp160r1-tls12-in-tls13
test-53 = 53-curve-secp160r2-tls12-in-tls13
test-54 = 54-curve-secp192k1-tls12-in-tls13
test-55 = 55-curve-secp224k1-tls12-in-tls13
test-56 = 56-curve-secp256k1-tls12-in-tls13
test-57 = 57-curve-brainpoolP256r1-tls12-in-tls13
test-58 = 58-curve-brainpoolP384r1-tls12-in-tls13
test-59 = 59-curve-brainpoolP512r1-tls12-in-tls13
test-60 = 60-curve-sect233k1-tls13
test-61 = 61-curve-sect233r1-tls13
test-62 = 62-curve-sect283k1-tls13
test-63 = 63-curve-sect283r1-tls13
test-64 = 64-curve-sect409k1-tls13
test-65 = 65-curve-sect409r1-tls13
test-66 = 66-curve-sect571k1-tls13
test-67 = 67-curve-sect571r1-tls13
test-68 = 68-curve-secp224r1-tls13
test-69 = 69-curve-sect163k1-tls13
test-70 = 70-curve-sect163r2-tls13
test-71 = 71-curve-prime192v1-tls13
test-72 = 72-curve-sect163r1-tls13
test-73 = 73-curve-sect193r1-tls13
test-74 = 74-curve-sect193r2-tls13
test-75 = 75-curve-sect239k1-tls13
test-76 = 76-curve-secp160k1-tls13
test-77 = 77-curve-secp160r1-tls13
test-78 = 78-curve-secp160r2-tls13
test-79 = 79-curve-secp192k1-tls13
test-80 = 80-curve-secp224k1-tls13
test-81 = 81-curve-secp256k1-tls13
test-82 = 82-curve-brainpoolP256r1-tls13
test-83 = 83-curve-brainpoolP384r1-tls13
test-84 = 84-curve-brainpoolP512r1-tls13
test-85 = 85-curve-ffdhe2048-tls13-in-tls12
test-86 = 86-curve-ffdhe2048-tls13-in-tls12-2
test-87 = 87-curve-ffdhe3072-tls13-in-tls12
test-88 = 88-curve-ffdhe3072-tls13-in-tls12-2
test-89 = 89-curve-ffdhe4096-tls13-in-tls12
test-90 = 90-curve-ffdhe4096-tls13-in-tls12-2
test-91 = 91-curve-ffdhe6144-tls13-in-tls12
test-92 = 92-curve-ffdhe6144-tls13-in-tls12-2
test-93 = 93-curve-ffdhe8192-tls13-in-tls12
test-94 = 94-curve-ffdhe8192-tls13-in-tls12-2
# ===========================================================

[0-curve-prime256v1]
ssl_conf = 0-curve-prime256v1-ssl

[0-curve-prime256v1-ssl]
server = 0-curve-prime256v1-server
client = 0-curve-prime256v1-client

[0-curve-prime256v1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = prime256v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[0-curve-prime256v1-client]
CipherString = ECDHE
Curves = prime256v1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-0]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = prime256v1


# ===========================================================

[1-curve-secp384r1]
ssl_conf = 1-curve-secp384r1-ssl

[1-curve-secp384r1-ssl]
server = 1-curve-secp384r1-server
client = 1-curve-secp384r1-client

[1-curve-secp384r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[1-curve-secp384r1-client]
CipherString = ECDHE
Curves = secp384r1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-1]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = secp384r1


# ===========================================================

[2-curve-secp521r1]
ssl_conf = 2-curve-secp521r1-ssl

[2-curve-secp521r1-ssl]
server = 2-curve-secp521r1-server
client = 2-curve-secp521r1-client

[2-curve-secp521r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp521r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[2-curve-secp521r1-client]
CipherString = ECDHE
Curves = secp521r1
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-2]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = secp521r1


# ===========================================================

[3-curve-X25519]
ssl_conf = 3-curve-X25519-ssl

[3-curve-X25519-ssl]
server = 3-curve-X25519-server
client = 3-curve-X25519-client

[3-curve-X25519-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = X25519
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[3-curve-X25519-client]
CipherString = ECDHE
Curves = X25519
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-3]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = X25519


# ===========================================================

[4-curve-X448]
ssl_conf = 4-curve-X448-ssl

[4-curve-X448-ssl]
server = 4-curve-X448-server
client = 4-curve-X448-client

[4-curve-X448-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = X448
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[4-curve-X448-client]
CipherString = ECDHE
Curves = X448
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-4]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = X448


# ===========================================================

[5-curve-ffdhe2048]
ssl_conf = 5-curve-ffdhe2048-ssl

[5-curve-ffdhe2048-ssl]
server = 5-curve-ffdhe2048-server
client = 5-curve-ffdhe2048-client

[5-curve-ffdhe2048-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = ffdhe2048
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[5-curve-ffdhe2048-client]
CipherString = ECDHE
Curves = ffdhe2048
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-5]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement


# ===========================================================

[6-curve-ffdhe3072]
ssl_conf = 6-curve-ffdhe3072-ssl

[6-curve-ffdhe3072-ssl]
server = 6-curve-ffdhe3072-server
client = 6-curve-ffdhe3072-client

[6-curve-ffdhe3072-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = ffdhe3072
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[6-curve-ffdhe3072-client]
CipherString = ECDHE
Curves = ffdhe3072
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-6]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement


# ===========================================================

[7-curve-ffdhe4096]
ssl_conf = 7-curve-ffdhe4096-ssl

[7-curve-ffdhe4096-ssl]
server = 7-curve-ffdhe4096-server
client = 7-curve-ffdhe4096-client

