mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-23 14:15:37 +00:00
Improve style in tests/ssl-opt.sh
Try to avoid line breaks in server and client command line arguments to ease reading of test cases.
This commit is contained in:
parent
45ee7877d0
commit
909f9a389a
232
tests/ssl-opt.sh
232
tests/ssl-opt.sh
|
@ -835,8 +835,7 @@ run_test "Truncated HMAC: client default, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client disabled, server default" \
|
run_test "Truncated HMAC: client disabled, server default" \
|
||||||
"$P_SRV debug_level=4" \
|
"$P_SRV debug_level=4" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=0" \
|
||||||
trunc_hmac=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -844,8 +843,7 @@ run_test "Truncated HMAC: client disabled, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server default" \
|
run_test "Truncated HMAC: client enabled, server default" \
|
||||||
"$P_SRV debug_level=4" \
|
"$P_SRV debug_level=4" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -853,8 +851,7 @@ run_test "Truncated HMAC: client enabled, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server disabled" \
|
run_test "Truncated HMAC: client enabled, server disabled" \
|
||||||
"$P_SRV debug_level=4 trunc_hmac=0" \
|
"$P_SRV debug_level=4 trunc_hmac=0" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -862,8 +859,7 @@ run_test "Truncated HMAC: client enabled, server disabled" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client disabled, server enabled" \
|
run_test "Truncated HMAC: client disabled, server enabled" \
|
||||||
"$P_SRV debug_level=4 trunc_hmac=1" \
|
"$P_SRV debug_level=4 trunc_hmac=1" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=0" \
|
||||||
trunc_hmac=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -871,8 +867,7 @@ run_test "Truncated HMAC: client disabled, server enabled" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server enabled" \
|
run_test "Truncated HMAC: client enabled, server enabled" \
|
||||||
"$P_SRV debug_level=4 trunc_hmac=1" \
|
"$P_SRV debug_level=4 trunc_hmac=1" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-S "dumping 'expected mac' (20 bytes)" \
|
-S "dumping 'expected mac' (20 bytes)" \
|
||||||
-s "dumping 'expected mac' (10 bytes)"
|
-s "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -887,8 +882,7 @@ run_test "Truncated HMAC, DTLS: client default, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC, DTLS: client disabled, server default" \
|
run_test "Truncated HMAC, DTLS: client disabled, server default" \
|
||||||
"$P_SRV dtls=1 debug_level=4" \
|
"$P_SRV dtls=1 debug_level=4" \
|
||||||
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=0" \
|
||||||
trunc_hmac=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -896,8 +890,7 @@ run_test "Truncated HMAC, DTLS: client disabled, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC, DTLS: client enabled, server default" \
|
run_test "Truncated HMAC, DTLS: client enabled, server default" \
|
||||||
"$P_SRV dtls=1 debug_level=4" \
|
"$P_SRV dtls=1 debug_level=4" \
|
||||||
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -905,8 +898,7 @@ run_test "Truncated HMAC, DTLS: client enabled, server default" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC, DTLS: client enabled, server disabled" \
|
run_test "Truncated HMAC, DTLS: client enabled, server disabled" \
|
||||||
"$P_SRV dtls=1 debug_level=4 trunc_hmac=0" \
|
"$P_SRV dtls=1 debug_level=4 trunc_hmac=0" \
|
||||||
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -914,8 +906,7 @@ run_test "Truncated HMAC, DTLS: client enabled, server disabled" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC, DTLS: client disabled, server enabled" \
|
run_test "Truncated HMAC, DTLS: client disabled, server enabled" \
|
||||||
"$P_SRV dtls=1 debug_level=4 trunc_hmac=1" \
|
"$P_SRV dtls=1 debug_level=4 trunc_hmac=1" \
|
||||||
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=0" \
|
||||||
trunc_hmac=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -923,8 +914,7 @@ run_test "Truncated HMAC, DTLS: client disabled, server enabled" \
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC, DTLS: client enabled, server enabled" \
|
run_test "Truncated HMAC, DTLS: client enabled, server enabled" \
|
||||||
"$P_SRV dtls=1 debug_level=4 trunc_hmac=1" \
|
"$P_SRV dtls=1 debug_level=4 trunc_hmac=1" \
|
||||||
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI dtls=1 force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-S "dumping 'expected mac' (20 bytes)" \
