1#!/bin/sh
2
3# tls13-compat.sh
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
7#
8# Purpose
9#
10# List TLS1.3 compat test cases. They are generated by
11# `./tests/scripts/generate_tls13_compat_tests.py -a -o ./tests/opt-testcases/tls13-compat.sh`.
12#
13# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
14# AND REGENERATE THIS FILE.
15#
16
17DATA_FILES_PATH=../framework/data_files
18requires_config_enabled MBEDTLS_SSL_SRV_C
19requires_config_enabled MBEDTLS_DEBUG_C
20requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
21requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
22requires_config_enabled PSA_WANT_ALG_ECDH
23requires_openssl_tls1_3
24run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
25         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
26         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
27         0 \
28         -s "Protocol is TLSv1.3" \
29         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
30         -s "received signature algorithm: 0x403" \
31         -s "got named group: secp256r1(0017)" \
32         -s "Certificate verification was skipped" \
33         -C "received HelloRetryRequest message"
34
35requires_config_enabled MBEDTLS_SSL_SRV_C
36requires_config_enabled MBEDTLS_DEBUG_C
37requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
38requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
39requires_config_enabled PSA_WANT_ALG_ECDH
40requires_openssl_tls1_3
41run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
42         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
43         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
44         0 \
45         -s "Protocol is TLSv1.3" \
46         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
47         -s "received signature algorithm: 0x503" \
48         -s "got named group: secp256r1(0017)" \
49         -s "Certificate verification was skipped" \
50         -C "received HelloRetryRequest message"
51
52requires_config_enabled MBEDTLS_SSL_SRV_C
53requires_config_enabled MBEDTLS_DEBUG_C
54requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
55requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
56requires_config_enabled PSA_WANT_ALG_ECDH
57requires_openssl_tls1_3
58run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
59         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
60         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
61         0 \
62         -s "Protocol is TLSv1.3" \
63         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
64         -s "received signature algorithm: 0x603" \
65         -s "got named group: secp256r1(0017)" \
66         -s "Certificate verification was skipped" \
67         -C "received HelloRetryRequest message"
68
69requires_config_enabled MBEDTLS_SSL_SRV_C
70requires_config_enabled MBEDTLS_DEBUG_C
71requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
72requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
73requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
74requires_config_enabled PSA_WANT_ALG_ECDH
75requires_openssl_tls1_3
76run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
77         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
78         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
79         0 \
80         -s "Protocol is TLSv1.3" \
81         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
82         -s "received signature algorithm: 0x804" \
83         -s "got named group: secp256r1(0017)" \
84         -s "Certificate verification was skipped" \
85         -C "received HelloRetryRequest message"
86
87requires_config_enabled MBEDTLS_SSL_SRV_C
88requires_config_enabled MBEDTLS_DEBUG_C
89requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
90requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
91requires_config_enabled PSA_WANT_ALG_ECDH
92requires_openssl_tls1_3
93run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
94         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
95         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
96         0 \
97         -s "Protocol is TLSv1.3" \
98         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
99         -s "received signature algorithm: 0x403" \
100         -s "got named group: secp384r1(0018)" \
101         -s "Certificate verification was skipped" \
102         -C "received HelloRetryRequest message"
103
104requires_config_enabled MBEDTLS_SSL_SRV_C
105requires_config_enabled MBEDTLS_DEBUG_C
106requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
107requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
108requires_config_enabled PSA_WANT_ALG_ECDH
109requires_openssl_tls1_3
110run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
111         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
112         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
113         0 \
114         -s "Protocol is TLSv1.3" \
115         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
116         -s "received signature algorithm: 0x503" \
117         -s "got named group: secp384r1(0018)" \
118         -s "Certificate verification was skipped" \
119         -C "received HelloRetryRequest message"
120
121requires_config_enabled MBEDTLS_SSL_SRV_C
122requires_config_enabled MBEDTLS_DEBUG_C
123requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
124requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
125requires_config_enabled PSA_WANT_ALG_ECDH
126requires_openssl_tls1_3
127run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
128         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
129         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
130         0 \
131         -s "Protocol is TLSv1.3" \
132         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
133         -s "received signature algorithm: 0x603" \
134         -s "got named group: secp384r1(0018)" \
135         -s "Certificate verification was skipped" \
136         -C "received HelloRetryRequest message"
137
138requires_config_enabled MBEDTLS_SSL_SRV_C
139requires_config_enabled MBEDTLS_DEBUG_C
140requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
142requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
143requires_config_enabled PSA_WANT_ALG_ECDH
144requires_openssl_tls1_3
145run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
146         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
147         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
148         0 \
149         -s "Protocol is TLSv1.3" \
150         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
151         -s "received signature algorithm: 0x804" \
152         -s "got named group: secp384r1(0018)" \
153         -s "Certificate verification was skipped" \
154         -C "received HelloRetryRequest message"
155
156requires_config_enabled MBEDTLS_SSL_SRV_C
157requires_config_enabled MBEDTLS_DEBUG_C
158requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
159requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
160requires_config_enabled PSA_WANT_ALG_ECDH
161requires_openssl_tls1_3
162run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
163         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
164         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
165         0 \
166         -s "Protocol is TLSv1.3" \
167         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
168         -s "received signature algorithm: 0x403" \
169         -s "got named group: secp521r1(0019)" \
170         -s "Certificate verification was skipped" \
171         -C "received HelloRetryRequest message"
172
173requires_config_enabled MBEDTLS_SSL_SRV_C
174requires_config_enabled MBEDTLS_DEBUG_C
175requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
176requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
177requires_config_enabled PSA_WANT_ALG_ECDH
178requires_openssl_tls1_3
179run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
180         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
181         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
182         0 \
183         -s "Protocol is TLSv1.3" \
184         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
185         -s "received signature algorithm: 0x503" \
186         -s "got named group: secp521r1(0019)" \
187         -s "Certificate verification was skipped" \
188         -C "received HelloRetryRequest message"
189
190requires_config_enabled MBEDTLS_SSL_SRV_C
191requires_config_enabled MBEDTLS_DEBUG_C
192requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
193requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
194requires_config_enabled PSA_WANT_ALG_ECDH
195requires_openssl_tls1_3
196run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
197         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
198         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
199         0 \
200         -s "Protocol is TLSv1.3" \
201         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
202         -s "received signature algorithm: 0x603" \
203         -s "got named group: secp521r1(0019)" \
204         -s "Certificate verification was skipped" \
205         -C "received HelloRetryRequest message"
206
207requires_config_enabled MBEDTLS_SSL_SRV_C
208requires_config_enabled MBEDTLS_DEBUG_C
209requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
210requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
211requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
212requires_config_enabled PSA_WANT_ALG_ECDH
213requires_openssl_tls1_3
214run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
215         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
216         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
217         0 \
218         -s "Protocol is TLSv1.3" \
219         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
220         -s "received signature algorithm: 0x804" \
221         -s "got named group: secp521r1(0019)" \
222         -s "Certificate verification was skipped" \
223         -C "received HelloRetryRequest message"
224
225requires_config_enabled MBEDTLS_SSL_SRV_C
226requires_config_enabled MBEDTLS_DEBUG_C
227requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
228requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
229requires_config_enabled PSA_WANT_ALG_ECDH
230requires_openssl_tls1_3
231run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
232         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
233         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
234         0 \
235         -s "Protocol is TLSv1.3" \
236         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
237         -s "received signature algorithm: 0x403" \
238         -s "got named group: x25519(001d)" \
239         -s "Certificate verification was skipped" \
240         -C "received HelloRetryRequest message"
241
242requires_config_enabled MBEDTLS_SSL_SRV_C
243requires_config_enabled MBEDTLS_DEBUG_C
244requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
246requires_config_enabled PSA_WANT_ALG_ECDH
247requires_openssl_tls1_3
248run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
249         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
250         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
251         0 \
252         -s "Protocol is TLSv1.3" \
253         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
254         -s "received signature algorithm: 0x503" \
255         -s "got named group: x25519(001d)" \
256         -s "Certificate verification was skipped" \
257         -C "received HelloRetryRequest message"
258
259requires_config_enabled MBEDTLS_SSL_SRV_C
260requires_config_enabled MBEDTLS_DEBUG_C
261requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
262requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
263requires_config_enabled PSA_WANT_ALG_ECDH
264requires_openssl_tls1_3
265run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
266         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
267         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
268         0 \
269         -s "Protocol is TLSv1.3" \
270         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
271         -s "received signature algorithm: 0x603" \
272         -s "got named group: x25519(001d)" \
273         -s "Certificate verification was skipped" \
274         -C "received HelloRetryRequest message"
275
276requires_config_enabled MBEDTLS_SSL_SRV_C
277requires_config_enabled MBEDTLS_DEBUG_C
278requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
279requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
280requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
281requires_config_enabled PSA_WANT_ALG_ECDH
282requires_openssl_tls1_3
283run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
284         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
285         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
286         0 \
287         -s "Protocol is TLSv1.3" \
288         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
289         -s "received signature algorithm: 0x804" \
290         -s "got named group: x25519(001d)" \
291         -s "Certificate verification was skipped" \
292         -C "received HelloRetryRequest message"
293
294requires_config_enabled MBEDTLS_SSL_SRV_C
295requires_config_enabled MBEDTLS_DEBUG_C
296requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
297requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
298requires_config_enabled PSA_WANT_ALG_ECDH
299requires_openssl_tls1_3
300run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
301         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
302         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
303         0 \
304         -s "Protocol is TLSv1.3" \
305         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
306         -s "received signature algorithm: 0x403" \
307         -s "got named group: x448(001e)" \
308         -s "Certificate verification was skipped" \
309         -C "received HelloRetryRequest message"
310
311requires_config_enabled MBEDTLS_SSL_SRV_C
312requires_config_enabled MBEDTLS_DEBUG_C
313requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
314requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
315requires_config_enabled PSA_WANT_ALG_ECDH
316requires_openssl_tls1_3
317run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
318         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
319         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
320         0 \
321         -s "Protocol is TLSv1.3" \
322         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
323         -s "received signature algorithm: 0x503" \
324         -s "got named group: x448(001e)" \
325         -s "Certificate verification was skipped" \
326         -C "received HelloRetryRequest message"
327
328requires_config_enabled MBEDTLS_SSL_SRV_C
329requires_config_enabled MBEDTLS_DEBUG_C
330requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
332requires_config_enabled PSA_WANT_ALG_ECDH
333requires_openssl_tls1_3
334run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
335         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
336         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
337         0 \
338         -s "Protocol is TLSv1.3" \
339         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
340         -s "received signature algorithm: 0x603" \
341         -s "got named group: x448(001e)" \
342         -s "Certificate verification was skipped" \
343         -C "received HelloRetryRequest message"
344
345requires_config_enabled MBEDTLS_SSL_SRV_C
346requires_config_enabled MBEDTLS_DEBUG_C
347requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
348requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
349requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
350requires_config_enabled PSA_WANT_ALG_ECDH
351requires_openssl_tls1_3
352run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
353         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
354         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
355         0 \
356         -s "Protocol is TLSv1.3" \
357         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
358         -s "received signature algorithm: 0x804" \
359         -s "got named group: x448(001e)" \
360         -s "Certificate verification was skipped" \
361         -C "received HelloRetryRequest message"
362
363requires_config_enabled MBEDTLS_SSL_SRV_C
364requires_config_enabled MBEDTLS_DEBUG_C
365requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
367requires_config_enabled PSA_WANT_ALG_FFDH
368requires_config_enabled PSA_WANT_DH_RFC7919_2048
369requires_openssl_tls1_3_with_ffdh
370run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
371         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
372         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3" \
373         0 \
374         -s "Protocol is TLSv1.3" \
375         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
376         -s "received signature algorithm: 0x403" \
377         -s "got named group: ffdhe2048(0100)" \
378         -s "Certificate verification was skipped" \
379         -C "received HelloRetryRequest message"
380
381requires_config_enabled MBEDTLS_SSL_SRV_C
382requires_config_enabled MBEDTLS_DEBUG_C
383requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
384requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
385requires_config_enabled PSA_WANT_ALG_FFDH
386requires_config_enabled PSA_WANT_DH_RFC7919_2048
387requires_openssl_tls1_3_with_ffdh
388run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
389         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
390         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3" \
391         0 \
392         -s "Protocol is TLSv1.3" \
393         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
394         -s "received signature algorithm: 0x503" \
395         -s "got named group: ffdhe2048(0100)" \
396         -s "Certificate verification was skipped" \
397         -C "received HelloRetryRequest message"
398
399requires_config_enabled MBEDTLS_SSL_SRV_C
400requires_config_enabled MBEDTLS_DEBUG_C
401requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
402requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
403requires_config_enabled PSA_WANT_ALG_FFDH
404requires_config_enabled PSA_WANT_DH_RFC7919_2048
405requires_openssl_tls1_3_with_ffdh
406run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
407         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
408         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3" \
409         0 \
410         -s "Protocol is TLSv1.3" \
411         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
412         -s "received signature algorithm: 0x603" \
413         -s "got named group: ffdhe2048(0100)" \
414         -s "Certificate verification was skipped" \
415         -C "received HelloRetryRequest message"
416
417requires_config_enabled MBEDTLS_SSL_SRV_C
418requires_config_enabled MBEDTLS_DEBUG_C
419requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
421requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
422requires_config_enabled PSA_WANT_ALG_FFDH
423requires_config_enabled PSA_WANT_DH_RFC7919_2048
424requires_openssl_tls1_3_with_ffdh
425run_test "TLS 1.3 O->m: AES_128_GCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
426         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
427         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3" \
428         0 \
429         -s "Protocol is TLSv1.3" \
430         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
431         -s "received signature algorithm: 0x804" \
432         -s "got named group: ffdhe2048(0100)" \
433         -s "Certificate verification was skipped" \
434         -C "received HelloRetryRequest message"
435
436requires_config_enabled MBEDTLS_SSL_SRV_C
437requires_config_enabled MBEDTLS_DEBUG_C
438requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
439requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
440requires_config_enabled PSA_WANT_ALG_ECDH
441requires_openssl_tls1_3
442run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
443         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
444         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
445         0 \
446         -s "Protocol is TLSv1.3" \
447         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
448         -s "received signature algorithm: 0x403" \
449         -s "got named group: secp256r1(0017)" \
450         -s "Certificate verification was skipped" \
451         -C "received HelloRetryRequest message"
452
453requires_config_enabled MBEDTLS_SSL_SRV_C
454requires_config_enabled MBEDTLS_DEBUG_C
455requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
456requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
457requires_config_enabled PSA_WANT_ALG_ECDH
458requires_openssl_tls1_3
459run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
460         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
461         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
462         0 \
463         -s "Protocol is TLSv1.3" \
464         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
465         -s "received signature algorithm: 0x503" \
466         -s "got named group: secp256r1(0017)" \
467         -s "Certificate verification was skipped" \
468         -C "received HelloRetryRequest message"
469
470requires_config_enabled MBEDTLS_SSL_SRV_C
471requires_config_enabled MBEDTLS_DEBUG_C
472requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
473requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
474requires_config_enabled PSA_WANT_ALG_ECDH
475requires_openssl_tls1_3
476run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
477         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
478         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
479         0 \
480         -s "Protocol is TLSv1.3" \
481         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
482         -s "received signature algorithm: 0x603" \
483         -s "got named group: secp256r1(0017)" \
484         -s "Certificate verification was skipped" \
485         -C "received HelloRetryRequest message"
486
487requires_config_enabled MBEDTLS_SSL_SRV_C
488requires_config_enabled MBEDTLS_DEBUG_C
489requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
490requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
491requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
492requires_config_enabled PSA_WANT_ALG_ECDH
493requires_openssl_tls1_3
494run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
495         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
496         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
497         0 \
498         -s "Protocol is TLSv1.3" \
499         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
500         -s "received signature algorithm: 0x804" \
501         -s "got named group: secp256r1(0017)" \
502         -s "Certificate verification was skipped" \
503         -C "received HelloRetryRequest message"
504
505requires_config_enabled MBEDTLS_SSL_SRV_C
506requires_config_enabled MBEDTLS_DEBUG_C
507requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
508requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
509requires_config_enabled PSA_WANT_ALG_ECDH
510requires_openssl_tls1_3
511run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
512         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
513         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
514         0 \
515         -s "Protocol is TLSv1.3" \
516         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
517         -s "received signature algorithm: 0x403" \
518         -s "got named group: secp384r1(0018)" \
519         -s "Certificate verification was skipped" \
520         -C "received HelloRetryRequest message"
521
522requires_config_enabled MBEDTLS_SSL_SRV_C
523requires_config_enabled MBEDTLS_DEBUG_C
524requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
525requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
526requires_config_enabled PSA_WANT_ALG_ECDH
527requires_openssl_tls1_3
528run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
529         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
530         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
531         0 \
532         -s "Protocol is TLSv1.3" \
533         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
534         -s "received signature algorithm: 0x503" \
535         -s "got named group: secp384r1(0018)" \
536         -s "Certificate verification was skipped" \
537         -C "received HelloRetryRequest message"
538
539requires_config_enabled MBEDTLS_SSL_SRV_C
540requires_config_enabled MBEDTLS_DEBUG_C
541requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
542requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
543requires_config_enabled PSA_WANT_ALG_ECDH
544requires_openssl_tls1_3
545run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
546         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
547         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
548         0 \
549         -s "Protocol is TLSv1.3" \
550         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
551         -s "received signature algorithm: 0x603" \
552         -s "got named group: secp384r1(0018)" \
553         -s "Certificate verification was skipped" \
554         -C "received HelloRetryRequest message"
555
556requires_config_enabled MBEDTLS_SSL_SRV_C
557requires_config_enabled MBEDTLS_DEBUG_C
558requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
559requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
560requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
561requires_config_enabled PSA_WANT_ALG_ECDH
562requires_openssl_tls1_3
563run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
564         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
565         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
566         0 \
567         -s "Protocol is TLSv1.3" \
568         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
569         -s "received signature algorithm: 0x804" \
570         -s "got named group: secp384r1(0018)" \
571         -s "Certificate verification was skipped" \
572         -C "received HelloRetryRequest message"
573
574requires_config_enabled MBEDTLS_SSL_SRV_C
575requires_config_enabled MBEDTLS_DEBUG_C
576requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
578requires_config_enabled PSA_WANT_ALG_ECDH
579requires_openssl_tls1_3
580run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
581         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
582         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
583         0 \
584         -s "Protocol is TLSv1.3" \
585         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
586         -s "received signature algorithm: 0x403" \
587         -s "got named group: secp521r1(0019)" \
588         -s "Certificate verification was skipped" \
589         -C "received HelloRetryRequest message"
590
591requires_config_enabled MBEDTLS_SSL_SRV_C
592requires_config_enabled MBEDTLS_DEBUG_C
593requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
594requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
595requires_config_enabled PSA_WANT_ALG_ECDH
596requires_openssl_tls1_3
597run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
598         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
599         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
600         0 \
601         -s "Protocol is TLSv1.3" \
602         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
603         -s "received signature algorithm: 0x503" \
604         -s "got named group: secp521r1(0019)" \
605         -s "Certificate verification was skipped" \
606         -C "received HelloRetryRequest message"
607
608requires_config_enabled MBEDTLS_SSL_SRV_C
609requires_config_enabled MBEDTLS_DEBUG_C
610requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
611requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
612requires_config_enabled PSA_WANT_ALG_ECDH
613requires_openssl_tls1_3
614run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
615         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
616         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
617         0 \
618         -s "Protocol is TLSv1.3" \
619         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
620         -s "received signature algorithm: 0x603" \
621         -s "got named group: secp521r1(0019)" \
622         -s "Certificate verification was skipped" \
623         -C "received HelloRetryRequest message"
624
625requires_config_enabled MBEDTLS_SSL_SRV_C
626requires_config_enabled MBEDTLS_DEBUG_C
627requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
628requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
629requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
630requires_config_enabled PSA_WANT_ALG_ECDH
631requires_openssl_tls1_3
632run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
633         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
634         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
635         0 \
636         -s "Protocol is TLSv1.3" \
637         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
638         -s "received signature algorithm: 0x804" \
639         -s "got named group: secp521r1(0019)" \
640         -s "Certificate verification was skipped" \
641         -C "received HelloRetryRequest message"
642
643requires_config_enabled MBEDTLS_SSL_SRV_C
644requires_config_enabled MBEDTLS_DEBUG_C
645requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
646requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
647requires_config_enabled PSA_WANT_ALG_ECDH
648requires_openssl_tls1_3
649run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
650         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
651         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
652         0 \
653         -s "Protocol is TLSv1.3" \
654         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
655         -s "received signature algorithm: 0x403" \
656         -s "got named group: x25519(001d)" \
657         -s "Certificate verification was skipped" \
658         -C "received HelloRetryRequest message"
659
660requires_config_enabled MBEDTLS_SSL_SRV_C
661requires_config_enabled MBEDTLS_DEBUG_C
662requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
663requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
664requires_config_enabled PSA_WANT_ALG_ECDH
665requires_openssl_tls1_3
666run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
667         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
668         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
669         0 \
670         -s "Protocol is TLSv1.3" \
671         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
672         -s "received signature algorithm: 0x503" \
673         -s "got named group: x25519(001d)" \
674         -s "Certificate verification was skipped" \
675         -C "received HelloRetryRequest message"
676
677requires_config_enabled MBEDTLS_SSL_SRV_C
678requires_config_enabled MBEDTLS_DEBUG_C
679requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
680requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
681requires_config_enabled PSA_WANT_ALG_ECDH
682requires_openssl_tls1_3
683run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
684         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
685         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
686         0 \
687         -s "Protocol is TLSv1.3" \
688         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
689         -s "received signature algorithm: 0x603" \
690         -s "got named group: x25519(001d)" \
691         -s "Certificate verification was skipped" \
692         -C "received HelloRetryRequest message"
693
694requires_config_enabled MBEDTLS_SSL_SRV_C
695requires_config_enabled MBEDTLS_DEBUG_C
696requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
698requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
699requires_config_enabled PSA_WANT_ALG_ECDH
700requires_openssl_tls1_3
701run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
702         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
703         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
704         0 \
705         -s "Protocol is TLSv1.3" \
706         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
707         -s "received signature algorithm: 0x804" \
708         -s "got named group: x25519(001d)" \
709         -s "Certificate verification was skipped" \
710         -C "received HelloRetryRequest message"
711
712requires_config_enabled MBEDTLS_SSL_SRV_C
713requires_config_enabled MBEDTLS_DEBUG_C
714requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
715requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
716requires_config_enabled PSA_WANT_ALG_ECDH
717requires_openssl_tls1_3
718run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
719         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
720         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
721         0 \
722         -s "Protocol is TLSv1.3" \
723         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
724         -s "received signature algorithm: 0x403" \
725         -s "got named group: x448(001e)" \
726         -s "Certificate verification was skipped" \
727         -C "received HelloRetryRequest message"
728
729requires_config_enabled MBEDTLS_SSL_SRV_C
730requires_config_enabled MBEDTLS_DEBUG_C
731requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
733requires_config_enabled PSA_WANT_ALG_ECDH
734requires_openssl_tls1_3
735run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
736         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
737         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
738         0 \
739         -s "Protocol is TLSv1.3" \
740         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
741         -s "received signature algorithm: 0x503" \
742         -s "got named group: x448(001e)" \
743         -s "Certificate verification was skipped" \
744         -C "received HelloRetryRequest message"
745
746requires_config_enabled MBEDTLS_SSL_SRV_C
747requires_config_enabled MBEDTLS_DEBUG_C
748requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
749requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
750requires_config_enabled PSA_WANT_ALG_ECDH
751requires_openssl_tls1_3
752run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
753         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
754         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
755         0 \
756         -s "Protocol is TLSv1.3" \
757         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
758         -s "received signature algorithm: 0x603" \
759         -s "got named group: x448(001e)" \
760         -s "Certificate verification was skipped" \
761         -C "received HelloRetryRequest message"
762
763requires_config_enabled MBEDTLS_SSL_SRV_C
764requires_config_enabled MBEDTLS_DEBUG_C
765requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
766requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
767requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
768requires_config_enabled PSA_WANT_ALG_ECDH
769requires_openssl_tls1_3
770run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
771         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
772         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
773         0 \
774         -s "Protocol is TLSv1.3" \
775         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
776         -s "received signature algorithm: 0x804" \
777         -s "got named group: x448(001e)" \
778         -s "Certificate verification was skipped" \
779         -C "received HelloRetryRequest message"
780
781requires_config_enabled MBEDTLS_SSL_SRV_C
782requires_config_enabled MBEDTLS_DEBUG_C
783requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
784requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
785requires_config_enabled PSA_WANT_ALG_FFDH
786requires_config_enabled PSA_WANT_DH_RFC7919_2048
787requires_openssl_tls1_3_with_ffdh
788run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp256r1_sha256" \
789         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
790         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3" \
791         0 \
792         -s "Protocol is TLSv1.3" \
793         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
794         -s "received signature algorithm: 0x403" \
795         -s "got named group: ffdhe2048(0100)" \
796         -s "Certificate verification was skipped" \
797         -C "received HelloRetryRequest message"
798
799requires_config_enabled MBEDTLS_SSL_SRV_C
800requires_config_enabled MBEDTLS_DEBUG_C
801requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
803requires_config_enabled PSA_WANT_ALG_FFDH
804requires_config_enabled PSA_WANT_DH_RFC7919_2048
805requires_openssl_tls1_3_with_ffdh
806run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp384r1_sha384" \
807         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
808         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3" \
809         0 \
810         -s "Protocol is TLSv1.3" \
811         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
812         -s "received signature algorithm: 0x503" \
813         -s "got named group: ffdhe2048(0100)" \
814         -s "Certificate verification was skipped" \
815         -C "received HelloRetryRequest message"
816
817requires_config_enabled MBEDTLS_SSL_SRV_C
818requires_config_enabled MBEDTLS_DEBUG_C
819requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
820requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
821requires_config_enabled PSA_WANT_ALG_FFDH
822requires_config_enabled PSA_WANT_DH_RFC7919_2048
823requires_openssl_tls1_3_with_ffdh
824run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp521r1_sha512" \
825         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
826         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3" \
827         0 \
828         -s "Protocol is TLSv1.3" \
829         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
830         -s "received signature algorithm: 0x603" \
831         -s "got named group: ffdhe2048(0100)" \
832         -s "Certificate verification was skipped" \
833         -C "received HelloRetryRequest message"
834
835requires_config_enabled MBEDTLS_SSL_SRV_C
836requires_config_enabled MBEDTLS_DEBUG_C
837requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
838requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
839requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
840requires_config_enabled PSA_WANT_ALG_FFDH
841requires_config_enabled PSA_WANT_DH_RFC7919_2048
842requires_openssl_tls1_3_with_ffdh
843run_test "TLS 1.3 O->m: AES_256_GCM_SHA384,ffdhe2048,rsa_pss_rsae_sha256" \
844         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
845         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3" \
846         0 \
847         -s "Protocol is TLSv1.3" \
848         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
849         -s "received signature algorithm: 0x804" \
850         -s "got named group: ffdhe2048(0100)" \
851         -s "Certificate verification was skipped" \
852         -C "received HelloRetryRequest message"
853
854requires_config_enabled MBEDTLS_SSL_SRV_C
855requires_config_enabled MBEDTLS_DEBUG_C
856requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
857requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
858requires_config_enabled PSA_WANT_ALG_ECDH
859requires_openssl_tls1_3
860run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
861         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
862         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
863         0 \
864         -s "Protocol is TLSv1.3" \
865         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
866         -s "received signature algorithm: 0x403" \
867         -s "got named group: secp256r1(0017)" \
868         -s "Certificate verification was skipped" \
869         -C "received HelloRetryRequest message"
870
871requires_config_enabled MBEDTLS_SSL_SRV_C
872requires_config_enabled MBEDTLS_DEBUG_C
873requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
874requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
875requires_config_enabled PSA_WANT_ALG_ECDH
876requires_openssl_tls1_3
877run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
878         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
879         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
880         0 \
881         -s "Protocol is TLSv1.3" \
882         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
883         -s "received signature algorithm: 0x503" \
884         -s "got named group: secp256r1(0017)" \
885         -s "Certificate verification was skipped" \
886         -C "received HelloRetryRequest message"
887
888requires_config_enabled MBEDTLS_SSL_SRV_C
889requires_config_enabled MBEDTLS_DEBUG_C
890requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
892requires_config_enabled PSA_WANT_ALG_ECDH
893requires_openssl_tls1_3
894run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
895         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
896         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
897         0 \
898         -s "Protocol is TLSv1.3" \
899         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
900         -s "received signature algorithm: 0x603" \
901         -s "got named group: secp256r1(0017)" \
902         -s "Certificate verification was skipped" \
903         -C "received HelloRetryRequest message"
904
905requires_config_enabled MBEDTLS_SSL_SRV_C
906requires_config_enabled MBEDTLS_DEBUG_C
907requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
908requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
909requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
910requires_config_enabled PSA_WANT_ALG_ECDH
911requires_openssl_tls1_3
912run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
913         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
914         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
915         0 \
916         -s "Protocol is TLSv1.3" \
917         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
918         -s "received signature algorithm: 0x804" \
919         -s "got named group: secp256r1(0017)" \
920         -s "Certificate verification was skipped" \
921         -C "received HelloRetryRequest message"
922
923requires_config_enabled MBEDTLS_SSL_SRV_C
924requires_config_enabled MBEDTLS_DEBUG_C
925requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
926requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
927requires_config_enabled PSA_WANT_ALG_ECDH
928requires_openssl_tls1_3
929run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
930         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
931         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
932         0 \
933         -s "Protocol is TLSv1.3" \
934         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
935         -s "received signature algorithm: 0x403" \
936         -s "got named group: secp384r1(0018)" \
937         -s "Certificate verification was skipped" \
938         -C "received HelloRetryRequest message"
939
940requires_config_enabled MBEDTLS_SSL_SRV_C
941requires_config_enabled MBEDTLS_DEBUG_C
942requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
943requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
944requires_config_enabled PSA_WANT_ALG_ECDH
945requires_openssl_tls1_3
946run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
947         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
948         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
949         0 \
950         -s "Protocol is TLSv1.3" \
951         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
952         -s "received signature algorithm: 0x503" \
953         -s "got named group: secp384r1(0018)" \
954         -s "Certificate verification was skipped" \
955         -C "received HelloRetryRequest message"
956
957requires_config_enabled MBEDTLS_SSL_SRV_C
958requires_config_enabled MBEDTLS_DEBUG_C
959requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
960requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
961requires_config_enabled PSA_WANT_ALG_ECDH
962requires_openssl_tls1_3
963run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
964         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
965         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
966         0 \
967         -s "Protocol is TLSv1.3" \
968         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
969         -s "received signature algorithm: 0x603" \
970         -s "got named group: secp384r1(0018)" \
971         -s "Certificate verification was skipped" \
972         -C "received HelloRetryRequest message"
973
974requires_config_enabled MBEDTLS_SSL_SRV_C
975requires_config_enabled MBEDTLS_DEBUG_C
976requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
977requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
978requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
979requires_config_enabled PSA_WANT_ALG_ECDH
980requires_openssl_tls1_3
981run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
982         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
983         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
984         0 \
985         -s "Protocol is TLSv1.3" \
986         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
987         -s "received signature algorithm: 0x804" \
988         -s "got named group: secp384r1(0018)" \
989         -s "Certificate verification was skipped" \
990         -C "received HelloRetryRequest message"
991
992requires_config_enabled MBEDTLS_SSL_SRV_C
993requires_config_enabled MBEDTLS_DEBUG_C
994requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
995requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
996requires_config_enabled PSA_WANT_ALG_ECDH
997requires_openssl_tls1_3
998run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
999         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1000         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
1001         0 \
1002         -s "Protocol is TLSv1.3" \
1003         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1004         -s "received signature algorithm: 0x403" \
1005         -s "got named group: secp521r1(0019)" \
1006         -s "Certificate verification was skipped" \
1007         -C "received HelloRetryRequest message"
1008
1009requires_config_enabled MBEDTLS_SSL_SRV_C
1010requires_config_enabled MBEDTLS_DEBUG_C
1011requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1012requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1013requires_config_enabled PSA_WANT_ALG_ECDH
1014requires_openssl_tls1_3
1015run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1016         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1017         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
1018         0 \
1019         -s "Protocol is TLSv1.3" \
1020         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1021         -s "received signature algorithm: 0x503" \
1022         -s "got named group: secp521r1(0019)" \
1023         -s "Certificate verification was skipped" \
1024         -C "received HelloRetryRequest message"
1025
1026requires_config_enabled MBEDTLS_SSL_SRV_C
1027requires_config_enabled MBEDTLS_DEBUG_C
1028requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1029requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1030requires_config_enabled PSA_WANT_ALG_ECDH
1031requires_openssl_tls1_3
1032run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1033         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1034         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
1035         0 \
1036         -s "Protocol is TLSv1.3" \
1037         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1038         -s "received signature algorithm: 0x603" \
1039         -s "got named group: secp521r1(0019)" \
1040         -s "Certificate verification was skipped" \
1041         -C "received HelloRetryRequest message"
1042
1043requires_config_enabled MBEDTLS_SSL_SRV_C
1044requires_config_enabled MBEDTLS_DEBUG_C
1045requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1046requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1047requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1048requires_config_enabled PSA_WANT_ALG_ECDH
1049requires_openssl_tls1_3
1050run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1051         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1052         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
1053         0 \
1054         -s "Protocol is TLSv1.3" \
1055         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1056         -s "received signature algorithm: 0x804" \
1057         -s "got named group: secp521r1(0019)" \
1058         -s "Certificate verification was skipped" \
1059         -C "received HelloRetryRequest message"
1060
1061requires_config_enabled MBEDTLS_SSL_SRV_C
1062requires_config_enabled MBEDTLS_DEBUG_C
1063requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1065requires_config_enabled PSA_WANT_ALG_ECDH
1066requires_openssl_tls1_3
1067run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
1068         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1069         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
1070         0 \
1071         -s "Protocol is TLSv1.3" \
1072         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1073         -s "received signature algorithm: 0x403" \
1074         -s "got named group: x25519(001d)" \
1075         -s "Certificate verification was skipped" \
1076         -C "received HelloRetryRequest message"
1077
1078requires_config_enabled MBEDTLS_SSL_SRV_C
1079requires_config_enabled MBEDTLS_DEBUG_C
1080requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1082requires_config_enabled PSA_WANT_ALG_ECDH
1083requires_openssl_tls1_3
1084run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
1085         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1086         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
1087         0 \
1088         -s "Protocol is TLSv1.3" \
1089         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1090         -s "received signature algorithm: 0x503" \
1091         -s "got named group: x25519(001d)" \
1092         -s "Certificate verification was skipped" \
1093         -C "received HelloRetryRequest message"
1094
1095requires_config_enabled MBEDTLS_SSL_SRV_C
1096requires_config_enabled MBEDTLS_DEBUG_C
1097requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1098requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1099requires_config_enabled PSA_WANT_ALG_ECDH
1100requires_openssl_tls1_3
1101run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
1102         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1103         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
1104         0 \
1105         -s "Protocol is TLSv1.3" \
1106         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1107         -s "received signature algorithm: 0x603" \
1108         -s "got named group: x25519(001d)" \
1109         -s "Certificate verification was skipped" \
1110         -C "received HelloRetryRequest message"
1111
1112requires_config_enabled MBEDTLS_SSL_SRV_C
