Lines Matching refs:run_test

340 run_test() {  function
647 run_test "Default" \
658 run_test "Default, DTLS" \
666 run_test "Unique IV in GCM" \
676 run_test "RC4: server disabled, client enabled" \
683 run_test "RC4: server half, client enabled" \
689 run_test "RC4: server enabled, client disabled" \
695 run_test "RC4: both enabled" \
704 run_test "Truncated HMAC: client default, server default" \
711 run_test "Truncated HMAC: client disabled, server default" \
719 run_test "Truncated HMAC: client enabled, server default" \
727 run_test "Truncated HMAC: client enabled, server disabled" \
735 run_test "Truncated HMAC: client enabled, server enabled" \
745 run_test "Encrypt then MAC: default" \
757 run_test "Encrypt then MAC: client enabled, server disabled" \
769 run_test "Encrypt then MAC: client enabled, aead cipher" \
781 run_test "Encrypt then MAC: client enabled, stream cipher" \
793 run_test "Encrypt then MAC: client disabled, server enabled" \
806 run_test "Encrypt then MAC: client SSLv3, server enabled" \
819 run_test "Encrypt then MAC: client enabled, server SSLv3" \
833 run_test "Extended Master Secret: default" \
844 run_test "Extended Master Secret: client enabled, server disabled" \
855 run_test "Extended Master Secret: client disabled, server enabled" \
867 run_test "Extended Master Secret: client SSLv3, server enabled" \
879 run_test "Extended Master Secret: client enabled, server SSLv3" \
892 run_test "Fallback SCSV: default" \
901 run_test "Fallback SCSV: explicitly disabled" \
910 run_test "Fallback SCSV: enabled" \
919 run_test "Fallback SCSV: enabled, max version" \
929 run_test "Fallback SCSV: default, openssl server" \
937 run_test "Fallback SCSV: enabled, openssl server" \
945 run_test "Fallback SCSV: disabled, openssl client" \
953 run_test "Fallback SCSV: enabled, openssl client" \
961 run_test "Fallback SCSV: enabled, max version, openssl client" \
970 run_test "CBC Record splitting: TLS 1.2, no splitting" \
979 run_test "CBC Record splitting: TLS 1.1, no splitting" \
988 run_test "CBC Record splitting: TLS 1.0, splitting" \
998 run_test "CBC Record splitting: SSLv3, splitting" \
1007 run_test "CBC Record splitting: TLS 1.0 RC4, no splitting" \
1016 run_test "CBC Record splitting: TLS 1.0, splitting disabled" \
1025 run_test "CBC Record splitting: TLS 1.0, splitting, nbio" \
1036 run_test "Session resume using tickets: basic" \
1050 run_test "Session resume using tickets: cache disabled" \
1064 run_test "Session resume using tickets: timeout" \
1078 run_test "Session resume using tickets: openssl server" \
1087 run_test "Session resume using tickets: openssl client" \
1101 run_test "Session resume using cache: tickets enabled on client" \
1115 run_test "Session resume using cache: tickets enabled on server" \
1129 run_test "Session resume using cache: cache_max=0" \
1138 run_test "Session resume using cache: cache_max=1" \
1147 run_test "Session resume using cache: timeout > delay" \
1156 run_test "Session resume using cache: timeout < delay" \
1165 run_test "Session resume using cache: no timeout" \
1174 run_test "Session resume using cache: openssl client" \
1186 run_test "Session resume using cache: openssl server" \
1196 run_test "Max fragment length: not used, reference" \
1207 run_test "Max fragment length: used by client" \
1218 run_test "Max fragment length: used by server" \
1230 run_test "Max fragment length: gnutls server" \
1238 run_test "Max fragment length: client, message just fits" \