[7-curve-ffdhe4096-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = ffdhe4096
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[7-curve-ffdhe4096-client]
CipherString = ECDHE
Curves = ffdhe4096
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-7]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement


# ===========================================================

[8-curve-ffdhe6144]
ssl_conf = 8-curve-ffdhe6144-ssl

[8-curve-ffdhe6144-ssl]
server = 8-curve-ffdhe6144-server
client = 8-curve-ffdhe6144-client

[8-curve-ffdhe6144-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = ffdhe6144
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[8-curve-ffdhe6144-client]
CipherString = ECDHE
Curves = ffdhe6144
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-8]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement


# ===========================================================

[9-curve-ffdhe8192]
ssl_conf = 9-curve-ffdhe8192-ssl

[9-curve-ffdhe8192-ssl]
server = 9-curve-ffdhe8192-server
client = 9-curve-ffdhe8192-client

[9-curve-ffdhe8192-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = ffdhe8192
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[9-curve-ffdhe8192-client]
CipherString = ECDHE
Curves = ffdhe8192
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-9]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = dhKeyAgreement


# ===========================================================

[10-curve-sect233k1]
ssl_conf = 10-curve-sect233k1-ssl

[10-curve-sect233k1-ssl]
server = 10-curve-sect233k1-server
client = 10-curve-sect233k1-client

[10-curve-sect233k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect233k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[10-curve-sect233k1-client]
CipherString = ECDHE
Curves = sect233k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-10]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect233k1


# ===========================================================

[11-curve-sect233r1]
ssl_conf = 11-curve-sect233r1-ssl

[11-curve-sect233r1-ssl]
server = 11-curve-sect233r1-server
client = 11-curve-sect233r1-client

[11-curve-sect233r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect233r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[11-curve-sect233r1-client]
CipherString = ECDHE
Curves = sect233r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-11]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect233r1


# ===========================================================

[12-curve-sect283k1]
ssl_conf = 12-curve-sect283k1-ssl

[12-curve-sect283k1-ssl]
server = 12-curve-sect283k1-server
client = 12-curve-sect283k1-client

[12-curve-sect283k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect283k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[12-curve-sect283k1-client]
CipherString = ECDHE
Curves = sect283k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-12]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect283k1


# ===========================================================

[13-curve-sect283r1]
ssl_conf = 13-curve-sect283r1-ssl

[13-curve-sect283r1-ssl]
server = 13-curve-sect283r1-server
client = 13-curve-sect283r1-client

[13-curve-sect283r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect283r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[13-curve-sect283r1-client]
CipherString = ECDHE
Curves = sect283r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-13]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect283r1


# ===========================================================

[14-curve-sect409k1]
ssl_conf = 14-curve-sect409k1-ssl

[14-curve-sect409k1-ssl]
server = 14-curve-sect409k1-server
client = 14-curve-sect409k1-client

[14-curve-sect409k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect409k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[14-curve-sect409k1-client]
CipherString = ECDHE
Curves = sect409k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-14]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect409k1


# ===========================================================

[15-curve-sect409r1]
ssl_conf = 15-curve-sect409r1-ssl

[15-curve-sect409r1-ssl]
server = 15-curve-sect409r1-server
client = 15-curve-sect409r1-client

[15-curve-sect409r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect409r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[15-curve-sect409r1-client]
CipherString = ECDHE
Curves = sect409r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-15]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect409r1


# ===========================================================

[16-curve-sect571k1]
ssl_conf = 16-curve-sect571k1-ssl

[16-curve-sect571k1-ssl]
server = 16-curve-sect571k1-server
client = 16-curve-sect571k1-client

[16-curve-sect571k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect571k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[16-curve-sect571k1-client]
CipherString = ECDHE
Curves = sect571k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-16]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect571k1


# ===========================================================

[17-curve-sect571r1]
ssl_conf = 17-curve-sect571r1-ssl

[17-curve-sect571r1-ssl]
server = 17-curve-sect571r1-server
client = 17-curve-sect571r1-client

[17-curve-sect571r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect571r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[17-curve-sect571r1-client]
CipherString = ECDHE
Curves = sect571r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-17]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect571r1


# ===========================================================

[18-curve-secp224r1]
ssl_conf = 18-curve-secp224r1-ssl

[18-curve-secp224r1-ssl]
server = 18-curve-secp224r1-server
client = 18-curve-secp224r1-client

[18-curve-secp224r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp224r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[18-curve-secp224r1-client]
CipherString = ECDHE
Curves = secp224r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-18]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp224r1


# ===========================================================

[19-curve-sect163k1]
ssl_conf = 19-curve-sect163k1-ssl

[19-curve-sect163k1-ssl]
server = 19-curve-sect163k1-server
client = 19-curve-sect163k1-client

[19-curve-sect163k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[19-curve-sect163k1-client]
CipherString = ECDHE
Curves = sect163k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-19]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163k1


# ===========================================================

[20-curve-sect163r2]
ssl_conf = 20-curve-sect163r2-ssl

[20-curve-sect163r2-ssl]
server = 20-curve-sect163r2-server
client = 20-curve-sect163r2-client

[20-curve-sect163r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[20-curve-sect163r2-client]
CipherString = ECDHE
Curves = sect163r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-20]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163r2


# ===========================================================

[21-curve-prime192v1]
ssl_conf = 21-curve-prime192v1-ssl

[21-curve-prime192v1-ssl]
server = 21-curve-prime192v1-server
client = 21-curve-prime192v1-client

[21-curve-prime192v1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = prime192v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[21-curve-prime192v1-client]
CipherString = ECDHE
Curves = prime192v1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-21]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = prime192v1