1113requires_config_enabled MBEDTLS_DEBUG_C
1114requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1116requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1117requires_config_enabled PSA_WANT_ALG_ECDH
1118requires_openssl_tls1_3
1119run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
1120         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1121         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
1122         0 \
1123         -s "Protocol is TLSv1.3" \
1124         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1125         -s "received signature algorithm: 0x804" \
1126         -s "got named group: x25519(001d)" \
1127         -s "Certificate verification was skipped" \
1128         -C "received HelloRetryRequest message"
1129
1130requires_config_enabled MBEDTLS_SSL_SRV_C
1131requires_config_enabled MBEDTLS_DEBUG_C
1132requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1133requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1134requires_config_enabled PSA_WANT_ALG_ECDH
1135requires_openssl_tls1_3
1136run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
1137         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1138         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
1139         0 \
1140         -s "Protocol is TLSv1.3" \
1141         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1142         -s "received signature algorithm: 0x403" \
1143         -s "got named group: x448(001e)" \
1144         -s "Certificate verification was skipped" \
1145         -C "received HelloRetryRequest message"
1146
1147requires_config_enabled MBEDTLS_SSL_SRV_C
1148requires_config_enabled MBEDTLS_DEBUG_C
1149requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1150requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1151requires_config_enabled PSA_WANT_ALG_ECDH
1152requires_openssl_tls1_3
1153run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
1154         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1155         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
1156         0 \
1157         -s "Protocol is TLSv1.3" \
1158         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1159         -s "received signature algorithm: 0x503" \
1160         -s "got named group: x448(001e)" \
1161         -s "Certificate verification was skipped" \
1162         -C "received HelloRetryRequest message"
1163
1164requires_config_enabled MBEDTLS_SSL_SRV_C
1165requires_config_enabled MBEDTLS_DEBUG_C
1166requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1168requires_config_enabled PSA_WANT_ALG_ECDH
1169requires_openssl_tls1_3
1170run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
1171         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1172         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
1173         0 \
1174         -s "Protocol is TLSv1.3" \
1175         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1176         -s "received signature algorithm: 0x603" \
1177         -s "got named group: x448(001e)" \
1178         -s "Certificate verification was skipped" \
1179         -C "received HelloRetryRequest message"
1180
1181requires_config_enabled MBEDTLS_SSL_SRV_C
1182requires_config_enabled MBEDTLS_DEBUG_C
1183requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1184requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1185requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1186requires_config_enabled PSA_WANT_ALG_ECDH
1187requires_openssl_tls1_3
1188run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
1189         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1190         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
1191         0 \
1192         -s "Protocol is TLSv1.3" \
1193         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1194         -s "received signature algorithm: 0x804" \
1195         -s "got named group: x448(001e)" \
1196         -s "Certificate verification was skipped" \
1197         -C "received HelloRetryRequest message"
1198
1199requires_config_enabled MBEDTLS_SSL_SRV_C
1200requires_config_enabled MBEDTLS_DEBUG_C
1201requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1202requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1203requires_config_enabled PSA_WANT_ALG_FFDH
1204requires_config_enabled PSA_WANT_DH_RFC7919_2048
1205requires_openssl_tls1_3_with_ffdh
1206run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
1207         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1208         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3" \
1209         0 \
1210         -s "Protocol is TLSv1.3" \
1211         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1212         -s "received signature algorithm: 0x403" \
1213         -s "got named group: ffdhe2048(0100)" \
1214         -s "Certificate verification was skipped" \
1215         -C "received HelloRetryRequest message"
1216
1217requires_config_enabled MBEDTLS_SSL_SRV_C
1218requires_config_enabled MBEDTLS_DEBUG_C
1219requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1221requires_config_enabled PSA_WANT_ALG_FFDH
1222requires_config_enabled PSA_WANT_DH_RFC7919_2048
1223requires_openssl_tls1_3_with_ffdh
1224run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
1225         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1226         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3" \
1227         0 \
1228         -s "Protocol is TLSv1.3" \
1229         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1230         -s "received signature algorithm: 0x503" \
1231         -s "got named group: ffdhe2048(0100)" \
1232         -s "Certificate verification was skipped" \
1233         -C "received HelloRetryRequest message"
1234
1235requires_config_enabled MBEDTLS_SSL_SRV_C
1236requires_config_enabled MBEDTLS_DEBUG_C
1237requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1239requires_config_enabled PSA_WANT_ALG_FFDH
1240requires_config_enabled PSA_WANT_DH_RFC7919_2048
1241requires_openssl_tls1_3_with_ffdh
1242run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
1243         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1244         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3" \
1245         0 \
1246         -s "Protocol is TLSv1.3" \
1247         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1248         -s "received signature algorithm: 0x603" \
1249         -s "got named group: ffdhe2048(0100)" \
1250         -s "Certificate verification was skipped" \
1251         -C "received HelloRetryRequest message"
1252
1253requires_config_enabled MBEDTLS_SSL_SRV_C
1254requires_config_enabled MBEDTLS_DEBUG_C
1255requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1256requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1257requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1258requires_config_enabled PSA_WANT_ALG_FFDH
1259requires_config_enabled PSA_WANT_DH_RFC7919_2048
1260requires_openssl_tls1_3_with_ffdh
1261run_test "TLS 1.3 O->m: CHACHA20_POLY1305_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
1262         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1263         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3" \
1264         0 \
1265         -s "Protocol is TLSv1.3" \
1266         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
1267         -s "received signature algorithm: 0x804" \
1268         -s "got named group: ffdhe2048(0100)" \
1269         -s "Certificate verification was skipped" \
1270         -C "received HelloRetryRequest message"
1271
1272requires_config_enabled MBEDTLS_SSL_SRV_C
1273requires_config_enabled MBEDTLS_DEBUG_C
1274requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1276requires_config_enabled PSA_WANT_ALG_ECDH
1277requires_openssl_tls1_3
1278run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1279         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1280         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
1281         0 \
1282         -s "Protocol is TLSv1.3" \
1283         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1284         -s "received signature algorithm: 0x403" \
1285         -s "got named group: secp256r1(0017)" \
1286         -s "Certificate verification was skipped" \
1287         -C "received HelloRetryRequest message"
1288
1289requires_config_enabled MBEDTLS_SSL_SRV_C
1290requires_config_enabled MBEDTLS_DEBUG_C
1291requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1293requires_config_enabled PSA_WANT_ALG_ECDH
1294requires_openssl_tls1_3
1295run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1296         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1297         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
1298         0 \
1299         -s "Protocol is TLSv1.3" \
1300         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1301         -s "received signature algorithm: 0x503" \
1302         -s "got named group: secp256r1(0017)" \
1303         -s "Certificate verification was skipped" \
1304         -C "received HelloRetryRequest message"
1305
1306requires_config_enabled MBEDTLS_SSL_SRV_C
1307requires_config_enabled MBEDTLS_DEBUG_C
1308requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1309requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1310requires_config_enabled PSA_WANT_ALG_ECDH
1311requires_openssl_tls1_3
1312run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1313         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1314         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
1315         0 \
1316         -s "Protocol is TLSv1.3" \
1317         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1318         -s "received signature algorithm: 0x603" \
1319         -s "got named group: secp256r1(0017)" \
1320         -s "Certificate verification was skipped" \
1321         -C "received HelloRetryRequest message"
1322
1323requires_config_enabled MBEDTLS_SSL_SRV_C
1324requires_config_enabled MBEDTLS_DEBUG_C
1325requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1327requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1328requires_config_enabled PSA_WANT_ALG_ECDH
1329requires_openssl_tls1_3
1330run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1331         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1332         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
1333         0 \
1334         -s "Protocol is TLSv1.3" \
1335         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1336         -s "received signature algorithm: 0x804" \
1337         -s "got named group: secp256r1(0017)" \
1338         -s "Certificate verification was skipped" \
1339         -C "received HelloRetryRequest message"
1340
1341requires_config_enabled MBEDTLS_SSL_SRV_C
1342requires_config_enabled MBEDTLS_DEBUG_C
1343requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1344requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1345requires_config_enabled PSA_WANT_ALG_ECDH
1346requires_openssl_tls1_3
1347run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1348         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1349         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
1350         0 \
1351         -s "Protocol is TLSv1.3" \
1352         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1353         -s "received signature algorithm: 0x403" \
1354         -s "got named group: secp384r1(0018)" \
1355         -s "Certificate verification was skipped" \
1356         -C "received HelloRetryRequest message"
1357
1358requires_config_enabled MBEDTLS_SSL_SRV_C
1359requires_config_enabled MBEDTLS_DEBUG_C
1360requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1361requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1362requires_config_enabled PSA_WANT_ALG_ECDH
1363requires_openssl_tls1_3
1364run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1365         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1366         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
1367         0 \
1368         -s "Protocol is TLSv1.3" \
1369         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1370         -s "received signature algorithm: 0x503" \
1371         -s "got named group: secp384r1(0018)" \
1372         -s "Certificate verification was skipped" \
1373         -C "received HelloRetryRequest message"
1374
1375requires_config_enabled MBEDTLS_SSL_SRV_C
1376requires_config_enabled MBEDTLS_DEBUG_C
1377requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1378requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1379requires_config_enabled PSA_WANT_ALG_ECDH
1380requires_openssl_tls1_3
1381run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1382         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1383         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
1384         0 \
1385         -s "Protocol is TLSv1.3" \
1386         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1387         -s "received signature algorithm: 0x603" \
1388         -s "got named group: secp384r1(0018)" \
1389         -s "Certificate verification was skipped" \
1390         -C "received HelloRetryRequest message"
1391
1392requires_config_enabled MBEDTLS_SSL_SRV_C
1393requires_config_enabled MBEDTLS_DEBUG_C
1394requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1395requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1396requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1397requires_config_enabled PSA_WANT_ALG_ECDH
1398requires_openssl_tls1_3
1399run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1400         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1401         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
1402         0 \
1403         -s "Protocol is TLSv1.3" \
1404         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1405         -s "received signature algorithm: 0x804" \
1406         -s "got named group: secp384r1(0018)" \
1407         -s "Certificate verification was skipped" \
1408         -C "received HelloRetryRequest message"
1409
1410requires_config_enabled MBEDTLS_SSL_SRV_C
1411requires_config_enabled MBEDTLS_DEBUG_C
1412requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1413requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1414requires_config_enabled PSA_WANT_ALG_ECDH
1415requires_openssl_tls1_3
1416run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1417         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1418         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
1419         0 \
1420         -s "Protocol is TLSv1.3" \
1421         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1422         -s "received signature algorithm: 0x403" \
1423         -s "got named group: secp521r1(0019)" \
1424         -s "Certificate verification was skipped" \
1425         -C "received HelloRetryRequest message"
1426
1427requires_config_enabled MBEDTLS_SSL_SRV_C
1428requires_config_enabled MBEDTLS_DEBUG_C
1429requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1431requires_config_enabled PSA_WANT_ALG_ECDH
1432requires_openssl_tls1_3
1433run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1434         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1435         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
1436         0 \
1437         -s "Protocol is TLSv1.3" \
1438         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1439         -s "received signature algorithm: 0x503" \
1440         -s "got named group: secp521r1(0019)" \
1441         -s "Certificate verification was skipped" \
1442         -C "received HelloRetryRequest message"
1443
1444requires_config_enabled MBEDTLS_SSL_SRV_C
1445requires_config_enabled MBEDTLS_DEBUG_C
1446requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1448requires_config_enabled PSA_WANT_ALG_ECDH
1449requires_openssl_tls1_3
1450run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1451         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1452         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
1453         0 \
1454         -s "Protocol is TLSv1.3" \
1455         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1456         -s "received signature algorithm: 0x603" \
1457         -s "got named group: secp521r1(0019)" \
1458         -s "Certificate verification was skipped" \
1459         -C "received HelloRetryRequest message"
1460
1461requires_config_enabled MBEDTLS_SSL_SRV_C
1462requires_config_enabled MBEDTLS_DEBUG_C
1463requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1464requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1465requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1466requires_config_enabled PSA_WANT_ALG_ECDH
1467requires_openssl_tls1_3
1468run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1469         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1470         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
1471         0 \
1472         -s "Protocol is TLSv1.3" \
1473         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1474         -s "received signature algorithm: 0x804" \
1475         -s "got named group: secp521r1(0019)" \
1476         -s "Certificate verification was skipped" \
1477         -C "received HelloRetryRequest message"
1478
1479requires_config_enabled MBEDTLS_SSL_SRV_C
1480requires_config_enabled MBEDTLS_DEBUG_C
1481requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1482requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1483requires_config_enabled PSA_WANT_ALG_ECDH
1484requires_openssl_tls1_3
1485run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
1486         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1487         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
1488         0 \
1489         -s "Protocol is TLSv1.3" \
1490         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1491         -s "received signature algorithm: 0x403" \
1492         -s "got named group: x25519(001d)" \
1493         -s "Certificate verification was skipped" \
1494         -C "received HelloRetryRequest message"
1495
1496requires_config_enabled MBEDTLS_SSL_SRV_C
1497requires_config_enabled MBEDTLS_DEBUG_C
1498requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1499requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1500requires_config_enabled PSA_WANT_ALG_ECDH
1501requires_openssl_tls1_3
1502run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
1503         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1504         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
1505         0 \
1506         -s "Protocol is TLSv1.3" \
1507         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1508         -s "received signature algorithm: 0x503" \
1509         -s "got named group: x25519(001d)" \
1510         -s "Certificate verification was skipped" \
1511         -C "received HelloRetryRequest message"
1512
1513requires_config_enabled MBEDTLS_SSL_SRV_C
1514requires_config_enabled MBEDTLS_DEBUG_C
1515requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1516requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1517requires_config_enabled PSA_WANT_ALG_ECDH
1518requires_openssl_tls1_3
1519run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
1520         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1521         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
1522         0 \
1523         -s "Protocol is TLSv1.3" \
1524         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1525         -s "received signature algorithm: 0x603" \
1526         -s "got named group: x25519(001d)" \
1527         -s "Certificate verification was skipped" \
1528         -C "received HelloRetryRequest message"
1529
1530requires_config_enabled MBEDTLS_SSL_SRV_C
1531requires_config_enabled MBEDTLS_DEBUG_C
1532requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1533requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1534requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1535requires_config_enabled PSA_WANT_ALG_ECDH
1536requires_openssl_tls1_3
1537run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
1538         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1539         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
1540         0 \
1541         -s "Protocol is TLSv1.3" \
1542         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1543         -s "received signature algorithm: 0x804" \
1544         -s "got named group: x25519(001d)" \
1545         -s "Certificate verification was skipped" \
1546         -C "received HelloRetryRequest message"
1547
1548requires_config_enabled MBEDTLS_SSL_SRV_C
1549requires_config_enabled MBEDTLS_DEBUG_C
1550requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1552requires_config_enabled PSA_WANT_ALG_ECDH
1553requires_openssl_tls1_3
1554run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
1555         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1556         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
1557         0 \
1558         -s "Protocol is TLSv1.3" \
1559         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1560         -s "received signature algorithm: 0x403" \
1561         -s "got named group: x448(001e)" \
1562         -s "Certificate verification was skipped" \
1563         -C "received HelloRetryRequest message"
1564
1565requires_config_enabled MBEDTLS_SSL_SRV_C
1566requires_config_enabled MBEDTLS_DEBUG_C
1567requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1569requires_config_enabled PSA_WANT_ALG_ECDH
1570requires_openssl_tls1_3
1571run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
1572         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1573         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
1574         0 \
1575         -s "Protocol is TLSv1.3" \
1576         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1577         -s "received signature algorithm: 0x503" \
1578         -s "got named group: x448(001e)" \
1579         -s "Certificate verification was skipped" \
1580         -C "received HelloRetryRequest message"
1581
1582requires_config_enabled MBEDTLS_SSL_SRV_C
1583requires_config_enabled MBEDTLS_DEBUG_C
1584requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1585requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1586requires_config_enabled PSA_WANT_ALG_ECDH
1587requires_openssl_tls1_3
1588run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
1589         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1590         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
1591         0 \
1592         -s "Protocol is TLSv1.3" \
1593         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1594         -s "received signature algorithm: 0x603" \
1595         -s "got named group: x448(001e)" \
1596         -s "Certificate verification was skipped" \
1597         -C "received HelloRetryRequest message"
1598
1599requires_config_enabled MBEDTLS_SSL_SRV_C
1600requires_config_enabled MBEDTLS_DEBUG_C
1601requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1602requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1603requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1604requires_config_enabled PSA_WANT_ALG_ECDH
1605requires_openssl_tls1_3
1606run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
1607         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1608         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
1609         0 \
1610         -s "Protocol is TLSv1.3" \
1611         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1612         -s "received signature algorithm: 0x804" \
1613         -s "got named group: x448(001e)" \
1614         -s "Certificate verification was skipped" \
1615         -C "received HelloRetryRequest message"
1616
1617requires_config_enabled MBEDTLS_SSL_SRV_C
1618requires_config_enabled MBEDTLS_DEBUG_C
1619requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1620requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1621requires_config_enabled PSA_WANT_ALG_FFDH
1622requires_config_enabled PSA_WANT_DH_RFC7919_2048
1623requires_openssl_tls1_3_with_ffdh
1624run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
1625         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1626         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3" \
1627         0 \
1628         -s "Protocol is TLSv1.3" \
1629         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1630         -s "received signature algorithm: 0x403" \
1631         -s "got named group: ffdhe2048(0100)" \
1632         -s "Certificate verification was skipped" \
1633         -C "received HelloRetryRequest message"
1634
1635requires_config_enabled MBEDTLS_SSL_SRV_C
1636requires_config_enabled MBEDTLS_DEBUG_C
1637requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1638requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1639requires_config_enabled PSA_WANT_ALG_FFDH
1640requires_config_enabled PSA_WANT_DH_RFC7919_2048
1641requires_openssl_tls1_3_with_ffdh
1642run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
1643         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1644         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3" \
1645         0 \
1646         -s "Protocol is TLSv1.3" \
1647         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1648         -s "received signature algorithm: 0x503" \
1649         -s "got named group: ffdhe2048(0100)" \
1650         -s "Certificate verification was skipped" \
1651         -C "received HelloRetryRequest message"
1652
1653requires_config_enabled MBEDTLS_SSL_SRV_C
1654requires_config_enabled MBEDTLS_DEBUG_C
1655requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1656requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1657requires_config_enabled PSA_WANT_ALG_FFDH
1658requires_config_enabled PSA_WANT_DH_RFC7919_2048
1659requires_openssl_tls1_3_with_ffdh
1660run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
1661         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1662         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3" \
1663         0 \
1664         -s "Protocol is TLSv1.3" \
1665         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1666         -s "received signature algorithm: 0x603" \
1667         -s "got named group: ffdhe2048(0100)" \
1668         -s "Certificate verification was skipped" \
1669         -C "received HelloRetryRequest message"
1670
1671requires_config_enabled MBEDTLS_SSL_SRV_C
1672requires_config_enabled MBEDTLS_DEBUG_C
1673requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1675requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1676requires_config_enabled PSA_WANT_ALG_FFDH
1677requires_config_enabled PSA_WANT_DH_RFC7919_2048
1678requires_openssl_tls1_3_with_ffdh
1679run_test "TLS 1.3 O->m: AES_128_CCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
1680         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1681         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3" \
1682         0 \
1683         -s "Protocol is TLSv1.3" \
1684         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
1685         -s "received signature algorithm: 0x804" \
1686         -s "got named group: ffdhe2048(0100)" \
1687         -s "Certificate verification was skipped" \
1688         -C "received HelloRetryRequest message"
1689
1690requires_config_enabled MBEDTLS_SSL_SRV_C
1691requires_config_enabled MBEDTLS_DEBUG_C
1692requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1693requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1694requires_config_enabled PSA_WANT_ALG_ECDH
1695requires_openssl_tls1_3
1696run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
1697         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1698         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3" \
1699         0 \
1700         -s "Protocol is TLSv1.3" \
1701         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1702         -s "received signature algorithm: 0x403" \
1703         -s "got named group: secp256r1(0017)" \
1704         -s "Certificate verification was skipped" \
1705         -C "received HelloRetryRequest message"
1706
1707requires_config_enabled MBEDTLS_SSL_SRV_C
1708requires_config_enabled MBEDTLS_DEBUG_C
1709requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1710requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1711requires_config_enabled PSA_WANT_ALG_ECDH
1712requires_openssl_tls1_3
1713run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
1714         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1715         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3" \
1716         0 \
1717         -s "Protocol is TLSv1.3" \
1718         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1719         -s "received signature algorithm: 0x503" \
1720         -s "got named group: secp256r1(0017)" \
1721         -s "Certificate verification was skipped" \
1722         -C "received HelloRetryRequest message"
1723
1724requires_config_enabled MBEDTLS_SSL_SRV_C
1725requires_config_enabled MBEDTLS_DEBUG_C
1726requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1728requires_config_enabled PSA_WANT_ALG_ECDH
1729requires_openssl_tls1_3
1730run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
1731         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1732         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3" \
1733         0 \
1734         -s "Protocol is TLSv1.3" \
1735         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1736         -s "received signature algorithm: 0x603" \
1737         -s "got named group: secp256r1(0017)" \
1738         -s "Certificate verification was skipped" \
1739         -C "received HelloRetryRequest message"
1740
1741requires_config_enabled MBEDTLS_SSL_SRV_C
1742requires_config_enabled MBEDTLS_DEBUG_C
1743requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1744requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1745requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1746requires_config_enabled PSA_WANT_ALG_ECDH
1747requires_openssl_tls1_3
1748run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
1749         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1750         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3" \
1751         0 \
1752         -s "Protocol is TLSv1.3" \
1753         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1754         -s "received signature algorithm: 0x804" \
1755         -s "got named group: secp256r1(0017)" \
1756         -s "Certificate verification was skipped" \
1757         -C "received HelloRetryRequest message"
1758
1759requires_config_enabled MBEDTLS_SSL_SRV_C
1760requires_config_enabled MBEDTLS_DEBUG_C
1761requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1762requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1763requires_config_enabled PSA_WANT_ALG_ECDH
1764requires_openssl_tls1_3
1765run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
1766         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1767         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3" \
1768         0 \
1769         -s "Protocol is TLSv1.3" \
1770         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1771         -s "received signature algorithm: 0x403" \
1772         -s "got named group: secp384r1(0018)" \
1773         -s "Certificate verification was skipped" \
1774         -C "received HelloRetryRequest message"
1775
1776requires_config_enabled MBEDTLS_SSL_SRV_C
1777requires_config_enabled MBEDTLS_DEBUG_C
1778requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1779requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1780requires_config_enabled PSA_WANT_ALG_ECDH
1781requires_openssl_tls1_3
1782run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
1783         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1784         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3" \
1785         0 \
1786         -s "Protocol is TLSv1.3" \
1787         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1788         -s "received signature algorithm: 0x503" \
1789         -s "got named group: secp384r1(0018)" \
1790         -s "Certificate verification was skipped" \
1791         -C "received HelloRetryRequest message"
1792
1793requires_config_enabled MBEDTLS_SSL_SRV_C
1794requires_config_enabled MBEDTLS_DEBUG_C
1795requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1797requires_config_enabled PSA_WANT_ALG_ECDH
1798requires_openssl_tls1_3
1799run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
1800         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1801         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3" \
1802         0 \
1803         -s "Protocol is TLSv1.3" \
1804         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1805         -s "received signature algorithm: 0x603" \
1806         -s "got named group: secp384r1(0018)" \
1807         -s "Certificate verification was skipped" \
1808         -C "received HelloRetryRequest message"
1809
1810requires_config_enabled MBEDTLS_SSL_SRV_C
1811requires_config_enabled MBEDTLS_DEBUG_C
1812requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1814requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1815requires_config_enabled PSA_WANT_ALG_ECDH
1816requires_openssl_tls1_3
1817run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
1818         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1819         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3" \
1820         0 \
1821         -s "Protocol is TLSv1.3" \
1822         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1823         -s "received signature algorithm: 0x804" \
1824         -s "got named group: secp384r1(0018)" \
1825         -s "Certificate verification was skipped" \
1826         -C "received HelloRetryRequest message"
1827
1828requires_config_enabled MBEDTLS_SSL_SRV_C
1829requires_config_enabled MBEDTLS_DEBUG_C
1830requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1831requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1832requires_config_enabled PSA_WANT_ALG_ECDH
1833requires_openssl_tls1_3
1834run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
1835         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1836         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3" \
1837         0 \
1838         -s "Protocol is TLSv1.3" \
1839         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1840         -s "received signature algorithm: 0x403" \
1841         -s "got named group: secp521r1(0019)" \
1842         -s "Certificate verification was skipped" \
1843         -C "received HelloRetryRequest message"
1844
1845requires_config_enabled MBEDTLS_SSL_SRV_C
1846requires_config_enabled MBEDTLS_DEBUG_C
1847requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1848requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1849requires_config_enabled PSA_WANT_ALG_ECDH
1850requires_openssl_tls1_3
1851run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
1852         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1853         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3" \
1854         0 \
1855         -s "Protocol is TLSv1.3" \
1856         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1857         -s "received signature algorithm: 0x503" \
1858         -s "got named group: secp521r1(0019)" \
1859         -s "Certificate verification was skipped" \
1860         -C "received HelloRetryRequest message"
1861
1862requires_config_enabled MBEDTLS_SSL_SRV_C
1863requires_config_enabled MBEDTLS_DEBUG_C
1864requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1865requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1866requires_config_enabled PSA_WANT_ALG_ECDH
1867requires_openssl_tls1_3
1868run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
1869         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1870         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3" \
1871         0 \
1872         -s "Protocol is TLSv1.3" \
1873         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1874         -s "received signature algorithm: 0x603" \
1875         -s "got named group: secp521r1(0019)" \
1876         -s "Certificate verification was skipped" \
1877         -C "received HelloRetryRequest message"
1878
1879requires_config_enabled MBEDTLS_SSL_SRV_C
1880requires_config_enabled MBEDTLS_DEBUG_C
1881requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1882requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1883requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1884requires_config_enabled PSA_WANT_ALG_ECDH
1885requires_openssl_tls1_3
1886run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
1887         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1888         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3" \
1889         0 \
1890         -s "Protocol is TLSv1.3" \
1891         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1892         -s "received signature algorithm: 0x804" \
1893         -s "got named group: secp521r1(0019)" \
1894         -s "Certificate verification was skipped" \
1895         -C "received HelloRetryRequest message"
1896
1897requires_config_enabled MBEDTLS_SSL_SRV_C
1898requires_config_enabled MBEDTLS_DEBUG_C
1899requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1900requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1901requires_config_enabled PSA_WANT_ALG_ECDH
1902requires_openssl_tls1_3
1903run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
1904         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1905         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3" \
1906         0 \
1907         -s "Protocol is TLSv1.3" \
1908         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1909         -s "received signature algorithm: 0x403" \
1910         -s "got named group: x25519(001d)" \
1911         -s "Certificate verification was skipped" \
1912         -C "received HelloRetryRequest message"
1913
1914requires_config_enabled MBEDTLS_SSL_SRV_C
1915requires_config_enabled MBEDTLS_DEBUG_C
1916requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1917requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1918requires_config_enabled PSA_WANT_ALG_ECDH
1919requires_openssl_tls1_3
1920run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
1921         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1922         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3" \
1923         0 \
1924         -s "Protocol is TLSv1.3" \
1925         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1926         -s "received signature algorithm: 0x503" \
1927         -s "got named group: x25519(001d)" \
1928         -s "Certificate verification was skipped" \
1929         -C "received HelloRetryRequest message"
1930
1931requires_config_enabled MBEDTLS_SSL_SRV_C
1932requires_config_enabled MBEDTLS_DEBUG_C
1933requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1934requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1935requires_config_enabled PSA_WANT_ALG_ECDH
1936requires_openssl_tls1_3
1937run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
1938         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1939         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3" \
1940         0 \
1941         -s "Protocol is TLSv1.3" \
1942         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1943         -s "received signature algorithm: 0x603" \
1944         -s "got named group: x25519(001d)" \
1945         -s "Certificate verification was skipped" \
1946         -C "received HelloRetryRequest message"
1947
1948requires_config_enabled MBEDTLS_SSL_SRV_C
1949requires_config_enabled MBEDTLS_DEBUG_C
1950requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1951requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1952requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
1953requires_config_enabled PSA_WANT_ALG_ECDH
1954requires_openssl_tls1_3
1955run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
1956         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1957         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3" \
1958         0 \
1959         -s "Protocol is TLSv1.3" \
1960         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1961         -s "received signature algorithm: 0x804" \
1962         -s "got named group: x25519(001d)" \
1963         -s "Certificate verification was skipped" \
1964         -C "received HelloRetryRequest message"
1965
1966requires_config_enabled MBEDTLS_SSL_SRV_C
1967requires_config_enabled MBEDTLS_DEBUG_C
1968requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1969requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1970requires_config_enabled PSA_WANT_ALG_ECDH
1971requires_openssl_tls1_3
1972run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
1973         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1974         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3" \
1975         0 \
1976         -s "Protocol is TLSv1.3" \
1977         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1978         -s "received signature algorithm: 0x403" \
1979         -s "got named group: x448(001e)" \
1980         -s "Certificate verification was skipped" \
1981         -C "received HelloRetryRequest message"
1982
1983requires_config_enabled MBEDTLS_SSL_SRV_C
1984requires_config_enabled MBEDTLS_DEBUG_C
1985requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
1986requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
1987requires_config_enabled PSA_WANT_ALG_ECDH
1988requires_openssl_tls1_3
1989run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
1990         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
1991         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3" \
1992         0 \
1993         -s "Protocol is TLSv1.3" \
1994         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
1995         -s "received signature algorithm: 0x503" \
1996         -s "got named group: x448(001e)" \
1997         -s "Certificate verification was skipped" \
1998         -C "received HelloRetryRequest message"
1999
2000requires_config_enabled MBEDTLS_SSL_SRV_C
2001requires_config_enabled MBEDTLS_DEBUG_C
2002requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2003requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2004requires_config_enabled PSA_WANT_ALG_ECDH
2005requires_openssl_tls1_3
2006run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
2007         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2008         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3" \
2009         0 \
2010         -s "Protocol is TLSv1.3" \
2011         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2012         -s "received signature algorithm: 0x603" \
2013         -s "got named group: x448(001e)" \
2014         -s "Certificate verification was skipped" \
2015         -C "received HelloRetryRequest message"
2016
2017requires_config_enabled MBEDTLS_SSL_SRV_C
2018requires_config_enabled MBEDTLS_DEBUG_C
2019requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2020requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2021requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2022requires_config_enabled PSA_WANT_ALG_ECDH
2023requires_openssl_tls1_3
2024run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
2025         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2026         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3" \
2027         0 \
2028         -s "Protocol is TLSv1.3" \
2029         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2030         -s "received signature algorithm: 0x804" \
2031         -s "got named group: x448(001e)" \
2032         -s "Certificate verification was skipped" \
2033         -C "received HelloRetryRequest message"
2034
2035requires_config_enabled MBEDTLS_SSL_SRV_C
2036requires_config_enabled MBEDTLS_DEBUG_C
2037requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2038requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2039requires_config_enabled PSA_WANT_ALG_FFDH
2040requires_config_enabled PSA_WANT_DH_RFC7919_2048
2041requires_openssl_tls1_3_with_ffdh
2042run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
2043         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2044         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3" \
2045         0 \
2046         -s "Protocol is TLSv1.3" \
2047         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2048         -s "received signature algorithm: 0x403" \
2049         -s "got named group: ffdhe2048(0100)" \
2050         -s "Certificate verification was skipped" \
2051         -C "received HelloRetryRequest message"
2052
2053requires_config_enabled MBEDTLS_SSL_SRV_C
2054requires_config_enabled MBEDTLS_DEBUG_C
2055requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2056requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2057requires_config_enabled PSA_WANT_ALG_FFDH
2058requires_config_enabled PSA_WANT_DH_RFC7919_2048
2059requires_openssl_tls1_3_with_ffdh
2060run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
2061         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2062         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3" \
2063         0 \
2064         -s "Protocol is TLSv1.3" \
2065         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2066         -s "received signature algorithm: 0x503" \
2067         -s "got named group: ffdhe2048(0100)" \
2068         -s "Certificate verification was skipped" \
2069         -C "received HelloRetryRequest message"
2070
2071requires_config_enabled MBEDTLS_SSL_SRV_C
2072requires_config_enabled MBEDTLS_DEBUG_C
2073requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2074requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2075requires_config_enabled PSA_WANT_ALG_FFDH
2076requires_config_enabled PSA_WANT_DH_RFC7919_2048
2077requires_openssl_tls1_3_with_ffdh
2078run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
2079         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2080         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3" \
2081         0 \
2082         -s "Protocol is TLSv1.3" \
2083         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2084         -s "received signature algorithm: 0x603" \
2085         -s "got named group: ffdhe2048(0100)" \
2086         -s "Certificate verification was skipped" \
2087         -C "received HelloRetryRequest message"
2088
2089requires_config_enabled MBEDTLS_SSL_SRV_C
2090requires_config_enabled MBEDTLS_DEBUG_C
2091requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2092requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2093requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2094requires_config_enabled PSA_WANT_ALG_FFDH
2095requires_config_enabled PSA_WANT_DH_RFC7919_2048
2096requires_openssl_tls1_3_with_ffdh
2097run_test "TLS 1.3 O->m: AES_128_CCM_8_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
2098         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2099         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca_cat12.crt -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3" \
2100         0 \
2101         -s "Protocol is TLSv1.3" \
2102         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
2103         -s "received signature algorithm: 0x804" \
2104         -s "got named group: ffdhe2048(0100)" \
2105         -s "Certificate verification was skipped" \
2106         -C "received HelloRetryRequest message"
2107
2108requires_config_enabled MBEDTLS_SSL_SRV_C
2109requires_config_enabled MBEDTLS_DEBUG_C
2110requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2111requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2112requires_config_enabled PSA_WANT_ALG_ECDH
2113requires_gnutls_tls1_3
2114requires_gnutls_next_no_ticket
2115requires_gnutls_next_disable_tls13_compat
2116run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
2117         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2118         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2119         0 \
2120         -s "Protocol is TLSv1.3" \
2121         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2122         -s "received signature algorithm: 0x403" \
2123         -s "got named group: secp256r1(0017)" \
2124         -s "Certificate verification was skipped" \
2125         -C "received HelloRetryRequest message"
2126
2127requires_config_enabled MBEDTLS_SSL_SRV_C
2128requires_config_enabled MBEDTLS_DEBUG_C
2129requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2130requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2131requires_config_enabled PSA_WANT_ALG_ECDH
2132requires_gnutls_tls1_3
2133requires_gnutls_next_no_ticket
2134requires_gnutls_next_disable_tls13_compat
2135run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
2136         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2137         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2138         0 \
2139         -s "Protocol is TLSv1.3" \
2140         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2141         -s "received signature algorithm: 0x503" \
2142         -s "got named group: secp256r1(0017)" \
2143         -s "Certificate verification was skipped" \
2144         -C "received HelloRetryRequest message"
2145
2146requires_config_enabled MBEDTLS_SSL_SRV_C
2147requires_config_enabled MBEDTLS_DEBUG_C
2148requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2149requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2150requires_config_enabled PSA_WANT_ALG_ECDH
2151requires_gnutls_tls1_3
2152requires_gnutls_next_no_ticket
2153requires_gnutls_next_disable_tls13_compat
2154run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
2155         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2156         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2157         0 \
2158         -s "Protocol is TLSv1.3" \
2159         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2160         -s "received signature algorithm: 0x603" \
2161         -s "got named group: secp256r1(0017)" \
2162         -s "Certificate verification was skipped" \
2163         -C "received HelloRetryRequest message"
2164
2165requires_config_enabled MBEDTLS_SSL_SRV_C
2166requires_config_enabled MBEDTLS_DEBUG_C
2167requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2168requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2169requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2170requires_config_enabled PSA_WANT_ALG_ECDH
2171requires_gnutls_tls1_3
2172requires_gnutls_next_no_ticket
2173requires_gnutls_next_disable_tls13_compat
2174run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
2175         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2176         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2177         0 \
2178         -s "Protocol is TLSv1.3" \
2179         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2180         -s "received signature algorithm: 0x804" \
2181         -s "got named group: secp256r1(0017)" \
2182         -s "Certificate verification was skipped" \
2183         -C "received HelloRetryRequest message"
2184
2185requires_config_enabled MBEDTLS_SSL_SRV_C
2186requires_config_enabled MBEDTLS_DEBUG_C
2187requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2188requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2189requires_config_enabled PSA_WANT_ALG_ECDH
2190requires_gnutls_tls1_3
2191requires_gnutls_next_no_ticket
2192requires_gnutls_next_disable_tls13_compat
2193run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
2194         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2195         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2196         0 \
2197         -s "Protocol is TLSv1.3" \
2198         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2199         -s "received signature algorithm: 0x403" \