1251 run_test "Max fragment length: client, larger message" \
1265 run_test "Max fragment length: DTLS client, larger message" \
1279 run_test "Renegotiation: none, for reference" \
1292 run_test "Renegotiation: client-initiated" \
1305 run_test "Renegotiation: server-initiated" \
1318 run_test "Renegotiation: double" \
1331 run_test "Renegotiation: client-initiated, server-rejected" \
1346 run_test "Renegotiation: server-initiated, client-rejected, default" \
1361 run_test "Renegotiation: server-initiated, client-rejected, not enforced" \
1378 run_test "Renegotiation: server-initiated, client-rejected, delay 2" \
1394 run_test "Renegotiation: server-initiated, client-rejected, delay 0" \
1409 run_test "Renegotiation: server-initiated, client-accepted, delay 0" \
1425 run_test "Renegotiation: periodic, just below period" \
1442 run_test "Renegotiation: periodic, just above period" \
1458 run_test "Renegotiation: periodic, two times period" \
1474 run_test "Renegotiation: periodic, above period, disabled" \
1490 run_test "Renegotiation: nbio, client-initiated" \
1503 run_test "Renegotiation: nbio, server-initiated" \
1516 run_test "Renegotiation: openssl server, client-initiated" \
1528 run_test "Renegotiation: gnutls server strict, client-initiated" \
1540 run_test "Renegotiation: gnutls server unsafe, client-initiated default" \
1552 run_test "Renegotiation: gnutls server unsafe, client-inititated no legacy" \
1565 run_test "Renegotiation: gnutls server unsafe, client-inititated legacy" \
1577 run_test "Renegotiation: DTLS, client-initiated" \
1590 run_test "Renegotiation: DTLS, server-initiated" \
1605 run_test "Renegotiation: DTLS, gnutls server, client-initiated" \
1619 run_test "Renego ext: gnutls server strict, client default" \
1628 run_test "Renego ext: gnutls server unsafe, client default" \
1637 run_test "Renego ext: gnutls server unsafe, client break legacy" \
1646 run_test "Renego ext: gnutls client strict, server default" \
1654 run_test "Renego ext: gnutls client unsafe, server default" \
1662 run_test "Renego ext: gnutls client unsafe, server break legacy" \
1672 run_test "DER format: no trailing bytes" \
1680 run_test "DER format: with a trailing zero byte" \
1688 run_test "DER format: with a trailing random byte" \
1696 run_test "DER format: with 2 trailing random bytes" \
1704 run_test "DER format: with 4 trailing random bytes" \
1712 run_test "DER format: with 8 trailing random bytes" \
1720 run_test "DER format: with 9 trailing random bytes" \
1729 run_test "Authentication: server badcert, client required" \
1739 run_test "Authentication: server badcert, client optional" \
1749 run_test "Authentication: server badcert, client none" \
1759 run_test "Authentication: client SHA256, server required" \
1768 run_test "Authentication: client SHA384, server required" \
1777 run_test "Authentication: client badcert, server required" \
1794 run_test "Authentication: client badcert, server optional" \
1811 run_test "Authentication: client badcert, server none" \
1828 run_test "Authentication: client no cert, server optional" \
1845 run_test "Authentication: openssl client no cert, server optional" \
1855 run_test "Authentication: client no cert, openssl server optional" \
1866 run_test "Authentication: client no cert, ssl3" \
1885 run_test "Certificate hash: client TLS 1.2 -> SHA-2" \
1895 run_test "Certificate hash: client TLS 1.1 -> SHA-1" \
1905 run_test "Certificate hash: client TLS 1.0 -> SHA-1" \
1915 run_test "Certificate hash: client TLS 1.1, no SHA-1 -> SHA-2 (order 1)" \