# ===========================================================

[22-curve-sect163r1]
ssl_conf = 22-curve-sect163r1-ssl

[22-curve-sect163r1-ssl]
server = 22-curve-sect163r1-server
client = 22-curve-sect163r1-client

[22-curve-sect163r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[22-curve-sect163r1-client]
CipherString = ECDHE
Curves = sect163r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-22]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect163r1


# ===========================================================

[23-curve-sect193r1]
ssl_conf = 23-curve-sect193r1-ssl

[23-curve-sect193r1-ssl]
server = 23-curve-sect193r1-server
client = 23-curve-sect193r1-client

[23-curve-sect193r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect193r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[23-curve-sect193r1-client]
CipherString = ECDHE
Curves = sect193r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-23]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect193r1


# ===========================================================

[24-curve-sect193r2]
ssl_conf = 24-curve-sect193r2-ssl

[24-curve-sect193r2-ssl]
server = 24-curve-sect193r2-server
client = 24-curve-sect193r2-client

[24-curve-sect193r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect193r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[24-curve-sect193r2-client]
CipherString = ECDHE
Curves = sect193r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-24]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect193r2


# ===========================================================

[25-curve-sect239k1]
ssl_conf = 25-curve-sect239k1-ssl

[25-curve-sect239k1-ssl]
server = 25-curve-sect239k1-server
client = 25-curve-sect239k1-client

[25-curve-sect239k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect239k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[25-curve-sect239k1-client]
CipherString = ECDHE
Curves = sect239k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-25]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = sect239k1


# ===========================================================

[26-curve-secp160k1]
ssl_conf = 26-curve-secp160k1-ssl

[26-curve-secp160k1-ssl]
server = 26-curve-secp160k1-server
client = 26-curve-secp160k1-client

[26-curve-secp160k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[26-curve-secp160k1-client]
CipherString = ECDHE
Curves = secp160k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-26]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160k1


# ===========================================================

[27-curve-secp160r1]
ssl_conf = 27-curve-secp160r1-ssl

[27-curve-secp160r1-ssl]
server = 27-curve-secp160r1-server
client = 27-curve-secp160r1-client

[27-curve-secp160r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[27-curve-secp160r1-client]
CipherString = ECDHE
Curves = secp160r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-27]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160r1


# ===========================================================

[28-curve-secp160r2]
ssl_conf = 28-curve-secp160r2-ssl

[28-curve-secp160r2-ssl]
server = 28-curve-secp160r2-server
client = 28-curve-secp160r2-client

[28-curve-secp160r2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[28-curve-secp160r2-client]
CipherString = ECDHE
Curves = secp160r2
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-28]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp160r2


# ===========================================================

[29-curve-secp192k1]
ssl_conf = 29-curve-secp192k1-ssl

[29-curve-secp192k1-ssl]
server = 29-curve-secp192k1-server
client = 29-curve-secp192k1-client

[29-curve-secp192k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp192k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[29-curve-secp192k1-client]
CipherString = ECDHE
Curves = secp192k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-29]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp192k1


# ===========================================================

[30-curve-secp224k1]
ssl_conf = 30-curve-secp224k1-ssl

[30-curve-secp224k1-ssl]
server = 30-curve-secp224k1-server
client = 30-curve-secp224k1-client

[30-curve-secp224k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp224k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[30-curve-secp224k1-client]
CipherString = ECDHE
Curves = secp224k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-30]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp224k1


# ===========================================================

[31-curve-secp256k1]
ssl_conf = 31-curve-secp256k1-ssl

[31-curve-secp256k1-ssl]
server = 31-curve-secp256k1-server
client = 31-curve-secp256k1-client

[31-curve-secp256k1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp256k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[31-curve-secp256k1-client]
CipherString = ECDHE
Curves = secp256k1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-31]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = secp256k1


# ===========================================================

[32-curve-brainpoolP256r1]
ssl_conf = 32-curve-brainpoolP256r1-ssl

[32-curve-brainpoolP256r1-ssl]
server = 32-curve-brainpoolP256r1-server
client = 32-curve-brainpoolP256r1-client

[32-curve-brainpoolP256r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP256r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[32-curve-brainpoolP256r1-client]
CipherString = ECDHE
Curves = brainpoolP256r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-32]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP256r1


# ===========================================================

[33-curve-brainpoolP384r1]
ssl_conf = 33-curve-brainpoolP384r1-ssl

[33-curve-brainpoolP384r1-ssl]
server = 33-curve-brainpoolP384r1-server
client = 33-curve-brainpoolP384r1-client

[33-curve-brainpoolP384r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[33-curve-brainpoolP384r1-client]
CipherString = ECDHE
Curves = brainpoolP384r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-33]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP384r1


# ===========================================================

[34-curve-brainpoolP512r1]
ssl_conf = 34-curve-brainpoolP512r1-ssl

[34-curve-brainpoolP512r1-ssl]
server = 34-curve-brainpoolP512r1-server
client = 34-curve-brainpoolP512r1-client

[34-curve-brainpoolP512r1-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP512r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[34-curve-brainpoolP512r1-client]
CipherString = ECDHE
Curves = brainpoolP512r1
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-34]
ExpectedProtocol = TLSv1.2
ExpectedResult = Success
ExpectedTmpKeyType = brainpoolP512r1


# ===========================================================

[35-curve-sect233k1-tls12-in-tls13]
ssl_conf = 35-curve-sect233k1-tls12-in-tls13-ssl

[35-curve-sect233k1-tls12-in-tls13-ssl]
server = 35-curve-sect233k1-tls12-in-tls13-server
client = 35-curve-sect233k1-tls12-in-tls13-client