2200         -s "got named group: secp384r1(0018)" \
2201         -s "Certificate verification was skipped" \
2202         -C "received HelloRetryRequest message"
2203
2204requires_config_enabled MBEDTLS_SSL_SRV_C
2205requires_config_enabled MBEDTLS_DEBUG_C
2206requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2207requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2208requires_config_enabled PSA_WANT_ALG_ECDH
2209requires_gnutls_tls1_3
2210requires_gnutls_next_no_ticket
2211requires_gnutls_next_disable_tls13_compat
2212run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
2213         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2214         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2215         0 \
2216         -s "Protocol is TLSv1.3" \
2217         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2218         -s "received signature algorithm: 0x503" \
2219         -s "got named group: secp384r1(0018)" \
2220         -s "Certificate verification was skipped" \
2221         -C "received HelloRetryRequest message"
2222
2223requires_config_enabled MBEDTLS_SSL_SRV_C
2224requires_config_enabled MBEDTLS_DEBUG_C
2225requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2226requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2227requires_config_enabled PSA_WANT_ALG_ECDH
2228requires_gnutls_tls1_3
2229requires_gnutls_next_no_ticket
2230requires_gnutls_next_disable_tls13_compat
2231run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
2232         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2233         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2234         0 \
2235         -s "Protocol is TLSv1.3" \
2236         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2237         -s "received signature algorithm: 0x603" \
2238         -s "got named group: secp384r1(0018)" \
2239         -s "Certificate verification was skipped" \
2240         -C "received HelloRetryRequest message"
2241
2242requires_config_enabled MBEDTLS_SSL_SRV_C
2243requires_config_enabled MBEDTLS_DEBUG_C
2244requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2246requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2247requires_config_enabled PSA_WANT_ALG_ECDH
2248requires_gnutls_tls1_3
2249requires_gnutls_next_no_ticket
2250requires_gnutls_next_disable_tls13_compat
2251run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
2252         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2253         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2254         0 \
2255         -s "Protocol is TLSv1.3" \
2256         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2257         -s "received signature algorithm: 0x804" \
2258         -s "got named group: secp384r1(0018)" \
2259         -s "Certificate verification was skipped" \
2260         -C "received HelloRetryRequest message"
2261
2262requires_config_enabled MBEDTLS_SSL_SRV_C
2263requires_config_enabled MBEDTLS_DEBUG_C
2264requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2266requires_config_enabled PSA_WANT_ALG_ECDH
2267requires_gnutls_tls1_3
2268requires_gnutls_next_no_ticket
2269requires_gnutls_next_disable_tls13_compat
2270run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
2271         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2272         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2273         0 \
2274         -s "Protocol is TLSv1.3" \
2275         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2276         -s "received signature algorithm: 0x403" \
2277         -s "got named group: secp521r1(0019)" \
2278         -s "Certificate verification was skipped" \
2279         -C "received HelloRetryRequest message"
2280
2281requires_config_enabled MBEDTLS_SSL_SRV_C
2282requires_config_enabled MBEDTLS_DEBUG_C
2283requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2284requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2285requires_config_enabled PSA_WANT_ALG_ECDH
2286requires_gnutls_tls1_3
2287requires_gnutls_next_no_ticket
2288requires_gnutls_next_disable_tls13_compat
2289run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
2290         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2291         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2292         0 \
2293         -s "Protocol is TLSv1.3" \
2294         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2295         -s "received signature algorithm: 0x503" \
2296         -s "got named group: secp521r1(0019)" \
2297         -s "Certificate verification was skipped" \
2298         -C "received HelloRetryRequest message"
2299
2300requires_config_enabled MBEDTLS_SSL_SRV_C
2301requires_config_enabled MBEDTLS_DEBUG_C
2302requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2304requires_config_enabled PSA_WANT_ALG_ECDH
2305requires_gnutls_tls1_3
2306requires_gnutls_next_no_ticket
2307requires_gnutls_next_disable_tls13_compat
2308run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
2309         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2310         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2311         0 \
2312         -s "Protocol is TLSv1.3" \
2313         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2314         -s "received signature algorithm: 0x603" \
2315         -s "got named group: secp521r1(0019)" \
2316         -s "Certificate verification was skipped" \
2317         -C "received HelloRetryRequest message"
2318
2319requires_config_enabled MBEDTLS_SSL_SRV_C
2320requires_config_enabled MBEDTLS_DEBUG_C
2321requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2322requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2323requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2324requires_config_enabled PSA_WANT_ALG_ECDH
2325requires_gnutls_tls1_3
2326requires_gnutls_next_no_ticket
2327requires_gnutls_next_disable_tls13_compat
2328run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
2329         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2330         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2331         0 \
2332         -s "Protocol is TLSv1.3" \
2333         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2334         -s "received signature algorithm: 0x804" \
2335         -s "got named group: secp521r1(0019)" \
2336         -s "Certificate verification was skipped" \
2337         -C "received HelloRetryRequest message"
2338
2339requires_config_enabled MBEDTLS_SSL_SRV_C
2340requires_config_enabled MBEDTLS_DEBUG_C
2341requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2343requires_config_enabled PSA_WANT_ALG_ECDH
2344requires_gnutls_tls1_3
2345requires_gnutls_next_no_ticket
2346requires_gnutls_next_disable_tls13_compat
2347run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
2348         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2349         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2350         0 \
2351         -s "Protocol is TLSv1.3" \
2352         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2353         -s "received signature algorithm: 0x403" \
2354         -s "got named group: x25519(001d)" \
2355         -s "Certificate verification was skipped" \
2356         -C "received HelloRetryRequest message"
2357
2358requires_config_enabled MBEDTLS_SSL_SRV_C
2359requires_config_enabled MBEDTLS_DEBUG_C
2360requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2361requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2362requires_config_enabled PSA_WANT_ALG_ECDH
2363requires_gnutls_tls1_3
2364requires_gnutls_next_no_ticket
2365requires_gnutls_next_disable_tls13_compat
2366run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
2367         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2368         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2369         0 \
2370         -s "Protocol is TLSv1.3" \
2371         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2372         -s "received signature algorithm: 0x503" \
2373         -s "got named group: x25519(001d)" \
2374         -s "Certificate verification was skipped" \
2375         -C "received HelloRetryRequest message"
2376
2377requires_config_enabled MBEDTLS_SSL_SRV_C
2378requires_config_enabled MBEDTLS_DEBUG_C
2379requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2381requires_config_enabled PSA_WANT_ALG_ECDH
2382requires_gnutls_tls1_3
2383requires_gnutls_next_no_ticket
2384requires_gnutls_next_disable_tls13_compat
2385run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
2386         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2387         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2388         0 \
2389         -s "Protocol is TLSv1.3" \
2390         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2391         -s "received signature algorithm: 0x603" \
2392         -s "got named group: x25519(001d)" \
2393         -s "Certificate verification was skipped" \
2394         -C "received HelloRetryRequest message"
2395
2396requires_config_enabled MBEDTLS_SSL_SRV_C
2397requires_config_enabled MBEDTLS_DEBUG_C
2398requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2399requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2400requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2401requires_config_enabled PSA_WANT_ALG_ECDH
2402requires_gnutls_tls1_3
2403requires_gnutls_next_no_ticket
2404requires_gnutls_next_disable_tls13_compat
2405run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
2406         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2407         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2408         0 \
2409         -s "Protocol is TLSv1.3" \
2410         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2411         -s "received signature algorithm: 0x804" \
2412         -s "got named group: x25519(001d)" \
2413         -s "Certificate verification was skipped" \
2414         -C "received HelloRetryRequest message"
2415
2416requires_config_enabled MBEDTLS_SSL_SRV_C
2417requires_config_enabled MBEDTLS_DEBUG_C
2418requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2419requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2420requires_config_enabled PSA_WANT_ALG_ECDH
2421requires_gnutls_tls1_3
2422requires_gnutls_next_no_ticket
2423requires_gnutls_next_disable_tls13_compat
2424run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
2425         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2426         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2427         0 \
2428         -s "Protocol is TLSv1.3" \
2429         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2430         -s "received signature algorithm: 0x403" \
2431         -s "got named group: x448(001e)" \
2432         -s "Certificate verification was skipped" \
2433         -C "received HelloRetryRequest message"
2434
2435requires_config_enabled MBEDTLS_SSL_SRV_C
2436requires_config_enabled MBEDTLS_DEBUG_C
2437requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2438requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2439requires_config_enabled PSA_WANT_ALG_ECDH
2440requires_gnutls_tls1_3
2441requires_gnutls_next_no_ticket
2442requires_gnutls_next_disable_tls13_compat
2443run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
2444         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2445         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2446         0 \
2447         -s "Protocol is TLSv1.3" \
2448         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2449         -s "received signature algorithm: 0x503" \
2450         -s "got named group: x448(001e)" \
2451         -s "Certificate verification was skipped" \
2452         -C "received HelloRetryRequest message"
2453
2454requires_config_enabled MBEDTLS_SSL_SRV_C
2455requires_config_enabled MBEDTLS_DEBUG_C
2456requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2458requires_config_enabled PSA_WANT_ALG_ECDH
2459requires_gnutls_tls1_3
2460requires_gnutls_next_no_ticket
2461requires_gnutls_next_disable_tls13_compat
2462run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
2463         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2464         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2465         0 \
2466         -s "Protocol is TLSv1.3" \
2467         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2468         -s "received signature algorithm: 0x603" \
2469         -s "got named group: x448(001e)" \
2470         -s "Certificate verification was skipped" \
2471         -C "received HelloRetryRequest message"
2472
2473requires_config_enabled MBEDTLS_SSL_SRV_C
2474requires_config_enabled MBEDTLS_DEBUG_C
2475requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2476requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2477requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2478requires_config_enabled PSA_WANT_ALG_ECDH
2479requires_gnutls_tls1_3
2480requires_gnutls_next_no_ticket
2481requires_gnutls_next_disable_tls13_compat
2482run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
2483         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2484         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2485         0 \
2486         -s "Protocol is TLSv1.3" \
2487         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2488         -s "received signature algorithm: 0x804" \
2489         -s "got named group: x448(001e)" \
2490         -s "Certificate verification was skipped" \
2491         -C "received HelloRetryRequest message"
2492
2493requires_config_enabled MBEDTLS_SSL_SRV_C
2494requires_config_enabled MBEDTLS_DEBUG_C
2495requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2497requires_config_enabled PSA_WANT_ALG_FFDH
2498requires_config_enabled PSA_WANT_DH_RFC7919_2048
2499requires_gnutls_tls1_3
2500requires_gnutls_next_no_ticket
2501requires_gnutls_next_disable_tls13_compat
2502run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
2503         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2504         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2505         0 \
2506         -s "Protocol is TLSv1.3" \
2507         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2508         -s "received signature algorithm: 0x403" \
2509         -s "got named group: ffdhe2048(0100)" \
2510         -s "Certificate verification was skipped" \
2511         -C "received HelloRetryRequest message"
2512
2513requires_config_enabled MBEDTLS_SSL_SRV_C
2514requires_config_enabled MBEDTLS_DEBUG_C
2515requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2516requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2517requires_config_enabled PSA_WANT_ALG_FFDH
2518requires_config_enabled PSA_WANT_DH_RFC7919_2048
2519requires_gnutls_tls1_3
2520requires_gnutls_next_no_ticket
2521requires_gnutls_next_disable_tls13_compat
2522run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
2523         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2524         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2525         0 \
2526         -s "Protocol is TLSv1.3" \
2527         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2528         -s "received signature algorithm: 0x503" \
2529         -s "got named group: ffdhe2048(0100)" \
2530         -s "Certificate verification was skipped" \
2531         -C "received HelloRetryRequest message"
2532
2533requires_config_enabled MBEDTLS_SSL_SRV_C
2534requires_config_enabled MBEDTLS_DEBUG_C
2535requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2536requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2537requires_config_enabled PSA_WANT_ALG_FFDH
2538requires_config_enabled PSA_WANT_DH_RFC7919_2048
2539requires_gnutls_tls1_3
2540requires_gnutls_next_no_ticket
2541requires_gnutls_next_disable_tls13_compat
2542run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
2543         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2544         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2545         0 \
2546         -s "Protocol is TLSv1.3" \
2547         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2548         -s "received signature algorithm: 0x603" \
2549         -s "got named group: ffdhe2048(0100)" \
2550         -s "Certificate verification was skipped" \
2551         -C "received HelloRetryRequest message"
2552
2553requires_config_enabled MBEDTLS_SSL_SRV_C
2554requires_config_enabled MBEDTLS_DEBUG_C
2555requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2556requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2557requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2558requires_config_enabled PSA_WANT_ALG_FFDH
2559requires_config_enabled PSA_WANT_DH_RFC7919_2048
2560requires_gnutls_tls1_3
2561requires_gnutls_next_no_ticket
2562requires_gnutls_next_disable_tls13_compat
2563run_test "TLS 1.3 G->m: AES_128_GCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
2564         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2565         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2566         0 \
2567         -s "Protocol is TLSv1.3" \
2568         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
2569         -s "received signature algorithm: 0x804" \
2570         -s "got named group: ffdhe2048(0100)" \
2571         -s "Certificate verification was skipped" \
2572         -C "received HelloRetryRequest message"
2573
2574requires_config_enabled MBEDTLS_SSL_SRV_C
2575requires_config_enabled MBEDTLS_DEBUG_C
2576requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2578requires_config_enabled PSA_WANT_ALG_ECDH
2579requires_gnutls_tls1_3
2580requires_gnutls_next_no_ticket
2581requires_gnutls_next_disable_tls13_compat
2582run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
2583         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2584         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2585         0 \
2586         -s "Protocol is TLSv1.3" \
2587         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2588         -s "received signature algorithm: 0x403" \
2589         -s "got named group: secp256r1(0017)" \
2590         -s "Certificate verification was skipped" \
2591         -C "received HelloRetryRequest message"
2592
2593requires_config_enabled MBEDTLS_SSL_SRV_C
2594requires_config_enabled MBEDTLS_DEBUG_C
2595requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2596requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2597requires_config_enabled PSA_WANT_ALG_ECDH
2598requires_gnutls_tls1_3
2599requires_gnutls_next_no_ticket
2600requires_gnutls_next_disable_tls13_compat
2601run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
2602         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2603         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2604         0 \
2605         -s "Protocol is TLSv1.3" \
2606         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2607         -s "received signature algorithm: 0x503" \
2608         -s "got named group: secp256r1(0017)" \
2609         -s "Certificate verification was skipped" \
2610         -C "received HelloRetryRequest message"
2611
2612requires_config_enabled MBEDTLS_SSL_SRV_C
2613requires_config_enabled MBEDTLS_DEBUG_C
2614requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2615requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2616requires_config_enabled PSA_WANT_ALG_ECDH
2617requires_gnutls_tls1_3
2618requires_gnutls_next_no_ticket
2619requires_gnutls_next_disable_tls13_compat
2620run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
2621         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2622         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2623         0 \
2624         -s "Protocol is TLSv1.3" \
2625         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2626         -s "received signature algorithm: 0x603" \
2627         -s "got named group: secp256r1(0017)" \
2628         -s "Certificate verification was skipped" \
2629         -C "received HelloRetryRequest message"
2630
2631requires_config_enabled MBEDTLS_SSL_SRV_C
2632requires_config_enabled MBEDTLS_DEBUG_C
2633requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2634requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2635requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2636requires_config_enabled PSA_WANT_ALG_ECDH
2637requires_gnutls_tls1_3
2638requires_gnutls_next_no_ticket
2639requires_gnutls_next_disable_tls13_compat
2640run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
2641         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2642         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
2643         0 \
2644         -s "Protocol is TLSv1.3" \
2645         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2646         -s "received signature algorithm: 0x804" \
2647         -s "got named group: secp256r1(0017)" \
2648         -s "Certificate verification was skipped" \
2649         -C "received HelloRetryRequest message"
2650
2651requires_config_enabled MBEDTLS_SSL_SRV_C
2652requires_config_enabled MBEDTLS_DEBUG_C
2653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2655requires_config_enabled PSA_WANT_ALG_ECDH
2656requires_gnutls_tls1_3
2657requires_gnutls_next_no_ticket
2658requires_gnutls_next_disable_tls13_compat
2659run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
2660         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2661         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2662         0 \
2663         -s "Protocol is TLSv1.3" \
2664         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2665         -s "received signature algorithm: 0x403" \
2666         -s "got named group: secp384r1(0018)" \
2667         -s "Certificate verification was skipped" \
2668         -C "received HelloRetryRequest message"
2669
2670requires_config_enabled MBEDTLS_SSL_SRV_C
2671requires_config_enabled MBEDTLS_DEBUG_C
2672requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2673requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2674requires_config_enabled PSA_WANT_ALG_ECDH
2675requires_gnutls_tls1_3
2676requires_gnutls_next_no_ticket
2677requires_gnutls_next_disable_tls13_compat
2678run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
2679         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2680         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2681         0 \
2682         -s "Protocol is TLSv1.3" \
2683         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2684         -s "received signature algorithm: 0x503" \
2685         -s "got named group: secp384r1(0018)" \
2686         -s "Certificate verification was skipped" \
2687         -C "received HelloRetryRequest message"
2688
2689requires_config_enabled MBEDTLS_SSL_SRV_C
2690requires_config_enabled MBEDTLS_DEBUG_C
2691requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2692requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2693requires_config_enabled PSA_WANT_ALG_ECDH
2694requires_gnutls_tls1_3
2695requires_gnutls_next_no_ticket
2696requires_gnutls_next_disable_tls13_compat
2697run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
2698         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2699         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2700         0 \
2701         -s "Protocol is TLSv1.3" \
2702         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2703         -s "received signature algorithm: 0x603" \
2704         -s "got named group: secp384r1(0018)" \
2705         -s "Certificate verification was skipped" \
2706         -C "received HelloRetryRequest message"
2707
2708requires_config_enabled MBEDTLS_SSL_SRV_C
2709requires_config_enabled MBEDTLS_DEBUG_C
2710requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2711requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2712requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2713requires_config_enabled PSA_WANT_ALG_ECDH
2714requires_gnutls_tls1_3
2715requires_gnutls_next_no_ticket
2716requires_gnutls_next_disable_tls13_compat
2717run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
2718         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2719         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
2720         0 \
2721         -s "Protocol is TLSv1.3" \
2722         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2723         -s "received signature algorithm: 0x804" \
2724         -s "got named group: secp384r1(0018)" \
2725         -s "Certificate verification was skipped" \
2726         -C "received HelloRetryRequest message"
2727
2728requires_config_enabled MBEDTLS_SSL_SRV_C
2729requires_config_enabled MBEDTLS_DEBUG_C
2730requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2732requires_config_enabled PSA_WANT_ALG_ECDH
2733requires_gnutls_tls1_3
2734requires_gnutls_next_no_ticket
2735requires_gnutls_next_disable_tls13_compat
2736run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
2737         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2738         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2739         0 \
2740         -s "Protocol is TLSv1.3" \
2741         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2742         -s "received signature algorithm: 0x403" \
2743         -s "got named group: secp521r1(0019)" \
2744         -s "Certificate verification was skipped" \
2745         -C "received HelloRetryRequest message"
2746
2747requires_config_enabled MBEDTLS_SSL_SRV_C
2748requires_config_enabled MBEDTLS_DEBUG_C
2749requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2750requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2751requires_config_enabled PSA_WANT_ALG_ECDH
2752requires_gnutls_tls1_3
2753requires_gnutls_next_no_ticket
2754requires_gnutls_next_disable_tls13_compat
2755run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
2756         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2757         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2758         0 \
2759         -s "Protocol is TLSv1.3" \
2760         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2761         -s "received signature algorithm: 0x503" \
2762         -s "got named group: secp521r1(0019)" \
2763         -s "Certificate verification was skipped" \
2764         -C "received HelloRetryRequest message"
2765
2766requires_config_enabled MBEDTLS_SSL_SRV_C
2767requires_config_enabled MBEDTLS_DEBUG_C
2768requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2769requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2770requires_config_enabled PSA_WANT_ALG_ECDH
2771requires_gnutls_tls1_3
2772requires_gnutls_next_no_ticket
2773requires_gnutls_next_disable_tls13_compat
2774run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
2775         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2776         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2777         0 \
2778         -s "Protocol is TLSv1.3" \
2779         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2780         -s "received signature algorithm: 0x603" \
2781         -s "got named group: secp521r1(0019)" \
2782         -s "Certificate verification was skipped" \
2783         -C "received HelloRetryRequest message"
2784
2785requires_config_enabled MBEDTLS_SSL_SRV_C
2786requires_config_enabled MBEDTLS_DEBUG_C
2787requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2788requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2789requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2790requires_config_enabled PSA_WANT_ALG_ECDH
2791requires_gnutls_tls1_3
2792requires_gnutls_next_no_ticket
2793requires_gnutls_next_disable_tls13_compat
2794run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
2795         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2796         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
2797         0 \
2798         -s "Protocol is TLSv1.3" \
2799         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2800         -s "received signature algorithm: 0x804" \
2801         -s "got named group: secp521r1(0019)" \
2802         -s "Certificate verification was skipped" \
2803         -C "received HelloRetryRequest message"
2804
2805requires_config_enabled MBEDTLS_SSL_SRV_C
2806requires_config_enabled MBEDTLS_DEBUG_C
2807requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2808requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2809requires_config_enabled PSA_WANT_ALG_ECDH
2810requires_gnutls_tls1_3
2811requires_gnutls_next_no_ticket
2812requires_gnutls_next_disable_tls13_compat
2813run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
2814         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2815         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2816         0 \
2817         -s "Protocol is TLSv1.3" \
2818         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2819         -s "received signature algorithm: 0x403" \
2820         -s "got named group: x25519(001d)" \
2821         -s "Certificate verification was skipped" \
2822         -C "received HelloRetryRequest message"
2823
2824requires_config_enabled MBEDTLS_SSL_SRV_C
2825requires_config_enabled MBEDTLS_DEBUG_C
2826requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2828requires_config_enabled PSA_WANT_ALG_ECDH
2829requires_gnutls_tls1_3
2830requires_gnutls_next_no_ticket
2831requires_gnutls_next_disable_tls13_compat
2832run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
2833         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2834         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2835         0 \
2836         -s "Protocol is TLSv1.3" \
2837         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2838         -s "received signature algorithm: 0x503" \
2839         -s "got named group: x25519(001d)" \
2840         -s "Certificate verification was skipped" \
2841         -C "received HelloRetryRequest message"
2842
2843requires_config_enabled MBEDTLS_SSL_SRV_C
2844requires_config_enabled MBEDTLS_DEBUG_C
2845requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2846requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2847requires_config_enabled PSA_WANT_ALG_ECDH
2848requires_gnutls_tls1_3
2849requires_gnutls_next_no_ticket
2850requires_gnutls_next_disable_tls13_compat
2851run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
2852         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2853         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2854         0 \
2855         -s "Protocol is TLSv1.3" \
2856         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2857         -s "received signature algorithm: 0x603" \
2858         -s "got named group: x25519(001d)" \
2859         -s "Certificate verification was skipped" \
2860         -C "received HelloRetryRequest message"
2861
2862requires_config_enabled MBEDTLS_SSL_SRV_C
2863requires_config_enabled MBEDTLS_DEBUG_C
2864requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2865requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2866requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2867requires_config_enabled PSA_WANT_ALG_ECDH
2868requires_gnutls_tls1_3
2869requires_gnutls_next_no_ticket
2870requires_gnutls_next_disable_tls13_compat
2871run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
2872         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2873         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
2874         0 \
2875         -s "Protocol is TLSv1.3" \
2876         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2877         -s "received signature algorithm: 0x804" \
2878         -s "got named group: x25519(001d)" \
2879         -s "Certificate verification was skipped" \
2880         -C "received HelloRetryRequest message"
2881
2882requires_config_enabled MBEDTLS_SSL_SRV_C
2883requires_config_enabled MBEDTLS_DEBUG_C
2884requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2885requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2886requires_config_enabled PSA_WANT_ALG_ECDH
2887requires_gnutls_tls1_3
2888requires_gnutls_next_no_ticket
2889requires_gnutls_next_disable_tls13_compat
2890run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
2891         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2892         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2893         0 \
2894         -s "Protocol is TLSv1.3" \
2895         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2896         -s "received signature algorithm: 0x403" \
2897         -s "got named group: x448(001e)" \
2898         -s "Certificate verification was skipped" \
2899         -C "received HelloRetryRequest message"
2900
2901requires_config_enabled MBEDTLS_SSL_SRV_C
2902requires_config_enabled MBEDTLS_DEBUG_C
2903requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2904requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2905requires_config_enabled PSA_WANT_ALG_ECDH
2906requires_gnutls_tls1_3
2907requires_gnutls_next_no_ticket
2908requires_gnutls_next_disable_tls13_compat
2909run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
2910         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2911         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2912         0 \
2913         -s "Protocol is TLSv1.3" \
2914         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2915         -s "received signature algorithm: 0x503" \
2916         -s "got named group: x448(001e)" \
2917         -s "Certificate verification was skipped" \
2918         -C "received HelloRetryRequest message"
2919
2920requires_config_enabled MBEDTLS_SSL_SRV_C
2921requires_config_enabled MBEDTLS_DEBUG_C
2922requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2923requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2924requires_config_enabled PSA_WANT_ALG_ECDH
2925requires_gnutls_tls1_3
2926requires_gnutls_next_no_ticket
2927requires_gnutls_next_disable_tls13_compat
2928run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
2929         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2930         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2931         0 \
2932         -s "Protocol is TLSv1.3" \
2933         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2934         -s "received signature algorithm: 0x603" \
2935         -s "got named group: x448(001e)" \
2936         -s "Certificate verification was skipped" \
2937         -C "received HelloRetryRequest message"
2938
2939requires_config_enabled MBEDTLS_SSL_SRV_C
2940requires_config_enabled MBEDTLS_DEBUG_C
2941requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2942requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2943requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
2944requires_config_enabled PSA_WANT_ALG_ECDH
2945requires_gnutls_tls1_3
2946requires_gnutls_next_no_ticket
2947requires_gnutls_next_disable_tls13_compat
2948run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
2949         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2950         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
2951         0 \
2952         -s "Protocol is TLSv1.3" \
2953         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2954         -s "received signature algorithm: 0x804" \
2955         -s "got named group: x448(001e)" \
2956         -s "Certificate verification was skipped" \
2957         -C "received HelloRetryRequest message"
2958
2959requires_config_enabled MBEDTLS_SSL_SRV_C
2960requires_config_enabled MBEDTLS_DEBUG_C
2961requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2963requires_config_enabled PSA_WANT_ALG_FFDH
2964requires_config_enabled PSA_WANT_DH_RFC7919_2048
2965requires_gnutls_tls1_3
2966requires_gnutls_next_no_ticket
2967requires_gnutls_next_disable_tls13_compat
2968run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp256r1_sha256" \
2969         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2970         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2971         0 \
2972         -s "Protocol is TLSv1.3" \
2973         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2974         -s "received signature algorithm: 0x403" \
2975         -s "got named group: ffdhe2048(0100)" \
2976         -s "Certificate verification was skipped" \
2977         -C "received HelloRetryRequest message"
2978
2979requires_config_enabled MBEDTLS_SSL_SRV_C
2980requires_config_enabled MBEDTLS_DEBUG_C
2981requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
2982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
2983requires_config_enabled PSA_WANT_ALG_FFDH
2984requires_config_enabled PSA_WANT_DH_RFC7919_2048
2985requires_gnutls_tls1_3
2986requires_gnutls_next_no_ticket
2987requires_gnutls_next_disable_tls13_compat
2988run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp384r1_sha384" \
2989         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
2990         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
2991         0 \
2992         -s "Protocol is TLSv1.3" \
2993         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
2994         -s "received signature algorithm: 0x503" \
2995         -s "got named group: ffdhe2048(0100)" \
2996         -s "Certificate verification was skipped" \
2997         -C "received HelloRetryRequest message"
2998
2999requires_config_enabled MBEDTLS_SSL_SRV_C
3000requires_config_enabled MBEDTLS_DEBUG_C
3001requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3002requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3003requires_config_enabled PSA_WANT_ALG_FFDH
3004requires_config_enabled PSA_WANT_DH_RFC7919_2048
3005requires_gnutls_tls1_3
3006requires_gnutls_next_no_ticket
3007requires_gnutls_next_disable_tls13_compat
3008run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp521r1_sha512" \
3009         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3010         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3011         0 \
3012         -s "Protocol is TLSv1.3" \
3013         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
3014         -s "received signature algorithm: 0x603" \
3015         -s "got named group: ffdhe2048(0100)" \
3016         -s "Certificate verification was skipped" \
3017         -C "received HelloRetryRequest message"
3018
3019requires_config_enabled MBEDTLS_SSL_SRV_C
3020requires_config_enabled MBEDTLS_DEBUG_C
3021requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3022requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3023requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3024requires_config_enabled PSA_WANT_ALG_FFDH
3025requires_config_enabled PSA_WANT_DH_RFC7919_2048
3026requires_gnutls_tls1_3
3027requires_gnutls_next_no_ticket
3028requires_gnutls_next_disable_tls13_compat
3029run_test "TLS 1.3 G->m: AES_256_GCM_SHA384,ffdhe2048,rsa_pss_rsae_sha256" \
3030         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3031         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3032         0 \
3033         -s "Protocol is TLSv1.3" \
3034         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
3035         -s "received signature algorithm: 0x804" \
3036         -s "got named group: ffdhe2048(0100)" \
3037         -s "Certificate verification was skipped" \
3038         -C "received HelloRetryRequest message"
3039
3040requires_config_enabled MBEDTLS_SSL_SRV_C
3041requires_config_enabled MBEDTLS_DEBUG_C
3042requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3043requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3044requires_config_enabled PSA_WANT_ALG_ECDH
3045requires_gnutls_tls1_3
3046requires_gnutls_next_no_ticket
3047requires_gnutls_next_disable_tls13_compat
3048run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
3049         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3050         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3051         0 \
3052         -s "Protocol is TLSv1.3" \
3053         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3054         -s "received signature algorithm: 0x403" \
3055         -s "got named group: secp256r1(0017)" \
3056         -s "Certificate verification was skipped" \
3057         -C "received HelloRetryRequest message"
3058
3059requires_config_enabled MBEDTLS_SSL_SRV_C
3060requires_config_enabled MBEDTLS_DEBUG_C
3061requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3062requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3063requires_config_enabled PSA_WANT_ALG_ECDH
3064requires_gnutls_tls1_3
3065requires_gnutls_next_no_ticket
3066requires_gnutls_next_disable_tls13_compat
3067run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
3068         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3069         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3070         0 \
3071         -s "Protocol is TLSv1.3" \
3072         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3073         -s "received signature algorithm: 0x503" \
3074         -s "got named group: secp256r1(0017)" \
3075         -s "Certificate verification was skipped" \
3076         -C "received HelloRetryRequest message"
3077
3078requires_config_enabled MBEDTLS_SSL_SRV_C
3079requires_config_enabled MBEDTLS_DEBUG_C
3080requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3082requires_config_enabled PSA_WANT_ALG_ECDH
3083requires_gnutls_tls1_3
3084requires_gnutls_next_no_ticket
3085requires_gnutls_next_disable_tls13_compat
3086run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
3087         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3088         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3089         0 \
3090         -s "Protocol is TLSv1.3" \
3091         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3092         -s "received signature algorithm: 0x603" \
3093         -s "got named group: secp256r1(0017)" \
3094         -s "Certificate verification was skipped" \
3095         -C "received HelloRetryRequest message"
3096
3097requires_config_enabled MBEDTLS_SSL_SRV_C
3098requires_config_enabled MBEDTLS_DEBUG_C
3099requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3100requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3101requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3102requires_config_enabled PSA_WANT_ALG_ECDH
3103requires_gnutls_tls1_3
3104requires_gnutls_next_no_ticket
3105requires_gnutls_next_disable_tls13_compat
3106run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
3107         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3108         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3109         0 \
3110         -s "Protocol is TLSv1.3" \
3111         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3112         -s "received signature algorithm: 0x804" \
3113         -s "got named group: secp256r1(0017)" \
3114         -s "Certificate verification was skipped" \
3115         -C "received HelloRetryRequest message"
3116
3117requires_config_enabled MBEDTLS_SSL_SRV_C
3118requires_config_enabled MBEDTLS_DEBUG_C
3119requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3120requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3121requires_config_enabled PSA_WANT_ALG_ECDH
3122requires_gnutls_tls1_3
3123requires_gnutls_next_no_ticket
3124requires_gnutls_next_disable_tls13_compat
3125run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
3126         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3127         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3128         0 \
3129         -s "Protocol is TLSv1.3" \
3130         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3131         -s "received signature algorithm: 0x403" \
3132         -s "got named group: secp384r1(0018)" \
3133         -s "Certificate verification was skipped" \
3134         -C "received HelloRetryRequest message"
3135
3136requires_config_enabled MBEDTLS_SSL_SRV_C
3137requires_config_enabled MBEDTLS_DEBUG_C
3138requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3140requires_config_enabled PSA_WANT_ALG_ECDH
3141requires_gnutls_tls1_3
3142requires_gnutls_next_no_ticket
3143requires_gnutls_next_disable_tls13_compat
3144run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3145         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3146         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3147         0 \
3148         -s "Protocol is TLSv1.3" \
3149         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3150         -s "received signature algorithm: 0x503" \
3151         -s "got named group: secp384r1(0018)" \
3152         -s "Certificate verification was skipped" \
3153         -C "received HelloRetryRequest message"
3154
3155requires_config_enabled MBEDTLS_SSL_SRV_C
3156requires_config_enabled MBEDTLS_DEBUG_C
3157requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3159requires_config_enabled PSA_WANT_ALG_ECDH
3160requires_gnutls_tls1_3
3161requires_gnutls_next_no_ticket
3162requires_gnutls_next_disable_tls13_compat
3163run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3164         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3165         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3166         0 \
3167         -s "Protocol is TLSv1.3" \
3168         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3169         -s "received signature algorithm: 0x603" \
3170         -s "got named group: secp384r1(0018)" \
3171         -s "Certificate verification was skipped" \
3172         -C "received HelloRetryRequest message"
3173
3174requires_config_enabled MBEDTLS_SSL_SRV_C
3175requires_config_enabled MBEDTLS_DEBUG_C
3176requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3177requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3178requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3179requires_config_enabled PSA_WANT_ALG_ECDH
3180requires_gnutls_tls1_3
3181requires_gnutls_next_no_ticket
3182requires_gnutls_next_disable_tls13_compat
3183run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3184         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3185         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3186         0 \
3187         -s "Protocol is TLSv1.3" \
3188         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3189         -s "received signature algorithm: 0x804" \
3190         -s "got named group: secp384r1(0018)" \
3191         -s "Certificate verification was skipped" \
3192         -C "received HelloRetryRequest message"
3193
3194requires_config_enabled MBEDTLS_SSL_SRV_C
3195requires_config_enabled MBEDTLS_DEBUG_C
3196requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3198requires_config_enabled PSA_WANT_ALG_ECDH
3199requires_gnutls_tls1_3
3200requires_gnutls_next_no_ticket
3201requires_gnutls_next_disable_tls13_compat
3202run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3203         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3204         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3205         0 \
3206         -s "Protocol is TLSv1.3" \
3207         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3208         -s "received signature algorithm: 0x403" \
3209         -s "got named group: secp521r1(0019)" \
3210         -s "Certificate verification was skipped" \
3211         -C "received HelloRetryRequest message"
3212
3213requires_config_enabled MBEDTLS_SSL_SRV_C
3214requires_config_enabled MBEDTLS_DEBUG_C
3215requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3216requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3217requires_config_enabled PSA_WANT_ALG_ECDH
3218requires_gnutls_tls1_3
3219requires_gnutls_next_no_ticket
3220requires_gnutls_next_disable_tls13_compat
3221run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3222         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3223         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3224         0 \
3225         -s "Protocol is TLSv1.3" \
3226         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3227         -s "received signature algorithm: 0x503" \
3228         -s "got named group: secp521r1(0019)" \
3229         -s "Certificate verification was skipped" \
3230         -C "received HelloRetryRequest message"
3231
3232requires_config_enabled MBEDTLS_SSL_SRV_C
3233requires_config_enabled MBEDTLS_DEBUG_C
3234requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3235requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3236requires_config_enabled PSA_WANT_ALG_ECDH
3237requires_gnutls_tls1_3
3238requires_gnutls_next_no_ticket
3239requires_gnutls_next_disable_tls13_compat
3240run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3241         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3242         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3243         0 \
3244         -s "Protocol is TLSv1.3" \
3245         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3246         -s "received signature algorithm: 0x603" \
3247         -s "got named group: secp521r1(0019)" \
3248         -s "Certificate verification was skipped" \
3249         -C "received HelloRetryRequest message"
3250
3251requires_config_enabled MBEDTLS_SSL_SRV_C
3252requires_config_enabled MBEDTLS_DEBUG_C
3253requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3254requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3255requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3256requires_config_enabled PSA_WANT_ALG_ECDH
3257requires_gnutls_tls1_3
3258requires_gnutls_next_no_ticket
3259requires_gnutls_next_disable_tls13_compat
3260run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3261         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3262         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3263         0 \
3264         -s "Protocol is TLSv1.3" \
3265         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3266         -s "received signature algorithm: 0x804" \
3267         -s "got named group: secp521r1(0019)" \
3268         -s "Certificate verification was skipped" \
3269         -C "received HelloRetryRequest message"
3270
3271requires_config_enabled MBEDTLS_SSL_SRV_C
3272requires_config_enabled MBEDTLS_DEBUG_C
3273requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3274requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3275requires_config_enabled PSA_WANT_ALG_ECDH
3276requires_gnutls_tls1_3
3277requires_gnutls_next_no_ticket
3278requires_gnutls_next_disable_tls13_compat
3279run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
3280         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3281         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3282         0 \
3283         -s "Protocol is TLSv1.3" \
3284         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3285         -s "received signature algorithm: 0x403" \
3286         -s "got named group: x25519(001d)" \
3287         -s "Certificate verification was skipped" \
3288         -C "received HelloRetryRequest message"
3289
3290requires_config_enabled MBEDTLS_SSL_SRV_C
3291requires_config_enabled MBEDTLS_DEBUG_C
3292requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3293requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3294requires_config_enabled PSA_WANT_ALG_ECDH
3295requires_gnutls_tls1_3
3296requires_gnutls_next_no_ticket
3297requires_gnutls_next_disable_tls13_compat
3298run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
3299         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3300         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3301         0 \
3302         -s "Protocol is TLSv1.3" \
3303         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3304         -s "received signature algorithm: 0x503" \
3305         -s "got named group: x25519(001d)" \
3306         -s "Certificate verification was skipped" \
3307         -C "received HelloRetryRequest message"
3308
3309requires_config_enabled MBEDTLS_SSL_SRV_C
3310requires_config_enabled MBEDTLS_DEBUG_C
3311requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3312requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3313requires_config_enabled PSA_WANT_ALG_ECDH
3314requires_gnutls_tls1_3