1926 run_test "Certificate hash: client TLS 1.1, no SHA-1 -> SHA-2 (order 2)" \
1939 run_test "SNI: no SNI callback" \
1948 run_test "SNI: matching cert 1" \
1958 run_test "SNI: matching cert 2" \
1968 run_test "SNI: no matching cert" \
1980 run_test "SNI: client auth no override: optional" \
1993 run_test "SNI: client auth override: none -> optional" \
2006 run_test "SNI: client auth override: optional -> none" \
2019 run_test "SNI: CA no override" \
2037 run_test "SNI: CA override" \
2055 run_test "SNI: CA override with CRL" \
2075 run_test "Non-blocking I/O: basic handshake" \
2083 run_test "Non-blocking I/O: client auth" \
2091 run_test "Non-blocking I/O: ticket" \
2099 run_test "Non-blocking I/O: ticket + client auth" \
2107 run_test "Non-blocking I/O: ticket + client auth + resume" \
2115 run_test "Non-blocking I/O: ticket + resume" \
2123 run_test "Non-blocking I/O: session-id resume" \
2133 run_test "Version check: all -> 1.2" \
2142 run_test "Version check: cli max 1.1 -> 1.1" \
2151 run_test "Version check: srv max 1.1 -> 1.1" \
2160 run_test "Version check: cli+srv max 1.1 -> 1.1" \
2169 run_test "Version check: cli max 1.1, srv min 1.1 -> 1.1" \
2178 run_test "Version check: cli min 1.1, srv max 1.1 -> 1.1" \
2187 run_test "Version check: cli min 1.2, srv max 1.1 -> fail" \
2195 run_test "Version check: srv min 1.2, cli max 1.1 -> fail" \
2205 run_test "ALPN: none" \
2217 run_test "ALPN: client only" \
2229 run_test "ALPN: server only" \
2241 run_test "ALPN: both, common cli1-srv1" \
2253 run_test "ALPN: both, common cli2-srv1" \
2265 run_test "ALPN: both, common cli1-srv2" \
2277 run_test "ALPN: both, no common" \
2293 run_test "keyUsage srv: RSA, digitalSignature -> (EC)DHE-RSA" \
2301 run_test "keyUsage srv: RSA, keyEncipherment -> RSA" \
2308 run_test "keyUsage srv: RSA, keyAgreement -> fail" \
2315 run_test "keyUsage srv: ECDSA, digitalSignature -> ECDHE-ECDSA" \
2323 run_test "keyUsage srv: ECDSA, keyAgreement -> ECDH-" \
2330 run_test "keyUsage srv: ECDSA, keyEncipherment -> fail" \
2340 run_test "keyUsage cli: DigitalSignature+KeyEncipherment, RSA: OK" \
2350 run_test "keyUsage cli: DigitalSignature+KeyEncipherment, DHE-RSA: OK" \
2360 run_test "keyUsage cli: KeyEncipherment, RSA: OK" \
2370 run_test "keyUsage cli: KeyEncipherment, DHE-RSA: fail" \
2380 run_test "keyUsage cli: KeyEncipherment, DHE-RSA: fail, soft" \
2391 run_test "keyUsage cli: DigitalSignature, DHE-RSA: OK" \
2401 run_test "keyUsage cli: DigitalSignature, RSA: fail" \
2411 run_test "keyUsage cli: DigitalSignature, RSA: fail, soft" \
2425 run_test "keyUsage cli-auth: RSA, DigitalSignature: OK" \
2433 run_test "keyUsage cli-auth: RSA, KeyEncipherment: fail (soft)" \
2441 run_test "keyUsage cli-auth: RSA, KeyEncipherment: fail (hard)" \
2449 run_test "keyUsage cli-auth: ECDSA, DigitalSignature: OK" \
2457 run_test "keyUsage cli-auth: ECDSA, KeyAgreement: fail (soft)" \
2467 run_test "extKeyUsage srv: serverAuth -> OK" \
2473 run_test "extKeyUsage srv: serverAuth,clientAuth -> OK" \
2479 run_test "extKeyUsage srv: codeSign,anyEKU -> OK" \
2485 run_test "extKeyUsage srv: codeSign -> fail" \
2493 run_test "extKeyUsage cli: serverAuth -> OK" \
2502 run_test "extKeyUsage cli: serverAuth,clientAuth -> OK" \
2511 run_test "extKeyUsage cli: codeSign,anyEKU -> OK" \
2520 run_test "extKeyUsage cli: codeSign -> fail" \
2531 run_test "extKeyUsage cli-auth: clientAuth -> OK" \
2539 run_test "extKeyUsage cli-auth: serverAuth,clientAuth -> OK" \