|
-S "dumping 'expected mac' (20 bytes)" \
|
||||||
-s "dumping 'expected mac' (10 bytes)"
|
-s "dumping 'expected mac' (10 bytes)"
|
||||||
|
@ -3355,22 +3345,17 @@ run_test "Small packet TLS 1.0 BlockCipher, without EtM" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 BlockCipher, truncated MAC" \
|
run_test "Small packet TLS 1.0 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 BlockCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.0 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3384,29 +3369,23 @@ run_test "Small packet TLS 1.0 StreamCipher" \
|
||||||
run_test "Small packet TLS 1.0 StreamCipher, without EtM" \
|
run_test "Small packet TLS 1.0 StreamCipher, without EtM" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 StreamCipher, truncated MAC" \
|
run_test "Small packet TLS 1.0 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 StreamCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.0 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
"$P_CLI request_size=1 force_version=tls1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
trunc_hmac=1 etm=0" \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3420,29 +3399,23 @@ run_test "Small packet TLS 1.1 BlockCipher" \
|
||||||
run_test "Small packet TLS 1.1 BlockCipher, without EtM" \
|
run_test "Small packet TLS 1.1 BlockCipher, without EtM" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 BlockCipher, truncated MAC" \
|
run_test "Small packet TLS 1.1 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 BlockCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.1 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3456,29 +3429,23 @@ run_test "Small packet TLS 1.1 StreamCipher" \
|
||||||
run_test "Small packet TLS 1.1 StreamCipher, without EtM" \
|
run_test "Small packet TLS 1.1 StreamCipher, without EtM" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 StreamCipher, truncated MAC" \
|
run_test "Small packet TLS 1.1 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 StreamCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.1 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3492,8 +3459,7 @@ run_test "Small packet TLS 1.2 BlockCipher" \
|
||||||
run_test "Small packet TLS 1.2 BlockCipher, without EtM" \
|
run_test "Small packet TLS 1.2 BlockCipher, without EtM" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3506,22 +3472,17 @@ run_test "Small packet TLS 1.2 BlockCipher larger MAC" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 BlockCipher, truncated MAC" \
|
run_test "Small packet TLS 1.2 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3535,29 +3496,23 @@ run_test "Small packet TLS 1.2 StreamCipher" \
|
||||||
run_test "Small packet TLS 1.2 StreamCipher, without EtM" \
|
run_test "Small packet TLS 1.2 StreamCipher, without EtM" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 StreamCipher, truncated MAC" \
|
run_test "Small packet TLS 1.2 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
run_test "Small packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3596,10 +3551,8 @@ run_test "Small packet DTLS 1.0, without EtM" \
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet DTLS 1.0, truncated hmac" \
|
run_test "Small packet DTLS 1.0, truncated hmac" \
|
||||||
"$P_SRV dtls=1 force_version=dtls1 \
|
"$P_SRV dtls=1 force_version=dtls1 trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
"$P_CLI dtls=1 request_size=1 trunc_hmac=1 \
|
||||||
"$P_CLI dtls=1 request_size=1 \
|
|
||||||
trunc_hmac=1 \
|
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
@ -3607,12 +3560,9 @@ run_test "Small packet DTLS 1.0, truncated hmac" \
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet DTLS 1.0, without EtM, truncated MAC" \
|
run_test "Small packet DTLS 1.0, without EtM, truncated MAC" \
|
||||||
"$P_SRV dtls=1 force_version=dtls1 \
|
"$P_SRV dtls=1 force_version=dtls1 trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
"$P_CLI dtls=1 request_size=1 \
|
"$P_CLI dtls=1 request_size=1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
||||||
trunc_hmac=1"\
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3626,8 +3576,7 @@ run_test "Small packet DTLS 1.2" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
run_test "Small packet DTLS 1.2, without EtM" \
|
run_test "Small packet DTLS 1.2, without EtM" \
|
||||||
"$P_SRV dtls=1 force_version=dtls1_2 \
|
"$P_SRV dtls=1 force_version=dtls1_2 etm=0" \
|
||||||
etm=0" \
|
|
||||||
"$P_CLI dtls=1 request_size=1 \
|