3315requires_gnutls_next_no_ticket
3316requires_gnutls_next_disable_tls13_compat
3317run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
3318         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3319         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3320         0 \
3321         -s "Protocol is TLSv1.3" \
3322         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3323         -s "received signature algorithm: 0x603" \
3324         -s "got named group: x25519(001d)" \
3325         -s "Certificate verification was skipped" \
3326         -C "received HelloRetryRequest message"
3327
3328requires_config_enabled MBEDTLS_SSL_SRV_C
3329requires_config_enabled MBEDTLS_DEBUG_C
3330requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3332requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3333requires_config_enabled PSA_WANT_ALG_ECDH
3334requires_gnutls_tls1_3
3335requires_gnutls_next_no_ticket
3336requires_gnutls_next_disable_tls13_compat
3337run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
3338         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3339         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3340         0 \
3341         -s "Protocol is TLSv1.3" \
3342         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3343         -s "received signature algorithm: 0x804" \
3344         -s "got named group: x25519(001d)" \
3345         -s "Certificate verification was skipped" \
3346         -C "received HelloRetryRequest message"
3347
3348requires_config_enabled MBEDTLS_SSL_SRV_C
3349requires_config_enabled MBEDTLS_DEBUG_C
3350requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3351requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3352requires_config_enabled PSA_WANT_ALG_ECDH
3353requires_gnutls_tls1_3
3354requires_gnutls_next_no_ticket
3355requires_gnutls_next_disable_tls13_compat
3356run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
3357         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3358         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3359         0 \
3360         -s "Protocol is TLSv1.3" \
3361         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3362         -s "received signature algorithm: 0x403" \
3363         -s "got named group: x448(001e)" \
3364         -s "Certificate verification was skipped" \
3365         -C "received HelloRetryRequest message"
3366
3367requires_config_enabled MBEDTLS_SSL_SRV_C
3368requires_config_enabled MBEDTLS_DEBUG_C
3369requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3370requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3371requires_config_enabled PSA_WANT_ALG_ECDH
3372requires_gnutls_tls1_3
3373requires_gnutls_next_no_ticket
3374requires_gnutls_next_disable_tls13_compat
3375run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
3376         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3377         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3378         0 \
3379         -s "Protocol is TLSv1.3" \
3380         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3381         -s "received signature algorithm: 0x503" \
3382         -s "got named group: x448(001e)" \
3383         -s "Certificate verification was skipped" \
3384         -C "received HelloRetryRequest message"
3385
3386requires_config_enabled MBEDTLS_SSL_SRV_C
3387requires_config_enabled MBEDTLS_DEBUG_C
3388requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3390requires_config_enabled PSA_WANT_ALG_ECDH
3391requires_gnutls_tls1_3
3392requires_gnutls_next_no_ticket
3393requires_gnutls_next_disable_tls13_compat
3394run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
3395         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3396         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3397         0 \
3398         -s "Protocol is TLSv1.3" \
3399         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3400         -s "received signature algorithm: 0x603" \
3401         -s "got named group: x448(001e)" \
3402         -s "Certificate verification was skipped" \
3403         -C "received HelloRetryRequest message"
3404
3405requires_config_enabled MBEDTLS_SSL_SRV_C
3406requires_config_enabled MBEDTLS_DEBUG_C
3407requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3409requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3410requires_config_enabled PSA_WANT_ALG_ECDH
3411requires_gnutls_tls1_3
3412requires_gnutls_next_no_ticket
3413requires_gnutls_next_disable_tls13_compat
3414run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
3415         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3416         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3417         0 \
3418         -s "Protocol is TLSv1.3" \
3419         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3420         -s "received signature algorithm: 0x804" \
3421         -s "got named group: x448(001e)" \
3422         -s "Certificate verification was skipped" \
3423         -C "received HelloRetryRequest message"
3424
3425requires_config_enabled MBEDTLS_SSL_SRV_C
3426requires_config_enabled MBEDTLS_DEBUG_C
3427requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3428requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3429requires_config_enabled PSA_WANT_ALG_FFDH
3430requires_config_enabled PSA_WANT_DH_RFC7919_2048
3431requires_gnutls_tls1_3
3432requires_gnutls_next_no_ticket
3433requires_gnutls_next_disable_tls13_compat
3434run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
3435         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3436         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3437         0 \
3438         -s "Protocol is TLSv1.3" \
3439         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3440         -s "received signature algorithm: 0x403" \
3441         -s "got named group: ffdhe2048(0100)" \
3442         -s "Certificate verification was skipped" \
3443         -C "received HelloRetryRequest message"
3444
3445requires_config_enabled MBEDTLS_SSL_SRV_C
3446requires_config_enabled MBEDTLS_DEBUG_C
3447requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3448requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3449requires_config_enabled PSA_WANT_ALG_FFDH
3450requires_config_enabled PSA_WANT_DH_RFC7919_2048
3451requires_gnutls_tls1_3
3452requires_gnutls_next_no_ticket
3453requires_gnutls_next_disable_tls13_compat
3454run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
3455         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3456         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3457         0 \
3458         -s "Protocol is TLSv1.3" \
3459         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3460         -s "received signature algorithm: 0x503" \
3461         -s "got named group: ffdhe2048(0100)" \
3462         -s "Certificate verification was skipped" \
3463         -C "received HelloRetryRequest message"
3464
3465requires_config_enabled MBEDTLS_SSL_SRV_C
3466requires_config_enabled MBEDTLS_DEBUG_C
3467requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3468requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3469requires_config_enabled PSA_WANT_ALG_FFDH
3470requires_config_enabled PSA_WANT_DH_RFC7919_2048
3471requires_gnutls_tls1_3
3472requires_gnutls_next_no_ticket
3473requires_gnutls_next_disable_tls13_compat
3474run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
3475         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3476         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3477         0 \
3478         -s "Protocol is TLSv1.3" \
3479         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3480         -s "received signature algorithm: 0x603" \
3481         -s "got named group: ffdhe2048(0100)" \
3482         -s "Certificate verification was skipped" \
3483         -C "received HelloRetryRequest message"
3484
3485requires_config_enabled MBEDTLS_SSL_SRV_C
3486requires_config_enabled MBEDTLS_DEBUG_C
3487requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3489requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3490requires_config_enabled PSA_WANT_ALG_FFDH
3491requires_config_enabled PSA_WANT_DH_RFC7919_2048
3492requires_gnutls_tls1_3
3493requires_gnutls_next_no_ticket
3494requires_gnutls_next_disable_tls13_compat
3495run_test "TLS 1.3 G->m: CHACHA20_POLY1305_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
3496         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3497         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3498         0 \
3499         -s "Protocol is TLSv1.3" \
3500         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
3501         -s "received signature algorithm: 0x804" \
3502         -s "got named group: ffdhe2048(0100)" \
3503         -s "Certificate verification was skipped" \
3504         -C "received HelloRetryRequest message"
3505
3506requires_config_enabled MBEDTLS_SSL_SRV_C
3507requires_config_enabled MBEDTLS_DEBUG_C
3508requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3509requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3510requires_config_enabled PSA_WANT_ALG_ECDH
3511requires_gnutls_tls1_3
3512requires_gnutls_next_no_ticket
3513requires_gnutls_next_disable_tls13_compat
3514run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
3515         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3516         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3517         0 \
3518         -s "Protocol is TLSv1.3" \
3519         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3520         -s "received signature algorithm: 0x403" \
3521         -s "got named group: secp256r1(0017)" \
3522         -s "Certificate verification was skipped" \
3523         -C "received HelloRetryRequest message"
3524
3525requires_config_enabled MBEDTLS_SSL_SRV_C
3526requires_config_enabled MBEDTLS_DEBUG_C
3527requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3528requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3529requires_config_enabled PSA_WANT_ALG_ECDH
3530requires_gnutls_tls1_3
3531requires_gnutls_next_no_ticket
3532requires_gnutls_next_disable_tls13_compat
3533run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
3534         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3535         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3536         0 \
3537         -s "Protocol is TLSv1.3" \
3538         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3539         -s "received signature algorithm: 0x503" \
3540         -s "got named group: secp256r1(0017)" \
3541         -s "Certificate verification was skipped" \
3542         -C "received HelloRetryRequest message"
3543
3544requires_config_enabled MBEDTLS_SSL_SRV_C
3545requires_config_enabled MBEDTLS_DEBUG_C
3546requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3548requires_config_enabled PSA_WANT_ALG_ECDH
3549requires_gnutls_tls1_3
3550requires_gnutls_next_no_ticket
3551requires_gnutls_next_disable_tls13_compat
3552run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
3553         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3554         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3555         0 \
3556         -s "Protocol is TLSv1.3" \
3557         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3558         -s "received signature algorithm: 0x603" \
3559         -s "got named group: secp256r1(0017)" \
3560         -s "Certificate verification was skipped" \
3561         -C "received HelloRetryRequest message"
3562
3563requires_config_enabled MBEDTLS_SSL_SRV_C
3564requires_config_enabled MBEDTLS_DEBUG_C
3565requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3566requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3567requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3568requires_config_enabled PSA_WANT_ALG_ECDH
3569requires_gnutls_tls1_3
3570requires_gnutls_next_no_ticket
3571requires_gnutls_next_disable_tls13_compat
3572run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
3573         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3574         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3575         0 \
3576         -s "Protocol is TLSv1.3" \
3577         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3578         -s "received signature algorithm: 0x804" \
3579         -s "got named group: secp256r1(0017)" \
3580         -s "Certificate verification was skipped" \
3581         -C "received HelloRetryRequest message"
3582
3583requires_config_enabled MBEDTLS_SSL_SRV_C
3584requires_config_enabled MBEDTLS_DEBUG_C
3585requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3586requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3587requires_config_enabled PSA_WANT_ALG_ECDH
3588requires_gnutls_tls1_3
3589requires_gnutls_next_no_ticket
3590requires_gnutls_next_disable_tls13_compat
3591run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
3592         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3593         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3594         0 \
3595         -s "Protocol is TLSv1.3" \
3596         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3597         -s "received signature algorithm: 0x403" \
3598         -s "got named group: secp384r1(0018)" \
3599         -s "Certificate verification was skipped" \
3600         -C "received HelloRetryRequest message"
3601
3602requires_config_enabled MBEDTLS_SSL_SRV_C
3603requires_config_enabled MBEDTLS_DEBUG_C
3604requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3605requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3606requires_config_enabled PSA_WANT_ALG_ECDH
3607requires_gnutls_tls1_3
3608requires_gnutls_next_no_ticket
3609requires_gnutls_next_disable_tls13_compat
3610run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
3611         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3612         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3613         0 \
3614         -s "Protocol is TLSv1.3" \
3615         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3616         -s "received signature algorithm: 0x503" \
3617         -s "got named group: secp384r1(0018)" \
3618         -s "Certificate verification was skipped" \
3619         -C "received HelloRetryRequest message"
3620
3621requires_config_enabled MBEDTLS_SSL_SRV_C
3622requires_config_enabled MBEDTLS_DEBUG_C
3623requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3624requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3625requires_config_enabled PSA_WANT_ALG_ECDH
3626requires_gnutls_tls1_3
3627requires_gnutls_next_no_ticket
3628requires_gnutls_next_disable_tls13_compat
3629run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
3630         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3631         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3632         0 \
3633         -s "Protocol is TLSv1.3" \
3634         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3635         -s "received signature algorithm: 0x603" \
3636         -s "got named group: secp384r1(0018)" \
3637         -s "Certificate verification was skipped" \
3638         -C "received HelloRetryRequest message"
3639
3640requires_config_enabled MBEDTLS_SSL_SRV_C
3641requires_config_enabled MBEDTLS_DEBUG_C
3642requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3643requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3644requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3645requires_config_enabled PSA_WANT_ALG_ECDH
3646requires_gnutls_tls1_3
3647requires_gnutls_next_no_ticket
3648requires_gnutls_next_disable_tls13_compat
3649run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
3650         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3651         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
3652         0 \
3653         -s "Protocol is TLSv1.3" \
3654         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3655         -s "received signature algorithm: 0x804" \
3656         -s "got named group: secp384r1(0018)" \
3657         -s "Certificate verification was skipped" \
3658         -C "received HelloRetryRequest message"
3659
3660requires_config_enabled MBEDTLS_SSL_SRV_C
3661requires_config_enabled MBEDTLS_DEBUG_C
3662requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3663requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3664requires_config_enabled PSA_WANT_ALG_ECDH
3665requires_gnutls_tls1_3
3666requires_gnutls_next_no_ticket
3667requires_gnutls_next_disable_tls13_compat
3668run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
3669         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3670         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3671         0 \
3672         -s "Protocol is TLSv1.3" \
3673         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3674         -s "received signature algorithm: 0x403" \
3675         -s "got named group: secp521r1(0019)" \
3676         -s "Certificate verification was skipped" \
3677         -C "received HelloRetryRequest message"
3678
3679requires_config_enabled MBEDTLS_SSL_SRV_C
3680requires_config_enabled MBEDTLS_DEBUG_C
3681requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3683requires_config_enabled PSA_WANT_ALG_ECDH
3684requires_gnutls_tls1_3
3685requires_gnutls_next_no_ticket
3686requires_gnutls_next_disable_tls13_compat
3687run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
3688         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3689         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3690         0 \
3691         -s "Protocol is TLSv1.3" \
3692         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3693         -s "received signature algorithm: 0x503" \
3694         -s "got named group: secp521r1(0019)" \
3695         -s "Certificate verification was skipped" \
3696         -C "received HelloRetryRequest message"
3697
3698requires_config_enabled MBEDTLS_SSL_SRV_C
3699requires_config_enabled MBEDTLS_DEBUG_C
3700requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3701requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3702requires_config_enabled PSA_WANT_ALG_ECDH
3703requires_gnutls_tls1_3
3704requires_gnutls_next_no_ticket
3705requires_gnutls_next_disable_tls13_compat
3706run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
3707         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3708         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3709         0 \
3710         -s "Protocol is TLSv1.3" \
3711         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3712         -s "received signature algorithm: 0x603" \
3713         -s "got named group: secp521r1(0019)" \
3714         -s "Certificate verification was skipped" \
3715         -C "received HelloRetryRequest message"
3716
3717requires_config_enabled MBEDTLS_SSL_SRV_C
3718requires_config_enabled MBEDTLS_DEBUG_C
3719requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3720requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3721requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3722requires_config_enabled PSA_WANT_ALG_ECDH
3723requires_gnutls_tls1_3
3724requires_gnutls_next_no_ticket
3725requires_gnutls_next_disable_tls13_compat
3726run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
3727         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3728         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
3729         0 \
3730         -s "Protocol is TLSv1.3" \
3731         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3732         -s "received signature algorithm: 0x804" \
3733         -s "got named group: secp521r1(0019)" \
3734         -s "Certificate verification was skipped" \
3735         -C "received HelloRetryRequest message"
3736
3737requires_config_enabled MBEDTLS_SSL_SRV_C
3738requires_config_enabled MBEDTLS_DEBUG_C
3739requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3740requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3741requires_config_enabled PSA_WANT_ALG_ECDH
3742requires_gnutls_tls1_3
3743requires_gnutls_next_no_ticket
3744requires_gnutls_next_disable_tls13_compat
3745run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
3746         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3747         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3748         0 \
3749         -s "Protocol is TLSv1.3" \
3750         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3751         -s "received signature algorithm: 0x403" \
3752         -s "got named group: x25519(001d)" \
3753         -s "Certificate verification was skipped" \
3754         -C "received HelloRetryRequest message"
3755
3756requires_config_enabled MBEDTLS_SSL_SRV_C
3757requires_config_enabled MBEDTLS_DEBUG_C
3758requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3759requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3760requires_config_enabled PSA_WANT_ALG_ECDH
3761requires_gnutls_tls1_3
3762requires_gnutls_next_no_ticket
3763requires_gnutls_next_disable_tls13_compat
3764run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
3765         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3766         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3767         0 \
3768         -s "Protocol is TLSv1.3" \
3769         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3770         -s "received signature algorithm: 0x503" \
3771         -s "got named group: x25519(001d)" \
3772         -s "Certificate verification was skipped" \
3773         -C "received HelloRetryRequest message"
3774
3775requires_config_enabled MBEDTLS_SSL_SRV_C
3776requires_config_enabled MBEDTLS_DEBUG_C
3777requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3778requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3779requires_config_enabled PSA_WANT_ALG_ECDH
3780requires_gnutls_tls1_3
3781requires_gnutls_next_no_ticket
3782requires_gnutls_next_disable_tls13_compat
3783run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
3784         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3785         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3786         0 \
3787         -s "Protocol is TLSv1.3" \
3788         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3789         -s "received signature algorithm: 0x603" \
3790         -s "got named group: x25519(001d)" \
3791         -s "Certificate verification was skipped" \
3792         -C "received HelloRetryRequest message"
3793
3794requires_config_enabled MBEDTLS_SSL_SRV_C
3795requires_config_enabled MBEDTLS_DEBUG_C
3796requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3797requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3798requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3799requires_config_enabled PSA_WANT_ALG_ECDH
3800requires_gnutls_tls1_3
3801requires_gnutls_next_no_ticket
3802requires_gnutls_next_disable_tls13_compat
3803run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
3804         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3805         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
3806         0 \
3807         -s "Protocol is TLSv1.3" \
3808         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3809         -s "received signature algorithm: 0x804" \
3810         -s "got named group: x25519(001d)" \
3811         -s "Certificate verification was skipped" \
3812         -C "received HelloRetryRequest message"
3813
3814requires_config_enabled MBEDTLS_SSL_SRV_C
3815requires_config_enabled MBEDTLS_DEBUG_C
3816requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3817requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3818requires_config_enabled PSA_WANT_ALG_ECDH
3819requires_gnutls_tls1_3
3820requires_gnutls_next_no_ticket
3821requires_gnutls_next_disable_tls13_compat
3822run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
3823         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3824         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3825         0 \
3826         -s "Protocol is TLSv1.3" \
3827         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3828         -s "received signature algorithm: 0x403" \
3829         -s "got named group: x448(001e)" \
3830         -s "Certificate verification was skipped" \
3831         -C "received HelloRetryRequest message"
3832
3833requires_config_enabled MBEDTLS_SSL_SRV_C
3834requires_config_enabled MBEDTLS_DEBUG_C
3835requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3836requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3837requires_config_enabled PSA_WANT_ALG_ECDH
3838requires_gnutls_tls1_3
3839requires_gnutls_next_no_ticket
3840requires_gnutls_next_disable_tls13_compat
3841run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
3842         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3843         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3844         0 \
3845         -s "Protocol is TLSv1.3" \
3846         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3847         -s "received signature algorithm: 0x503" \
3848         -s "got named group: x448(001e)" \
3849         -s "Certificate verification was skipped" \
3850         -C "received HelloRetryRequest message"
3851
3852requires_config_enabled MBEDTLS_SSL_SRV_C
3853requires_config_enabled MBEDTLS_DEBUG_C
3854requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3855requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3856requires_config_enabled PSA_WANT_ALG_ECDH
3857requires_gnutls_tls1_3
3858requires_gnutls_next_no_ticket
3859requires_gnutls_next_disable_tls13_compat
3860run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
3861         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3862         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3863         0 \
3864         -s "Protocol is TLSv1.3" \
3865         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3866         -s "received signature algorithm: 0x603" \
3867         -s "got named group: x448(001e)" \
3868         -s "Certificate verification was skipped" \
3869         -C "received HelloRetryRequest message"
3870
3871requires_config_enabled MBEDTLS_SSL_SRV_C
3872requires_config_enabled MBEDTLS_DEBUG_C
3873requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3874requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3875requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3876requires_config_enabled PSA_WANT_ALG_ECDH
3877requires_gnutls_tls1_3
3878requires_gnutls_next_no_ticket
3879requires_gnutls_next_disable_tls13_compat
3880run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
3881         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3882         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
3883         0 \
3884         -s "Protocol is TLSv1.3" \
3885         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3886         -s "received signature algorithm: 0x804" \
3887         -s "got named group: x448(001e)" \
3888         -s "Certificate verification was skipped" \
3889         -C "received HelloRetryRequest message"
3890
3891requires_config_enabled MBEDTLS_SSL_SRV_C
3892requires_config_enabled MBEDTLS_DEBUG_C
3893requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3895requires_config_enabled PSA_WANT_ALG_FFDH
3896requires_config_enabled PSA_WANT_DH_RFC7919_2048
3897requires_gnutls_tls1_3
3898requires_gnutls_next_no_ticket
3899requires_gnutls_next_disable_tls13_compat
3900run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
3901         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3902         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3903         0 \
3904         -s "Protocol is TLSv1.3" \
3905         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3906         -s "received signature algorithm: 0x403" \
3907         -s "got named group: ffdhe2048(0100)" \
3908         -s "Certificate verification was skipped" \
3909         -C "received HelloRetryRequest message"
3910
3911requires_config_enabled MBEDTLS_SSL_SRV_C
3912requires_config_enabled MBEDTLS_DEBUG_C
3913requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3914requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3915requires_config_enabled PSA_WANT_ALG_FFDH
3916requires_config_enabled PSA_WANT_DH_RFC7919_2048
3917requires_gnutls_tls1_3
3918requires_gnutls_next_no_ticket
3919requires_gnutls_next_disable_tls13_compat
3920run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
3921         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3922         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3923         0 \
3924         -s "Protocol is TLSv1.3" \
3925         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3926         -s "received signature algorithm: 0x503" \
3927         -s "got named group: ffdhe2048(0100)" \
3928         -s "Certificate verification was skipped" \
3929         -C "received HelloRetryRequest message"
3930
3931requires_config_enabled MBEDTLS_SSL_SRV_C
3932requires_config_enabled MBEDTLS_DEBUG_C
3933requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3934requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3935requires_config_enabled PSA_WANT_ALG_FFDH
3936requires_config_enabled PSA_WANT_DH_RFC7919_2048
3937requires_gnutls_tls1_3
3938requires_gnutls_next_no_ticket
3939requires_gnutls_next_disable_tls13_compat
3940run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
3941         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3942         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3943         0 \
3944         -s "Protocol is TLSv1.3" \
3945         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3946         -s "received signature algorithm: 0x603" \
3947         -s "got named group: ffdhe2048(0100)" \
3948         -s "Certificate verification was skipped" \
3949         -C "received HelloRetryRequest message"
3950
3951requires_config_enabled MBEDTLS_SSL_SRV_C
3952requires_config_enabled MBEDTLS_DEBUG_C
3953requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3954requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3955requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
3956requires_config_enabled PSA_WANT_ALG_FFDH
3957requires_config_enabled PSA_WANT_DH_RFC7919_2048
3958requires_gnutls_tls1_3
3959requires_gnutls_next_no_ticket
3960requires_gnutls_next_disable_tls13_compat
3961run_test "TLS 1.3 G->m: AES_128_CCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
3962         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3963         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
3964         0 \
3965         -s "Protocol is TLSv1.3" \
3966         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
3967         -s "received signature algorithm: 0x804" \
3968         -s "got named group: ffdhe2048(0100)" \
3969         -s "Certificate verification was skipped" \
3970         -C "received HelloRetryRequest message"
3971
3972requires_config_enabled MBEDTLS_SSL_SRV_C
3973requires_config_enabled MBEDTLS_DEBUG_C
3974requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3976requires_config_enabled PSA_WANT_ALG_ECDH
3977requires_gnutls_tls1_3
3978requires_gnutls_next_no_ticket
3979requires_gnutls_next_disable_tls13_compat
3980run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
3981         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
3982         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
3983         0 \
3984         -s "Protocol is TLSv1.3" \
3985         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
3986         -s "received signature algorithm: 0x403" \
3987         -s "got named group: secp256r1(0017)" \
3988         -s "Certificate verification was skipped" \
3989         -C "received HelloRetryRequest message"
3990
3991requires_config_enabled MBEDTLS_SSL_SRV_C
3992requires_config_enabled MBEDTLS_DEBUG_C
3993requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
3994requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
3995requires_config_enabled PSA_WANT_ALG_ECDH
3996requires_gnutls_tls1_3
3997requires_gnutls_next_no_ticket
3998requires_gnutls_next_disable_tls13_compat
3999run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
4000         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4001         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
4002         0 \
4003         -s "Protocol is TLSv1.3" \
4004         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4005         -s "received signature algorithm: 0x503" \
4006         -s "got named group: secp256r1(0017)" \
4007         -s "Certificate verification was skipped" \
4008         -C "received HelloRetryRequest message"
4009
4010requires_config_enabled MBEDTLS_SSL_SRV_C
4011requires_config_enabled MBEDTLS_DEBUG_C
4012requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4013requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4014requires_config_enabled PSA_WANT_ALG_ECDH
4015requires_gnutls_tls1_3
4016requires_gnutls_next_no_ticket
4017requires_gnutls_next_disable_tls13_compat
4018run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
4019         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4020         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
4021         0 \
4022         -s "Protocol is TLSv1.3" \
4023         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4024         -s "received signature algorithm: 0x603" \
4025         -s "got named group: secp256r1(0017)" \
4026         -s "Certificate verification was skipped" \
4027         -C "received HelloRetryRequest message"
4028
4029requires_config_enabled MBEDTLS_SSL_SRV_C
4030requires_config_enabled MBEDTLS_DEBUG_C
4031requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4032requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4033requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4034requires_config_enabled PSA_WANT_ALG_ECDH
4035requires_gnutls_tls1_3
4036requires_gnutls_next_no_ticket
4037requires_gnutls_next_disable_tls13_compat
4038run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
4039         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4040         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
4041         0 \
4042         -s "Protocol is TLSv1.3" \
4043         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4044         -s "received signature algorithm: 0x804" \
4045         -s "got named group: secp256r1(0017)" \
4046         -s "Certificate verification was skipped" \
4047         -C "received HelloRetryRequest message"
4048
4049requires_config_enabled MBEDTLS_SSL_SRV_C
4050requires_config_enabled MBEDTLS_DEBUG_C
4051requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4052requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4053requires_config_enabled PSA_WANT_ALG_ECDH
4054requires_gnutls_tls1_3
4055requires_gnutls_next_no_ticket
4056requires_gnutls_next_disable_tls13_compat
4057run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
4058         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4059         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
4060         0 \
4061         -s "Protocol is TLSv1.3" \
4062         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4063         -s "received signature algorithm: 0x403" \
4064         -s "got named group: secp384r1(0018)" \
4065         -s "Certificate verification was skipped" \
4066         -C "received HelloRetryRequest message"
4067
4068requires_config_enabled MBEDTLS_SSL_SRV_C
4069requires_config_enabled MBEDTLS_DEBUG_C
4070requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4071requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4072requires_config_enabled PSA_WANT_ALG_ECDH
4073requires_gnutls_tls1_3
4074requires_gnutls_next_no_ticket
4075requires_gnutls_next_disable_tls13_compat
4076run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
4077         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4078         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
4079         0 \
4080         -s "Protocol is TLSv1.3" \
4081         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4082         -s "received signature algorithm: 0x503" \
4083         -s "got named group: secp384r1(0018)" \
4084         -s "Certificate verification was skipped" \
4085         -C "received HelloRetryRequest message"
4086
4087requires_config_enabled MBEDTLS_SSL_SRV_C
4088requires_config_enabled MBEDTLS_DEBUG_C
4089requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4090requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4091requires_config_enabled PSA_WANT_ALG_ECDH
4092requires_gnutls_tls1_3
4093requires_gnutls_next_no_ticket
4094requires_gnutls_next_disable_tls13_compat
4095run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
4096         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4097         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
4098         0 \
4099         -s "Protocol is TLSv1.3" \
4100         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4101         -s "received signature algorithm: 0x603" \
4102         -s "got named group: secp384r1(0018)" \
4103         -s "Certificate verification was skipped" \
4104         -C "received HelloRetryRequest message"
4105
4106requires_config_enabled MBEDTLS_SSL_SRV_C
4107requires_config_enabled MBEDTLS_DEBUG_C
4108requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4109requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4110requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4111requires_config_enabled PSA_WANT_ALG_ECDH
4112requires_gnutls_tls1_3
4113requires_gnutls_next_no_ticket
4114requires_gnutls_next_disable_tls13_compat
4115run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
4116         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4117         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
4118         0 \
4119         -s "Protocol is TLSv1.3" \
4120         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4121         -s "received signature algorithm: 0x804" \
4122         -s "got named group: secp384r1(0018)" \
4123         -s "Certificate verification was skipped" \
4124         -C "received HelloRetryRequest message"
4125
4126requires_config_enabled MBEDTLS_SSL_SRV_C
4127requires_config_enabled MBEDTLS_DEBUG_C
4128requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4129requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4130requires_config_enabled PSA_WANT_ALG_ECDH
4131requires_gnutls_tls1_3
4132requires_gnutls_next_no_ticket
4133requires_gnutls_next_disable_tls13_compat
4134run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
4135         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4136         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
4137         0 \
4138         -s "Protocol is TLSv1.3" \
4139         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4140         -s "received signature algorithm: 0x403" \
4141         -s "got named group: secp521r1(0019)" \
4142         -s "Certificate verification was skipped" \
4143         -C "received HelloRetryRequest message"
4144
4145requires_config_enabled MBEDTLS_SSL_SRV_C
4146requires_config_enabled MBEDTLS_DEBUG_C
4147requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4148requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4149requires_config_enabled PSA_WANT_ALG_ECDH
4150requires_gnutls_tls1_3
4151requires_gnutls_next_no_ticket
4152requires_gnutls_next_disable_tls13_compat
4153run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
4154         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4155         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
4156         0 \
4157         -s "Protocol is TLSv1.3" \
4158         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4159         -s "received signature algorithm: 0x503" \
4160         -s "got named group: secp521r1(0019)" \
4161         -s "Certificate verification was skipped" \
4162         -C "received HelloRetryRequest message"
4163
4164requires_config_enabled MBEDTLS_SSL_SRV_C
4165requires_config_enabled MBEDTLS_DEBUG_C
4166requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4167requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4168requires_config_enabled PSA_WANT_ALG_ECDH
4169requires_gnutls_tls1_3
4170requires_gnutls_next_no_ticket
4171requires_gnutls_next_disable_tls13_compat
4172run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
4173         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4174         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
4175         0 \
4176         -s "Protocol is TLSv1.3" \
4177         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4178         -s "received signature algorithm: 0x603" \
4179         -s "got named group: secp521r1(0019)" \
4180         -s "Certificate verification was skipped" \
4181         -C "received HelloRetryRequest message"
4182
4183requires_config_enabled MBEDTLS_SSL_SRV_C
4184requires_config_enabled MBEDTLS_DEBUG_C
4185requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4186requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4187requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4188requires_config_enabled PSA_WANT_ALG_ECDH
4189requires_gnutls_tls1_3
4190requires_gnutls_next_no_ticket
4191requires_gnutls_next_disable_tls13_compat
4192run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
4193         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4194         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
4195         0 \
4196         -s "Protocol is TLSv1.3" \
4197         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4198         -s "received signature algorithm: 0x804" \
4199         -s "got named group: secp521r1(0019)" \
4200         -s "Certificate verification was skipped" \
4201         -C "received HelloRetryRequest message"
4202
4203requires_config_enabled MBEDTLS_SSL_SRV_C
4204requires_config_enabled MBEDTLS_DEBUG_C
4205requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4206requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4207requires_config_enabled PSA_WANT_ALG_ECDH
4208requires_gnutls_tls1_3
4209requires_gnutls_next_no_ticket
4210requires_gnutls_next_disable_tls13_compat
4211run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
4212         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4213         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
4214         0 \
4215         -s "Protocol is TLSv1.3" \
4216         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4217         -s "received signature algorithm: 0x403" \
4218         -s "got named group: x25519(001d)" \
4219         -s "Certificate verification was skipped" \
4220         -C "received HelloRetryRequest message"
4221
4222requires_config_enabled MBEDTLS_SSL_SRV_C
4223requires_config_enabled MBEDTLS_DEBUG_C
4224requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4226requires_config_enabled PSA_WANT_ALG_ECDH
4227requires_gnutls_tls1_3
4228requires_gnutls_next_no_ticket
4229requires_gnutls_next_disable_tls13_compat
4230run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
4231         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4232         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
4233         0 \
4234         -s "Protocol is TLSv1.3" \
4235         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4236         -s "received signature algorithm: 0x503" \
4237         -s "got named group: x25519(001d)" \
4238         -s "Certificate verification was skipped" \
4239         -C "received HelloRetryRequest message"
4240
4241requires_config_enabled MBEDTLS_SSL_SRV_C
4242requires_config_enabled MBEDTLS_DEBUG_C
4243requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4244requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4245requires_config_enabled PSA_WANT_ALG_ECDH
4246requires_gnutls_tls1_3
4247requires_gnutls_next_no_ticket
4248requires_gnutls_next_disable_tls13_compat
4249run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
4250         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4251         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
4252         0 \
4253         -s "Protocol is TLSv1.3" \
4254         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4255         -s "received signature algorithm: 0x603" \
4256         -s "got named group: x25519(001d)" \
4257         -s "Certificate verification was skipped" \
4258         -C "received HelloRetryRequest message"
4259
4260requires_config_enabled MBEDTLS_SSL_SRV_C
4261requires_config_enabled MBEDTLS_DEBUG_C
4262requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4263requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4264requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4265requires_config_enabled PSA_WANT_ALG_ECDH
4266requires_gnutls_tls1_3
4267requires_gnutls_next_no_ticket
4268requires_gnutls_next_disable_tls13_compat
4269run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
4270         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4271         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
4272         0 \
4273         -s "Protocol is TLSv1.3" \
4274         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4275         -s "received signature algorithm: 0x804" \
4276         -s "got named group: x25519(001d)" \
4277         -s "Certificate verification was skipped" \
4278         -C "received HelloRetryRequest message"
4279
4280requires_config_enabled MBEDTLS_SSL_SRV_C
4281requires_config_enabled MBEDTLS_DEBUG_C
4282requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4283requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4284requires_config_enabled PSA_WANT_ALG_ECDH
4285requires_gnutls_tls1_3
4286requires_gnutls_next_no_ticket
4287requires_gnutls_next_disable_tls13_compat
4288run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
4289         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4290         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
4291         0 \
4292         -s "Protocol is TLSv1.3" \
4293         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4294         -s "received signature algorithm: 0x403" \
4295         -s "got named group: x448(001e)" \
4296         -s "Certificate verification was skipped" \
4297         -C "received HelloRetryRequest message"
4298
4299requires_config_enabled MBEDTLS_SSL_SRV_C
4300requires_config_enabled MBEDTLS_DEBUG_C
4301requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4303requires_config_enabled PSA_WANT_ALG_ECDH
4304requires_gnutls_tls1_3
4305requires_gnutls_next_no_ticket
4306requires_gnutls_next_disable_tls13_compat
4307run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
4308         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4309         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
4310         0 \
4311         -s "Protocol is TLSv1.3" \
4312         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4313         -s "received signature algorithm: 0x503" \
4314         -s "got named group: x448(001e)" \
4315         -s "Certificate verification was skipped" \
4316         -C "received HelloRetryRequest message"
4317
4318requires_config_enabled MBEDTLS_SSL_SRV_C
4319requires_config_enabled MBEDTLS_DEBUG_C
4320requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4321requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4322requires_config_enabled PSA_WANT_ALG_ECDH
4323requires_gnutls_tls1_3
4324requires_gnutls_next_no_ticket
4325requires_gnutls_next_disable_tls13_compat
4326run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
4327         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4328         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
4329         0 \
4330         -s "Protocol is TLSv1.3" \
4331         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4332         -s "received signature algorithm: 0x603" \
4333         -s "got named group: x448(001e)" \
4334         -s "Certificate verification was skipped" \
4335         -C "received HelloRetryRequest message"
4336
4337requires_config_enabled MBEDTLS_SSL_SRV_C
4338requires_config_enabled MBEDTLS_DEBUG_C
4339requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4340requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4341requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4342requires_config_enabled PSA_WANT_ALG_ECDH
4343requires_gnutls_tls1_3
4344requires_gnutls_next_no_ticket
4345requires_gnutls_next_disable_tls13_compat
4346run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
4347         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4348         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
4349         0 \
4350         -s "Protocol is TLSv1.3" \
4351         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4352         -s "received signature algorithm: 0x804" \
4353         -s "got named group: x448(001e)" \
4354         -s "Certificate verification was skipped" \
4355         -C "received HelloRetryRequest message"
4356
4357requires_config_enabled MBEDTLS_SSL_SRV_C
4358requires_config_enabled MBEDTLS_DEBUG_C
4359requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4360requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4361requires_config_enabled PSA_WANT_ALG_FFDH
4362requires_config_enabled PSA_WANT_DH_RFC7919_2048
4363requires_gnutls_tls1_3
4364requires_gnutls_next_no_ticket
4365requires_gnutls_next_disable_tls13_compat
4366run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
4367         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4368         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
4369         0 \
4370         -s "Protocol is TLSv1.3" \
4371         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4372         -s "received signature algorithm: 0x403" \
4373         -s "got named group: ffdhe2048(0100)" \
4374         -s "Certificate verification was skipped" \
4375         -C "received HelloRetryRequest message"
4376
4377requires_config_enabled MBEDTLS_SSL_SRV_C
4378requires_config_enabled MBEDTLS_DEBUG_C
4379requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4381requires_config_enabled PSA_WANT_ALG_FFDH
4382requires_config_enabled PSA_WANT_DH_RFC7919_2048
4383requires_gnutls_tls1_3
4384requires_gnutls_next_no_ticket
4385requires_gnutls_next_disable_tls13_compat
4386run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
4387         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4388         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
4389         0 \
4390         -s "Protocol is TLSv1.3" \
4391         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4392         -s "received signature algorithm: 0x503" \
4393         -s "got named group: ffdhe2048(0100)" \
4394         -s "Certificate verification was skipped" \
4395         -C "received HelloRetryRequest message"
4396
4397requires_config_enabled MBEDTLS_SSL_SRV_C
4398requires_config_enabled MBEDTLS_DEBUG_C
4399requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4400requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4401requires_config_enabled PSA_WANT_ALG_FFDH
4402requires_config_enabled PSA_WANT_DH_RFC7919_2048
4403requires_gnutls_tls1_3
4404requires_gnutls_next_no_ticket
4405requires_gnutls_next_disable_tls13_compat
4406run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
4407         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4408         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
4409         0 \
4410         -s "Protocol is TLSv1.3" \
4411         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4412         -s "received signature algorithm: 0x603" \
4413         -s "got named group: ffdhe2048(0100)" \
4414         -s "Certificate verification was skipped" \
4415         -C "received HelloRetryRequest message"
4416
4417requires_config_enabled MBEDTLS_SSL_SRV_C
4418requires_config_enabled MBEDTLS_DEBUG_C
4419requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4421requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4422requires_config_enabled PSA_WANT_ALG_FFDH
4423requires_config_enabled PSA_WANT_DH_RFC7919_2048