2547 run_test "extKeyUsage cli-auth: codeSign,anyEKU -> OK" \
2555 run_test "extKeyUsage cli-auth: codeSign -> fail (soft)" \
2563 run_test "extKeyUsage cli-auth: codeSign -> fail (hard)" \
2573 run_test "DHM parameters: reference" \
2581 run_test "DHM parameters: other parameters" \
2591 run_test "DHM size: server default, client default, OK" \
2598 run_test "DHM size: server default, client 2048, OK" \
2605 run_test "DHM size: server 1024, client default, OK" \
2612 run_test "DHM size: server 1000, client default, rejected" \
2619 run_test "DHM size: server default, client 2049, rejected" \
2628 run_test "PSK callback: psk, no callback" \
2637 run_test "PSK callback: no psk, no callback" \
2646 run_test "PSK callback: callback overrides other settings" \
2655 run_test "PSK callback: first id matches" \
2664 run_test "PSK callback: second id matches" \
2673 run_test "PSK callback: no match" \
2682 run_test "PSK callback: wrong key" \
2694 run_test "ECJPAKE: client not configured" \
2708 run_test "ECJPAKE: server not configured" \
2723 run_test "ECJPAKE: working, TLS" \
2741 run_test "ECJPAKE: password mismatch, TLS" \
2750 run_test "ECJPAKE: working, DTLS" \
2759 run_test "ECJPAKE: working, DTLS, no cookie" \
2769 run_test "ECJPAKE: password mismatch, DTLS" \
2779 run_test "ECJPAKE: working, DTLS, nolog" \
2788 run_test "Per-version suites: SSL3" \
2794 run_test "Per-version suites: TLS 1.0" \
2800 run_test "Per-version suites: TLS 1.1" \
2806 run_test "Per-version suites: TLS 1.2" \
2815 run_test "ClientHello without extensions" \
2823 run_test "mbedtls_ssl_get_bytes_avail: no extra data" \
2829 run_test "mbedtls_ssl_get_bytes_avail: extra data" \
2838 run_test "Small packet SSLv3 BlockCipher" \
2846 run_test "Small packet SSLv3 StreamCipher" \
2853 run_test "Small packet TLS 1.0 BlockCipher" \
2860 run_test "Small packet TLS 1.0 BlockCipher without EtM" \
2867 run_test "Small packet TLS 1.0 BlockCipher truncated MAC" \
2875 run_test "Small packet TLS 1.0 StreamCipher truncated MAC" \
2883 run_test "Small packet TLS 1.1 BlockCipher" \
2890 run_test "Small packet TLS 1.1 BlockCipher without EtM" \
2897 run_test "Small packet TLS 1.1 StreamCipher" \
2904 run_test "Small packet TLS 1.1 BlockCipher truncated MAC" \
2912 run_test "Small packet TLS 1.1 StreamCipher truncated MAC" \
2920 run_test "Small packet TLS 1.2 BlockCipher" \
2927 run_test "Small packet TLS 1.2 BlockCipher without EtM" \
2934 run_test "Small packet TLS 1.2 BlockCipher larger MAC" \
2941 run_test "Small packet TLS 1.2 BlockCipher truncated MAC" \
2949 run_test "Small packet TLS 1.2 StreamCipher" \
2956 run_test "Small packet TLS 1.2 StreamCipher truncated MAC" \
2964 run_test "Small packet TLS 1.2 AEAD" \
2971 run_test "Small packet TLS 1.2 AEAD shorter tag" \
2981 run_test "SSLv3 with extensions, server side" \
2991 run_test "Large packet SSLv3 BlockCipher" \
2999 run_test "Large packet SSLv3 StreamCipher" \
3006 run_test "Large packet TLS 1.0 BlockCipher" \
3013 run_test "Large packet TLS 1.0 BlockCipher truncated MAC" \
3021 run_test "Large packet TLS 1.0 StreamCipher truncated MAC" \
3029 run_test "Large packet TLS 1.1 BlockCipher" \
3036 run_test "Large packet TLS 1.1 StreamCipher" \
3043 run_test "Large packet TLS 1.1 BlockCipher truncated MAC" \
3051 run_test "Large packet TLS 1.1 StreamCipher truncated MAC" \
3059 run_test "Large packet TLS 1.2 BlockCipher" \
3066 run_test "Large packet TLS 1.2 BlockCipher larger MAC" \
3073 run_test "Large packet TLS 1.2 BlockCipher truncated MAC" \
