summaryrefslogtreecommitdiff
path: root/test/ssl-tests
diff options
context:
space:
mode:
authorBernd Edlinger <bernd.edlinger@hotmail.de>2022-06-01 16:37:05 +0200
committerBernd Edlinger <bernd.edlinger@hotmail.de>2022-06-03 17:17:08 +0200
commit479b9adb88b9050186c1e9fc94879906f378b14b (patch)
treebcd1bef2e1705708125cef57458c7dc30778f5e8 /test/ssl-tests
parent89dd85430770d39cbfb15eb586c921958ca7687f (diff)
downloadopenssl-new-479b9adb88b9050186c1e9fc94879906f378b14b.tar.gz
Change the SCT issuer key to RSA 2048
This avoids the need to use SECLEVEL=1 in 12-ct.cnf.in. Reviewed-by: Paul Dale <pauli@openssl.org> Reviewed-by: Todd Short <todd.short@me.com> (Merged from https://github.com/openssl/openssl/pull/18450)
Diffstat (limited to 'test/ssl-tests')
-rw-r--r--test/ssl-tests/12-ct.cnf24
-rw-r--r--test/ssl-tests/12-ct.cnf.in14
2 files changed, 13 insertions, 25 deletions
diff --git a/test/ssl-tests/12-ct.cnf b/test/ssl-tests/12-ct.cnf
index 369c5d4e8e..2e6e9dea67 100644
--- a/test/ssl-tests/12-ct.cnf
+++ b/test/ssl-tests/12-ct.cnf
@@ -19,11 +19,11 @@ client = 0-ct-permissive-without-scts-client
[0-ct-permissive-without-scts-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[0-ct-permissive-without-scts-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
@@ -46,11 +46,11 @@ client = 1-ct-permissive-with-scts-client
[1-ct-permissive-with-scts-server]
Certificate = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1-key.pem
[1-ct-permissive-with-scts-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1_issuer.pem
VerifyMode = Peer
@@ -73,11 +73,11 @@ client = 2-ct-strict-without-scts-client
[2-ct-strict-without-scts-server]
Certificate = ${ENV::TEST_CERTS_DIR}/servercert.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/serverkey.pem
[2-ct-strict-without-scts-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/rootcert.pem
VerifyMode = Peer
@@ -101,11 +101,11 @@ client = 3-ct-strict-with-scts-client
[3-ct-strict-with-scts-server]
Certificate = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1-key.pem
[3-ct-strict-with-scts-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1_issuer.pem
VerifyMode = Peer
@@ -130,11 +130,11 @@ resume-client = 4-ct-permissive-resumption-client
[4-ct-permissive-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1-key.pem
[4-ct-permissive-resumption-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1_issuer.pem
VerifyMode = Peer
@@ -162,11 +162,11 @@ resume-client = 5-ct-strict-resumption-resume-client
[5-ct-strict-resumption-server]
Certificate = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1.pem
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
PrivateKey = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1-key.pem
[5-ct-strict-resumption-client]
-CipherString = DEFAULT@SECLEVEL=1
+CipherString = DEFAULT
VerifyCAFile = ${ENV::TEST_CERTS_DIR}/embeddedSCTs1_issuer.pem
VerifyMode = Peer
diff --git a/test/ssl-tests/12-ct.cnf.in b/test/ssl-tests/12-ct.cnf.in
index 93890b9fce..ddafd3fc4c 100644
--- a/test/ssl-tests/12-ct.cnf.in
+++ b/test/ssl-tests/12-ct.cnf.in
@@ -1,5 +1,5 @@
# -*- mode: perl; -*-
-# Copyright 2016-2020 The OpenSSL Project Authors. All Rights Reserved.
+# Copyright 2016-2022 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
@@ -19,10 +19,8 @@ our @tests = (
{
name => "ct-permissive-without-scts",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
extra => {
"CTValidation" => "Permissive",
},
@@ -34,12 +32,10 @@ our @tests = (
{
name => "ct-permissive-with-scts",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"Certificate" => test_pem("embeddedSCTs1.pem"),
"PrivateKey" => test_pem("embeddedSCTs1-key.pem"),
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
extra => {
"CTValidation" => "Permissive",
@@ -52,10 +48,8 @@ our @tests = (
{
name => "ct-strict-without-scts",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
extra => {
"CTValidation" => "Strict",
},
@@ -68,12 +62,10 @@ our @tests = (
{
name => "ct-strict-with-scts",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"Certificate" => test_pem("embeddedSCTs1.pem"),
"PrivateKey" => test_pem("embeddedSCTs1-key.pem"),
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
extra => {
"CTValidation" => "Strict",
@@ -86,12 +78,10 @@ our @tests = (
{
name => "ct-permissive-resumption",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"Certificate" => test_pem("embeddedSCTs1.pem"),
"PrivateKey" => test_pem("embeddedSCTs1-key.pem"),
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
extra => {
"CTValidation" => "Permissive",
@@ -106,12 +96,10 @@ our @tests = (
{
name => "ct-strict-resumption",
server => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"Certificate" => test_pem("embeddedSCTs1.pem"),
"PrivateKey" => test_pem("embeddedSCTs1-key.pem"),
},
client => {
- "CipherString" => 'DEFAULT@SECLEVEL=1',
"VerifyCAFile" => test_pem("embeddedSCTs1_issuer.pem"),
extra => {
"CTValidation" => "Strict",