4424requires_gnutls_tls1_3
4425requires_gnutls_next_no_ticket
4426requires_gnutls_next_disable_tls13_compat
4427run_test "TLS 1.3 G->m: AES_128_CCM_8_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
4428         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
4429         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca_cat12.crt --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
4430         0 \
4431         -s "Protocol is TLSv1.3" \
4432         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
4433         -s "received signature algorithm: 0x804" \
4434         -s "got named group: ffdhe2048(0100)" \
4435         -s "Certificate verification was skipped" \
4436         -C "received HelloRetryRequest message"
4437
4438requires_openssl_tls1_3
4439requires_config_enabled MBEDTLS_SSL_CLI_C
4440requires_config_enabled MBEDTLS_DEBUG_C
4441requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4442requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4443requires_config_enabled PSA_WANT_ALG_ECDH
4444run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
4445         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4446         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
4447         0 \
4448         -c "HTTP/1.0 200 ok" \
4449         -c "Protocol is TLSv1.3" \
4450         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4451         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4452         -c "NamedGroup: secp256r1 ( 17 )" \
4453         -c "Verifying peer X.509 certificate... ok" \
4454         -C "received HelloRetryRequest message"
4455
4456requires_openssl_tls1_3
4457requires_config_enabled MBEDTLS_SSL_CLI_C
4458requires_config_enabled MBEDTLS_DEBUG_C
4459requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4460requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4461requires_config_enabled PSA_WANT_ALG_ECDH
4462run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
4463         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4464         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
4465         0 \
4466         -c "HTTP/1.0 200 ok" \
4467         -c "Protocol is TLSv1.3" \
4468         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4469         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4470         -c "NamedGroup: secp256r1 ( 17 )" \
4471         -c "Verifying peer X.509 certificate... ok" \
4472         -C "received HelloRetryRequest message"
4473
4474requires_openssl_tls1_3
4475requires_config_enabled MBEDTLS_SSL_CLI_C
4476requires_config_enabled MBEDTLS_DEBUG_C
4477requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4478requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4479requires_config_enabled PSA_WANT_ALG_ECDH
4480run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
4481         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4482         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
4483         0 \
4484         -c "HTTP/1.0 200 ok" \
4485         -c "Protocol is TLSv1.3" \
4486         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4487         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4488         -c "NamedGroup: secp256r1 ( 17 )" \
4489         -c "Verifying peer X.509 certificate... ok" \
4490         -C "received HelloRetryRequest message"
4491
4492requires_openssl_tls1_3
4493requires_config_enabled MBEDTLS_SSL_CLI_C
4494requires_config_enabled MBEDTLS_DEBUG_C
4495requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4497requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4498requires_config_enabled PSA_WANT_ALG_ECDH
4499run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
4500         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4501         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
4502         0 \
4503         -c "HTTP/1.0 200 ok" \
4504         -c "Protocol is TLSv1.3" \
4505         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4506         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4507         -c "NamedGroup: secp256r1 ( 17 )" \
4508         -c "Verifying peer X.509 certificate... ok" \
4509         -C "received HelloRetryRequest message"
4510
4511requires_openssl_tls1_3
4512requires_config_enabled MBEDTLS_SSL_CLI_C
4513requires_config_enabled MBEDTLS_DEBUG_C
4514requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4515requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4516requires_config_enabled PSA_WANT_ALG_ECDH
4517run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
4518         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4519         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
4520         0 \
4521         -c "HTTP/1.0 200 ok" \
4522         -c "Protocol is TLSv1.3" \
4523         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4524         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4525         -c "NamedGroup: secp384r1 ( 18 )" \
4526         -c "Verifying peer X.509 certificate... ok" \
4527         -C "received HelloRetryRequest message"
4528
4529requires_openssl_tls1_3
4530requires_config_enabled MBEDTLS_SSL_CLI_C
4531requires_config_enabled MBEDTLS_DEBUG_C
4532requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4533requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4534requires_config_enabled PSA_WANT_ALG_ECDH
4535run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
4536         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4537         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
4538         0 \
4539         -c "HTTP/1.0 200 ok" \
4540         -c "Protocol is TLSv1.3" \
4541         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4542         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4543         -c "NamedGroup: secp384r1 ( 18 )" \
4544         -c "Verifying peer X.509 certificate... ok" \
4545         -C "received HelloRetryRequest message"
4546
4547requires_openssl_tls1_3
4548requires_config_enabled MBEDTLS_SSL_CLI_C
4549requires_config_enabled MBEDTLS_DEBUG_C
4550requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4552requires_config_enabled PSA_WANT_ALG_ECDH
4553run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
4554         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4555         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
4556         0 \
4557         -c "HTTP/1.0 200 ok" \
4558         -c "Protocol is TLSv1.3" \
4559         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4560         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4561         -c "NamedGroup: secp384r1 ( 18 )" \
4562         -c "Verifying peer X.509 certificate... ok" \
4563         -C "received HelloRetryRequest message"
4564
4565requires_openssl_tls1_3
4566requires_config_enabled MBEDTLS_SSL_CLI_C
4567requires_config_enabled MBEDTLS_DEBUG_C
4568requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4569requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4570requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4571requires_config_enabled PSA_WANT_ALG_ECDH
4572run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
4573         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4574         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
4575         0 \
4576         -c "HTTP/1.0 200 ok" \
4577         -c "Protocol is TLSv1.3" \
4578         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4579         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4580         -c "NamedGroup: secp384r1 ( 18 )" \
4581         -c "Verifying peer X.509 certificate... ok" \
4582         -C "received HelloRetryRequest message"
4583
4584requires_openssl_tls1_3
4585requires_config_enabled MBEDTLS_SSL_CLI_C
4586requires_config_enabled MBEDTLS_DEBUG_C
4587requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4588requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4589requires_config_enabled PSA_WANT_ALG_ECDH
4590run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
4591         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4592         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
4593         0 \
4594         -c "HTTP/1.0 200 ok" \
4595         -c "Protocol is TLSv1.3" \
4596         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4597         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4598         -c "NamedGroup: secp521r1 ( 19 )" \
4599         -c "Verifying peer X.509 certificate... ok" \
4600         -C "received HelloRetryRequest message"
4601
4602requires_openssl_tls1_3
4603requires_config_enabled MBEDTLS_SSL_CLI_C
4604requires_config_enabled MBEDTLS_DEBUG_C
4605requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4606requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4607requires_config_enabled PSA_WANT_ALG_ECDH
4608run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
4609         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4610         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
4611         0 \
4612         -c "HTTP/1.0 200 ok" \
4613         -c "Protocol is TLSv1.3" \
4614         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4615         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4616         -c "NamedGroup: secp521r1 ( 19 )" \
4617         -c "Verifying peer X.509 certificate... ok" \
4618         -C "received HelloRetryRequest message"
4619
4620requires_openssl_tls1_3
4621requires_config_enabled MBEDTLS_SSL_CLI_C
4622requires_config_enabled MBEDTLS_DEBUG_C
4623requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4624requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4625requires_config_enabled PSA_WANT_ALG_ECDH
4626run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
4627         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4628         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
4629         0 \
4630         -c "HTTP/1.0 200 ok" \
4631         -c "Protocol is TLSv1.3" \
4632         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4633         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4634         -c "NamedGroup: secp521r1 ( 19 )" \
4635         -c "Verifying peer X.509 certificate... ok" \
4636         -C "received HelloRetryRequest message"
4637
4638requires_openssl_tls1_3
4639requires_config_enabled MBEDTLS_SSL_CLI_C
4640requires_config_enabled MBEDTLS_DEBUG_C
4641requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4642requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4643requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4644requires_config_enabled PSA_WANT_ALG_ECDH
4645run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
4646         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4647         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
4648         0 \
4649         -c "HTTP/1.0 200 ok" \
4650         -c "Protocol is TLSv1.3" \
4651         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4652         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4653         -c "NamedGroup: secp521r1 ( 19 )" \
4654         -c "Verifying peer X.509 certificate... ok" \
4655         -C "received HelloRetryRequest message"
4656
4657requires_openssl_tls1_3
4658requires_config_enabled MBEDTLS_SSL_CLI_C
4659requires_config_enabled MBEDTLS_DEBUG_C
4660requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4661requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4662requires_config_enabled PSA_WANT_ALG_ECDH
4663run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
4664         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4665         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
4666         0 \
4667         -c "HTTP/1.0 200 ok" \
4668         -c "Protocol is TLSv1.3" \
4669         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4670         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4671         -c "NamedGroup: x25519 ( 1d )" \
4672         -c "Verifying peer X.509 certificate... ok" \
4673         -C "received HelloRetryRequest message"
4674
4675requires_openssl_tls1_3
4676requires_config_enabled MBEDTLS_SSL_CLI_C
4677requires_config_enabled MBEDTLS_DEBUG_C
4678requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4680requires_config_enabled PSA_WANT_ALG_ECDH
4681run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
4682         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4683         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
4684         0 \
4685         -c "HTTP/1.0 200 ok" \
4686         -c "Protocol is TLSv1.3" \
4687         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4688         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4689         -c "NamedGroup: x25519 ( 1d )" \
4690         -c "Verifying peer X.509 certificate... ok" \
4691         -C "received HelloRetryRequest message"
4692
4693requires_openssl_tls1_3
4694requires_config_enabled MBEDTLS_SSL_CLI_C
4695requires_config_enabled MBEDTLS_DEBUG_C
4696requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4697requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4698requires_config_enabled PSA_WANT_ALG_ECDH
4699run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
4700         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4701         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
4702         0 \
4703         -c "HTTP/1.0 200 ok" \
4704         -c "Protocol is TLSv1.3" \
4705         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4706         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4707         -c "NamedGroup: x25519 ( 1d )" \
4708         -c "Verifying peer X.509 certificate... ok" \
4709         -C "received HelloRetryRequest message"
4710
4711requires_openssl_tls1_3
4712requires_config_enabled MBEDTLS_SSL_CLI_C
4713requires_config_enabled MBEDTLS_DEBUG_C
4714requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4715requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4716requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4717requires_config_enabled PSA_WANT_ALG_ECDH
4718run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
4719         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4720         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
4721         0 \
4722         -c "HTTP/1.0 200 ok" \
4723         -c "Protocol is TLSv1.3" \
4724         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4725         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4726         -c "NamedGroup: x25519 ( 1d )" \
4727         -c "Verifying peer X.509 certificate... ok" \
4728         -C "received HelloRetryRequest message"
4729
4730requires_openssl_tls1_3
4731requires_config_enabled MBEDTLS_SSL_CLI_C
4732requires_config_enabled MBEDTLS_DEBUG_C
4733requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4734requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4735requires_config_enabled PSA_WANT_ALG_ECDH
4736run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
4737         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4738         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
4739         0 \
4740         -c "HTTP/1.0 200 ok" \
4741         -c "Protocol is TLSv1.3" \
4742         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4743         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4744         -c "NamedGroup: x448 ( 1e )" \
4745         -c "Verifying peer X.509 certificate... ok" \
4746         -C "received HelloRetryRequest message"
4747
4748requires_openssl_tls1_3
4749requires_config_enabled MBEDTLS_SSL_CLI_C
4750requires_config_enabled MBEDTLS_DEBUG_C
4751requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4752requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4753requires_config_enabled PSA_WANT_ALG_ECDH
4754run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
4755         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4756         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
4757         0 \
4758         -c "HTTP/1.0 200 ok" \
4759         -c "Protocol is TLSv1.3" \
4760         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4761         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4762         -c "NamedGroup: x448 ( 1e )" \
4763         -c "Verifying peer X.509 certificate... ok" \
4764         -C "received HelloRetryRequest message"
4765
4766requires_openssl_tls1_3
4767requires_config_enabled MBEDTLS_SSL_CLI_C
4768requires_config_enabled MBEDTLS_DEBUG_C
4769requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4770requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4771requires_config_enabled PSA_WANT_ALG_ECDH
4772run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
4773         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4774         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
4775         0 \
4776         -c "HTTP/1.0 200 ok" \
4777         -c "Protocol is TLSv1.3" \
4778         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4779         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4780         -c "NamedGroup: x448 ( 1e )" \
4781         -c "Verifying peer X.509 certificate... ok" \
4782         -C "received HelloRetryRequest message"
4783
4784requires_openssl_tls1_3
4785requires_config_enabled MBEDTLS_SSL_CLI_C
4786requires_config_enabled MBEDTLS_DEBUG_C
4787requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4788requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4789requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4790requires_config_enabled PSA_WANT_ALG_ECDH
4791run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
4792         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4793         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
4794         0 \
4795         -c "HTTP/1.0 200 ok" \
4796         -c "Protocol is TLSv1.3" \
4797         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4798         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4799         -c "NamedGroup: x448 ( 1e )" \
4800         -c "Verifying peer X.509 certificate... ok" \
4801         -C "received HelloRetryRequest message"
4802
4803requires_openssl_tls1_3_with_ffdh
4804requires_config_enabled MBEDTLS_SSL_CLI_C
4805requires_config_enabled MBEDTLS_DEBUG_C
4806requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4807requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4808requires_config_enabled PSA_WANT_ALG_FFDH
4809requires_config_enabled PSA_WANT_DH_RFC7919_2048
4810run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
4811         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4812         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
4813         0 \
4814         -c "HTTP/1.0 200 ok" \
4815         -c "Protocol is TLSv1.3" \
4816         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4817         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4818         -c "NamedGroup: ffdhe2048 ( 100 )" \
4819         -c "Verifying peer X.509 certificate... ok" \
4820         -C "received HelloRetryRequest message"
4821
4822requires_openssl_tls1_3_with_ffdh
4823requires_config_enabled MBEDTLS_SSL_CLI_C
4824requires_config_enabled MBEDTLS_DEBUG_C
4825requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4826requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4827requires_config_enabled PSA_WANT_ALG_FFDH
4828requires_config_enabled PSA_WANT_DH_RFC7919_2048
4829run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
4830         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4831         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
4832         0 \
4833         -c "HTTP/1.0 200 ok" \
4834         -c "Protocol is TLSv1.3" \
4835         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4836         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4837         -c "NamedGroup: ffdhe2048 ( 100 )" \
4838         -c "Verifying peer X.509 certificate... ok" \
4839         -C "received HelloRetryRequest message"
4840
4841requires_openssl_tls1_3_with_ffdh
4842requires_config_enabled MBEDTLS_SSL_CLI_C
4843requires_config_enabled MBEDTLS_DEBUG_C
4844requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4845requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4846requires_config_enabled PSA_WANT_ALG_FFDH
4847requires_config_enabled PSA_WANT_DH_RFC7919_2048
4848run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
4849         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4850         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
4851         0 \
4852         -c "HTTP/1.0 200 ok" \
4853         -c "Protocol is TLSv1.3" \
4854         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4855         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4856         -c "NamedGroup: ffdhe2048 ( 100 )" \
4857         -c "Verifying peer X.509 certificate... ok" \
4858         -C "received HelloRetryRequest message"
4859
4860requires_openssl_tls1_3_with_ffdh
4861requires_config_enabled MBEDTLS_SSL_CLI_C
4862requires_config_enabled MBEDTLS_DEBUG_C
4863requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4864requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4865requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4866requires_config_enabled PSA_WANT_ALG_FFDH
4867requires_config_enabled PSA_WANT_DH_RFC7919_2048
4868run_test "TLS 1.3 m->O: AES_128_GCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
4869         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_GCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4870         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
4871         0 \
4872         -c "HTTP/1.0 200 ok" \
4873         -c "Protocol is TLSv1.3" \
4874         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
4875         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4876         -c "NamedGroup: ffdhe2048 ( 100 )" \
4877         -c "Verifying peer X.509 certificate... ok" \
4878         -C "received HelloRetryRequest message"
4879
4880requires_openssl_tls1_3
4881requires_config_enabled MBEDTLS_SSL_CLI_C
4882requires_config_enabled MBEDTLS_DEBUG_C
4883requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4884requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4885requires_config_enabled PSA_WANT_ALG_ECDH
4886run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
4887         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4888         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
4889         0 \
4890         -c "HTTP/1.0 200 ok" \
4891         -c "Protocol is TLSv1.3" \
4892         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4893         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4894         -c "NamedGroup: secp256r1 ( 17 )" \
4895         -c "Verifying peer X.509 certificate... ok" \
4896         -C "received HelloRetryRequest message"
4897
4898requires_openssl_tls1_3
4899requires_config_enabled MBEDTLS_SSL_CLI_C
4900requires_config_enabled MBEDTLS_DEBUG_C
4901requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4902requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4903requires_config_enabled PSA_WANT_ALG_ECDH
4904run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
4905         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4906         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
4907         0 \
4908         -c "HTTP/1.0 200 ok" \
4909         -c "Protocol is TLSv1.3" \
4910         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4911         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4912         -c "NamedGroup: secp256r1 ( 17 )" \
4913         -c "Verifying peer X.509 certificate... ok" \
4914         -C "received HelloRetryRequest message"
4915
4916requires_openssl_tls1_3
4917requires_config_enabled MBEDTLS_SSL_CLI_C
4918requires_config_enabled MBEDTLS_DEBUG_C
4919requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4920requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4921requires_config_enabled PSA_WANT_ALG_ECDH
4922run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
4923         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4924         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
4925         0 \
4926         -c "HTTP/1.0 200 ok" \
4927         -c "Protocol is TLSv1.3" \
4928         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4929         -c "Certificate Verify: Signature algorithm ( 0603 )" \
4930         -c "NamedGroup: secp256r1 ( 17 )" \
4931         -c "Verifying peer X.509 certificate... ok" \
4932         -C "received HelloRetryRequest message"
4933
4934requires_openssl_tls1_3
4935requires_config_enabled MBEDTLS_SSL_CLI_C
4936requires_config_enabled MBEDTLS_DEBUG_C
4937requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4938requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4939requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
4940requires_config_enabled PSA_WANT_ALG_ECDH
4941run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
4942         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4943         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
4944         0 \
4945         -c "HTTP/1.0 200 ok" \
4946         -c "Protocol is TLSv1.3" \
4947         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4948         -c "Certificate Verify: Signature algorithm ( 0804 )" \
4949         -c "NamedGroup: secp256r1 ( 17 )" \
4950         -c "Verifying peer X.509 certificate... ok" \
4951         -C "received HelloRetryRequest message"
4952
4953requires_openssl_tls1_3
4954requires_config_enabled MBEDTLS_SSL_CLI_C
4955requires_config_enabled MBEDTLS_DEBUG_C
4956requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4958requires_config_enabled PSA_WANT_ALG_ECDH
4959run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
4960         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4961         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
4962         0 \
4963         -c "HTTP/1.0 200 ok" \
4964         -c "Protocol is TLSv1.3" \
4965         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4966         -c "Certificate Verify: Signature algorithm ( 0403 )" \
4967         -c "NamedGroup: secp384r1 ( 18 )" \
4968         -c "Verifying peer X.509 certificate... ok" \
4969         -C "received HelloRetryRequest message"
4970
4971requires_openssl_tls1_3
4972requires_config_enabled MBEDTLS_SSL_CLI_C
4973requires_config_enabled MBEDTLS_DEBUG_C
4974requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4976requires_config_enabled PSA_WANT_ALG_ECDH
4977run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
4978         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4979         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
4980         0 \
4981         -c "HTTP/1.0 200 ok" \
4982         -c "Protocol is TLSv1.3" \
4983         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
4984         -c "Certificate Verify: Signature algorithm ( 0503 )" \
4985         -c "NamedGroup: secp384r1 ( 18 )" \
4986         -c "Verifying peer X.509 certificate... ok" \
4987         -C "received HelloRetryRequest message"
4988
4989requires_openssl_tls1_3
4990requires_config_enabled MBEDTLS_SSL_CLI_C
4991requires_config_enabled MBEDTLS_DEBUG_C
4992requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
4993requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
4994requires_config_enabled PSA_WANT_ALG_ECDH
4995run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
4996         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
4997         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
4998         0 \
4999         -c "HTTP/1.0 200 ok" \
5000         -c "Protocol is TLSv1.3" \
5001         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5002         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5003         -c "NamedGroup: secp384r1 ( 18 )" \
5004         -c "Verifying peer X.509 certificate... ok" \
5005         -C "received HelloRetryRequest message"
5006
5007requires_openssl_tls1_3
5008requires_config_enabled MBEDTLS_SSL_CLI_C
5009requires_config_enabled MBEDTLS_DEBUG_C
5010requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5011requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5012requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5013requires_config_enabled PSA_WANT_ALG_ECDH
5014run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
5015         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5016         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
5017         0 \
5018         -c "HTTP/1.0 200 ok" \
5019         -c "Protocol is TLSv1.3" \
5020         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5021         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5022         -c "NamedGroup: secp384r1 ( 18 )" \
5023         -c "Verifying peer X.509 certificate... ok" \
5024         -C "received HelloRetryRequest message"
5025
5026requires_openssl_tls1_3
5027requires_config_enabled MBEDTLS_SSL_CLI_C
5028requires_config_enabled MBEDTLS_DEBUG_C
5029requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5030requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5031requires_config_enabled PSA_WANT_ALG_ECDH
5032run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
5033         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5034         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
5035         0 \
5036         -c "HTTP/1.0 200 ok" \
5037         -c "Protocol is TLSv1.3" \
5038         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5039         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5040         -c "NamedGroup: secp521r1 ( 19 )" \
5041         -c "Verifying peer X.509 certificate... ok" \
5042         -C "received HelloRetryRequest message"
5043
5044requires_openssl_tls1_3
5045requires_config_enabled MBEDTLS_SSL_CLI_C
5046requires_config_enabled MBEDTLS_DEBUG_C
5047requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5048requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5049requires_config_enabled PSA_WANT_ALG_ECDH
5050run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
5051         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5052         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
5053         0 \
5054         -c "HTTP/1.0 200 ok" \
5055         -c "Protocol is TLSv1.3" \
5056         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5057         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5058         -c "NamedGroup: secp521r1 ( 19 )" \
5059         -c "Verifying peer X.509 certificate... ok" \
5060         -C "received HelloRetryRequest message"
5061
5062requires_openssl_tls1_3
5063requires_config_enabled MBEDTLS_SSL_CLI_C
5064requires_config_enabled MBEDTLS_DEBUG_C
5065requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5066requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5067requires_config_enabled PSA_WANT_ALG_ECDH
5068run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
5069         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5070         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
5071         0 \
5072         -c "HTTP/1.0 200 ok" \
5073         -c "Protocol is TLSv1.3" \
5074         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5075         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5076         -c "NamedGroup: secp521r1 ( 19 )" \
5077         -c "Verifying peer X.509 certificate... ok" \
5078         -C "received HelloRetryRequest message"
5079
5080requires_openssl_tls1_3
5081requires_config_enabled MBEDTLS_SSL_CLI_C
5082requires_config_enabled MBEDTLS_DEBUG_C
5083requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5084requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5085requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5086requires_config_enabled PSA_WANT_ALG_ECDH
5087run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
5088         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5089         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
5090         0 \
5091         -c "HTTP/1.0 200 ok" \
5092         -c "Protocol is TLSv1.3" \
5093         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5094         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5095         -c "NamedGroup: secp521r1 ( 19 )" \
5096         -c "Verifying peer X.509 certificate... ok" \
5097         -C "received HelloRetryRequest message"
5098
5099requires_openssl_tls1_3
5100requires_config_enabled MBEDTLS_SSL_CLI_C
5101requires_config_enabled MBEDTLS_DEBUG_C
5102requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5103requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5104requires_config_enabled PSA_WANT_ALG_ECDH
5105run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
5106         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5107         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
5108         0 \
5109         -c "HTTP/1.0 200 ok" \
5110         -c "Protocol is TLSv1.3" \
5111         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5112         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5113         -c "NamedGroup: x25519 ( 1d )" \
5114         -c "Verifying peer X.509 certificate... ok" \
5115         -C "received HelloRetryRequest message"
5116
5117requires_openssl_tls1_3
5118requires_config_enabled MBEDTLS_SSL_CLI_C
5119requires_config_enabled MBEDTLS_DEBUG_C
5120requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5121requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5122requires_config_enabled PSA_WANT_ALG_ECDH
5123run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
5124         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5125         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
5126         0 \
5127         -c "HTTP/1.0 200 ok" \
5128         -c "Protocol is TLSv1.3" \
5129         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5130         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5131         -c "NamedGroup: x25519 ( 1d )" \
5132         -c "Verifying peer X.509 certificate... ok" \
5133         -C "received HelloRetryRequest message"
5134
5135requires_openssl_tls1_3
5136requires_config_enabled MBEDTLS_SSL_CLI_C
5137requires_config_enabled MBEDTLS_DEBUG_C
5138requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5140requires_config_enabled PSA_WANT_ALG_ECDH
5141run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
5142         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5143         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
5144         0 \
5145         -c "HTTP/1.0 200 ok" \
5146         -c "Protocol is TLSv1.3" \
5147         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5148         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5149         -c "NamedGroup: x25519 ( 1d )" \
5150         -c "Verifying peer X.509 certificate... ok" \
5151         -C "received HelloRetryRequest message"
5152
5153requires_openssl_tls1_3
5154requires_config_enabled MBEDTLS_SSL_CLI_C
5155requires_config_enabled MBEDTLS_DEBUG_C
5156requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5157requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5158requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5159requires_config_enabled PSA_WANT_ALG_ECDH
5160run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
5161         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5162         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
5163         0 \
5164         -c "HTTP/1.0 200 ok" \
5165         -c "Protocol is TLSv1.3" \
5166         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5167         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5168         -c "NamedGroup: x25519 ( 1d )" \
5169         -c "Verifying peer X.509 certificate... ok" \
5170         -C "received HelloRetryRequest message"
5171
5172requires_openssl_tls1_3
5173requires_config_enabled MBEDTLS_SSL_CLI_C
5174requires_config_enabled MBEDTLS_DEBUG_C
5175requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5176requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5177requires_config_enabled PSA_WANT_ALG_ECDH
5178run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
5179         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5180         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
5181         0 \
5182         -c "HTTP/1.0 200 ok" \
5183         -c "Protocol is TLSv1.3" \
5184         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5185         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5186         -c "NamedGroup: x448 ( 1e )" \
5187         -c "Verifying peer X.509 certificate... ok" \
5188         -C "received HelloRetryRequest message"
5189
5190requires_openssl_tls1_3
5191requires_config_enabled MBEDTLS_SSL_CLI_C
5192requires_config_enabled MBEDTLS_DEBUG_C
5193requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5194requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5195requires_config_enabled PSA_WANT_ALG_ECDH
5196run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
5197         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5198         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
5199         0 \
5200         -c "HTTP/1.0 200 ok" \
5201         -c "Protocol is TLSv1.3" \
5202         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5203         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5204         -c "NamedGroup: x448 ( 1e )" \
5205         -c "Verifying peer X.509 certificate... ok" \
5206         -C "received HelloRetryRequest message"
5207
5208requires_openssl_tls1_3
5209requires_config_enabled MBEDTLS_SSL_CLI_C
5210requires_config_enabled MBEDTLS_DEBUG_C
5211requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5212requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5213requires_config_enabled PSA_WANT_ALG_ECDH
5214run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
5215         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5216         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
5217         0 \
5218         -c "HTTP/1.0 200 ok" \
5219         -c "Protocol is TLSv1.3" \
5220         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5221         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5222         -c "NamedGroup: x448 ( 1e )" \
5223         -c "Verifying peer X.509 certificate... ok" \
5224         -C "received HelloRetryRequest message"
5225
5226requires_openssl_tls1_3
5227requires_config_enabled MBEDTLS_SSL_CLI_C
5228requires_config_enabled MBEDTLS_DEBUG_C
5229requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5230requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5231requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5232requires_config_enabled PSA_WANT_ALG_ECDH
5233run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
5234         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5235         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
5236         0 \
5237         -c "HTTP/1.0 200 ok" \
5238         -c "Protocol is TLSv1.3" \
5239         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5240         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5241         -c "NamedGroup: x448 ( 1e )" \
5242         -c "Verifying peer X.509 certificate... ok" \
5243         -C "received HelloRetryRequest message"
5244
5245requires_openssl_tls1_3_with_ffdh
5246requires_config_enabled MBEDTLS_SSL_CLI_C
5247requires_config_enabled MBEDTLS_DEBUG_C
5248requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5249requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5250requires_config_enabled PSA_WANT_ALG_FFDH
5251requires_config_enabled PSA_WANT_DH_RFC7919_2048
5252run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp256r1_sha256" \
5253         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5254         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
5255         0 \
5256         -c "HTTP/1.0 200 ok" \
5257         -c "Protocol is TLSv1.3" \
5258         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5259         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5260         -c "NamedGroup: ffdhe2048 ( 100 )" \
5261         -c "Verifying peer X.509 certificate... ok" \
5262         -C "received HelloRetryRequest message"
5263
5264requires_openssl_tls1_3_with_ffdh
5265requires_config_enabled MBEDTLS_SSL_CLI_C
5266requires_config_enabled MBEDTLS_DEBUG_C
5267requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5268requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5269requires_config_enabled PSA_WANT_ALG_FFDH
5270requires_config_enabled PSA_WANT_DH_RFC7919_2048
5271run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp384r1_sha384" \
5272         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5273         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
5274         0 \
5275         -c "HTTP/1.0 200 ok" \
5276         -c "Protocol is TLSv1.3" \
5277         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5278         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5279         -c "NamedGroup: ffdhe2048 ( 100 )" \
5280         -c "Verifying peer X.509 certificate... ok" \
5281         -C "received HelloRetryRequest message"
5282
5283requires_openssl_tls1_3_with_ffdh
5284requires_config_enabled MBEDTLS_SSL_CLI_C
5285requires_config_enabled MBEDTLS_DEBUG_C
5286requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5287requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5288requires_config_enabled PSA_WANT_ALG_FFDH
5289requires_config_enabled PSA_WANT_DH_RFC7919_2048
5290run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp521r1_sha512" \
5291         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5292         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
5293         0 \
5294         -c "HTTP/1.0 200 ok" \
5295         -c "Protocol is TLSv1.3" \
5296         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5297         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5298         -c "NamedGroup: ffdhe2048 ( 100 )" \
5299         -c "Verifying peer X.509 certificate... ok" \
5300         -C "received HelloRetryRequest message"
5301
5302requires_openssl_tls1_3_with_ffdh
5303requires_config_enabled MBEDTLS_SSL_CLI_C
5304requires_config_enabled MBEDTLS_DEBUG_C
5305requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5307requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5308requires_config_enabled PSA_WANT_ALG_FFDH
5309requires_config_enabled PSA_WANT_DH_RFC7919_2048
5310run_test "TLS 1.3 m->O: AES_256_GCM_SHA384,ffdhe2048,rsa_pss_rsae_sha256" \
5311         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_256_GCM_SHA384 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5312         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
5313         0 \
5314         -c "HTTP/1.0 200 ok" \
5315         -c "Protocol is TLSv1.3" \
5316         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
5317         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5318         -c "NamedGroup: ffdhe2048 ( 100 )" \
5319         -c "Verifying peer X.509 certificate... ok" \
5320         -C "received HelloRetryRequest message"
5321
5322requires_openssl_tls1_3
5323requires_config_enabled MBEDTLS_SSL_CLI_C
5324requires_config_enabled MBEDTLS_DEBUG_C
5325requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5327requires_config_enabled PSA_WANT_ALG_ECDH
5328run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
5329         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5330         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
5331         0 \
5332         -c "HTTP/1.0 200 ok" \
5333         -c "Protocol is TLSv1.3" \
5334         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5335         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5336         -c "NamedGroup: secp256r1 ( 17 )" \
5337         -c "Verifying peer X.509 certificate... ok" \
5338         -C "received HelloRetryRequest message"
5339
5340requires_openssl_tls1_3
5341requires_config_enabled MBEDTLS_SSL_CLI_C
5342requires_config_enabled MBEDTLS_DEBUG_C
5343requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5344requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5345requires_config_enabled PSA_WANT_ALG_ECDH
5346run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
5347         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5348         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
5349         0 \
5350         -c "HTTP/1.0 200 ok" \
5351         -c "Protocol is TLSv1.3" \
5352         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5353         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5354         -c "NamedGroup: secp256r1 ( 17 )" \
5355         -c "Verifying peer X.509 certificate... ok" \
5356         -C "received HelloRetryRequest message"
5357
5358requires_openssl_tls1_3
5359requires_config_enabled MBEDTLS_SSL_CLI_C
5360requires_config_enabled MBEDTLS_DEBUG_C
5361requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5362requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5363requires_config_enabled PSA_WANT_ALG_ECDH
5364run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
5365         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5366         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
5367         0 \
5368         -c "HTTP/1.0 200 ok" \
5369         -c "Protocol is TLSv1.3" \
5370         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5371         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5372         -c "NamedGroup: secp256r1 ( 17 )" \
5373         -c "Verifying peer X.509 certificate... ok" \
5374         -C "received HelloRetryRequest message"
5375
5376requires_openssl_tls1_3
5377requires_config_enabled MBEDTLS_SSL_CLI_C
5378requires_config_enabled MBEDTLS_DEBUG_C
5379requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5380requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5381requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5382requires_config_enabled PSA_WANT_ALG_ECDH
5383run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
5384         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5385         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
5386         0 \
5387         -c "HTTP/1.0 200 ok" \
5388         -c "Protocol is TLSv1.3" \
5389         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5390         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5391         -c "NamedGroup: secp256r1 ( 17 )" \
5392         -c "Verifying peer X.509 certificate... ok" \
5393         -C "received HelloRetryRequest message"
5394
5395requires_openssl_tls1_3
5396requires_config_enabled MBEDTLS_SSL_CLI_C
5397requires_config_enabled MBEDTLS_DEBUG_C
5398requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5399requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5400requires_config_enabled PSA_WANT_ALG_ECDH
5401run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
5402         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5403         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
5404         0 \
5405         -c "HTTP/1.0 200 ok" \
5406         -c "Protocol is TLSv1.3" \
5407         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5408         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5409         -c "NamedGroup: secp384r1 ( 18 )" \
5410         -c "Verifying peer X.509 certificate... ok" \
5411         -C "received HelloRetryRequest message"
5412
5413requires_openssl_tls1_3
5414requires_config_enabled MBEDTLS_SSL_CLI_C
5415requires_config_enabled MBEDTLS_DEBUG_C
5416requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5417requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5418requires_config_enabled PSA_WANT_ALG_ECDH
5419run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
5420         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5421         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
5422         0 \
5423         -c "HTTP/1.0 200 ok" \
5424         -c "Protocol is TLSv1.3" \
5425         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5426         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5427         -c "NamedGroup: secp384r1 ( 18 )" \
5428         -c "Verifying peer X.509 certificate... ok" \
5429         -C "received HelloRetryRequest message"
5430
5431requires_openssl_tls1_3
5432requires_config_enabled MBEDTLS_SSL_CLI_C
5433requires_config_enabled MBEDTLS_DEBUG_C
5434requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5435requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5436requires_config_enabled PSA_WANT_ALG_ECDH
5437run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
5438         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5439         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
5440         0 \
5441         -c "HTTP/1.0 200 ok" \
5442         -c "Protocol is TLSv1.3" \
5443         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5444         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5445         -c "NamedGroup: secp384r1 ( 18 )" \
5446         -c "Verifying peer X.509 certificate... ok" \
5447         -C "received HelloRetryRequest message"
5448
5449requires_openssl_tls1_3
5450requires_config_enabled MBEDTLS_SSL_CLI_C
5451requires_config_enabled MBEDTLS_DEBUG_C
5452requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5453requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5454requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5455requires_config_enabled PSA_WANT_ALG_ECDH
5456run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
5457         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5458         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
5459         0 \
5460         -c "HTTP/1.0 200 ok" \
5461         -c "Protocol is TLSv1.3" \
5462         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5463         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5464         -c "NamedGroup: secp384r1 ( 18 )" \
5465         -c "Verifying peer X.509 certificate... ok" \
5466         -C "received HelloRetryRequest message"
5467
5468requires_openssl_tls1_3
5469requires_config_enabled MBEDTLS_SSL_CLI_C
5470requires_config_enabled MBEDTLS_DEBUG_C
5471requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5472requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5473requires_config_enabled PSA_WANT_ALG_ECDH
5474run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
5475         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5476         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
5477         0 \
5478         -c "HTTP/1.0 200 ok" \
5479         -c "Protocol is TLSv1.3" \
5480         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5481         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5482         -c "NamedGroup: secp521r1 ( 19 )" \
5483         -c "Verifying peer X.509 certificate... ok" \
5484         -C "received HelloRetryRequest message"
5485
5486requires_openssl_tls1_3
5487requires_config_enabled MBEDTLS_SSL_CLI_C
5488requires_config_enabled MBEDTLS_DEBUG_C
5489requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5490requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5491requires_config_enabled PSA_WANT_ALG_ECDH
5492run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
5493         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5494         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
5495         0 \
5496         -c "HTTP/1.0 200 ok" \
5497         -c "Protocol is TLSv1.3" \
5498         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5499         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5500         -c "NamedGroup: secp521r1 ( 19 )" \
5501         -c "Verifying peer X.509 certificate... ok" \
5502         -C "received HelloRetryRequest message"
5503
5504requires_openssl_tls1_3
5505requires_config_enabled MBEDTLS_SSL_CLI_C
5506requires_config_enabled MBEDTLS_DEBUG_C
