summaryrefslogtreecommitdiff
path: root/mozilla/security/nss/tests/ssl/sslauth.txt
blob: 75d0316ffdfeadd66c970623f699b5edc0442480 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
# ***** BEGIN LICENSE BLOCK *****
# Version: MPL 1.1/GPL 2.0/LGPL 2.1
#
# The contents of this file are subject to the Mozilla Public License Version
# 1.1 (the "License"); you may not use this file except in compliance with
# the License. You may obtain a copy of the License at
# http://www.mozilla.org/MPL/
#
# Software distributed under the License is distributed on an "AS IS" basis,
# WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
# for the specific language governing rights and limitations under the
# License.
#
# The Original Code is the Netscape security libraries.
#
# The Initial Developer of the Original Code is
# Netscape Communications Corporation.
# Portions created by the Initial Developer are Copyright (C) 1994-2009
# the Initial Developer. All Rights Reserved.
#
# Contributor(s):
#
# Alternatively, the contents of this file may be used under the terms of
# either the GNU General Public License Version 2 or later (the "GPL"), or
# the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
# in which case the provisions of the GPL or the LGPL are applicable instead
# of those above. If you wish to allow use of your version of this file only
# under the terms of either the GPL or the LGPL, and not to allow others to
# use your version of this file under the terms of the MPL, indicate your
# decision by deleting the provisions above and replace them with the notice
# and other provisions required by the GPL or the LGPL. If you do not delete
# the provisions above, a recipient may use your version of this file under
# the terms of any one of the MPL, the GPL or the LGPL.
#
# ***** END LICENSE BLOCK *****
#
# This file defines the tests for client auth.
#
#        expected
# Enable  return  server     client                         Test Case name
#  ECC     value  params     params
# ------- ------  ------     ------                         ---------------
  noECC     0       -r           -w_nss_-n_none           TLS Request don't require client auth (client does not provide auth)
  noECC     0       -r           -w_bogus_-n_TestUser     TLS Request don't require client auth (bad password)
  noECC     0       -r           -w_nss_-n_TestUser       TLS Request don't require client auth (client auth)
  noECC    254      -r_-r        -w_nss_-n_none           TLS Require client auth (client does not provide auth)
  noECC    254      -r_-r        -w_bogus_-n_TestUser     TLS Require client auth (bad password)
  noECC     0       -r_-r        -w_nss_-n_TestUser_      TLS Require client auth (client auth)
  noECC     0       -r           -T_-w_nss_-n_none        SSL3 Request don't require client auth (client does not provide auth)
  noECC     0       -r           -T_-n_TestUser_-w_bogus  SSL3 Request don't require client auth (bad password)
  noECC     0       -r           -T_-n_TestUser_-w_nss    SSL3 Request don't require client auth (client auth)
  noECC    254      -r_-r        -T_-w_nss_-n_none        SSL3 Require client auth (client does not provide auth)
  noECC    254      -r_-r        -T_-n_TestUser_-w_bogus  SSL3 Require client auth (bad password)
  noECC     0       -r_-r        -T_-n_TestUser_-w_nss    SSL3 Require client auth (client auth)
  noECC     0       -r_-r_-r     -2_-w_nss_-n_none        TLS Request don't require client auth on 2nd hs (client does not provide auth)
  noECC     0       -r_-r_-r     -2_-w_bogus_-n_TestUser  TLS Request don't require client auth on 2nd hs (bad password)
  noECC     0       -r_-r_-r     -2_-w_nss_-n_TestUser    TLS Request don't require client auth on 2nd hs (client auth)
  noECC     1       -r_-r_-r_-r  -2_-w_nss_-n_none        TLS Require client auth on 2nd hs (client does not provide auth)
  noECC     1       -r_-r_-r_-r  -2_-w_bogus_-n_TestUser  TLS Require client auth on 2nd hs (bad password)