"$P_CLI dtls=1 request_size=1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA" \
|
||||||
0 \
|
0 \
|
||||||
|
@ -3636,23 +3585,18 @@ run_test "Small packet DTLS 1.2, without EtM" \
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet DTLS 1.2, truncated hmac" \
|
run_test "Small packet DTLS 1.2, truncated hmac" \
|
||||||
"$P_SRV dtls=1 force_version=dtls1_2 \
|
"$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI dtls=1 request_size=1 \
|
"$P_CLI dtls=1 request_size=1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
requires_config_enabled MBEDTLS_SSL_PROTO_DTLS
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet DTLS 1.2, without EtM, truncated MAC" \
|
run_test "Small packet DTLS 1.2, without EtM, truncated MAC" \
|
||||||
"$P_SRV dtls=1 force_version=dtls1_2 \
|
"$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 \
|
|
||||||
etm=0" \
|
|
||||||
"$P_CLI dtls=1 request_size=1 \
|
"$P_CLI dtls=1 request_size=1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1"\
|
||||||
trunc_hmac=1"\
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
@ -3700,21 +3644,17 @@ run_test "Large packet TLS 1.0 BlockCipher, without EtM" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 BlockCipher, truncated MAC" \
|
run_test "Large packet TLS 1.0 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1 recsplit=0 \
|
"$P_CLI request_size=16384 force_version=tls1 recsplit=0 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 BlockCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.0 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1 etm=0 recsplit=0 \
|
"$P_CLI request_size=16384 force_version=tls1 etm=0 recsplit=0 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
@ -3728,28 +3668,23 @@ run_test "Large packet TLS 1.0 StreamCipher" \
|
||||||
run_test "Large packet TLS 1.0 StreamCipher, without EtM" \
|
run_test "Large packet TLS 1.0 StreamCipher, without EtM" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1 \
|
"$P_CLI request_size=16384 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 StreamCipher, truncated MAC" \
|
run_test "Large packet TLS 1.0 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1 \
|
"$P_CLI request_size=16384 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 StreamCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.0 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1 \
|
"$P_CLI request_size=16384 force_version=tls1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
@ -3769,21 +3704,17 @@ run_test "Large packet TLS 1.1 BlockCipher, without EtM" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 BlockCipher, truncated MAC" \
|
run_test "Large packet TLS 1.1 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 BlockCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.1 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
@ -3797,28 +3728,23 @@ run_test "Large packet TLS 1.1 StreamCipher" \
|
||||||
run_test "Large packet TLS 1.1 StreamCipher, without EtM" \
|
run_test "Large packet TLS 1.1 StreamCipher, without EtM" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA etm=0" \
|
||||||
etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 StreamCipher, truncated MAC" \
|
run_test "Large packet TLS 1.1 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 StreamCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.1 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
@ -3845,21 +3771,17 @@ run_test "Large packet TLS 1.2 BlockCipher larger MAC" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 BlockCipher, truncated MAC" \
|
run_test "Large packet TLS 1.2 BlockCipher, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.2 BlockCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV \
|
"$P_SRV trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA \
|
force_ciphersuite=TLS-RSA-WITH-AES-256-CBC-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
@ -3879,21 +3801,17 @@ run_test "Large packet TLS 1.2 StreamCipher, without EtM" \
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 StreamCipher, truncated MAC" \
|
run_test "Large packet TLS 1.2 StreamCipher, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
run_test "Large packet TLS 1.2 StreamCipher, without EtM, truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1" \
|
||||||
trunc_hmac=1" \
|
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA \
|
force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA trunc_hmac=1 etm=0" \
|
||||||
trunc_hmac=1 etm=0" \
|
|
||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue