summaryrefslogtreecommitdiff
path: root/test/ssl_test_ctx_test.cnf
blob: 91e1465ffe450df9da793a627279592c8dfe1513 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
[ssltest_default]

[ssltest_good]
client = ssltest_good_client_extra
server = ssltest_good_server_extra
resume-server2 = ssltest_good_resume_server2_extra
resume-client = ssltest_good_resume_client_extra

Method = DTLS
HandshakeMode = Resume
ApplicationData = 1024
MaxFragmentSize = 2048

ExpectedResult = ServerFail
ExpectedClientAlert = UnknownCA
ExpectedProtocol = TLSv1.1
ExpectedServerName = server2
SessionTicketExpected = Yes
ResumptionExpected = Yes

[ssltest_good_client_extra]
VerifyCallback = RejectAll
ServerName = server2
NPNProtocols = foo,bar

[ssltest_good_resume_client_extra]
CTValidation = Strict

[ssltest_good_server_extra]
ServerNameCallback = IgnoreMismatch
BrokenSessionTicket = Yes

[ssltest_good_resume_server2_extra]
ALPNProtocols = baz

[ssltest_unknown_option]
UnknownOption = Foo

[ssltest_wrong_section]
server = ssltest_wrong_section_server

[ssltest_wrong_section_server]
VerifyCallback = RejectAll

[ssltest_unknown_expected_result]
ExpectedResult = Foo

[ssltest_unknown_alert]
ExpectedServerAlert = Foo

[ssltest_unknown_protocol]
Protocol = Foo

[ssltest_unknown_verify_callback]
client = ssltest_unknown_verify_callback_client

[ssltest_unknown_verify_callback_client]
VerifyCallback = Foo

[ssltest_unknown_servername]
client = ssltest_unknown_servername_client

[ssltest_unknown_servername_client]
ServerName = Foo

[ssltest_unknown_servername_callback]
server = ssltest_unknown_servername_server

[ssltest_unknown_servername_server]
ServerNameCallback = Foo

[ssltest_unknown_session_ticket_expected]
SessionTicketExpected = Foo

[ssltest_unknown_compression_expected]
CompressionExpected = Foo

[ssltest_unknown_session_id_expected]
SessionIdExpected = Foo

[ssltest_unknown_method]
Method = TLS2

[ssltest_unknown_handshake_mode]
HandshakeMode = Foo

[ssltest_unknown_resumption_expected]
ResumptionExpected = Foo

[ssltest_unknown_ct_validation]
client = ssltest_unknown_ct_validation_client

[ssltest_unknown_ct_validation_client]
CTCallback = Foo

[ssltest_invalid_max_fragment_len]
MaxFragmentLenExt = 421