[35-curve-sect233k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[35-curve-sect233k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-35]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[36-curve-sect233r1-tls12-in-tls13]
ssl_conf = 36-curve-sect233r1-tls12-in-tls13-ssl

[36-curve-sect233r1-tls12-in-tls13-ssl]
server = 36-curve-sect233r1-tls12-in-tls13-server
client = 36-curve-sect233r1-tls12-in-tls13-client

[36-curve-sect233r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect233r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[36-curve-sect233r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect233r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-36]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[37-curve-sect283k1-tls12-in-tls13]
ssl_conf = 37-curve-sect283k1-tls12-in-tls13-ssl

[37-curve-sect283k1-tls12-in-tls13-ssl]
server = 37-curve-sect283k1-tls12-in-tls13-server
client = 37-curve-sect283k1-tls12-in-tls13-client

[37-curve-sect283k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[37-curve-sect283k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-37]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[38-curve-sect283r1-tls12-in-tls13]
ssl_conf = 38-curve-sect283r1-tls12-in-tls13-ssl

[38-curve-sect283r1-tls12-in-tls13-ssl]
server = 38-curve-sect283r1-tls12-in-tls13-server
client = 38-curve-sect283r1-tls12-in-tls13-client

[38-curve-sect283r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect283r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[38-curve-sect283r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect283r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-38]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[39-curve-sect409k1-tls12-in-tls13]
ssl_conf = 39-curve-sect409k1-tls12-in-tls13-ssl

[39-curve-sect409k1-tls12-in-tls13-ssl]
server = 39-curve-sect409k1-tls12-in-tls13-server
client = 39-curve-sect409k1-tls12-in-tls13-client

[39-curve-sect409k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[39-curve-sect409k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-39]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[40-curve-sect409r1-tls12-in-tls13]
ssl_conf = 40-curve-sect409r1-tls12-in-tls13-ssl

[40-curve-sect409r1-tls12-in-tls13-ssl]
server = 40-curve-sect409r1-tls12-in-tls13-server
client = 40-curve-sect409r1-tls12-in-tls13-client

[40-curve-sect409r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect409r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[40-curve-sect409r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect409r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-40]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[41-curve-sect571k1-tls12-in-tls13]
ssl_conf = 41-curve-sect571k1-tls12-in-tls13-ssl

[41-curve-sect571k1-tls12-in-tls13-ssl]
server = 41-curve-sect571k1-tls12-in-tls13-server
client = 41-curve-sect571k1-tls12-in-tls13-client

[41-curve-sect571k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[41-curve-sect571k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-41]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[42-curve-sect571r1-tls12-in-tls13]
ssl_conf = 42-curve-sect571r1-tls12-in-tls13-ssl

[42-curve-sect571r1-tls12-in-tls13-ssl]
server = 42-curve-sect571r1-tls12-in-tls13-server
client = 42-curve-sect571r1-tls12-in-tls13-client

[42-curve-sect571r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect571r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[42-curve-sect571r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect571r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-42]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[43-curve-secp224r1-tls12-in-tls13]
ssl_conf = 43-curve-secp224r1-tls12-in-tls13-ssl

[43-curve-secp224r1-tls12-in-tls13-ssl]
server = 43-curve-secp224r1-tls12-in-tls13-server
client = 43-curve-secp224r1-tls12-in-tls13-client

[43-curve-secp224r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[43-curve-secp224r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-43]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[44-curve-sect163k1-tls12-in-tls13]
ssl_conf = 44-curve-sect163k1-tls12-in-tls13-ssl

[44-curve-sect163k1-tls12-in-tls13-ssl]
server = 44-curve-sect163k1-tls12-in-tls13-server
client = 44-curve-sect163k1-tls12-in-tls13-client

[44-curve-sect163k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[44-curve-sect163k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-44]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[45-curve-sect163r2-tls12-in-tls13]
ssl_conf = 45-curve-sect163r2-tls12-in-tls13-ssl

[45-curve-sect163r2-tls12-in-tls13-ssl]
server = 45-curve-sect163r2-tls12-in-tls13-server
client = 45-curve-sect163r2-tls12-in-tls13-client

[45-curve-sect163r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[45-curve-sect163r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-45]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[46-curve-prime192v1-tls12-in-tls13]
ssl_conf = 46-curve-prime192v1-tls12-in-tls13-ssl

[46-curve-prime192v1-tls12-in-tls13-ssl]
server = 46-curve-prime192v1-tls12-in-tls13-server
client = 46-curve-prime192v1-tls12-in-tls13-client

[46-curve-prime192v1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = prime192v1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[46-curve-prime192v1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = prime192v1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-46]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[47-curve-sect163r1-tls12-in-tls13]
ssl_conf = 47-curve-sect163r1-tls12-in-tls13-ssl

[47-curve-sect163r1-tls12-in-tls13-ssl]
server = 47-curve-sect163r1-tls12-in-tls13-server
client = 47-curve-sect163r1-tls12-in-tls13-client

[47-curve-sect163r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect163r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[47-curve-sect163r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect163r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-47]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[48-curve-sect193r1-tls12-in-tls13]
ssl_conf = 48-curve-sect193r1-tls12-in-tls13-ssl

[48-curve-sect193r1-tls12-in-tls13-ssl]
server = 48-curve-sect193r1-tls12-in-tls13-server
client = 48-curve-sect193r1-tls12-in-tls13-client

[48-curve-sect193r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[48-curve-sect193r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-48]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[49-curve-sect193r2-tls12-in-tls13]
ssl_conf = 49-curve-sect193r2-tls12-in-tls13-ssl

[49-curve-sect193r2-tls12-in-tls13-ssl]
server = 49-curve-sect193r2-tls12-in-tls13-server
client = 49-curve-sect193r2-tls12-in-tls13-client

[49-curve-sect193r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect193r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[49-curve-sect193r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect193r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-49]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[50-curve-sect239k1-tls12-in-tls13]
ssl_conf = 50-curve-sect239k1-tls12-in-tls13-ssl

[50-curve-sect239k1-tls12-in-tls13-ssl]
server = 50-curve-sect239k1-tls12-in-tls13-server
client = 50-curve-sect239k1-tls12-in-tls13-client

[50-curve-sect239k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = sect239k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[50-curve-sect239k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = sect239k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-50]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[51-curve-secp160k1-tls12-in-tls13]
ssl_conf = 51-curve-secp160k1-tls12-in-tls13-ssl

[51-curve-secp160k1-tls12-in-tls13-ssl]
server = 51-curve-secp160k1-tls12-in-tls13-server
client = 51-curve-secp160k1-tls12-in-tls13-client

[51-curve-secp160k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[51-curve-secp160k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-51]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[52-curve-secp160r1-tls12-in-tls13]
ssl_conf = 52-curve-secp160r1-tls12-in-tls13-ssl

[52-curve-secp160r1-tls12-in-tls13-ssl]
server = 52-curve-secp160r1-tls12-in-tls13-server
client = 52-curve-secp160r1-tls12-in-tls13-client

[52-curve-secp160r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[52-curve-secp160r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-52]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[53-curve-secp160r2-tls12-in-tls13]
ssl_conf = 53-curve-secp160r2-tls12-in-tls13-ssl

[53-curve-secp160r2-tls12-in-tls13-ssl]
server = 53-curve-secp160r2-tls12-in-tls13-server
client = 53-curve-secp160r2-tls12-in-tls13-client

[53-curve-secp160r2-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp160r2:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[53-curve-secp160r2-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp160r2:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-53]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[54-curve-secp192k1-tls12-in-tls13]
ssl_conf = 54-curve-secp192k1-tls12-in-tls13-ssl

[54-curve-secp192k1-tls12-in-tls13-ssl]
server = 54-curve-secp192k1-tls12-in-tls13-server
client = 54-curve-secp192k1-tls12-in-tls13-client

[54-curve-secp192k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp192k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[54-curve-secp192k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp192k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-54]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[55-curve-secp224k1-tls12-in-tls13]
ssl_conf = 55-curve-secp224k1-tls12-in-tls13-ssl

[55-curve-secp224k1-tls12-in-tls13-ssl]
server = 55-curve-secp224k1-tls12-in-tls13-server
client = 55-curve-secp224k1-tls12-in-tls13-client

[55-curve-secp224k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp224k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[55-curve-secp224k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp224k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-55]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[56-curve-secp256k1-tls12-in-tls13]
ssl_conf = 56-curve-secp256k1-tls12-in-tls13-ssl

[56-curve-secp256k1-tls12-in-tls13-ssl]
server = 56-curve-secp256k1-tls12-in-tls13-server
client = 56-curve-secp256k1-tls12-in-tls13-client

[56-curve-secp256k1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = secp256k1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[56-curve-secp256k1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = secp256k1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-56]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[57-curve-brainpoolP256r1-tls12-in-tls13]
ssl_conf = 57-curve-brainpoolP256r1-tls12-in-tls13-ssl

[57-curve-brainpoolP256r1-tls12-in-tls13-ssl]
server = 57-curve-brainpoolP256r1-tls12-in-tls13-server
client = 57-curve-brainpoolP256r1-tls12-in-tls13-client

[57-curve-brainpoolP256r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP256r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[57-curve-brainpoolP256r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP256r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-57]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[58-curve-brainpoolP384r1-tls12-in-tls13]
ssl_conf = 58-curve-brainpoolP384r1-tls12-in-tls13-ssl

[58-curve-brainpoolP384r1-tls12-in-tls13-ssl]
server = 58-curve-brainpoolP384r1-tls12-in-tls13-server
client = 58-curve-brainpoolP384r1-tls12-in-tls13-client

[58-curve-brainpoolP384r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP384r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[58-curve-brainpoolP384r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP384r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-58]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[59-curve-brainpoolP512r1-tls12-in-tls13]
ssl_conf = 59-curve-brainpoolP512r1-tls12-in-tls13-ssl

[59-curve-brainpoolP512r1-tls12-in-tls13-ssl]
server = 59-curve-brainpoolP512r1-tls12-in-tls13-server
client = 59-curve-brainpoolP512r1-tls12-in-tls13-client

[59-curve-brainpoolP512r1-tls12-in-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = brainpoolP512r1:P-256
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[59-curve-brainpoolP512r1-tls12-in-tls13-client]
CipherString = ECDHE@SECLEVEL=1
Curves = brainpoolP512r1:P-256
MaxProtocol = TLSv1.3
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-59]
ExpectedProtocol = TLSv1.3
ExpectedResult = Success
ExpectedTmpKeyType = P-256


# ===========================================================

[60-curve-sect233k1-tls13]
ssl_conf = 60-curve-sect233k1-tls13-ssl

[60-curve-sect233k1-tls13-ssl]
server = 60-curve-sect233k1-tls13-server
client = 60-curve-sect233k1-tls13-client

[60-curve-sect233k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect233k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[60-curve-sect233k1-tls13-client]
CipherString = ECDHE
Curves = sect233k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-60]
ExpectedResult = ClientFail


# ===========================================================

[61-curve-sect233r1-tls13]
ssl_conf = 61-curve-sect233r1-tls13-ssl

[61-curve-sect233r1-tls13-ssl]
server = 61-curve-sect233r1-tls13-server
client = 61-curve-sect233r1-tls13-client