  noECC     0       -r_-r_-r_-r  -2_-w_nss_-n_TestUser    TLS Require client auth on 2nd hs (client auth)
  noECC     0       -r_-r_-r     -2_-T_-w_nss_-n_none     SSL3 Request don't require client auth on 2nd hs (client does not provide auth)
  noECC     0       -r_-r_-r     -2_-T_-n_TestUser_-w_bogus SSL3 Request don't require client auth on 2nd hs (bad password)
  noECC     0       -r_-r_-r     -2_-T_-n_TestUser_-w_nss SSL3 Request don't require client auth on 2nd hs (client auth)
  noECC     1       -r_-r_-r_-r  -2_-T_-w_nss_-n_none     SSL3 Require client auth on 2nd hs (client does not provide auth)
  noECC     1       -r_-r_-r_-r  -2_-T_-n_TestUser_-w_bogus SSL3 Require client auth on 2nd hs (bad password)
  noECC     0       -r_-r_-r_-r  -2_-T_-n_TestUser_-w_nss SSL3 Require client auth on 2nd hs (client auth)
#
# Use EC cert for client authentication
#
   ECC      0       -r           -w_bogus_-n_TestUser-ec     TLS Request don't require client auth (EC) (bad password)
   ECC      0       -r           -w_nss_-n_TestUser-ec       TLS Request don't require client auth (EC) (client auth)
   ECC     254      -r_-r        -w_bogus_-n_TestUser-ec     TLS Require client auth (EC) (bad password)
   ECC      0       -r_-r        -w_nss_-n_TestUser-ec_      TLS Require client auth (EC) (client auth)
   ECC      0       -r           -T_-n_TestUser-ec_-w_bogus  SSL3 Request don't require client auth (EC) (bad password)
   ECC      0       -r           -T_-n_TestUser-ec_-w_nss    SSL3 Request don't require client auth (EC) (client auth)
   ECC     254      -r_-r        -T_-n_TestUser-ec_-w_bogus  SSL3 Require client auth (EC) (bad password)
   ECC      0       -r_-r        -T_-n_TestUser-ec_-w_nss    SSL3 Require client auth (EC) (client auth)
   ECC      0       -r_-r_-r     -2_-w_bogus_-n_TestUser-ec  TLS Request don't require client auth on 2nd hs (EC) (bad password)
   ECC      0       -r_-r_-r     -2_-w_nss_-n_TestUser-ec    TLS Request don't require client auth on 2nd hs (EC) (client auth)
   ECC      1       -r_-r_-r_-r  -2_-w_bogus_-n_TestUser-ec  TLS Require client auth on 2nd hs (EC) (bad password)
   ECC      0       -r_-r_-r_-r  -2_-w_nss_-n_TestUser-ec_   TLS Require client auth on 2nd hs (EC) (client auth)
   ECC      0       -r_-r_-r     -2_-T_-n_TestUser-ec_-w_bogus SSL3 Request don't require client auth on 2nd hs (EC) (bad password)
   ECC      0       -r_-r_-r     -2_-T_-n_TestUser-ec_-w_nss SSL3 Request don't require client auth on 2nd hs (EC) (client auth)
   ECC      1       -r_-r_-r_-r  -2_-T_-n_TestUser-ec_-w_bogus SSL3 Require client auth on 2nd hs (EC) (bad password)
   ECC      0       -r_-r_-r_-r  -2_-T_-n_TestUser-ec_-w_nss SSL3 Require client auth on 2nd hs (EC) (client auth)
#
# SNI Tests
#
  SNI     0       -r_-a_Host-sni.Dom       -2_-w_nss_-n_TestUser                     TLS Server hello response without SNI 
  SNI     0       -r_-a_Host-sni.Dom       -2_-w_nss_-n_TestUser_-a_Host-sni.Dom     TLS Server hello response with SNI 
  SNI     1       -r_-a_Host-sni.Dom       -2_-w_nss_-n_TestUser_-a_Host-sni1.Dom    TLS Server response with alert
  SNI     0       -r_-a_Host-sni.Dom       -2_-T_-w_nss_-n_TestUser                  SSL3 Server hello response without SNI 
  SNI     1       -r_-a_Host-sni.Dom       -2_-T_-w_nss_-n_TestUser_-a_Host-sni.Dom  SSL3 Server hello response with SNI: SSL don't have SH extensions
  SNI     0       -r_-r_-r_-a_Host-sni.Dom -2_-w_nss_-n_TestUser                     TLS Server hello response without SNI 
  SNI     0       -r_-r_-r_-a_Host-sni.Dom -2_-w_nss_-n_TestUser_-a_Host-sni.Dom     TLS Server hello response with SNI 
  SNI     1       -r_-r_-r_-a_Host-sni.Dom -2_-w_nss_-n_TestUser_-a_Host-sni.Dom_-a_Host.Dom TLS Server hello response with SNI: Change name on 2d HS 
  SNI     1       -r_-r_-r_-a_Host-sni.Dom -2_-w_nss_-n_TestUser_-a_Host-sni.Dom_-a_Host-sni1.Dom TLS Server hello response with SNI: Change name to invalid 2d HS 
  SNI     1       -r_-r_-r_-a_Host-sni.Dom -2_-w_nss_-n_TestUser_-a_Host-sni1.Dom    TLS Server response with alert