mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-11 16:15:56 -04:00
Add negative test for Opaque key & static ECDH
That's actually the only non-PSK key exchange that needs to be negative-tested: all the other key exchanges are either positive-tested or use RSA, for which we can't even create opaque keys in this branch. Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
This commit is contained in:
parent
b3de3fd68c
commit
938be422c6
@ -1673,6 +1673,32 @@ run_test "Opaque key for client/server authentication" \
|
||||
-S "error" \
|
||||
-C "error"
|
||||
|
||||
# Opaque keys not supported for static ECDH
|
||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||
run_test "Opaque key: server: ECDH-ECDSA not supported" \
|
||||
"$P_SRV debug_level=1 key_opaque=1
|
||||
crt_file=data_files/server5.crt key_file=data_files/server5.key" \
|
||||
"$P_CLI force_ciphersuite=TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256" \
|
||||
1 \
|
||||
-s "server key not ECDH capable" \
|
||||
-s "ssl_get_ecdh_params_from_cert() returned" \
|
||||
-s "error" \
|
||||
-c "error"
|
||||
|
||||
# Opaque keys not supported for static ECDH
|
||||
requires_config_enabled MBEDTLS_USE_PSA_CRYPTO
|
||||
requires_config_enabled MBEDTLS_X509_CRT_PARSE_C
|
||||
run_test "Opaque key: server: ECDH-RSA not supported" \
|
||||
"$P_SRV debug_level=1 key_opaque=1
|
||||
crt_file=data_files/server5.crt key_file=data_files/server5.key" \
|
||||
"$P_CLI force_ciphersuite=TLS-ECDH-RSA-WITH-AES-128-GCM-SHA256" \
|
||||
1 \
|
||||
-s "server key not ECDH capable" \
|
||||
-s "ssl_get_ecdh_params_from_cert() returned" \
|
||||
-s "error" \
|
||||
-c "error"
|
||||
|
||||
# Test ciphersuites which we expect to be fully supported by PSA Crypto
|
||||
# and check that we don't fall back to Mbed TLS' internal crypto primitives.
|
||||
run_test_psa TLS-ECDHE-ECDSA-WITH-AES-128-CCM
|
||||
|
Loading…
x
Reference in New Issue
Block a user