[61-curve-sect233r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect233r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[61-curve-sect233r1-tls13-client]
CipherString = ECDHE
Curves = sect233r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-61]
ExpectedResult = ClientFail


# ===========================================================

[62-curve-sect283k1-tls13]
ssl_conf = 62-curve-sect283k1-tls13-ssl

[62-curve-sect283k1-tls13-ssl]
server = 62-curve-sect283k1-tls13-server
client = 62-curve-sect283k1-tls13-client

[62-curve-sect283k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect283k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[62-curve-sect283k1-tls13-client]
CipherString = ECDHE
Curves = sect283k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-62]
ExpectedResult = ClientFail


# ===========================================================

[63-curve-sect283r1-tls13]
ssl_conf = 63-curve-sect283r1-tls13-ssl

[63-curve-sect283r1-tls13-ssl]
server = 63-curve-sect283r1-tls13-server
client = 63-curve-sect283r1-tls13-client

[63-curve-sect283r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect283r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[63-curve-sect283r1-tls13-client]
CipherString = ECDHE
Curves = sect283r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-63]
ExpectedResult = ClientFail


# ===========================================================

[64-curve-sect409k1-tls13]
ssl_conf = 64-curve-sect409k1-tls13-ssl

[64-curve-sect409k1-tls13-ssl]
server = 64-curve-sect409k1-tls13-server
client = 64-curve-sect409k1-tls13-client

[64-curve-sect409k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect409k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[64-curve-sect409k1-tls13-client]
CipherString = ECDHE
Curves = sect409k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-64]
ExpectedResult = ClientFail


# ===========================================================

[65-curve-sect409r1-tls13]
ssl_conf = 65-curve-sect409r1-tls13-ssl

[65-curve-sect409r1-tls13-ssl]
server = 65-curve-sect409r1-tls13-server
client = 65-curve-sect409r1-tls13-client

[65-curve-sect409r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect409r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[65-curve-sect409r1-tls13-client]
CipherString = ECDHE
Curves = sect409r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-65]
ExpectedResult = ClientFail


# ===========================================================

[66-curve-sect571k1-tls13]
ssl_conf = 66-curve-sect571k1-tls13-ssl

[66-curve-sect571k1-tls13-ssl]
server = 66-curve-sect571k1-tls13-server
client = 66-curve-sect571k1-tls13-client

[66-curve-sect571k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect571k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[66-curve-sect571k1-tls13-client]
CipherString = ECDHE
Curves = sect571k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-66]
ExpectedResult = ClientFail


# ===========================================================

[67-curve-sect571r1-tls13]
ssl_conf = 67-curve-sect571r1-tls13-ssl

[67-curve-sect571r1-tls13-ssl]
server = 67-curve-sect571r1-tls13-server
client = 67-curve-sect571r1-tls13-client

[67-curve-sect571r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect571r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[67-curve-sect571r1-tls13-client]
CipherString = ECDHE
Curves = sect571r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-67]
ExpectedResult = ClientFail


# ===========================================================

[68-curve-secp224r1-tls13]
ssl_conf = 68-curve-secp224r1-tls13-ssl

[68-curve-secp224r1-tls13-ssl]
server = 68-curve-secp224r1-tls13-server
client = 68-curve-secp224r1-tls13-client

[68-curve-secp224r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp224r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[68-curve-secp224r1-tls13-client]
CipherString = ECDHE
Curves = secp224r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-68]
ExpectedResult = ClientFail


# ===========================================================

[69-curve-sect163k1-tls13]
ssl_conf = 69-curve-sect163k1-tls13-ssl

[69-curve-sect163k1-tls13-ssl]
server = 69-curve-sect163k1-tls13-server
client = 69-curve-sect163k1-tls13-client

[69-curve-sect163k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[69-curve-sect163k1-tls13-client]
CipherString = ECDHE
Curves = sect163k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-69]
ExpectedResult = ClientFail


# ===========================================================

[70-curve-sect163r2-tls13]
ssl_conf = 70-curve-sect163r2-tls13-ssl

[70-curve-sect163r2-tls13-ssl]
server = 70-curve-sect163r2-tls13-server
client = 70-curve-sect163r2-tls13-client

[70-curve-sect163r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[70-curve-sect163r2-tls13-client]
CipherString = ECDHE
Curves = sect163r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-70]
ExpectedResult = ClientFail


# ===========================================================

[71-curve-prime192v1-tls13]
ssl_conf = 71-curve-prime192v1-tls13-ssl

[71-curve-prime192v1-tls13-ssl]
server = 71-curve-prime192v1-tls13-server
client = 71-curve-prime192v1-tls13-client

[71-curve-prime192v1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = prime192v1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[71-curve-prime192v1-tls13-client]
CipherString = ECDHE
Curves = prime192v1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-71]
ExpectedResult = ClientFail


# ===========================================================

[72-curve-sect163r1-tls13]
ssl_conf = 72-curve-sect163r1-tls13-ssl

[72-curve-sect163r1-tls13-ssl]
server = 72-curve-sect163r1-tls13-server
client = 72-curve-sect163r1-tls13-client

[72-curve-sect163r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect163r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[72-curve-sect163r1-tls13-client]
CipherString = ECDHE
Curves = sect163r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-72]
ExpectedResult = ClientFail


# ===========================================================

[73-curve-sect193r1-tls13]
ssl_conf = 73-curve-sect193r1-tls13-ssl

[73-curve-sect193r1-tls13-ssl]
server = 73-curve-sect193r1-tls13-server
client = 73-curve-sect193r1-tls13-client

[73-curve-sect193r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect193r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[73-curve-sect193r1-tls13-client]
CipherString = ECDHE
Curves = sect193r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-73]
ExpectedResult = ClientFail


# ===========================================================

[74-curve-sect193r2-tls13]
ssl_conf = 74-curve-sect193r2-tls13-ssl

[74-curve-sect193r2-tls13-ssl]
server = 74-curve-sect193r2-tls13-server
client = 74-curve-sect193r2-tls13-client

[74-curve-sect193r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect193r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[74-curve-sect193r2-tls13-client]
CipherString = ECDHE
Curves = sect193r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-74]
ExpectedResult = ClientFail


# ===========================================================

[75-curve-sect239k1-tls13]
ssl_conf = 75-curve-sect239k1-tls13-ssl

[75-curve-sect239k1-tls13-ssl]
server = 75-curve-sect239k1-tls13-server
client = 75-curve-sect239k1-tls13-client

[75-curve-sect239k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = sect239k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[75-curve-sect239k1-tls13-client]
CipherString = ECDHE
Curves = sect239k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-75]
ExpectedResult = ClientFail


# ===========================================================

[76-curve-secp160k1-tls13]
ssl_conf = 76-curve-secp160k1-tls13-ssl

[76-curve-secp160k1-tls13-ssl]
server = 76-curve-secp160k1-tls13-server
client = 76-curve-secp160k1-tls13-client

[76-curve-secp160k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[76-curve-secp160k1-tls13-client]
CipherString = ECDHE
Curves = secp160k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-76]
ExpectedResult = ClientFail


# ===========================================================

[77-curve-secp160r1-tls13]
ssl_conf = 77-curve-secp160r1-tls13-ssl

[77-curve-secp160r1-tls13-ssl]
server = 77-curve-secp160r1-tls13-server
client = 77-curve-secp160r1-tls13-client

[77-curve-secp160r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[77-curve-secp160r1-tls13-client]
CipherString = ECDHE
Curves = secp160r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-77]
ExpectedResult = ClientFail


# ===========================================================

[78-curve-secp160r2-tls13]
ssl_conf = 78-curve-secp160r2-tls13-ssl

[78-curve-secp160r2-tls13-ssl]
server = 78-curve-secp160r2-tls13-server
client = 78-curve-secp160r2-tls13-client

[78-curve-secp160r2-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp160r2
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[78-curve-secp160r2-tls13-client]
CipherString = ECDHE
Curves = secp160r2
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-78]
ExpectedResult = ClientFail


# ===========================================================

[79-curve-secp192k1-tls13]
ssl_conf = 79-curve-secp192k1-tls13-ssl

[79-curve-secp192k1-tls13-ssl]
server = 79-curve-secp192k1-tls13-server
client = 79-curve-secp192k1-tls13-client

[79-curve-secp192k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp192k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[79-curve-secp192k1-tls13-client]
CipherString = ECDHE
Curves = secp192k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-79]
ExpectedResult = ClientFail


# ===========================================================

[80-curve-secp224k1-tls13]
ssl_conf = 80-curve-secp224k1-tls13-ssl

[80-curve-secp224k1-tls13-ssl]
server = 80-curve-secp224k1-tls13-server
client = 80-curve-secp224k1-tls13-client

[80-curve-secp224k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp224k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[80-curve-secp224k1-tls13-client]
CipherString = ECDHE
Curves = secp224k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-80]
ExpectedResult = ClientFail


# ===========================================================

[81-curve-secp256k1-tls13]
ssl_conf = 81-curve-secp256k1-tls13-ssl

[81-curve-secp256k1-tls13-ssl]
server = 81-curve-secp256k1-tls13-server
client = 81-curve-secp256k1-tls13-client

[81-curve-secp256k1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = secp256k1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[81-curve-secp256k1-tls13-client]
CipherString = ECDHE
Curves = secp256k1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-81]
ExpectedResult = ClientFail


# ===========================================================

[82-curve-brainpoolP256r1-tls13]
ssl_conf = 82-curve-brainpoolP256r1-tls13-ssl

[82-curve-brainpoolP256r1-tls13-ssl]
server = 82-curve-brainpoolP256r1-tls13-server
client = 82-curve-brainpoolP256r1-tls13-client

[82-curve-brainpoolP256r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP256r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[82-curve-brainpoolP256r1-tls13-client]
CipherString = ECDHE
Curves = brainpoolP256r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-82]
ExpectedResult = ClientFail


# ===========================================================

[83-curve-brainpoolP384r1-tls13]
ssl_conf = 83-curve-brainpoolP384r1-tls13-ssl

[83-curve-brainpoolP384r1-tls13-ssl]
server = 83-curve-brainpoolP384r1-tls13-server
client = 83-curve-brainpoolP384r1-tls13-client

[83-curve-brainpoolP384r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP384r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[83-curve-brainpoolP384r1-tls13-client]
CipherString = ECDHE
Curves = brainpoolP384r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-83]
ExpectedResult = ClientFail


# ===========================================================

[84-curve-brainpoolP512r1-tls13]
ssl_conf = 84-curve-brainpoolP512r1-tls13-ssl

[84-curve-brainpoolP512r1-tls13-ssl]
server = 84-curve-brainpoolP512r1-tls13-server
client = 84-curve-brainpoolP512r1-tls13-client

[84-curve-brainpoolP512r1-tls13-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT
Curves = brainpoolP512r1
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[84-curve-brainpoolP512r1-tls13-client]
CipherString = ECDHE
Curves = brainpoolP512r1
MinProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-84]
ExpectedResult = ClientFail


# ===========================================================

[85-curve-ffdhe2048-tls13-in-tls12]
ssl_conf = 85-curve-ffdhe2048-tls13-in-tls12-ssl