5507requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5508requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5509requires_config_enabled PSA_WANT_ALG_ECDH
5510run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
5511         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5512         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
5513         0 \
5514         -c "HTTP/1.0 200 ok" \
5515         -c "Protocol is TLSv1.3" \
5516         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5517         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5518         -c "NamedGroup: secp521r1 ( 19 )" \
5519         -c "Verifying peer X.509 certificate... ok" \
5520         -C "received HelloRetryRequest message"
5521
5522requires_openssl_tls1_3
5523requires_config_enabled MBEDTLS_SSL_CLI_C
5524requires_config_enabled MBEDTLS_DEBUG_C
5525requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5527requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5528requires_config_enabled PSA_WANT_ALG_ECDH
5529run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
5530         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5531         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
5532         0 \
5533         -c "HTTP/1.0 200 ok" \
5534         -c "Protocol is TLSv1.3" \
5535         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5536         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5537         -c "NamedGroup: secp521r1 ( 19 )" \
5538         -c "Verifying peer X.509 certificate... ok" \
5539         -C "received HelloRetryRequest message"
5540
5541requires_openssl_tls1_3
5542requires_config_enabled MBEDTLS_SSL_CLI_C
5543requires_config_enabled MBEDTLS_DEBUG_C
5544requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5545requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5546requires_config_enabled PSA_WANT_ALG_ECDH
5547run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
5548         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5549         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
5550         0 \
5551         -c "HTTP/1.0 200 ok" \
5552         -c "Protocol is TLSv1.3" \
5553         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5554         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5555         -c "NamedGroup: x25519 ( 1d )" \
5556         -c "Verifying peer X.509 certificate... ok" \
5557         -C "received HelloRetryRequest message"
5558
5559requires_openssl_tls1_3
5560requires_config_enabled MBEDTLS_SSL_CLI_C
5561requires_config_enabled MBEDTLS_DEBUG_C
5562requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5564requires_config_enabled PSA_WANT_ALG_ECDH
5565run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
5566         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5567         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
5568         0 \
5569         -c "HTTP/1.0 200 ok" \
5570         -c "Protocol is TLSv1.3" \
5571         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5572         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5573         -c "NamedGroup: x25519 ( 1d )" \
5574         -c "Verifying peer X.509 certificate... ok" \
5575         -C "received HelloRetryRequest message"
5576
5577requires_openssl_tls1_3
5578requires_config_enabled MBEDTLS_SSL_CLI_C
5579requires_config_enabled MBEDTLS_DEBUG_C
5580requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5581requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5582requires_config_enabled PSA_WANT_ALG_ECDH
5583run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
5584         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5585         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
5586         0 \
5587         -c "HTTP/1.0 200 ok" \
5588         -c "Protocol is TLSv1.3" \
5589         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5590         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5591         -c "NamedGroup: x25519 ( 1d )" \
5592         -c "Verifying peer X.509 certificate... ok" \
5593         -C "received HelloRetryRequest message"
5594
5595requires_openssl_tls1_3
5596requires_config_enabled MBEDTLS_SSL_CLI_C
5597requires_config_enabled MBEDTLS_DEBUG_C
5598requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5599requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5600requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5601requires_config_enabled PSA_WANT_ALG_ECDH
5602run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
5603         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5604         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
5605         0 \
5606         -c "HTTP/1.0 200 ok" \
5607         -c "Protocol is TLSv1.3" \
5608         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5609         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5610         -c "NamedGroup: x25519 ( 1d )" \
5611         -c "Verifying peer X.509 certificate... ok" \
5612         -C "received HelloRetryRequest message"
5613
5614requires_openssl_tls1_3
5615requires_config_enabled MBEDTLS_SSL_CLI_C
5616requires_config_enabled MBEDTLS_DEBUG_C
5617requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5618requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5619requires_config_enabled PSA_WANT_ALG_ECDH
5620run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
5621         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5622         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
5623         0 \
5624         -c "HTTP/1.0 200 ok" \
5625         -c "Protocol is TLSv1.3" \
5626         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5627         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5628         -c "NamedGroup: x448 ( 1e )" \
5629         -c "Verifying peer X.509 certificate... ok" \
5630         -C "received HelloRetryRequest message"
5631
5632requires_openssl_tls1_3
5633requires_config_enabled MBEDTLS_SSL_CLI_C
5634requires_config_enabled MBEDTLS_DEBUG_C
5635requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5636requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5637requires_config_enabled PSA_WANT_ALG_ECDH
5638run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
5639         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5640         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
5641         0 \
5642         -c "HTTP/1.0 200 ok" \
5643         -c "Protocol is TLSv1.3" \
5644         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5645         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5646         -c "NamedGroup: x448 ( 1e )" \
5647         -c "Verifying peer X.509 certificate... ok" \
5648         -C "received HelloRetryRequest message"
5649
5650requires_openssl_tls1_3
5651requires_config_enabled MBEDTLS_SSL_CLI_C
5652requires_config_enabled MBEDTLS_DEBUG_C
5653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5655requires_config_enabled PSA_WANT_ALG_ECDH
5656run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
5657         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5658         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
5659         0 \
5660         -c "HTTP/1.0 200 ok" \
5661         -c "Protocol is TLSv1.3" \
5662         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5663         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5664         -c "NamedGroup: x448 ( 1e )" \
5665         -c "Verifying peer X.509 certificate... ok" \
5666         -C "received HelloRetryRequest message"
5667
5668requires_openssl_tls1_3
5669requires_config_enabled MBEDTLS_SSL_CLI_C
5670requires_config_enabled MBEDTLS_DEBUG_C
5671requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5672requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5673requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5674requires_config_enabled PSA_WANT_ALG_ECDH
5675run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
5676         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5677         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
5678         0 \
5679         -c "HTTP/1.0 200 ok" \
5680         -c "Protocol is TLSv1.3" \
5681         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5682         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5683         -c "NamedGroup: x448 ( 1e )" \
5684         -c "Verifying peer X.509 certificate... ok" \
5685         -C "received HelloRetryRequest message"
5686
5687requires_openssl_tls1_3_with_ffdh
5688requires_config_enabled MBEDTLS_SSL_CLI_C
5689requires_config_enabled MBEDTLS_DEBUG_C
5690requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5691requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5692requires_config_enabled PSA_WANT_ALG_FFDH
5693requires_config_enabled PSA_WANT_DH_RFC7919_2048
5694run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
5695         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5696         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
5697         0 \
5698         -c "HTTP/1.0 200 ok" \
5699         -c "Protocol is TLSv1.3" \
5700         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5701         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5702         -c "NamedGroup: ffdhe2048 ( 100 )" \
5703         -c "Verifying peer X.509 certificate... ok" \
5704         -C "received HelloRetryRequest message"
5705
5706requires_openssl_tls1_3_with_ffdh
5707requires_config_enabled MBEDTLS_SSL_CLI_C
5708requires_config_enabled MBEDTLS_DEBUG_C
5709requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5710requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5711requires_config_enabled PSA_WANT_ALG_FFDH
5712requires_config_enabled PSA_WANT_DH_RFC7919_2048
5713run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
5714         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5715         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
5716         0 \
5717         -c "HTTP/1.0 200 ok" \
5718         -c "Protocol is TLSv1.3" \
5719         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5720         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5721         -c "NamedGroup: ffdhe2048 ( 100 )" \
5722         -c "Verifying peer X.509 certificate... ok" \
5723         -C "received HelloRetryRequest message"
5724
5725requires_openssl_tls1_3_with_ffdh
5726requires_config_enabled MBEDTLS_SSL_CLI_C
5727requires_config_enabled MBEDTLS_DEBUG_C
5728requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5730requires_config_enabled PSA_WANT_ALG_FFDH
5731requires_config_enabled PSA_WANT_DH_RFC7919_2048
5732run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
5733         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5734         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
5735         0 \
5736         -c "HTTP/1.0 200 ok" \
5737         -c "Protocol is TLSv1.3" \
5738         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5739         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5740         -c "NamedGroup: ffdhe2048 ( 100 )" \
5741         -c "Verifying peer X.509 certificate... ok" \
5742         -C "received HelloRetryRequest message"
5743
5744requires_openssl_tls1_3_with_ffdh
5745requires_config_enabled MBEDTLS_SSL_CLI_C
5746requires_config_enabled MBEDTLS_DEBUG_C
5747requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5748requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5749requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5750requires_config_enabled PSA_WANT_ALG_FFDH
5751requires_config_enabled PSA_WANT_DH_RFC7919_2048
5752run_test "TLS 1.3 m->O: CHACHA20_POLY1305_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
5753         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_CHACHA20_POLY1305_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5754         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
5755         0 \
5756         -c "HTTP/1.0 200 ok" \
5757         -c "Protocol is TLSv1.3" \
5758         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
5759         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5760         -c "NamedGroup: ffdhe2048 ( 100 )" \
5761         -c "Verifying peer X.509 certificate... ok" \
5762         -C "received HelloRetryRequest message"
5763
5764requires_openssl_tls1_3
5765requires_config_enabled MBEDTLS_SSL_CLI_C
5766requires_config_enabled MBEDTLS_DEBUG_C
5767requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5768requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5769requires_config_enabled PSA_WANT_ALG_ECDH
5770run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
5771         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5772         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
5773         0 \
5774         -c "HTTP/1.0 200 ok" \
5775         -c "Protocol is TLSv1.3" \
5776         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5777         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5778         -c "NamedGroup: secp256r1 ( 17 )" \
5779         -c "Verifying peer X.509 certificate... ok" \
5780         -C "received HelloRetryRequest message"
5781
5782requires_openssl_tls1_3
5783requires_config_enabled MBEDTLS_SSL_CLI_C
5784requires_config_enabled MBEDTLS_DEBUG_C
5785requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5786requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5787requires_config_enabled PSA_WANT_ALG_ECDH
5788run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
5789         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5790         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
5791         0 \
5792         -c "HTTP/1.0 200 ok" \
5793         -c "Protocol is TLSv1.3" \
5794         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5795         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5796         -c "NamedGroup: secp256r1 ( 17 )" \
5797         -c "Verifying peer X.509 certificate... ok" \
5798         -C "received HelloRetryRequest message"
5799
5800requires_openssl_tls1_3
5801requires_config_enabled MBEDTLS_SSL_CLI_C
5802requires_config_enabled MBEDTLS_DEBUG_C
5803requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5804requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5805requires_config_enabled PSA_WANT_ALG_ECDH
5806run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
5807         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5808         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
5809         0 \
5810         -c "HTTP/1.0 200 ok" \
5811         -c "Protocol is TLSv1.3" \
5812         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5813         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5814         -c "NamedGroup: secp256r1 ( 17 )" \
5815         -c "Verifying peer X.509 certificate... ok" \
5816         -C "received HelloRetryRequest message"
5817
5818requires_openssl_tls1_3
5819requires_config_enabled MBEDTLS_SSL_CLI_C
5820requires_config_enabled MBEDTLS_DEBUG_C
5821requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5822requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5823requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5824requires_config_enabled PSA_WANT_ALG_ECDH
5825run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
5826         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5827         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
5828         0 \
5829         -c "HTTP/1.0 200 ok" \
5830         -c "Protocol is TLSv1.3" \
5831         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5832         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5833         -c "NamedGroup: secp256r1 ( 17 )" \
5834         -c "Verifying peer X.509 certificate... ok" \
5835         -C "received HelloRetryRequest message"
5836
5837requires_openssl_tls1_3
5838requires_config_enabled MBEDTLS_SSL_CLI_C
5839requires_config_enabled MBEDTLS_DEBUG_C
5840requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5841requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5842requires_config_enabled PSA_WANT_ALG_ECDH
5843run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
5844         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5845         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
5846         0 \
5847         -c "HTTP/1.0 200 ok" \
5848         -c "Protocol is TLSv1.3" \
5849         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5850         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5851         -c "NamedGroup: secp384r1 ( 18 )" \
5852         -c "Verifying peer X.509 certificate... ok" \
5853         -C "received HelloRetryRequest message"
5854
5855requires_openssl_tls1_3
5856requires_config_enabled MBEDTLS_SSL_CLI_C
5857requires_config_enabled MBEDTLS_DEBUG_C
5858requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5859requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5860requires_config_enabled PSA_WANT_ALG_ECDH
5861run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
5862         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5863         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
5864         0 \
5865         -c "HTTP/1.0 200 ok" \
5866         -c "Protocol is TLSv1.3" \
5867         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5868         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5869         -c "NamedGroup: secp384r1 ( 18 )" \
5870         -c "Verifying peer X.509 certificate... ok" \
5871         -C "received HelloRetryRequest message"
5872
5873requires_openssl_tls1_3
5874requires_config_enabled MBEDTLS_SSL_CLI_C
5875requires_config_enabled MBEDTLS_DEBUG_C
5876requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5878requires_config_enabled PSA_WANT_ALG_ECDH
5879run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
5880         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5881         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
5882         0 \
5883         -c "HTTP/1.0 200 ok" \
5884         -c "Protocol is TLSv1.3" \
5885         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5886         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5887         -c "NamedGroup: secp384r1 ( 18 )" \
5888         -c "Verifying peer X.509 certificate... ok" \
5889         -C "received HelloRetryRequest message"
5890
5891requires_openssl_tls1_3
5892requires_config_enabled MBEDTLS_SSL_CLI_C
5893requires_config_enabled MBEDTLS_DEBUG_C
5894requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5895requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5896requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5897requires_config_enabled PSA_WANT_ALG_ECDH
5898run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
5899         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5900         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
5901         0 \
5902         -c "HTTP/1.0 200 ok" \
5903         -c "Protocol is TLSv1.3" \
5904         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5905         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5906         -c "NamedGroup: secp384r1 ( 18 )" \
5907         -c "Verifying peer X.509 certificate... ok" \
5908         -C "received HelloRetryRequest message"
5909
5910requires_openssl_tls1_3
5911requires_config_enabled MBEDTLS_SSL_CLI_C
5912requires_config_enabled MBEDTLS_DEBUG_C
5913requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5914requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5915requires_config_enabled PSA_WANT_ALG_ECDH
5916run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
5917         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5918         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
5919         0 \
5920         -c "HTTP/1.0 200 ok" \
5921         -c "Protocol is TLSv1.3" \
5922         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5923         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5924         -c "NamedGroup: secp521r1 ( 19 )" \
5925         -c "Verifying peer X.509 certificate... ok" \
5926         -C "received HelloRetryRequest message"
5927
5928requires_openssl_tls1_3
5929requires_config_enabled MBEDTLS_SSL_CLI_C
5930requires_config_enabled MBEDTLS_DEBUG_C
5931requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5932requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5933requires_config_enabled PSA_WANT_ALG_ECDH
5934run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
5935         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5936         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
5937         0 \
5938         -c "HTTP/1.0 200 ok" \
5939         -c "Protocol is TLSv1.3" \
5940         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5941         -c "Certificate Verify: Signature algorithm ( 0503 )" \
5942         -c "NamedGroup: secp521r1 ( 19 )" \
5943         -c "Verifying peer X.509 certificate... ok" \
5944         -C "received HelloRetryRequest message"
5945
5946requires_openssl_tls1_3
5947requires_config_enabled MBEDTLS_SSL_CLI_C
5948requires_config_enabled MBEDTLS_DEBUG_C
5949requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5950requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5951requires_config_enabled PSA_WANT_ALG_ECDH
5952run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
5953         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5954         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
5955         0 \
5956         -c "HTTP/1.0 200 ok" \
5957         -c "Protocol is TLSv1.3" \
5958         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5959         -c "Certificate Verify: Signature algorithm ( 0603 )" \
5960         -c "NamedGroup: secp521r1 ( 19 )" \
5961         -c "Verifying peer X.509 certificate... ok" \
5962         -C "received HelloRetryRequest message"
5963
5964requires_openssl_tls1_3
5965requires_config_enabled MBEDTLS_SSL_CLI_C
5966requires_config_enabled MBEDTLS_DEBUG_C
5967requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5968requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5969requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
5970requires_config_enabled PSA_WANT_ALG_ECDH
5971run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
5972         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5973         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
5974         0 \
5975         -c "HTTP/1.0 200 ok" \
5976         -c "Protocol is TLSv1.3" \
5977         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5978         -c "Certificate Verify: Signature algorithm ( 0804 )" \
5979         -c "NamedGroup: secp521r1 ( 19 )" \
5980         -c "Verifying peer X.509 certificate... ok" \
5981         -C "received HelloRetryRequest message"
5982
5983requires_openssl_tls1_3
5984requires_config_enabled MBEDTLS_SSL_CLI_C
5985requires_config_enabled MBEDTLS_DEBUG_C
5986requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
5987requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
5988requires_config_enabled PSA_WANT_ALG_ECDH
5989run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
5990         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
5991         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
5992         0 \
5993         -c "HTTP/1.0 200 ok" \
5994         -c "Protocol is TLSv1.3" \
5995         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
5996         -c "Certificate Verify: Signature algorithm ( 0403 )" \
5997         -c "NamedGroup: x25519 ( 1d )" \
5998         -c "Verifying peer X.509 certificate... ok" \
5999         -C "received HelloRetryRequest message"
6000
6001requires_openssl_tls1_3
6002requires_config_enabled MBEDTLS_SSL_CLI_C
6003requires_config_enabled MBEDTLS_DEBUG_C
6004requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6005requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6006requires_config_enabled PSA_WANT_ALG_ECDH
6007run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
6008         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6009         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
6010         0 \
6011         -c "HTTP/1.0 200 ok" \
6012         -c "Protocol is TLSv1.3" \
6013         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6014         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6015         -c "NamedGroup: x25519 ( 1d )" \
6016         -c "Verifying peer X.509 certificate... ok" \
6017         -C "received HelloRetryRequest message"
6018
6019requires_openssl_tls1_3
6020requires_config_enabled MBEDTLS_SSL_CLI_C
6021requires_config_enabled MBEDTLS_DEBUG_C
6022requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6023requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6024requires_config_enabled PSA_WANT_ALG_ECDH
6025run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
6026         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6027         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
6028         0 \
6029         -c "HTTP/1.0 200 ok" \
6030         -c "Protocol is TLSv1.3" \
6031         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6032         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6033         -c "NamedGroup: x25519 ( 1d )" \
6034         -c "Verifying peer X.509 certificate... ok" \
6035         -C "received HelloRetryRequest message"
6036
6037requires_openssl_tls1_3
6038requires_config_enabled MBEDTLS_SSL_CLI_C
6039requires_config_enabled MBEDTLS_DEBUG_C
6040requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6042requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6043requires_config_enabled PSA_WANT_ALG_ECDH
6044run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
6045         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6046         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
6047         0 \
6048         -c "HTTP/1.0 200 ok" \
6049         -c "Protocol is TLSv1.3" \
6050         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6051         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6052         -c "NamedGroup: x25519 ( 1d )" \
6053         -c "Verifying peer X.509 certificate... ok" \
6054         -C "received HelloRetryRequest message"
6055
6056requires_openssl_tls1_3
6057requires_config_enabled MBEDTLS_SSL_CLI_C
6058requires_config_enabled MBEDTLS_DEBUG_C
6059requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6060requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6061requires_config_enabled PSA_WANT_ALG_ECDH
6062run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
6063         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6064         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
6065         0 \
6066         -c "HTTP/1.0 200 ok" \
6067         -c "Protocol is TLSv1.3" \
6068         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6069         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6070         -c "NamedGroup: x448 ( 1e )" \
6071         -c "Verifying peer X.509 certificate... ok" \
6072         -C "received HelloRetryRequest message"
6073
6074requires_openssl_tls1_3
6075requires_config_enabled MBEDTLS_SSL_CLI_C
6076requires_config_enabled MBEDTLS_DEBUG_C
6077requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6078requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6079requires_config_enabled PSA_WANT_ALG_ECDH
6080run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
6081         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6082         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
6083         0 \
6084         -c "HTTP/1.0 200 ok" \
6085         -c "Protocol is TLSv1.3" \
6086         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6087         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6088         -c "NamedGroup: x448 ( 1e )" \
6089         -c "Verifying peer X.509 certificate... ok" \
6090         -C "received HelloRetryRequest message"
6091
6092requires_openssl_tls1_3
6093requires_config_enabled MBEDTLS_SSL_CLI_C
6094requires_config_enabled MBEDTLS_DEBUG_C
6095requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6096requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6097requires_config_enabled PSA_WANT_ALG_ECDH
6098run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
6099         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6100         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
6101         0 \
6102         -c "HTTP/1.0 200 ok" \
6103         -c "Protocol is TLSv1.3" \
6104         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6105         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6106         -c "NamedGroup: x448 ( 1e )" \
6107         -c "Verifying peer X.509 certificate... ok" \
6108         -C "received HelloRetryRequest message"
6109
6110requires_openssl_tls1_3
6111requires_config_enabled MBEDTLS_SSL_CLI_C
6112requires_config_enabled MBEDTLS_DEBUG_C
6113requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6114requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6115requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6116requires_config_enabled PSA_WANT_ALG_ECDH
6117run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
6118         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6119         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
6120         0 \
6121         -c "HTTP/1.0 200 ok" \
6122         -c "Protocol is TLSv1.3" \
6123         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6124         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6125         -c "NamedGroup: x448 ( 1e )" \
6126         -c "Verifying peer X.509 certificate... ok" \
6127         -C "received HelloRetryRequest message"
6128
6129requires_openssl_tls1_3_with_ffdh
6130requires_config_enabled MBEDTLS_SSL_CLI_C
6131requires_config_enabled MBEDTLS_DEBUG_C
6132requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6133requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6134requires_config_enabled PSA_WANT_ALG_FFDH
6135requires_config_enabled PSA_WANT_DH_RFC7919_2048
6136run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
6137         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6138         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
6139         0 \
6140         -c "HTTP/1.0 200 ok" \
6141         -c "Protocol is TLSv1.3" \
6142         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6143         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6144         -c "NamedGroup: ffdhe2048 ( 100 )" \
6145         -c "Verifying peer X.509 certificate... ok" \
6146         -C "received HelloRetryRequest message"
6147
6148requires_openssl_tls1_3_with_ffdh
6149requires_config_enabled MBEDTLS_SSL_CLI_C
6150requires_config_enabled MBEDTLS_DEBUG_C
6151requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6152requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6153requires_config_enabled PSA_WANT_ALG_FFDH
6154requires_config_enabled PSA_WANT_DH_RFC7919_2048
6155run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
6156         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6157         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
6158         0 \
6159         -c "HTTP/1.0 200 ok" \
6160         -c "Protocol is TLSv1.3" \
6161         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6162         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6163         -c "NamedGroup: ffdhe2048 ( 100 )" \
6164         -c "Verifying peer X.509 certificate... ok" \
6165         -C "received HelloRetryRequest message"
6166
6167requires_openssl_tls1_3_with_ffdh
6168requires_config_enabled MBEDTLS_SSL_CLI_C
6169requires_config_enabled MBEDTLS_DEBUG_C
6170requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6171requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6172requires_config_enabled PSA_WANT_ALG_FFDH
6173requires_config_enabled PSA_WANT_DH_RFC7919_2048
6174run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
6175         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6176         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
6177         0 \
6178         -c "HTTP/1.0 200 ok" \
6179         -c "Protocol is TLSv1.3" \
6180         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6181         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6182         -c "NamedGroup: ffdhe2048 ( 100 )" \
6183         -c "Verifying peer X.509 certificate... ok" \
6184         -C "received HelloRetryRequest message"
6185
6186requires_openssl_tls1_3_with_ffdh
6187requires_config_enabled MBEDTLS_SSL_CLI_C
6188requires_config_enabled MBEDTLS_DEBUG_C
6189requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6190requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6191requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6192requires_config_enabled PSA_WANT_ALG_FFDH
6193requires_config_enabled PSA_WANT_DH_RFC7919_2048
6194run_test "TLS 1.3 m->O: AES_128_CCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
6195         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6196         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
6197         0 \
6198         -c "HTTP/1.0 200 ok" \
6199         -c "Protocol is TLSv1.3" \
6200         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
6201         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6202         -c "NamedGroup: ffdhe2048 ( 100 )" \
6203         -c "Verifying peer X.509 certificate... ok" \
6204         -C "received HelloRetryRequest message"
6205
6206requires_openssl_tls1_3
6207requires_config_enabled MBEDTLS_SSL_CLI_C
6208requires_config_enabled MBEDTLS_DEBUG_C
6209requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6210requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6211requires_config_enabled PSA_WANT_ALG_ECDH
6212run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
6213         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6214         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
6215         0 \
6216         -c "HTTP/1.0 200 ok" \
6217         -c "Protocol is TLSv1.3" \
6218         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6219         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6220         -c "NamedGroup: secp256r1 ( 17 )" \
6221         -c "Verifying peer X.509 certificate... ok" \
6222         -C "received HelloRetryRequest message"
6223
6224requires_openssl_tls1_3
6225requires_config_enabled MBEDTLS_SSL_CLI_C
6226requires_config_enabled MBEDTLS_DEBUG_C
6227requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6228requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6229requires_config_enabled PSA_WANT_ALG_ECDH
6230run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
6231         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6232         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
6233         0 \
6234         -c "HTTP/1.0 200 ok" \
6235         -c "Protocol is TLSv1.3" \
6236         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6237         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6238         -c "NamedGroup: secp256r1 ( 17 )" \
6239         -c "Verifying peer X.509 certificate... ok" \
6240         -C "received HelloRetryRequest message"
6241
6242requires_openssl_tls1_3
6243requires_config_enabled MBEDTLS_SSL_CLI_C
6244requires_config_enabled MBEDTLS_DEBUG_C
6245requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6246requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6247requires_config_enabled PSA_WANT_ALG_ECDH
6248run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
6249         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6250         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
6251         0 \
6252         -c "HTTP/1.0 200 ok" \
6253         -c "Protocol is TLSv1.3" \
6254         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6255         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6256         -c "NamedGroup: secp256r1 ( 17 )" \
6257         -c "Verifying peer X.509 certificate... ok" \
6258         -C "received HelloRetryRequest message"
6259
6260requires_openssl_tls1_3
6261requires_config_enabled MBEDTLS_SSL_CLI_C
6262requires_config_enabled MBEDTLS_DEBUG_C
6263requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6264requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6265requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6266requires_config_enabled PSA_WANT_ALG_ECDH
6267run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
6268         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6269         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
6270         0 \
6271         -c "HTTP/1.0 200 ok" \
6272         -c "Protocol is TLSv1.3" \
6273         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6274         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6275         -c "NamedGroup: secp256r1 ( 17 )" \
6276         -c "Verifying peer X.509 certificate... ok" \
6277         -C "received HelloRetryRequest message"
6278
6279requires_openssl_tls1_3
6280requires_config_enabled MBEDTLS_SSL_CLI_C
6281requires_config_enabled MBEDTLS_DEBUG_C
6282requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6283requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6284requires_config_enabled PSA_WANT_ALG_ECDH
6285run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
6286         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6287         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
6288         0 \
6289         -c "HTTP/1.0 200 ok" \
6290         -c "Protocol is TLSv1.3" \
6291         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6292         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6293         -c "NamedGroup: secp384r1 ( 18 )" \
6294         -c "Verifying peer X.509 certificate... ok" \
6295         -C "received HelloRetryRequest message"
6296
6297requires_openssl_tls1_3
6298requires_config_enabled MBEDTLS_SSL_CLI_C
6299requires_config_enabled MBEDTLS_DEBUG_C
6300requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6301requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6302requires_config_enabled PSA_WANT_ALG_ECDH
6303run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
6304         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6305         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
6306         0 \
6307         -c "HTTP/1.0 200 ok" \
6308         -c "Protocol is TLSv1.3" \
6309         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6310         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6311         -c "NamedGroup: secp384r1 ( 18 )" \
6312         -c "Verifying peer X.509 certificate... ok" \
6313         -C "received HelloRetryRequest message"
6314
6315requires_openssl_tls1_3
6316requires_config_enabled MBEDTLS_SSL_CLI_C
6317requires_config_enabled MBEDTLS_DEBUG_C
6318requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6319requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6320requires_config_enabled PSA_WANT_ALG_ECDH
6321run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
6322         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6323         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
6324         0 \
6325         -c "HTTP/1.0 200 ok" \
6326         -c "Protocol is TLSv1.3" \
6327         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6328         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6329         -c "NamedGroup: secp384r1 ( 18 )" \
6330         -c "Verifying peer X.509 certificate... ok" \
6331         -C "received HelloRetryRequest message"
6332
6333requires_openssl_tls1_3
6334requires_config_enabled MBEDTLS_SSL_CLI_C
6335requires_config_enabled MBEDTLS_DEBUG_C
6336requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6337requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6338requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6339requires_config_enabled PSA_WANT_ALG_ECDH
6340run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
6341         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6342         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
6343         0 \
6344         -c "HTTP/1.0 200 ok" \
6345         -c "Protocol is TLSv1.3" \
6346         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6347         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6348         -c "NamedGroup: secp384r1 ( 18 )" \
6349         -c "Verifying peer X.509 certificate... ok" \
6350         -C "received HelloRetryRequest message"
6351
6352requires_openssl_tls1_3
6353requires_config_enabled MBEDTLS_SSL_CLI_C
6354requires_config_enabled MBEDTLS_DEBUG_C
6355requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6356requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6357requires_config_enabled PSA_WANT_ALG_ECDH
6358run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
6359         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6360         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
6361         0 \
6362         -c "HTTP/1.0 200 ok" \
6363         -c "Protocol is TLSv1.3" \
6364         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6365         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6366         -c "NamedGroup: secp521r1 ( 19 )" \
6367         -c "Verifying peer X.509 certificate... ok" \
6368         -C "received HelloRetryRequest message"
6369
6370requires_openssl_tls1_3
6371requires_config_enabled MBEDTLS_SSL_CLI_C
6372requires_config_enabled MBEDTLS_DEBUG_C
6373requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6374requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6375requires_config_enabled PSA_WANT_ALG_ECDH
6376run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
6377         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6378         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
6379         0 \
6380         -c "HTTP/1.0 200 ok" \
6381         -c "Protocol is TLSv1.3" \
6382         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6383         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6384         -c "NamedGroup: secp521r1 ( 19 )" \
6385         -c "Verifying peer X.509 certificate... ok" \
6386         -C "received HelloRetryRequest message"
6387
6388requires_openssl_tls1_3
6389requires_config_enabled MBEDTLS_SSL_CLI_C
6390requires_config_enabled MBEDTLS_DEBUG_C
6391requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6392requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6393requires_config_enabled PSA_WANT_ALG_ECDH
6394run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
6395         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6396         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
6397         0 \
6398         -c "HTTP/1.0 200 ok" \
6399         -c "Protocol is TLSv1.3" \
6400         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6401         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6402         -c "NamedGroup: secp521r1 ( 19 )" \
6403         -c "Verifying peer X.509 certificate... ok" \
6404         -C "received HelloRetryRequest message"
6405
6406requires_openssl_tls1_3
6407requires_config_enabled MBEDTLS_SSL_CLI_C
6408requires_config_enabled MBEDTLS_DEBUG_C
6409requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6410requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6411requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6412requires_config_enabled PSA_WANT_ALG_ECDH
6413run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
6414         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6415         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
6416         0 \
6417         -c "HTTP/1.0 200 ok" \
6418         -c "Protocol is TLSv1.3" \
6419         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6420         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6421         -c "NamedGroup: secp521r1 ( 19 )" \
6422         -c "Verifying peer X.509 certificate... ok" \
6423         -C "received HelloRetryRequest message"
6424
6425requires_openssl_tls1_3
6426requires_config_enabled MBEDTLS_SSL_CLI_C
6427requires_config_enabled MBEDTLS_DEBUG_C
6428requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6430requires_config_enabled PSA_WANT_ALG_ECDH
6431run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
6432         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6433         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
6434         0 \
6435         -c "HTTP/1.0 200 ok" \
6436         -c "Protocol is TLSv1.3" \
6437         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6438         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6439         -c "NamedGroup: x25519 ( 1d )" \
6440         -c "Verifying peer X.509 certificate... ok" \
6441         -C "received HelloRetryRequest message"
6442
6443requires_openssl_tls1_3
6444requires_config_enabled MBEDTLS_SSL_CLI_C
6445requires_config_enabled MBEDTLS_DEBUG_C
6446requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6448requires_config_enabled PSA_WANT_ALG_ECDH
6449run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
6450         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6451         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
6452         0 \
6453         -c "HTTP/1.0 200 ok" \
6454         -c "Protocol is TLSv1.3" \
6455         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6456         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6457         -c "NamedGroup: x25519 ( 1d )" \
6458         -c "Verifying peer X.509 certificate... ok" \
6459         -C "received HelloRetryRequest message"
6460
6461requires_openssl_tls1_3
6462requires_config_enabled MBEDTLS_SSL_CLI_C
6463requires_config_enabled MBEDTLS_DEBUG_C
6464requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6465requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6466requires_config_enabled PSA_WANT_ALG_ECDH
6467run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
6468         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6469         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
6470         0 \
6471         -c "HTTP/1.0 200 ok" \
6472         -c "Protocol is TLSv1.3" \
6473         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6474         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6475         -c "NamedGroup: x25519 ( 1d )" \
6476         -c "Verifying peer X.509 certificate... ok" \
6477         -C "received HelloRetryRequest message"
6478
6479requires_openssl_tls1_3
6480requires_config_enabled MBEDTLS_SSL_CLI_C
6481requires_config_enabled MBEDTLS_DEBUG_C
6482requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6483requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6484requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6485requires_config_enabled PSA_WANT_ALG_ECDH
6486run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
6487         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6488         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
6489         0 \
6490         -c "HTTP/1.0 200 ok" \
6491         -c "Protocol is TLSv1.3" \
6492         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6493         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6494         -c "NamedGroup: x25519 ( 1d )" \
6495         -c "Verifying peer X.509 certificate... ok" \
6496         -C "received HelloRetryRequest message"
6497
6498requires_openssl_tls1_3
6499requires_config_enabled MBEDTLS_SSL_CLI_C
6500requires_config_enabled MBEDTLS_DEBUG_C
6501requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6502requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6503requires_config_enabled PSA_WANT_ALG_ECDH
6504run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
6505         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6506         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
6507         0 \
6508         -c "HTTP/1.0 200 ok" \
6509         -c "Protocol is TLSv1.3" \
6510         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6511         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6512         -c "NamedGroup: x448 ( 1e )" \
6513         -c "Verifying peer X.509 certificate... ok" \
6514         -C "received HelloRetryRequest message"
6515
6516requires_openssl_tls1_3
6517requires_config_enabled MBEDTLS_SSL_CLI_C
6518requires_config_enabled MBEDTLS_DEBUG_C
6519requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6520requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6521requires_config_enabled PSA_WANT_ALG_ECDH
6522run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
6523         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6524         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
6525         0 \
6526         -c "HTTP/1.0 200 ok" \
6527         -c "Protocol is TLSv1.3" \
6528         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6529         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6530         -c "NamedGroup: x448 ( 1e )" \
6531         -c "Verifying peer X.509 certificate... ok" \
6532         -C "received HelloRetryRequest message"
6533
6534requires_openssl_tls1_3
6535requires_config_enabled MBEDTLS_SSL_CLI_C
6536requires_config_enabled MBEDTLS_DEBUG_C
6537requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6538requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6539requires_config_enabled PSA_WANT_ALG_ECDH
6540run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
6541         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6542         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
6543         0 \
6544         -c "HTTP/1.0 200 ok" \
6545         -c "Protocol is TLSv1.3" \
6546         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6547         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6548         -c "NamedGroup: x448 ( 1e )" \
6549         -c "Verifying peer X.509 certificate... ok" \
6550         -C "received HelloRetryRequest message"
6551
6552requires_openssl_tls1_3
6553requires_config_enabled MBEDTLS_SSL_CLI_C
6554requires_config_enabled MBEDTLS_DEBUG_C
6555requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6556requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6557requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6558requires_config_enabled PSA_WANT_ALG_ECDH
6559run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
6560         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6561         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
6562         0 \
6563         -c "HTTP/1.0 200 ok" \
6564         -c "Protocol is TLSv1.3" \
6565         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6566         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6567         -c "NamedGroup: x448 ( 1e )" \
6568         -c "Verifying peer X.509 certificate... ok" \
6569         -C "received HelloRetryRequest message"
6570
6571requires_openssl_tls1_3_with_ffdh
6572requires_config_enabled MBEDTLS_SSL_CLI_C
6573requires_config_enabled MBEDTLS_DEBUG_C
6574requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6575requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6576requires_config_enabled PSA_WANT_ALG_FFDH
6577requires_config_enabled PSA_WANT_DH_RFC7919_2048
6578run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
6579         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp256r1_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6580         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
6581         0 \
6582         -c "HTTP/1.0 200 ok" \
6583         -c "Protocol is TLSv1.3" \
6584         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6585         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6586         -c "NamedGroup: ffdhe2048 ( 100 )" \
6587         -c "Verifying peer X.509 certificate... ok" \
6588         -C "received HelloRetryRequest message"
6589
6590requires_openssl_tls1_3_with_ffdh
6591requires_config_enabled MBEDTLS_SSL_CLI_C