3081 run_test "Large packet TLS 1.2 StreamCipher" \
3088 run_test "Large packet TLS 1.2 StreamCipher truncated MAC" \
3096 run_test "Large packet TLS 1.2 AEAD" \
3103 run_test "Large packet TLS 1.2 AEAD shorter tag" \
3112 run_test "DTLS cookie: enabled" \
3123 run_test "DTLS cookie: disabled" \
3134 run_test "DTLS cookie: default (failing)" \
3146 run_test "DTLS cookie: enabled, IPv6" \
3157 run_test "DTLS cookie: enabled, nbio" \
3171 run_test "DTLS client reconnect from same port: reference" \
3180 run_test "DTLS client reconnect from same port: reconnect" \
3189 run_test "DTLS client reconnect from same port: reconnect, nbio, no valgrind" \
3197 run_test "DTLS client reconnect from same port: reconnect, nbio, valgrind" \
3204 run_test "DTLS client reconnect from same port: no cookies" \
3214 run_test "DTLS client auth: required" \
3220 run_test "DTLS client auth: optional, client has no cert" \
3226 run_test "DTLS client auth: none, client has no cert" \
3233 run_test "DTLS wrong PSK: badmac alert" \
3243 run_test "DTLS reassembly: no fragmentation (gnutls server)" \
3251 run_test "DTLS reassembly: some fragmentation (gnutls server)" \
3259 run_test "DTLS reassembly: more fragmentation (gnutls server)" \
3267 run_test "DTLS reassembly: more fragmentation, nbio (gnutls server)" \
3275 run_test "DTLS reassembly: fragmentation, renego (gnutls server)" \
3288 run_test "DTLS reassembly: fragmentation, nbio, renego (gnutls server)" \
3300 run_test "DTLS reassembly: no fragmentation (openssl server)" \
3307 run_test "DTLS reassembly: some fragmentation (openssl server)" \
3314 run_test "DTLS reassembly: more fragmentation (openssl server)" \
3321 run_test "DTLS reassembly: fragmentation, nbio (openssl server)" \
3331 run_test "DTLS proxy: reference" \
3347 run_test "DTLS proxy: duplicate every packet" \
3360 run_test "DTLS proxy: duplicate every packet, server anti-replay off" \
3374 run_test "DTLS proxy: inject invalid AD record, default badmac_limit" \
3386 run_test "DTLS proxy: inject invalid AD record, badmac_limit 1" \
3398 run_test "DTLS proxy: inject invalid AD record, badmac_limit 2" \
3410 run_test "DTLS proxy: inject invalid AD record, badmac_limit 2, exchanges 2"\
3422 run_test "DTLS proxy: delay ChangeCipherSpec" \
3437 run_test "DTLS proxy: 3d (drop, delay, duplicate), \"short\" PSK handshake" \
3448 run_test "DTLS proxy: 3d, \"short\" RSA handshake" \
3458 run_test "DTLS proxy: 3d, \"short\" (no ticket, no cli_auth) FS handshake" \
3467 run_test "DTLS proxy: 3d, FS, client auth" \
3476 run_test "DTLS proxy: 3d, FS, ticket" \
3485 run_test "DTLS proxy: 3d, max handshake (FS, ticket + client auth)" \
3494 run_test "DTLS proxy: 3d, max handshake, nbio" \
3504 run_test "DTLS proxy: 3d, min handshake, resumption" \
3518 run_test "DTLS proxy: 3d, min handshake, resumption, nbio" \
3532 run_test "DTLS proxy: 3d, min handshake, client-initiated renego" \
3546 run_test "DTLS proxy: 3d, min handshake, client-initiated renego, nbio" \
3560 run_test "DTLS proxy: 3d, min handshake, server-initiated renego" \
3575 run_test "DTLS proxy: 3d, min handshake, server-initiated renego, nbio" \
3591 run_test "DTLS proxy: 3d, openssl server" \
3600 run_test "DTLS proxy: 3d, openssl server, fragmentation" \
3609 run_test "DTLS proxy: 3d, openssl server, fragmentation, nbio" \
3619 run_test "DTLS proxy: 3d, gnutls server" \
3630 run_test "DTLS proxy: 3d, gnutls server, fragmentation" \
3641 run_test "DTLS proxy: 3d, gnutls server, fragmentation, nbio" \