[85-curve-ffdhe2048-tls13-in-tls12-ssl]
server = 85-curve-ffdhe2048-tls13-in-tls12-server
client = 85-curve-ffdhe2048-tls13-in-tls12-client

[85-curve-ffdhe2048-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[85-curve-ffdhe2048-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-85]
ExpectedResult = ServerFail


# ===========================================================

[86-curve-ffdhe2048-tls13-in-tls12-2]
ssl_conf = 86-curve-ffdhe2048-tls13-in-tls12-2-ssl

[86-curve-ffdhe2048-tls13-in-tls12-2-ssl]
server = 86-curve-ffdhe2048-tls13-in-tls12-2-server
client = 86-curve-ffdhe2048-tls13-in-tls12-2-client

[86-curve-ffdhe2048-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[86-curve-ffdhe2048-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe2048
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-86]
ExpectedResult = Success


# ===========================================================

[87-curve-ffdhe3072-tls13-in-tls12]
ssl_conf = 87-curve-ffdhe3072-tls13-in-tls12-ssl

[87-curve-ffdhe3072-tls13-in-tls12-ssl]
server = 87-curve-ffdhe3072-tls13-in-tls12-server
client = 87-curve-ffdhe3072-tls13-in-tls12-client

[87-curve-ffdhe3072-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[87-curve-ffdhe3072-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-87]
ExpectedResult = ServerFail


# ===========================================================

[88-curve-ffdhe3072-tls13-in-tls12-2]
ssl_conf = 88-curve-ffdhe3072-tls13-in-tls12-2-ssl

[88-curve-ffdhe3072-tls13-in-tls12-2-ssl]
server = 88-curve-ffdhe3072-tls13-in-tls12-2-server
client = 88-curve-ffdhe3072-tls13-in-tls12-2-client

[88-curve-ffdhe3072-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[88-curve-ffdhe3072-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe3072
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-88]
ExpectedResult = Success


# ===========================================================

[89-curve-ffdhe4096-tls13-in-tls12]
ssl_conf = 89-curve-ffdhe4096-tls13-in-tls12-ssl

[89-curve-ffdhe4096-tls13-in-tls12-ssl]
server = 89-curve-ffdhe4096-tls13-in-tls12-server
client = 89-curve-ffdhe4096-tls13-in-tls12-client

[89-curve-ffdhe4096-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[89-curve-ffdhe4096-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-89]
ExpectedResult = ServerFail


# ===========================================================

[90-curve-ffdhe4096-tls13-in-tls12-2]
ssl_conf = 90-curve-ffdhe4096-tls13-in-tls12-2-ssl

[90-curve-ffdhe4096-tls13-in-tls12-2-ssl]
server = 90-curve-ffdhe4096-tls13-in-tls12-2-server
client = 90-curve-ffdhe4096-tls13-in-tls12-2-client

[90-curve-ffdhe4096-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[90-curve-ffdhe4096-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe4096
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-90]
ExpectedResult = Success


# ===========================================================

[91-curve-ffdhe6144-tls13-in-tls12]
ssl_conf = 91-curve-ffdhe6144-tls13-in-tls12-ssl

[91-curve-ffdhe6144-tls13-in-tls12-ssl]
server = 91-curve-ffdhe6144-tls13-in-tls12-server
client = 91-curve-ffdhe6144-tls13-in-tls12-client

[91-curve-ffdhe6144-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[91-curve-ffdhe6144-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-91]
ExpectedResult = ServerFail


# ===========================================================

[92-curve-ffdhe6144-tls13-in-tls12-2]
ssl_conf = 92-curve-ffdhe6144-tls13-in-tls12-2-ssl

[92-curve-ffdhe6144-tls13-in-tls12-2-ssl]
server = 92-curve-ffdhe6144-tls13-in-tls12-2-server
client = 92-curve-ffdhe6144-tls13-in-tls12-2-client

[92-curve-ffdhe6144-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[92-curve-ffdhe6144-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe6144
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-92]
ExpectedResult = Success


# ===========================================================

[93-curve-ffdhe8192-tls13-in-tls12]
ssl_conf = 93-curve-ffdhe8192-tls13-in-tls12-ssl

[93-curve-ffdhe8192-tls13-in-tls12-ssl]
server = 93-curve-ffdhe8192-tls13-in-tls12-server
client = 93-curve-ffdhe8192-tls13-in-tls12-client

[93-curve-ffdhe8192-tls13-in-tls12-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[93-curve-ffdhe8192-tls13-in-tls12-client]
CipherString = ECDHE@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.2
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-93]
ExpectedResult = ServerFail


# ===========================================================

[94-curve-ffdhe8192-tls13-in-tls12-2]
ssl_conf = 94-curve-ffdhe8192-tls13-in-tls12-2-ssl

[94-curve-ffdhe8192-tls13-in-tls12-2-ssl]
server = 94-curve-ffdhe8192-tls13-in-tls12-2-server
client = 94-curve-ffdhe8192-tls13-in-tls12-2-client

[94-curve-ffdhe8192-tls13-in-tls12-2-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.2
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem

[94-curve-ffdhe8192-tls13-in-tls12-2-client]
CipherString = DEFAULT@SECLEVEL=1
Curves = ffdhe8192
MaxProtocol = TLSv1.3
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer

[test-94]
ExpectedResult = Success


The diff you're trying to view is too large. Only the first 1000 changed files have been loaded.
Showing with 0 additions and 0 deletions (0 / 0 diffs computed)
swh spinner

Computing file changes ...

ENEA — Copyright (C), ENEA. License: GNU AGPLv3+.
Legal notes  ::  JavaScript license information ::  Web API

back to top