6592requires_config_enabled MBEDTLS_DEBUG_C
6593requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6594requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6595requires_config_enabled PSA_WANT_ALG_FFDH
6596requires_config_enabled PSA_WANT_DH_RFC7919_2048
6597run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
6598         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp384r1.crt -key $DATA_FILES_PATH/ecdsa_secp384r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp384r1_sha384 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6599         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
6600         0 \
6601         -c "HTTP/1.0 200 ok" \
6602         -c "Protocol is TLSv1.3" \
6603         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6604         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6605         -c "NamedGroup: ffdhe2048 ( 100 )" \
6606         -c "Verifying peer X.509 certificate... ok" \
6607         -C "received HelloRetryRequest message"
6608
6609requires_openssl_tls1_3_with_ffdh
6610requires_config_enabled MBEDTLS_SSL_CLI_C
6611requires_config_enabled MBEDTLS_DEBUG_C
6612requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6613requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6614requires_config_enabled PSA_WANT_ALG_FFDH
6615requires_config_enabled PSA_WANT_DH_RFC7919_2048
6616run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
6617         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp521r1.crt -key $DATA_FILES_PATH/ecdsa_secp521r1.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs ecdsa_secp521r1_sha512 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6618         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
6619         0 \
6620         -c "HTTP/1.0 200 ok" \
6621         -c "Protocol is TLSv1.3" \
6622         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6623         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6624         -c "NamedGroup: ffdhe2048 ( 100 )" \
6625         -c "Verifying peer X.509 certificate... ok" \
6626         -C "received HelloRetryRequest message"
6627
6628requires_openssl_tls1_3_with_ffdh
6629requires_config_enabled MBEDTLS_SSL_CLI_C
6630requires_config_enabled MBEDTLS_DEBUG_C
6631requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6633requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6634requires_config_enabled PSA_WANT_ALG_FFDH
6635requires_config_enabled PSA_WANT_DH_RFC7919_2048
6636run_test "TLS 1.3 m->O: AES_128_CCM_8_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
6637         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/server2-sha256.crt -key $DATA_FILES_PATH/server2.key -ciphersuites TLS_AES_128_CCM_8_SHA256 -sigalgs rsa_pss_rsae_sha256 -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
6638         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
6639         0 \
6640         -c "HTTP/1.0 200 ok" \
6641         -c "Protocol is TLSv1.3" \
6642         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
6643         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6644         -c "NamedGroup: ffdhe2048 ( 100 )" \
6645         -c "Verifying peer X.509 certificate... ok" \
6646         -C "received HelloRetryRequest message"
6647
6648requires_gnutls_tls1_3
6649requires_gnutls_next_no_ticket
6650requires_gnutls_next_disable_tls13_compat
6651requires_config_enabled MBEDTLS_SSL_CLI_C
6652requires_config_enabled MBEDTLS_DEBUG_C
6653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6655requires_config_enabled PSA_WANT_ALG_ECDH
6656run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
6657         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
6658         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
6659         0 \
6660         -c "HTTP/1.0 200 OK" \
6661         -c "Protocol is TLSv1.3" \
6662         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6663         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6664         -c "NamedGroup: secp256r1 ( 17 )" \
6665         -c "Verifying peer X.509 certificate... ok" \
6666         -C "received HelloRetryRequest message"
6667
6668requires_gnutls_tls1_3
6669requires_gnutls_next_no_ticket
6670requires_gnutls_next_disable_tls13_compat
6671requires_config_enabled MBEDTLS_SSL_CLI_C
6672requires_config_enabled MBEDTLS_DEBUG_C
6673requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6675requires_config_enabled PSA_WANT_ALG_ECDH
6676run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
6677         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
6678         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
6679         0 \
6680         -c "HTTP/1.0 200 OK" \
6681         -c "Protocol is TLSv1.3" \
6682         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6683         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6684         -c "NamedGroup: secp256r1 ( 17 )" \
6685         -c "Verifying peer X.509 certificate... ok" \
6686         -C "received HelloRetryRequest message"
6687
6688requires_gnutls_tls1_3
6689requires_gnutls_next_no_ticket
6690requires_gnutls_next_disable_tls13_compat
6691requires_config_enabled MBEDTLS_SSL_CLI_C
6692requires_config_enabled MBEDTLS_DEBUG_C
6693requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6694requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6695requires_config_enabled PSA_WANT_ALG_ECDH
6696run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
6697         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
6698         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
6699         0 \
6700         -c "HTTP/1.0 200 OK" \
6701         -c "Protocol is TLSv1.3" \
6702         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6703         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6704         -c "NamedGroup: secp256r1 ( 17 )" \
6705         -c "Verifying peer X.509 certificate... ok" \
6706         -C "received HelloRetryRequest message"
6707
6708requires_gnutls_tls1_3
6709requires_gnutls_next_no_ticket
6710requires_gnutls_next_disable_tls13_compat
6711requires_config_enabled MBEDTLS_SSL_CLI_C
6712requires_config_enabled MBEDTLS_DEBUG_C
6713requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6714requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6715requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6716requires_config_enabled PSA_WANT_ALG_ECDH
6717run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
6718         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
6719         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
6720         0 \
6721         -c "HTTP/1.0 200 OK" \
6722         -c "Protocol is TLSv1.3" \
6723         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6724         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6725         -c "NamedGroup: secp256r1 ( 17 )" \
6726         -c "Verifying peer X.509 certificate... ok" \
6727         -C "received HelloRetryRequest message"
6728
6729requires_gnutls_tls1_3
6730requires_gnutls_next_no_ticket
6731requires_gnutls_next_disable_tls13_compat
6732requires_config_enabled MBEDTLS_SSL_CLI_C
6733requires_config_enabled MBEDTLS_DEBUG_C
6734requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6736requires_config_enabled PSA_WANT_ALG_ECDH
6737run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
6738         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
6739         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
6740         0 \
6741         -c "HTTP/1.0 200 OK" \
6742         -c "Protocol is TLSv1.3" \
6743         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6744         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6745         -c "NamedGroup: secp384r1 ( 18 )" \
6746         -c "Verifying peer X.509 certificate... ok" \
6747         -C "received HelloRetryRequest message"
6748
6749requires_gnutls_tls1_3
6750requires_gnutls_next_no_ticket
6751requires_gnutls_next_disable_tls13_compat
6752requires_config_enabled MBEDTLS_SSL_CLI_C
6753requires_config_enabled MBEDTLS_DEBUG_C
6754requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6756requires_config_enabled PSA_WANT_ALG_ECDH
6757run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
6758         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
6759         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
6760         0 \
6761         -c "HTTP/1.0 200 OK" \
6762         -c "Protocol is TLSv1.3" \
6763         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6764         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6765         -c "NamedGroup: secp384r1 ( 18 )" \
6766         -c "Verifying peer X.509 certificate... ok" \
6767         -C "received HelloRetryRequest message"
6768
6769requires_gnutls_tls1_3
6770requires_gnutls_next_no_ticket
6771requires_gnutls_next_disable_tls13_compat
6772requires_config_enabled MBEDTLS_SSL_CLI_C
6773requires_config_enabled MBEDTLS_DEBUG_C
6774requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6776requires_config_enabled PSA_WANT_ALG_ECDH
6777run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
6778         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
6779         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
6780         0 \
6781         -c "HTTP/1.0 200 OK" \
6782         -c "Protocol is TLSv1.3" \
6783         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6784         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6785         -c "NamedGroup: secp384r1 ( 18 )" \
6786         -c "Verifying peer X.509 certificate... ok" \
6787         -C "received HelloRetryRequest message"
6788
6789requires_gnutls_tls1_3
6790requires_gnutls_next_no_ticket
6791requires_gnutls_next_disable_tls13_compat
6792requires_config_enabled MBEDTLS_SSL_CLI_C
6793requires_config_enabled MBEDTLS_DEBUG_C
6794requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6795requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6796requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6797requires_config_enabled PSA_WANT_ALG_ECDH
6798run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
6799         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
6800         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
6801         0 \
6802         -c "HTTP/1.0 200 OK" \
6803         -c "Protocol is TLSv1.3" \
6804         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6805         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6806         -c "NamedGroup: secp384r1 ( 18 )" \
6807         -c "Verifying peer X.509 certificate... ok" \
6808         -C "received HelloRetryRequest message"
6809
6810requires_gnutls_tls1_3
6811requires_gnutls_next_no_ticket
6812requires_gnutls_next_disable_tls13_compat
6813requires_config_enabled MBEDTLS_SSL_CLI_C
6814requires_config_enabled MBEDTLS_DEBUG_C
6815requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6817requires_config_enabled PSA_WANT_ALG_ECDH
6818run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
6819         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
6820         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
6821         0 \
6822         -c "HTTP/1.0 200 OK" \
6823         -c "Protocol is TLSv1.3" \
6824         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6825         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6826         -c "NamedGroup: secp521r1 ( 19 )" \
6827         -c "Verifying peer X.509 certificate... ok" \
6828         -C "received HelloRetryRequest message"
6829
6830requires_gnutls_tls1_3
6831requires_gnutls_next_no_ticket
6832requires_gnutls_next_disable_tls13_compat
6833requires_config_enabled MBEDTLS_SSL_CLI_C
6834requires_config_enabled MBEDTLS_DEBUG_C
6835requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6836requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6837requires_config_enabled PSA_WANT_ALG_ECDH
6838run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
6839         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
6840         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
6841         0 \
6842         -c "HTTP/1.0 200 OK" \
6843         -c "Protocol is TLSv1.3" \
6844         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6845         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6846         -c "NamedGroup: secp521r1 ( 19 )" \
6847         -c "Verifying peer X.509 certificate... ok" \
6848         -C "received HelloRetryRequest message"
6849
6850requires_gnutls_tls1_3
6851requires_gnutls_next_no_ticket
6852requires_gnutls_next_disable_tls13_compat
6853requires_config_enabled MBEDTLS_SSL_CLI_C
6854requires_config_enabled MBEDTLS_DEBUG_C
6855requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6857requires_config_enabled PSA_WANT_ALG_ECDH
6858run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
6859         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
6860         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
6861         0 \
6862         -c "HTTP/1.0 200 OK" \
6863         -c "Protocol is TLSv1.3" \
6864         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6865         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6866         -c "NamedGroup: secp521r1 ( 19 )" \
6867         -c "Verifying peer X.509 certificate... ok" \
6868         -C "received HelloRetryRequest message"
6869
6870requires_gnutls_tls1_3
6871requires_gnutls_next_no_ticket
6872requires_gnutls_next_disable_tls13_compat
6873requires_config_enabled MBEDTLS_SSL_CLI_C
6874requires_config_enabled MBEDTLS_DEBUG_C
6875requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6876requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6877requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6878requires_config_enabled PSA_WANT_ALG_ECDH
6879run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
6880         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
6881         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
6882         0 \
6883         -c "HTTP/1.0 200 OK" \
6884         -c "Protocol is TLSv1.3" \
6885         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6886         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6887         -c "NamedGroup: secp521r1 ( 19 )" \
6888         -c "Verifying peer X.509 certificate... ok" \
6889         -C "received HelloRetryRequest message"
6890
6891requires_gnutls_tls1_3
6892requires_gnutls_next_no_ticket
6893requires_gnutls_next_disable_tls13_compat
6894requires_config_enabled MBEDTLS_SSL_CLI_C
6895requires_config_enabled MBEDTLS_DEBUG_C
6896requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6898requires_config_enabled PSA_WANT_ALG_ECDH
6899run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
6900         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
6901         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
6902         0 \
6903         -c "HTTP/1.0 200 OK" \
6904         -c "Protocol is TLSv1.3" \
6905         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6906         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6907         -c "NamedGroup: x25519 ( 1d )" \
6908         -c "Verifying peer X.509 certificate... ok" \
6909         -C "received HelloRetryRequest message"
6910
6911requires_gnutls_tls1_3
6912requires_gnutls_next_no_ticket
6913requires_gnutls_next_disable_tls13_compat
6914requires_config_enabled MBEDTLS_SSL_CLI_C
6915requires_config_enabled MBEDTLS_DEBUG_C
6916requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6917requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6918requires_config_enabled PSA_WANT_ALG_ECDH
6919run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
6920         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
6921         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
6922         0 \
6923         -c "HTTP/1.0 200 OK" \
6924         -c "Protocol is TLSv1.3" \
6925         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6926         -c "Certificate Verify: Signature algorithm ( 0503 )" \
6927         -c "NamedGroup: x25519 ( 1d )" \
6928         -c "Verifying peer X.509 certificate... ok" \
6929         -C "received HelloRetryRequest message"
6930
6931requires_gnutls_tls1_3
6932requires_gnutls_next_no_ticket
6933requires_gnutls_next_disable_tls13_compat
6934requires_config_enabled MBEDTLS_SSL_CLI_C
6935requires_config_enabled MBEDTLS_DEBUG_C
6936requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6937requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6938requires_config_enabled PSA_WANT_ALG_ECDH
6939run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
6940         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
6941         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
6942         0 \
6943         -c "HTTP/1.0 200 OK" \
6944         -c "Protocol is TLSv1.3" \
6945         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6946         -c "Certificate Verify: Signature algorithm ( 0603 )" \
6947         -c "NamedGroup: x25519 ( 1d )" \
6948         -c "Verifying peer X.509 certificate... ok" \
6949         -C "received HelloRetryRequest message"
6950
6951requires_gnutls_tls1_3
6952requires_gnutls_next_no_ticket
6953requires_gnutls_next_disable_tls13_compat
6954requires_config_enabled MBEDTLS_SSL_CLI_C
6955requires_config_enabled MBEDTLS_DEBUG_C
6956requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6958requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
6959requires_config_enabled PSA_WANT_ALG_ECDH
6960run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
6961         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
6962         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
6963         0 \
6964         -c "HTTP/1.0 200 OK" \
6965         -c "Protocol is TLSv1.3" \
6966         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6967         -c "Certificate Verify: Signature algorithm ( 0804 )" \
6968         -c "NamedGroup: x25519 ( 1d )" \
6969         -c "Verifying peer X.509 certificate... ok" \
6970         -C "received HelloRetryRequest message"
6971
6972requires_gnutls_tls1_3
6973requires_gnutls_next_no_ticket
6974requires_gnutls_next_disable_tls13_compat
6975requires_config_enabled MBEDTLS_SSL_CLI_C
6976requires_config_enabled MBEDTLS_DEBUG_C
6977requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6978requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6979requires_config_enabled PSA_WANT_ALG_ECDH
6980run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
6981         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
6982         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
6983         0 \
6984         -c "HTTP/1.0 200 OK" \
6985         -c "Protocol is TLSv1.3" \
6986         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
6987         -c "Certificate Verify: Signature algorithm ( 0403 )" \
6988         -c "NamedGroup: x448 ( 1e )" \
6989         -c "Verifying peer X.509 certificate... ok" \
6990         -C "received HelloRetryRequest message"
6991
6992requires_gnutls_tls1_3
6993requires_gnutls_next_no_ticket
6994requires_gnutls_next_disable_tls13_compat
6995requires_config_enabled MBEDTLS_SSL_CLI_C
6996requires_config_enabled MBEDTLS_DEBUG_C
6997requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
6998requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
6999requires_config_enabled PSA_WANT_ALG_ECDH
7000run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
7001         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7002         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
7003         0 \
7004         -c "HTTP/1.0 200 OK" \
7005         -c "Protocol is TLSv1.3" \
7006         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7007         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7008         -c "NamedGroup: x448 ( 1e )" \
7009         -c "Verifying peer X.509 certificate... ok" \
7010         -C "received HelloRetryRequest message"
7011
7012requires_gnutls_tls1_3
7013requires_gnutls_next_no_ticket
7014requires_gnutls_next_disable_tls13_compat
7015requires_config_enabled MBEDTLS_SSL_CLI_C
7016requires_config_enabled MBEDTLS_DEBUG_C
7017requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7018requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7019requires_config_enabled PSA_WANT_ALG_ECDH
7020run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
7021         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7022         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
7023         0 \
7024         -c "HTTP/1.0 200 OK" \
7025         -c "Protocol is TLSv1.3" \
7026         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7027         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7028         -c "NamedGroup: x448 ( 1e )" \
7029         -c "Verifying peer X.509 certificate... ok" \
7030         -C "received HelloRetryRequest message"
7031
7032requires_gnutls_tls1_3
7033requires_gnutls_next_no_ticket
7034requires_gnutls_next_disable_tls13_compat
7035requires_config_enabled MBEDTLS_SSL_CLI_C
7036requires_config_enabled MBEDTLS_DEBUG_C
7037requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7038requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7039requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7040requires_config_enabled PSA_WANT_ALG_ECDH
7041run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
7042         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7043         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
7044         0 \
7045         -c "HTTP/1.0 200 OK" \
7046         -c "Protocol is TLSv1.3" \
7047         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7048         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7049         -c "NamedGroup: x448 ( 1e )" \
7050         -c "Verifying peer X.509 certificate... ok" \
7051         -C "received HelloRetryRequest message"
7052
7053requires_gnutls_tls1_3
7054requires_gnutls_next_no_ticket
7055requires_gnutls_next_disable_tls13_compat
7056requires_config_enabled MBEDTLS_SSL_CLI_C
7057requires_config_enabled MBEDTLS_DEBUG_C
7058requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7059requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7060requires_config_enabled PSA_WANT_ALG_FFDH
7061requires_config_enabled PSA_WANT_DH_RFC7919_2048
7062run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
7063         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7064         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
7065         0 \
7066         -c "HTTP/1.0 200 OK" \
7067         -c "Protocol is TLSv1.3" \
7068         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7069         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7070         -c "NamedGroup: ffdhe2048 ( 100 )" \
7071         -c "Verifying peer X.509 certificate... ok" \
7072         -C "received HelloRetryRequest message"
7073
7074requires_gnutls_tls1_3
7075requires_gnutls_next_no_ticket
7076requires_gnutls_next_disable_tls13_compat
7077requires_config_enabled MBEDTLS_SSL_CLI_C
7078requires_config_enabled MBEDTLS_DEBUG_C
7079requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7080requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7081requires_config_enabled PSA_WANT_ALG_FFDH
7082requires_config_enabled PSA_WANT_DH_RFC7919_2048
7083run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
7084         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7085         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
7086         0 \
7087         -c "HTTP/1.0 200 OK" \
7088         -c "Protocol is TLSv1.3" \
7089         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7090         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7091         -c "NamedGroup: ffdhe2048 ( 100 )" \
7092         -c "Verifying peer X.509 certificate... ok" \
7093         -C "received HelloRetryRequest message"
7094
7095requires_gnutls_tls1_3
7096requires_gnutls_next_no_ticket
7097requires_gnutls_next_disable_tls13_compat
7098requires_config_enabled MBEDTLS_SSL_CLI_C
7099requires_config_enabled MBEDTLS_DEBUG_C
7100requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7102requires_config_enabled PSA_WANT_ALG_FFDH
7103requires_config_enabled PSA_WANT_DH_RFC7919_2048
7104run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
7105         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7106         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
7107         0 \
7108         -c "HTTP/1.0 200 OK" \
7109         -c "Protocol is TLSv1.3" \
7110         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7111         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7112         -c "NamedGroup: ffdhe2048 ( 100 )" \
7113         -c "Verifying peer X.509 certificate... ok" \
7114         -C "received HelloRetryRequest message"
7115
7116requires_gnutls_tls1_3
7117requires_gnutls_next_no_ticket
7118requires_gnutls_next_disable_tls13_compat
7119requires_config_enabled MBEDTLS_SSL_CLI_C
7120requires_config_enabled MBEDTLS_DEBUG_C
7121requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7122requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7123requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7124requires_config_enabled PSA_WANT_ALG_FFDH
7125requires_config_enabled PSA_WANT_DH_RFC7919_2048
7126run_test "TLS 1.3 m->G: AES_128_GCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
7127         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-GCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7128         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
7129         0 \
7130         -c "HTTP/1.0 200 OK" \
7131         -c "Protocol is TLSv1.3" \
7132         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
7133         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7134         -c "NamedGroup: ffdhe2048 ( 100 )" \
7135         -c "Verifying peer X.509 certificate... ok" \
7136         -C "received HelloRetryRequest message"
7137
7138requires_gnutls_tls1_3
7139requires_gnutls_next_no_ticket
7140requires_gnutls_next_disable_tls13_compat
7141requires_config_enabled MBEDTLS_SSL_CLI_C
7142requires_config_enabled MBEDTLS_DEBUG_C
7143requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7144requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7145requires_config_enabled PSA_WANT_ALG_ECDH
7146run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
7147         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7148         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
7149         0 \
7150         -c "HTTP/1.0 200 OK" \
7151         -c "Protocol is TLSv1.3" \
7152         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7153         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7154         -c "NamedGroup: secp256r1 ( 17 )" \
7155         -c "Verifying peer X.509 certificate... ok" \
7156         -C "received HelloRetryRequest message"
7157
7158requires_gnutls_tls1_3
7159requires_gnutls_next_no_ticket
7160requires_gnutls_next_disable_tls13_compat
7161requires_config_enabled MBEDTLS_SSL_CLI_C
7162requires_config_enabled MBEDTLS_DEBUG_C
7163requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7164requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7165requires_config_enabled PSA_WANT_ALG_ECDH
7166run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
7167         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7168         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
7169         0 \
7170         -c "HTTP/1.0 200 OK" \
7171         -c "Protocol is TLSv1.3" \
7172         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7173         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7174         -c "NamedGroup: secp256r1 ( 17 )" \
7175         -c "Verifying peer X.509 certificate... ok" \
7176         -C "received HelloRetryRequest message"
7177
7178requires_gnutls_tls1_3
7179requires_gnutls_next_no_ticket
7180requires_gnutls_next_disable_tls13_compat
7181requires_config_enabled MBEDTLS_SSL_CLI_C
7182requires_config_enabled MBEDTLS_DEBUG_C
7183requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7184requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7185requires_config_enabled PSA_WANT_ALG_ECDH
7186run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
7187         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7188         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
7189         0 \
7190         -c "HTTP/1.0 200 OK" \
7191         -c "Protocol is TLSv1.3" \
7192         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7193         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7194         -c "NamedGroup: secp256r1 ( 17 )" \
7195         -c "Verifying peer X.509 certificate... ok" \
7196         -C "received HelloRetryRequest message"
7197
7198requires_gnutls_tls1_3
7199requires_gnutls_next_no_ticket
7200requires_gnutls_next_disable_tls13_compat
7201requires_config_enabled MBEDTLS_SSL_CLI_C
7202requires_config_enabled MBEDTLS_DEBUG_C
7203requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7204requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7205requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7206requires_config_enabled PSA_WANT_ALG_ECDH
7207run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
7208         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7209         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
7210         0 \
7211         -c "HTTP/1.0 200 OK" \
7212         -c "Protocol is TLSv1.3" \
7213         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7214         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7215         -c "NamedGroup: secp256r1 ( 17 )" \
7216         -c "Verifying peer X.509 certificate... ok" \
7217         -C "received HelloRetryRequest message"
7218
7219requires_gnutls_tls1_3
7220requires_gnutls_next_no_ticket
7221requires_gnutls_next_disable_tls13_compat
7222requires_config_enabled MBEDTLS_SSL_CLI_C
7223requires_config_enabled MBEDTLS_DEBUG_C
7224requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7226requires_config_enabled PSA_WANT_ALG_ECDH
7227run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
7228         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7229         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
7230         0 \
7231         -c "HTTP/1.0 200 OK" \
7232         -c "Protocol is TLSv1.3" \
7233         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7234         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7235         -c "NamedGroup: secp384r1 ( 18 )" \
7236         -c "Verifying peer X.509 certificate... ok" \
7237         -C "received HelloRetryRequest message"
7238
7239requires_gnutls_tls1_3
7240requires_gnutls_next_no_ticket
7241requires_gnutls_next_disable_tls13_compat
7242requires_config_enabled MBEDTLS_SSL_CLI_C
7243requires_config_enabled MBEDTLS_DEBUG_C
7244requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7246requires_config_enabled PSA_WANT_ALG_ECDH
7247run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
7248         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7249         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
7250         0 \
7251         -c "HTTP/1.0 200 OK" \
7252         -c "Protocol is TLSv1.3" \
7253         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7254         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7255         -c "NamedGroup: secp384r1 ( 18 )" \
7256         -c "Verifying peer X.509 certificate... ok" \
7257         -C "received HelloRetryRequest message"
7258
7259requires_gnutls_tls1_3
7260requires_gnutls_next_no_ticket
7261requires_gnutls_next_disable_tls13_compat
7262requires_config_enabled MBEDTLS_SSL_CLI_C
7263requires_config_enabled MBEDTLS_DEBUG_C
7264requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7266requires_config_enabled PSA_WANT_ALG_ECDH
7267run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
7268         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7269         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
7270         0 \
7271         -c "HTTP/1.0 200 OK" \
7272         -c "Protocol is TLSv1.3" \
7273         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7274         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7275         -c "NamedGroup: secp384r1 ( 18 )" \
7276         -c "Verifying peer X.509 certificate... ok" \
7277         -C "received HelloRetryRequest message"
7278
7279requires_gnutls_tls1_3
7280requires_gnutls_next_no_ticket
7281requires_gnutls_next_disable_tls13_compat
7282requires_config_enabled MBEDTLS_SSL_CLI_C
7283requires_config_enabled MBEDTLS_DEBUG_C
7284requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7287requires_config_enabled PSA_WANT_ALG_ECDH
7288run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
7289         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7290         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
7291         0 \
7292         -c "HTTP/1.0 200 OK" \
7293         -c "Protocol is TLSv1.3" \
7294         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7295         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7296         -c "NamedGroup: secp384r1 ( 18 )" \
7297         -c "Verifying peer X.509 certificate... ok" \
7298         -C "received HelloRetryRequest message"
7299
7300requires_gnutls_tls1_3
7301requires_gnutls_next_no_ticket
7302requires_gnutls_next_disable_tls13_compat
7303requires_config_enabled MBEDTLS_SSL_CLI_C
7304requires_config_enabled MBEDTLS_DEBUG_C
7305requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7307requires_config_enabled PSA_WANT_ALG_ECDH
7308run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
7309         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7310         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
7311         0 \
7312         -c "HTTP/1.0 200 OK" \
7313         -c "Protocol is TLSv1.3" \
7314         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7315         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7316         -c "NamedGroup: secp521r1 ( 19 )" \
7317         -c "Verifying peer X.509 certificate... ok" \
7318         -C "received HelloRetryRequest message"
7319
7320requires_gnutls_tls1_3
7321requires_gnutls_next_no_ticket
7322requires_gnutls_next_disable_tls13_compat
7323requires_config_enabled MBEDTLS_SSL_CLI_C
7324requires_config_enabled MBEDTLS_DEBUG_C
7325requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7327requires_config_enabled PSA_WANT_ALG_ECDH
7328run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
7329         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7330         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
7331         0 \
7332         -c "HTTP/1.0 200 OK" \
7333         -c "Protocol is TLSv1.3" \
7334         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7335         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7336         -c "NamedGroup: secp521r1 ( 19 )" \
7337         -c "Verifying peer X.509 certificate... ok" \
7338         -C "received HelloRetryRequest message"
7339
7340requires_gnutls_tls1_3
7341requires_gnutls_next_no_ticket
7342requires_gnutls_next_disable_tls13_compat
7343requires_config_enabled MBEDTLS_SSL_CLI_C
7344requires_config_enabled MBEDTLS_DEBUG_C
7345requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7346requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7347requires_config_enabled PSA_WANT_ALG_ECDH
7348run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
7349         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7350         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
7351         0 \
7352         -c "HTTP/1.0 200 OK" \
7353         -c "Protocol is TLSv1.3" \
7354         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7355         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7356         -c "NamedGroup: secp521r1 ( 19 )" \
7357         -c "Verifying peer X.509 certificate... ok" \
7358         -C "received HelloRetryRequest message"
7359
7360requires_gnutls_tls1_3
7361requires_gnutls_next_no_ticket
7362requires_gnutls_next_disable_tls13_compat
7363requires_config_enabled MBEDTLS_SSL_CLI_C
7364requires_config_enabled MBEDTLS_DEBUG_C
7365requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7367requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7368requires_config_enabled PSA_WANT_ALG_ECDH
7369run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
7370         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7371         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
7372         0 \
7373         -c "HTTP/1.0 200 OK" \
7374         -c "Protocol is TLSv1.3" \
7375         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7376         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7377         -c "NamedGroup: secp521r1 ( 19 )" \
7378         -c "Verifying peer X.509 certificate... ok" \
7379         -C "received HelloRetryRequest message"
7380
7381requires_gnutls_tls1_3
7382requires_gnutls_next_no_ticket
7383requires_gnutls_next_disable_tls13_compat
7384requires_config_enabled MBEDTLS_SSL_CLI_C
7385requires_config_enabled MBEDTLS_DEBUG_C
7386requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7387requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7388requires_config_enabled PSA_WANT_ALG_ECDH
7389run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
7390         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7391         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
7392         0 \
7393         -c "HTTP/1.0 200 OK" \
7394         -c "Protocol is TLSv1.3" \
7395         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7396         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7397         -c "NamedGroup: x25519 ( 1d )" \
7398         -c "Verifying peer X.509 certificate... ok" \
7399         -C "received HelloRetryRequest message"
7400
7401requires_gnutls_tls1_3
7402requires_gnutls_next_no_ticket
7403requires_gnutls_next_disable_tls13_compat
7404requires_config_enabled MBEDTLS_SSL_CLI_C
7405requires_config_enabled MBEDTLS_DEBUG_C
7406requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7407requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7408requires_config_enabled PSA_WANT_ALG_ECDH
7409run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
7410         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7411         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
7412         0 \
7413         -c "HTTP/1.0 200 OK" \
7414         -c "Protocol is TLSv1.3" \
7415         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7416         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7417         -c "NamedGroup: x25519 ( 1d )" \
7418         -c "Verifying peer X.509 certificate... ok" \
7419         -C "received HelloRetryRequest message"
7420
7421requires_gnutls_tls1_3
7422requires_gnutls_next_no_ticket
7423requires_gnutls_next_disable_tls13_compat
7424requires_config_enabled MBEDTLS_SSL_CLI_C
7425requires_config_enabled MBEDTLS_DEBUG_C
7426requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7427requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7428requires_config_enabled PSA_WANT_ALG_ECDH
7429run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
7430         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7431         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
7432         0 \
7433         -c "HTTP/1.0 200 OK" \
7434         -c "Protocol is TLSv1.3" \
7435         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7436         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7437         -c "NamedGroup: x25519 ( 1d )" \
7438         -c "Verifying peer X.509 certificate... ok" \
7439         -C "received HelloRetryRequest message"
7440
7441requires_gnutls_tls1_3
7442requires_gnutls_next_no_ticket
7443requires_gnutls_next_disable_tls13_compat
7444requires_config_enabled MBEDTLS_SSL_CLI_C
7445requires_config_enabled MBEDTLS_DEBUG_C
7446requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7447requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7448requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7449requires_config_enabled PSA_WANT_ALG_ECDH
7450run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
7451         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7452         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
7453         0 \
7454         -c "HTTP/1.0 200 OK" \
7455         -c "Protocol is TLSv1.3" \
7456         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7457         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7458         -c "NamedGroup: x25519 ( 1d )" \
7459         -c "Verifying peer X.509 certificate... ok" \
7460         -C "received HelloRetryRequest message"
7461
7462requires_gnutls_tls1_3
7463requires_gnutls_next_no_ticket
7464requires_gnutls_next_disable_tls13_compat
7465requires_config_enabled MBEDTLS_SSL_CLI_C
7466requires_config_enabled MBEDTLS_DEBUG_C
7467requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7468requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7469requires_config_enabled PSA_WANT_ALG_ECDH
7470run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
7471         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7472         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
7473         0 \
7474         -c "HTTP/1.0 200 OK" \
7475         -c "Protocol is TLSv1.3" \
7476         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7477         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7478         -c "NamedGroup: x448 ( 1e )" \
7479         -c "Verifying peer X.509 certificate... ok" \
7480         -C "received HelloRetryRequest message"
7481
7482requires_gnutls_tls1_3
7483requires_gnutls_next_no_ticket
7484requires_gnutls_next_disable_tls13_compat
7485requires_config_enabled MBEDTLS_SSL_CLI_C
7486requires_config_enabled MBEDTLS_DEBUG_C
7487requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7489requires_config_enabled PSA_WANT_ALG_ECDH
7490run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
7491         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7492         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
7493         0 \
7494         -c "HTTP/1.0 200 OK" \
7495         -c "Protocol is TLSv1.3" \
7496         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7497         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7498         -c "NamedGroup: x448 ( 1e )" \
7499         -c "Verifying peer X.509 certificate... ok" \
7500         -C "received HelloRetryRequest message"
7501
7502requires_gnutls_tls1_3
7503requires_gnutls_next_no_ticket
7504requires_gnutls_next_disable_tls13_compat
7505requires_config_enabled MBEDTLS_SSL_CLI_C
7506requires_config_enabled MBEDTLS_DEBUG_C
7507requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7508requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7509requires_config_enabled PSA_WANT_ALG_ECDH
7510run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
7511         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7512         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
7513         0 \
7514         -c "HTTP/1.0 200 OK" \
7515         -c "Protocol is TLSv1.3" \
7516         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7517         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7518         -c "NamedGroup: x448 ( 1e )" \
7519         -c "Verifying peer X.509 certificate... ok" \
7520         -C "received HelloRetryRequest message"
7521
7522requires_gnutls_tls1_3
7523requires_gnutls_next_no_ticket
7524requires_gnutls_next_disable_tls13_compat
7525requires_config_enabled MBEDTLS_SSL_CLI_C
7526requires_config_enabled MBEDTLS_DEBUG_C
7527requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7528requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7529requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7530requires_config_enabled PSA_WANT_ALG_ECDH
7531run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
7532         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7533         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
7534         0 \
7535         -c "HTTP/1.0 200 OK" \
7536         -c "Protocol is TLSv1.3" \
7537         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7538         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7539         -c "NamedGroup: x448 ( 1e )" \
7540         -c "Verifying peer X.509 certificate... ok" \
7541         -C "received HelloRetryRequest message"
7542
7543requires_gnutls_tls1_3
7544requires_gnutls_next_no_ticket
7545requires_gnutls_next_disable_tls13_compat
7546requires_config_enabled MBEDTLS_SSL_CLI_C
7547requires_config_enabled MBEDTLS_DEBUG_C
7548requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7550requires_config_enabled PSA_WANT_ALG_FFDH
7551requires_config_enabled PSA_WANT_DH_RFC7919_2048
7552run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp256r1_sha256" \
7553         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7554         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
7555         0 \
7556         -c "HTTP/1.0 200 OK" \
7557         -c "Protocol is TLSv1.3" \
7558         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7559         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7560         -c "NamedGroup: ffdhe2048 ( 100 )" \
7561         -c "Verifying peer X.509 certificate... ok" \
7562         -C "received HelloRetryRequest message"
7563
7564requires_gnutls_tls1_3
7565requires_gnutls_next_no_ticket
7566requires_gnutls_next_disable_tls13_compat
7567requires_config_enabled MBEDTLS_SSL_CLI_C
7568requires_config_enabled MBEDTLS_DEBUG_C
7569requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7570requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7571requires_config_enabled PSA_WANT_ALG_FFDH
7572requires_config_enabled PSA_WANT_DH_RFC7919_2048
7573run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp384r1_sha384" \
7574         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7575         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
7576         0 \
7577         -c "HTTP/1.0 200 OK" \
7578         -c "Protocol is TLSv1.3" \
7579         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7580         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7581         -c "NamedGroup: ffdhe2048 ( 100 )" \
7582         -c "Verifying peer X.509 certificate... ok" \
7583         -C "received HelloRetryRequest message"
7584
7585requires_gnutls_tls1_3
7586requires_gnutls_next_no_ticket
7587requires_gnutls_next_disable_tls13_compat
7588requires_config_enabled MBEDTLS_SSL_CLI_C
7589requires_config_enabled MBEDTLS_DEBUG_C
7590requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7591requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7592requires_config_enabled PSA_WANT_ALG_FFDH
7593requires_config_enabled PSA_WANT_DH_RFC7919_2048
7594run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp521r1_sha512" \
7595         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7596         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
7597         0 \
7598         -c "HTTP/1.0 200 OK" \
7599         -c "Protocol is TLSv1.3" \
7600         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7601         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7602         -c "NamedGroup: ffdhe2048 ( 100 )" \
7603         -c "Verifying peer X.509 certificate... ok" \
7604         -C "received HelloRetryRequest message"
7605
7606requires_gnutls_tls1_3
7607requires_gnutls_next_no_ticket
7608requires_gnutls_next_disable_tls13_compat
7609requires_config_enabled MBEDTLS_SSL_CLI_C
7610requires_config_enabled MBEDTLS_DEBUG_C
7611requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7612requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7613requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7614requires_config_enabled PSA_WANT_ALG_FFDH
7615requires_config_enabled PSA_WANT_DH_RFC7919_2048
7616run_test "TLS 1.3 m->G: AES_256_GCM_SHA384,ffdhe2048,rsa_pss_rsae_sha256" \
7617         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-256-GCM:+SHA384:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
7618         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
7619         0 \
7620         -c "HTTP/1.0 200 OK" \
7621         -c "Protocol is TLSv1.3" \
7622         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
7623         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7624         -c "NamedGroup: ffdhe2048 ( 100 )" \
7625         -c "Verifying peer X.509 certificate... ok" \
7626         -C "received HelloRetryRequest message"
7627
7628requires_gnutls_tls1_3
7629requires_gnutls_next_no_ticket
7630requires_gnutls_next_disable_tls13_compat
7631requires_config_enabled MBEDTLS_SSL_CLI_C
7632requires_config_enabled MBEDTLS_DEBUG_C
7633requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7634requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7635requires_config_enabled PSA_WANT_ALG_ECDH
7636run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
7637         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7638         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
7639         0 \
7640         -c "HTTP/1.0 200 OK" \
7641         -c "Protocol is TLSv1.3" \
7642         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7643         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7644         -c "NamedGroup: secp256r1 ( 17 )" \
7645         -c "Verifying peer X.509 certificate... ok" \
7646         -C "received HelloRetryRequest message"
7647
7648requires_gnutls_tls1_3
7649requires_gnutls_next_no_ticket
7650requires_gnutls_next_disable_tls13_compat
7651requires_config_enabled MBEDTLS_SSL_CLI_C
7652requires_config_enabled MBEDTLS_DEBUG_C
7653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7655requires_config_enabled PSA_WANT_ALG_ECDH
7656run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
7657         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7658         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
7659         0 \
7660         -c "HTTP/1.0 200 OK" \
7661         -c "Protocol is TLSv1.3" \
7662         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7663         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7664         -c "NamedGroup: secp256r1 ( 17 )" \
7665         -c "Verifying peer X.509 certificate... ok" \
7666         -C "received HelloRetryRequest message"
7667
7668requires_gnutls_tls1_3
7669requires_gnutls_next_no_ticket
7670requires_gnutls_next_disable_tls13_compat
7671requires_config_enabled MBEDTLS_SSL_CLI_C
7672requires_config_enabled MBEDTLS_DEBUG_C
7673requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7675requires_config_enabled PSA_WANT_ALG_ECDH
7676run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
7677         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7678         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
7679         0 \
7680         -c "HTTP/1.0 200 OK" \
7681         -c "Protocol is TLSv1.3" \
7682         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7683         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7684         -c "NamedGroup: secp256r1 ( 17 )" \
7685         -c "Verifying peer X.509 certificate... ok" \
7686         -C "received HelloRetryRequest message"
7687
7688requires_gnutls_tls1_3
7689requires_gnutls_next_no_ticket
7690requires_gnutls_next_disable_tls13_compat
7691requires_config_enabled MBEDTLS_SSL_CLI_C
7692requires_config_enabled MBEDTLS_DEBUG_C
7693requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7694requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7695requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7696requires_config_enabled PSA_WANT_ALG_ECDH
7697run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
7698         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
7699         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
7700         0 \
