openssl/test/ssl-tests/01-simple.cnf.in
openssl-machine 0c679f5566 Copyright year updates
Reviewed-by: Neil Horman <nhorman@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Release: yes
2025-03-12 13:35:59 +00:00

66 lines
1.8 KiB
Perl

# -*- mode: perl; -*-
# Copyright 2016-2025 The OpenSSL Project Authors. All Rights Reserved.
#
# Licensed under the Apache License 2.0 (the "License"). You may not use
# this file except in compliance with the License. You can obtain a copy
# in the file LICENSE in the source distribution or at
# https://www.openssl.org/source/license.html
## SSL test configurations
package ssltests;
srand(1);
sub randcase {
my ($names) = @_;
my @ret;
foreach my $name (split(/:/, $names)) {
my ($alg, $rest) = split(/(?=[+])/, $name, 2);
$alg =~ s{([a-zA-Z])}{chr(ord($1)^(int(rand(2.0)) * 32))}eg;
push @ret, $alg . ($rest // "");
}
return join(":", @ret);
}
our @tests = (
{
name => "default",
server => { },
client => { },
test => { "ExpectedResult" => "Success" },
},
{
name => "Server signature algorithms bug",
# Should have no effect as we aren't doing client auth
server => { "ClientSignatureAlgorithms" => randcase("PSS+SHA512:RSA+SHA512") },
client => { "SignatureAlgorithms" => randcase("PSS+SHA256:RSA+SHA256") },
test => { "ExpectedResult" => "Success" },
},
{
name => "verify-cert",
server => { },
client => {
# Don't set up the client root file.
"VerifyCAFile" => undef,
},
test => {
"ExpectedResult" => "ClientFail",
"ExpectedClientAlert" => "UnknownCA",
},
},
{
name => "name-constraints-no-san-in-ee",
server => {
"Certificate" => test_pem("goodcn2-chain.pem"),
"PrivateKey" => test_pem("goodcn2-key.pem"),
},
client => {
"VerifyCAFile" => test_pem("root-cert.pem"),
},
test => { "ExpectedResult" => "Success" },
},
);