7701         -c "HTTP/1.0 200 OK" \
7702         -c "Protocol is TLSv1.3" \
7703         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7704         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7705         -c "NamedGroup: secp256r1 ( 17 )" \
7706         -c "Verifying peer X.509 certificate... ok" \
7707         -C "received HelloRetryRequest message"
7708
7709requires_gnutls_tls1_3
7710requires_gnutls_next_no_ticket
7711requires_gnutls_next_disable_tls13_compat
7712requires_config_enabled MBEDTLS_SSL_CLI_C
7713requires_config_enabled MBEDTLS_DEBUG_C
7714requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7715requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7716requires_config_enabled PSA_WANT_ALG_ECDH
7717run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
7718         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7719         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
7720         0 \
7721         -c "HTTP/1.0 200 OK" \
7722         -c "Protocol is TLSv1.3" \
7723         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7724         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7725         -c "NamedGroup: secp384r1 ( 18 )" \
7726         -c "Verifying peer X.509 certificate... ok" \
7727         -C "received HelloRetryRequest message"
7728
7729requires_gnutls_tls1_3
7730requires_gnutls_next_no_ticket
7731requires_gnutls_next_disable_tls13_compat
7732requires_config_enabled MBEDTLS_SSL_CLI_C
7733requires_config_enabled MBEDTLS_DEBUG_C
7734requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7736requires_config_enabled PSA_WANT_ALG_ECDH
7737run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
7738         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7739         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
7740         0 \
7741         -c "HTTP/1.0 200 OK" \
7742         -c "Protocol is TLSv1.3" \
7743         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7744         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7745         -c "NamedGroup: secp384r1 ( 18 )" \
7746         -c "Verifying peer X.509 certificate... ok" \
7747         -C "received HelloRetryRequest message"
7748
7749requires_gnutls_tls1_3
7750requires_gnutls_next_no_ticket
7751requires_gnutls_next_disable_tls13_compat
7752requires_config_enabled MBEDTLS_SSL_CLI_C
7753requires_config_enabled MBEDTLS_DEBUG_C
7754requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7756requires_config_enabled PSA_WANT_ALG_ECDH
7757run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
7758         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7759         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
7760         0 \
7761         -c "HTTP/1.0 200 OK" \
7762         -c "Protocol is TLSv1.3" \
7763         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7764         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7765         -c "NamedGroup: secp384r1 ( 18 )" \
7766         -c "Verifying peer X.509 certificate... ok" \
7767         -C "received HelloRetryRequest message"
7768
7769requires_gnutls_tls1_3
7770requires_gnutls_next_no_ticket
7771requires_gnutls_next_disable_tls13_compat
7772requires_config_enabled MBEDTLS_SSL_CLI_C
7773requires_config_enabled MBEDTLS_DEBUG_C
7774requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7775requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7776requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7777requires_config_enabled PSA_WANT_ALG_ECDH
7778run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
7779         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
7780         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
7781         0 \
7782         -c "HTTP/1.0 200 OK" \
7783         -c "Protocol is TLSv1.3" \
7784         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7785         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7786         -c "NamedGroup: secp384r1 ( 18 )" \
7787         -c "Verifying peer X.509 certificate... ok" \
7788         -C "received HelloRetryRequest message"
7789
7790requires_gnutls_tls1_3
7791requires_gnutls_next_no_ticket
7792requires_gnutls_next_disable_tls13_compat
7793requires_config_enabled MBEDTLS_SSL_CLI_C
7794requires_config_enabled MBEDTLS_DEBUG_C
7795requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7797requires_config_enabled PSA_WANT_ALG_ECDH
7798run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
7799         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7800         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
7801         0 \
7802         -c "HTTP/1.0 200 OK" \
7803         -c "Protocol is TLSv1.3" \
7804         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7805         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7806         -c "NamedGroup: secp521r1 ( 19 )" \
7807         -c "Verifying peer X.509 certificate... ok" \
7808         -C "received HelloRetryRequest message"
7809
7810requires_gnutls_tls1_3
7811requires_gnutls_next_no_ticket
7812requires_gnutls_next_disable_tls13_compat
7813requires_config_enabled MBEDTLS_SSL_CLI_C
7814requires_config_enabled MBEDTLS_DEBUG_C
7815requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7817requires_config_enabled PSA_WANT_ALG_ECDH
7818run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
7819         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7820         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
7821         0 \
7822         -c "HTTP/1.0 200 OK" \
7823         -c "Protocol is TLSv1.3" \
7824         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7825         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7826         -c "NamedGroup: secp521r1 ( 19 )" \
7827         -c "Verifying peer X.509 certificate... ok" \
7828         -C "received HelloRetryRequest message"
7829
7830requires_gnutls_tls1_3
7831requires_gnutls_next_no_ticket
7832requires_gnutls_next_disable_tls13_compat
7833requires_config_enabled MBEDTLS_SSL_CLI_C
7834requires_config_enabled MBEDTLS_DEBUG_C
7835requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7836requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7837requires_config_enabled PSA_WANT_ALG_ECDH
7838run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
7839         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7840         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
7841         0 \
7842         -c "HTTP/1.0 200 OK" \
7843         -c "Protocol is TLSv1.3" \
7844         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7845         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7846         -c "NamedGroup: secp521r1 ( 19 )" \
7847         -c "Verifying peer X.509 certificate... ok" \
7848         -C "received HelloRetryRequest message"
7849
7850requires_gnutls_tls1_3
7851requires_gnutls_next_no_ticket
7852requires_gnutls_next_disable_tls13_compat
7853requires_config_enabled MBEDTLS_SSL_CLI_C
7854requires_config_enabled MBEDTLS_DEBUG_C
7855requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7857requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7858requires_config_enabled PSA_WANT_ALG_ECDH
7859run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
7860         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
7861         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
7862         0 \
7863         -c "HTTP/1.0 200 OK" \
7864         -c "Protocol is TLSv1.3" \
7865         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7866         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7867         -c "NamedGroup: secp521r1 ( 19 )" \
7868         -c "Verifying peer X.509 certificate... ok" \
7869         -C "received HelloRetryRequest message"
7870
7871requires_gnutls_tls1_3
7872requires_gnutls_next_no_ticket
7873requires_gnutls_next_disable_tls13_compat
7874requires_config_enabled MBEDTLS_SSL_CLI_C
7875requires_config_enabled MBEDTLS_DEBUG_C
7876requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7878requires_config_enabled PSA_WANT_ALG_ECDH
7879run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
7880         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7881         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
7882         0 \
7883         -c "HTTP/1.0 200 OK" \
7884         -c "Protocol is TLSv1.3" \
7885         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7886         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7887         -c "NamedGroup: x25519 ( 1d )" \
7888         -c "Verifying peer X.509 certificate... ok" \
7889         -C "received HelloRetryRequest message"
7890
7891requires_gnutls_tls1_3
7892requires_gnutls_next_no_ticket
7893requires_gnutls_next_disable_tls13_compat
7894requires_config_enabled MBEDTLS_SSL_CLI_C
7895requires_config_enabled MBEDTLS_DEBUG_C
7896requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7898requires_config_enabled PSA_WANT_ALG_ECDH
7899run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
7900         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7901         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
7902         0 \
7903         -c "HTTP/1.0 200 OK" \
7904         -c "Protocol is TLSv1.3" \
7905         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7906         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7907         -c "NamedGroup: x25519 ( 1d )" \
7908         -c "Verifying peer X.509 certificate... ok" \
7909         -C "received HelloRetryRequest message"
7910
7911requires_gnutls_tls1_3
7912requires_gnutls_next_no_ticket
7913requires_gnutls_next_disable_tls13_compat
7914requires_config_enabled MBEDTLS_SSL_CLI_C
7915requires_config_enabled MBEDTLS_DEBUG_C
7916requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7917requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7918requires_config_enabled PSA_WANT_ALG_ECDH
7919run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
7920         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7921         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
7922         0 \
7923         -c "HTTP/1.0 200 OK" \
7924         -c "Protocol is TLSv1.3" \
7925         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7926         -c "Certificate Verify: Signature algorithm ( 0603 )" \
7927         -c "NamedGroup: x25519 ( 1d )" \
7928         -c "Verifying peer X.509 certificate... ok" \
7929         -C "received HelloRetryRequest message"
7930
7931requires_gnutls_tls1_3
7932requires_gnutls_next_no_ticket
7933requires_gnutls_next_disable_tls13_compat
7934requires_config_enabled MBEDTLS_SSL_CLI_C
7935requires_config_enabled MBEDTLS_DEBUG_C
7936requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7937requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7938requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
7939requires_config_enabled PSA_WANT_ALG_ECDH
7940run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
7941         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
7942         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
7943         0 \
7944         -c "HTTP/1.0 200 OK" \
7945         -c "Protocol is TLSv1.3" \
7946         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7947         -c "Certificate Verify: Signature algorithm ( 0804 )" \
7948         -c "NamedGroup: x25519 ( 1d )" \
7949         -c "Verifying peer X.509 certificate... ok" \
7950         -C "received HelloRetryRequest message"
7951
7952requires_gnutls_tls1_3
7953requires_gnutls_next_no_ticket
7954requires_gnutls_next_disable_tls13_compat
7955requires_config_enabled MBEDTLS_SSL_CLI_C
7956requires_config_enabled MBEDTLS_DEBUG_C
7957requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7959requires_config_enabled PSA_WANT_ALG_ECDH
7960run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
7961         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7962         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
7963         0 \
7964         -c "HTTP/1.0 200 OK" \
7965         -c "Protocol is TLSv1.3" \
7966         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7967         -c "Certificate Verify: Signature algorithm ( 0403 )" \
7968         -c "NamedGroup: x448 ( 1e )" \
7969         -c "Verifying peer X.509 certificate... ok" \
7970         -C "received HelloRetryRequest message"
7971
7972requires_gnutls_tls1_3
7973requires_gnutls_next_no_ticket
7974requires_gnutls_next_disable_tls13_compat
7975requires_config_enabled MBEDTLS_SSL_CLI_C
7976requires_config_enabled MBEDTLS_DEBUG_C
7977requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7978requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7979requires_config_enabled PSA_WANT_ALG_ECDH
7980run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
7981         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
7982         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
7983         0 \
7984         -c "HTTP/1.0 200 OK" \
7985         -c "Protocol is TLSv1.3" \
7986         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
7987         -c "Certificate Verify: Signature algorithm ( 0503 )" \
7988         -c "NamedGroup: x448 ( 1e )" \
7989         -c "Verifying peer X.509 certificate... ok" \
7990         -C "received HelloRetryRequest message"
7991
7992requires_gnutls_tls1_3
7993requires_gnutls_next_no_ticket
7994requires_gnutls_next_disable_tls13_compat
7995requires_config_enabled MBEDTLS_SSL_CLI_C
7996requires_config_enabled MBEDTLS_DEBUG_C
7997requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
7998requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
7999requires_config_enabled PSA_WANT_ALG_ECDH
8000run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
8001         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8002         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
8003         0 \
8004         -c "HTTP/1.0 200 OK" \
8005         -c "Protocol is TLSv1.3" \
8006         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8007         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8008         -c "NamedGroup: x448 ( 1e )" \
8009         -c "Verifying peer X.509 certificate... ok" \
8010         -C "received HelloRetryRequest message"
8011
8012requires_gnutls_tls1_3
8013requires_gnutls_next_no_ticket
8014requires_gnutls_next_disable_tls13_compat
8015requires_config_enabled MBEDTLS_SSL_CLI_C
8016requires_config_enabled MBEDTLS_DEBUG_C
8017requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8018requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8019requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8020requires_config_enabled PSA_WANT_ALG_ECDH
8021run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
8022         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8023         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
8024         0 \
8025         -c "HTTP/1.0 200 OK" \
8026         -c "Protocol is TLSv1.3" \
8027         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8028         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8029         -c "NamedGroup: x448 ( 1e )" \
8030         -c "Verifying peer X.509 certificate... ok" \
8031         -C "received HelloRetryRequest message"
8032
8033requires_gnutls_tls1_3
8034requires_gnutls_next_no_ticket
8035requires_gnutls_next_disable_tls13_compat
8036requires_config_enabled MBEDTLS_SSL_CLI_C
8037requires_config_enabled MBEDTLS_DEBUG_C
8038requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8039requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8040requires_config_enabled PSA_WANT_ALG_FFDH
8041requires_config_enabled PSA_WANT_DH_RFC7919_2048
8042run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
8043         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8044         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
8045         0 \
8046         -c "HTTP/1.0 200 OK" \
8047         -c "Protocol is TLSv1.3" \
8048         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8049         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8050         -c "NamedGroup: ffdhe2048 ( 100 )" \
8051         -c "Verifying peer X.509 certificate... ok" \
8052         -C "received HelloRetryRequest message"
8053
8054requires_gnutls_tls1_3
8055requires_gnutls_next_no_ticket
8056requires_gnutls_next_disable_tls13_compat
8057requires_config_enabled MBEDTLS_SSL_CLI_C
8058requires_config_enabled MBEDTLS_DEBUG_C
8059requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8060requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8061requires_config_enabled PSA_WANT_ALG_FFDH
8062requires_config_enabled PSA_WANT_DH_RFC7919_2048
8063run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
8064         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8065         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
8066         0 \
8067         -c "HTTP/1.0 200 OK" \
8068         -c "Protocol is TLSv1.3" \
8069         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8070         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8071         -c "NamedGroup: ffdhe2048 ( 100 )" \
8072         -c "Verifying peer X.509 certificate... ok" \
8073         -C "received HelloRetryRequest message"
8074
8075requires_gnutls_tls1_3
8076requires_gnutls_next_no_ticket
8077requires_gnutls_next_disable_tls13_compat
8078requires_config_enabled MBEDTLS_SSL_CLI_C
8079requires_config_enabled MBEDTLS_DEBUG_C
8080requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8081requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8082requires_config_enabled PSA_WANT_ALG_FFDH
8083requires_config_enabled PSA_WANT_DH_RFC7919_2048
8084run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
8085         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8086         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
8087         0 \
8088         -c "HTTP/1.0 200 OK" \
8089         -c "Protocol is TLSv1.3" \
8090         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8091         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8092         -c "NamedGroup: ffdhe2048 ( 100 )" \
8093         -c "Verifying peer X.509 certificate... ok" \
8094         -C "received HelloRetryRequest message"
8095
8096requires_gnutls_tls1_3
8097requires_gnutls_next_no_ticket
8098requires_gnutls_next_disable_tls13_compat
8099requires_config_enabled MBEDTLS_SSL_CLI_C
8100requires_config_enabled MBEDTLS_DEBUG_C
8101requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8103requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8104requires_config_enabled PSA_WANT_ALG_FFDH
8105requires_config_enabled PSA_WANT_DH_RFC7919_2048
8106run_test "TLS 1.3 m->G: CHACHA20_POLY1305_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
8107         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+CHACHA20-POLY1305:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8108         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
8109         0 \
8110         -c "HTTP/1.0 200 OK" \
8111         -c "Protocol is TLSv1.3" \
8112         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
8113         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8114         -c "NamedGroup: ffdhe2048 ( 100 )" \
8115         -c "Verifying peer X.509 certificate... ok" \
8116         -C "received HelloRetryRequest message"
8117
8118requires_gnutls_tls1_3
8119requires_gnutls_next_no_ticket
8120requires_gnutls_next_disable_tls13_compat
8121requires_config_enabled MBEDTLS_SSL_CLI_C
8122requires_config_enabled MBEDTLS_DEBUG_C
8123requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8124requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8125requires_config_enabled PSA_WANT_ALG_ECDH
8126run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8127         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8128         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
8129         0 \
8130         -c "HTTP/1.0 200 OK" \
8131         -c "Protocol is TLSv1.3" \
8132         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8133         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8134         -c "NamedGroup: secp256r1 ( 17 )" \
8135         -c "Verifying peer X.509 certificate... ok" \
8136         -C "received HelloRetryRequest message"
8137
8138requires_gnutls_tls1_3
8139requires_gnutls_next_no_ticket
8140requires_gnutls_next_disable_tls13_compat
8141requires_config_enabled MBEDTLS_SSL_CLI_C
8142requires_config_enabled MBEDTLS_DEBUG_C
8143requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8144requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8145requires_config_enabled PSA_WANT_ALG_ECDH
8146run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8147         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8148         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
8149         0 \
8150         -c "HTTP/1.0 200 OK" \
8151         -c "Protocol is TLSv1.3" \
8152         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8153         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8154         -c "NamedGroup: secp256r1 ( 17 )" \
8155         -c "Verifying peer X.509 certificate... ok" \
8156         -C "received HelloRetryRequest message"
8157
8158requires_gnutls_tls1_3
8159requires_gnutls_next_no_ticket
8160requires_gnutls_next_disable_tls13_compat
8161requires_config_enabled MBEDTLS_SSL_CLI_C
8162requires_config_enabled MBEDTLS_DEBUG_C
8163requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8164requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8165requires_config_enabled PSA_WANT_ALG_ECDH
8166run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8167         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8168         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
8169         0 \
8170         -c "HTTP/1.0 200 OK" \
8171         -c "Protocol is TLSv1.3" \
8172         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8173         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8174         -c "NamedGroup: secp256r1 ( 17 )" \
8175         -c "Verifying peer X.509 certificate... ok" \
8176         -C "received HelloRetryRequest message"
8177
8178requires_gnutls_tls1_3
8179requires_gnutls_next_no_ticket
8180requires_gnutls_next_disable_tls13_compat
8181requires_config_enabled MBEDTLS_SSL_CLI_C
8182requires_config_enabled MBEDTLS_DEBUG_C
8183requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8184requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8185requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8186requires_config_enabled PSA_WANT_ALG_ECDH
8187run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8188         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8189         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
8190         0 \
8191         -c "HTTP/1.0 200 OK" \
8192         -c "Protocol is TLSv1.3" \
8193         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8194         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8195         -c "NamedGroup: secp256r1 ( 17 )" \
8196         -c "Verifying peer X.509 certificate... ok" \
8197         -C "received HelloRetryRequest message"
8198
8199requires_gnutls_tls1_3
8200requires_gnutls_next_no_ticket
8201requires_gnutls_next_disable_tls13_compat
8202requires_config_enabled MBEDTLS_SSL_CLI_C
8203requires_config_enabled MBEDTLS_DEBUG_C
8204requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8205requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8206requires_config_enabled PSA_WANT_ALG_ECDH
8207run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8208         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8209         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
8210         0 \
8211         -c "HTTP/1.0 200 OK" \
8212         -c "Protocol is TLSv1.3" \
8213         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8214         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8215         -c "NamedGroup: secp384r1 ( 18 )" \
8216         -c "Verifying peer X.509 certificate... ok" \
8217         -C "received HelloRetryRequest message"
8218
8219requires_gnutls_tls1_3
8220requires_gnutls_next_no_ticket
8221requires_gnutls_next_disable_tls13_compat
8222requires_config_enabled MBEDTLS_SSL_CLI_C
8223requires_config_enabled MBEDTLS_DEBUG_C
8224requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8225requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8226requires_config_enabled PSA_WANT_ALG_ECDH
8227run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8228         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8229         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
8230         0 \
8231         -c "HTTP/1.0 200 OK" \
8232         -c "Protocol is TLSv1.3" \
8233         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8234         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8235         -c "NamedGroup: secp384r1 ( 18 )" \
8236         -c "Verifying peer X.509 certificate... ok" \
8237         -C "received HelloRetryRequest message"
8238
8239requires_gnutls_tls1_3
8240requires_gnutls_next_no_ticket
8241requires_gnutls_next_disable_tls13_compat
8242requires_config_enabled MBEDTLS_SSL_CLI_C
8243requires_config_enabled MBEDTLS_DEBUG_C
8244requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8246requires_config_enabled PSA_WANT_ALG_ECDH
8247run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8248         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8249         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
8250         0 \
8251         -c "HTTP/1.0 200 OK" \
8252         -c "Protocol is TLSv1.3" \
8253         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8254         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8255         -c "NamedGroup: secp384r1 ( 18 )" \
8256         -c "Verifying peer X.509 certificate... ok" \
8257         -C "received HelloRetryRequest message"
8258
8259requires_gnutls_tls1_3
8260requires_gnutls_next_no_ticket
8261requires_gnutls_next_disable_tls13_compat
8262requires_config_enabled MBEDTLS_SSL_CLI_C
8263requires_config_enabled MBEDTLS_DEBUG_C
8264requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8265requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8266requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8267requires_config_enabled PSA_WANT_ALG_ECDH
8268run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8269         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8270         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
8271         0 \
8272         -c "HTTP/1.0 200 OK" \
8273         -c "Protocol is TLSv1.3" \
8274         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8275         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8276         -c "NamedGroup: secp384r1 ( 18 )" \
8277         -c "Verifying peer X.509 certificate... ok" \
8278         -C "received HelloRetryRequest message"
8279
8280requires_gnutls_tls1_3
8281requires_gnutls_next_no_ticket
8282requires_gnutls_next_disable_tls13_compat
8283requires_config_enabled MBEDTLS_SSL_CLI_C
8284requires_config_enabled MBEDTLS_DEBUG_C
8285requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8286requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8287requires_config_enabled PSA_WANT_ALG_ECDH
8288run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
8289         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8290         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
8291         0 \
8292         -c "HTTP/1.0 200 OK" \
8293         -c "Protocol is TLSv1.3" \
8294         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8295         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8296         -c "NamedGroup: secp521r1 ( 19 )" \
8297         -c "Verifying peer X.509 certificate... ok" \
8298         -C "received HelloRetryRequest message"
8299
8300requires_gnutls_tls1_3
8301requires_gnutls_next_no_ticket
8302requires_gnutls_next_disable_tls13_compat
8303requires_config_enabled MBEDTLS_SSL_CLI_C
8304requires_config_enabled MBEDTLS_DEBUG_C
8305requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8306requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8307requires_config_enabled PSA_WANT_ALG_ECDH
8308run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
8309         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8310         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
8311         0 \
8312         -c "HTTP/1.0 200 OK" \
8313         -c "Protocol is TLSv1.3" \
8314         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8315         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8316         -c "NamedGroup: secp521r1 ( 19 )" \
8317         -c "Verifying peer X.509 certificate... ok" \
8318         -C "received HelloRetryRequest message"
8319
8320requires_gnutls_tls1_3
8321requires_gnutls_next_no_ticket
8322requires_gnutls_next_disable_tls13_compat
8323requires_config_enabled MBEDTLS_SSL_CLI_C
8324requires_config_enabled MBEDTLS_DEBUG_C
8325requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8326requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8327requires_config_enabled PSA_WANT_ALG_ECDH
8328run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
8329         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8330         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
8331         0 \
8332         -c "HTTP/1.0 200 OK" \
8333         -c "Protocol is TLSv1.3" \
8334         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8335         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8336         -c "NamedGroup: secp521r1 ( 19 )" \
8337         -c "Verifying peer X.509 certificate... ok" \
8338         -C "received HelloRetryRequest message"
8339
8340requires_gnutls_tls1_3
8341requires_gnutls_next_no_ticket
8342requires_gnutls_next_disable_tls13_compat
8343requires_config_enabled MBEDTLS_SSL_CLI_C
8344requires_config_enabled MBEDTLS_DEBUG_C
8345requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8346requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8347requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8348requires_config_enabled PSA_WANT_ALG_ECDH
8349run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
8350         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8351         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
8352         0 \
8353         -c "HTTP/1.0 200 OK" \
8354         -c "Protocol is TLSv1.3" \
8355         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8356         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8357         -c "NamedGroup: secp521r1 ( 19 )" \
8358         -c "Verifying peer X.509 certificate... ok" \
8359         -C "received HelloRetryRequest message"
8360
8361requires_gnutls_tls1_3
8362requires_gnutls_next_no_ticket
8363requires_gnutls_next_disable_tls13_compat
8364requires_config_enabled MBEDTLS_SSL_CLI_C
8365requires_config_enabled MBEDTLS_DEBUG_C
8366requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8367requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8368requires_config_enabled PSA_WANT_ALG_ECDH
8369run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
8370         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8371         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
8372         0 \
8373         -c "HTTP/1.0 200 OK" \
8374         -c "Protocol is TLSv1.3" \
8375         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8376         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8377         -c "NamedGroup: x25519 ( 1d )" \
8378         -c "Verifying peer X.509 certificate... ok" \
8379         -C "received HelloRetryRequest message"
8380
8381requires_gnutls_tls1_3
8382requires_gnutls_next_no_ticket
8383requires_gnutls_next_disable_tls13_compat
8384requires_config_enabled MBEDTLS_SSL_CLI_C
8385requires_config_enabled MBEDTLS_DEBUG_C
8386requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8387requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8388requires_config_enabled PSA_WANT_ALG_ECDH
8389run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
8390         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8391         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
8392         0 \
8393         -c "HTTP/1.0 200 OK" \
8394         -c "Protocol is TLSv1.3" \
8395         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8396         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8397         -c "NamedGroup: x25519 ( 1d )" \
8398         -c "Verifying peer X.509 certificate... ok" \
8399         -C "received HelloRetryRequest message"
8400
8401requires_gnutls_tls1_3
8402requires_gnutls_next_no_ticket
8403requires_gnutls_next_disable_tls13_compat
8404requires_config_enabled MBEDTLS_SSL_CLI_C
8405requires_config_enabled MBEDTLS_DEBUG_C
8406requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8407requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8408requires_config_enabled PSA_WANT_ALG_ECDH
8409run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
8410         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8411         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
8412         0 \
8413         -c "HTTP/1.0 200 OK" \
8414         -c "Protocol is TLSv1.3" \
8415         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8416         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8417         -c "NamedGroup: x25519 ( 1d )" \
8418         -c "Verifying peer X.509 certificate... ok" \
8419         -C "received HelloRetryRequest message"
8420
8421requires_gnutls_tls1_3
8422requires_gnutls_next_no_ticket
8423requires_gnutls_next_disable_tls13_compat
8424requires_config_enabled MBEDTLS_SSL_CLI_C
8425requires_config_enabled MBEDTLS_DEBUG_C
8426requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8427requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8428requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8429requires_config_enabled PSA_WANT_ALG_ECDH
8430run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
8431         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8432         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
8433         0 \
8434         -c "HTTP/1.0 200 OK" \
8435         -c "Protocol is TLSv1.3" \
8436         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8437         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8438         -c "NamedGroup: x25519 ( 1d )" \
8439         -c "Verifying peer X.509 certificate... ok" \
8440         -C "received HelloRetryRequest message"
8441
8442requires_gnutls_tls1_3
8443requires_gnutls_next_no_ticket
8444requires_gnutls_next_disable_tls13_compat
8445requires_config_enabled MBEDTLS_SSL_CLI_C
8446requires_config_enabled MBEDTLS_DEBUG_C
8447requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8448requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8449requires_config_enabled PSA_WANT_ALG_ECDH
8450run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
8451         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8452         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
8453         0 \
8454         -c "HTTP/1.0 200 OK" \
8455         -c "Protocol is TLSv1.3" \
8456         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8457         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8458         -c "NamedGroup: x448 ( 1e )" \
8459         -c "Verifying peer X.509 certificate... ok" \
8460         -C "received HelloRetryRequest message"
8461
8462requires_gnutls_tls1_3
8463requires_gnutls_next_no_ticket
8464requires_gnutls_next_disable_tls13_compat
8465requires_config_enabled MBEDTLS_SSL_CLI_C
8466requires_config_enabled MBEDTLS_DEBUG_C
8467requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8468requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8469requires_config_enabled PSA_WANT_ALG_ECDH
8470run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
8471         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8472         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
8473         0 \
8474         -c "HTTP/1.0 200 OK" \
8475         -c "Protocol is TLSv1.3" \
8476         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8477         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8478         -c "NamedGroup: x448 ( 1e )" \
8479         -c "Verifying peer X.509 certificate... ok" \
8480         -C "received HelloRetryRequest message"
8481
8482requires_gnutls_tls1_3
8483requires_gnutls_next_no_ticket
8484requires_gnutls_next_disable_tls13_compat
8485requires_config_enabled MBEDTLS_SSL_CLI_C
8486requires_config_enabled MBEDTLS_DEBUG_C
8487requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8489requires_config_enabled PSA_WANT_ALG_ECDH
8490run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
8491         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8492         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
8493         0 \
8494         -c "HTTP/1.0 200 OK" \
8495         -c "Protocol is TLSv1.3" \
8496         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8497         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8498         -c "NamedGroup: x448 ( 1e )" \
8499         -c "Verifying peer X.509 certificate... ok" \
8500         -C "received HelloRetryRequest message"
8501
8502requires_gnutls_tls1_3
8503requires_gnutls_next_no_ticket
8504requires_gnutls_next_disable_tls13_compat
8505requires_config_enabled MBEDTLS_SSL_CLI_C
8506requires_config_enabled MBEDTLS_DEBUG_C
8507requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8508requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8509requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8510requires_config_enabled PSA_WANT_ALG_ECDH
8511run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
8512         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8513         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
8514         0 \
8515         -c "HTTP/1.0 200 OK" \
8516         -c "Protocol is TLSv1.3" \
8517         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8518         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8519         -c "NamedGroup: x448 ( 1e )" \
8520         -c "Verifying peer X.509 certificate... ok" \
8521         -C "received HelloRetryRequest message"
8522
8523requires_gnutls_tls1_3
8524requires_gnutls_next_no_ticket
8525requires_gnutls_next_disable_tls13_compat
8526requires_config_enabled MBEDTLS_SSL_CLI_C
8527requires_config_enabled MBEDTLS_DEBUG_C
8528requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8529requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8530requires_config_enabled PSA_WANT_ALG_FFDH
8531requires_config_enabled PSA_WANT_DH_RFC7919_2048
8532run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
8533         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8534         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
8535         0 \
8536         -c "HTTP/1.0 200 OK" \
8537         -c "Protocol is TLSv1.3" \
8538         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8539         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8540         -c "NamedGroup: ffdhe2048 ( 100 )" \
8541         -c "Verifying peer X.509 certificate... ok" \
8542         -C "received HelloRetryRequest message"
8543
8544requires_gnutls_tls1_3
8545requires_gnutls_next_no_ticket
8546requires_gnutls_next_disable_tls13_compat
8547requires_config_enabled MBEDTLS_SSL_CLI_C
8548requires_config_enabled MBEDTLS_DEBUG_C
8549requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8550requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8551requires_config_enabled PSA_WANT_ALG_FFDH
8552requires_config_enabled PSA_WANT_DH_RFC7919_2048
8553run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
8554         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8555         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
8556         0 \
8557         -c "HTTP/1.0 200 OK" \
8558         -c "Protocol is TLSv1.3" \
8559         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8560         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8561         -c "NamedGroup: ffdhe2048 ( 100 )" \
8562         -c "Verifying peer X.509 certificate... ok" \
8563         -C "received HelloRetryRequest message"
8564
8565requires_gnutls_tls1_3
8566requires_gnutls_next_no_ticket
8567requires_gnutls_next_disable_tls13_compat
8568requires_config_enabled MBEDTLS_SSL_CLI_C
8569requires_config_enabled MBEDTLS_DEBUG_C
8570requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8571requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8572requires_config_enabled PSA_WANT_ALG_FFDH
8573requires_config_enabled PSA_WANT_DH_RFC7919_2048
8574run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
8575         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8576         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
8577         0 \
8578         -c "HTTP/1.0 200 OK" \
8579         -c "Protocol is TLSv1.3" \
8580         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8581         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8582         -c "NamedGroup: ffdhe2048 ( 100 )" \
8583         -c "Verifying peer X.509 certificate... ok" \
8584         -C "received HelloRetryRequest message"
8585
8586requires_gnutls_tls1_3
8587requires_gnutls_next_no_ticket
8588requires_gnutls_next_disable_tls13_compat
8589requires_config_enabled MBEDTLS_SSL_CLI_C
8590requires_config_enabled MBEDTLS_DEBUG_C
8591requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8592requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8593requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8594requires_config_enabled PSA_WANT_ALG_FFDH
8595requires_config_enabled PSA_WANT_DH_RFC7919_2048
8596run_test "TLS 1.3 m->G: AES_128_CCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
8597         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
8598         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
8599         0 \
8600         -c "HTTP/1.0 200 OK" \
8601         -c "Protocol is TLSv1.3" \
8602         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
8603         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8604         -c "NamedGroup: ffdhe2048 ( 100 )" \
8605         -c "Verifying peer X.509 certificate... ok" \
8606         -C "received HelloRetryRequest message"
8607
8608requires_gnutls_tls1_3
8609requires_gnutls_next_no_ticket
8610requires_gnutls_next_disable_tls13_compat
8611requires_config_enabled MBEDTLS_SSL_CLI_C
8612requires_config_enabled MBEDTLS_DEBUG_C
8613requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8614requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8615requires_config_enabled PSA_WANT_ALG_ECDH
8616run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
8617         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8618         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
8619         0 \
8620         -c "HTTP/1.0 200 OK" \
8621         -c "Protocol is TLSv1.3" \
8622         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8623         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8624         -c "NamedGroup: secp256r1 ( 17 )" \
8625         -c "Verifying peer X.509 certificate... ok" \
8626         -C "received HelloRetryRequest message"
8627
8628requires_gnutls_tls1_3
8629requires_gnutls_next_no_ticket
8630requires_gnutls_next_disable_tls13_compat
8631requires_config_enabled MBEDTLS_SSL_CLI_C
8632requires_config_enabled MBEDTLS_DEBUG_C
8633requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8634requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8635requires_config_enabled PSA_WANT_ALG_ECDH
8636run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
8637         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8638         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
8639         0 \
8640         -c "HTTP/1.0 200 OK" \
8641         -c "Protocol is TLSv1.3" \
8642         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8643         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8644         -c "NamedGroup: secp256r1 ( 17 )" \
8645         -c "Verifying peer X.509 certificate... ok" \
8646         -C "received HelloRetryRequest message"
8647
8648requires_gnutls_tls1_3
8649requires_gnutls_next_no_ticket
8650requires_gnutls_next_disable_tls13_compat
8651requires_config_enabled MBEDTLS_SSL_CLI_C
8652requires_config_enabled MBEDTLS_DEBUG_C
8653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8655requires_config_enabled PSA_WANT_ALG_ECDH
8656run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
8657         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8658         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
8659         0 \
8660         -c "HTTP/1.0 200 OK" \
8661         -c "Protocol is TLSv1.3" \
8662         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8663         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8664         -c "NamedGroup: secp256r1 ( 17 )" \
8665         -c "Verifying peer X.509 certificate... ok" \
8666         -C "received HelloRetryRequest message"
8667
8668requires_gnutls_tls1_3
8669requires_gnutls_next_no_ticket
8670requires_gnutls_next_disable_tls13_compat
8671requires_config_enabled MBEDTLS_SSL_CLI_C
8672requires_config_enabled MBEDTLS_DEBUG_C
8673requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8675requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8676requires_config_enabled PSA_WANT_ALG_ECDH
8677run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
8678         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
8679         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
8680         0 \
8681         -c "HTTP/1.0 200 OK" \
8682         -c "Protocol is TLSv1.3" \
8683         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8684         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8685         -c "NamedGroup: secp256r1 ( 17 )" \
8686         -c "Verifying peer X.509 certificate... ok" \
8687         -C "received HelloRetryRequest message"
8688
8689requires_gnutls_tls1_3
8690requires_gnutls_next_no_ticket
8691requires_gnutls_next_disable_tls13_compat
8692requires_config_enabled MBEDTLS_SSL_CLI_C
8693requires_config_enabled MBEDTLS_DEBUG_C
8694requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8695requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8696requires_config_enabled PSA_WANT_ALG_ECDH
8697run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
8698         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8699         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
8700         0 \
8701         -c "HTTP/1.0 200 OK" \
8702         -c "Protocol is TLSv1.3" \
8703         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8704         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8705         -c "NamedGroup: secp384r1 ( 18 )" \
8706         -c "Verifying peer X.509 certificate... ok" \
8707         -C "received HelloRetryRequest message"
8708
8709requires_gnutls_tls1_3
8710requires_gnutls_next_no_ticket
8711requires_gnutls_next_disable_tls13_compat
8712requires_config_enabled MBEDTLS_SSL_CLI_C
8713requires_config_enabled MBEDTLS_DEBUG_C
8714requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8715requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8716requires_config_enabled PSA_WANT_ALG_ECDH
8717run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
8718         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8719         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
8720         0 \
8721         -c "HTTP/1.0 200 OK" \
8722         -c "Protocol is TLSv1.3" \
8723         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8724         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8725         -c "NamedGroup: secp384r1 ( 18 )" \
8726         -c "Verifying peer X.509 certificate... ok" \
8727         -C "received HelloRetryRequest message"
8728
8729requires_gnutls_tls1_3
8730requires_gnutls_next_no_ticket
8731requires_gnutls_next_disable_tls13_compat
8732requires_config_enabled MBEDTLS_SSL_CLI_C
8733requires_config_enabled MBEDTLS_DEBUG_C
8734requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8735requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8736requires_config_enabled PSA_WANT_ALG_ECDH
8737run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
8738         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8739         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
8740         0 \
8741         -c "HTTP/1.0 200 OK" \
8742         -c "Protocol is TLSv1.3" \
8743         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8744         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8745         -c "NamedGroup: secp384r1 ( 18 )" \
8746         -c "Verifying peer X.509 certificate... ok" \
8747         -C "received HelloRetryRequest message"
8748
8749requires_gnutls_tls1_3
8750requires_gnutls_next_no_ticket
8751requires_gnutls_next_disable_tls13_compat
8752requires_config_enabled MBEDTLS_SSL_CLI_C
8753requires_config_enabled MBEDTLS_DEBUG_C
8754requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8756requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8757requires_config_enabled PSA_WANT_ALG_ECDH
8758run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
8759         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
8760         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
8761         0 \
8762         -c "HTTP/1.0 200 OK" \
8763         -c "Protocol is TLSv1.3" \
8764         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8765         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8766         -c "NamedGroup: secp384r1 ( 18 )" \
8767         -c "Verifying peer X.509 certificate... ok" \
8768         -C "received HelloRetryRequest message"
8769
8770requires_gnutls_tls1_3
8771requires_gnutls_next_no_ticket
8772requires_gnutls_next_disable_tls13_compat
8773requires_config_enabled MBEDTLS_SSL_CLI_C
8774requires_config_enabled MBEDTLS_DEBUG_C
8775requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8777requires_config_enabled PSA_WANT_ALG_ECDH
8778run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
8779         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8780         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
8781         0 \
8782         -c "HTTP/1.0 200 OK" \
8783         -c "Protocol is TLSv1.3" \
8784         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8785         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8786         -c "NamedGroup: secp521r1 ( 19 )" \
8787         -c "Verifying peer X.509 certificate... ok" \
8788         -C "received HelloRetryRequest message"
8789
8790requires_gnutls_tls1_3
8791requires_gnutls_next_no_ticket
8792requires_gnutls_next_disable_tls13_compat
8793requires_config_enabled MBEDTLS_SSL_CLI_C
8794requires_config_enabled MBEDTLS_DEBUG_C
8795requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8796requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8797requires_config_enabled PSA_WANT_ALG_ECDH
8798run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
8799         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8800         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
8801         0 \
8802         -c "HTTP/1.0 200 OK" \
8803         -c "Protocol is TLSv1.3" \
8804         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8805         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8806         -c "NamedGroup: secp521r1 ( 19 )" \
8807         -c "Verifying peer X.509 certificate... ok" \
8808         -C "received HelloRetryRequest message"
8809
8810requires_gnutls_tls1_3
8811requires_gnutls_next_no_ticket
8812requires_gnutls_next_disable_tls13_compat
8813requires_config_enabled MBEDTLS_SSL_CLI_C
8814requires_config_enabled MBEDTLS_DEBUG_C
8815requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8816requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8817requires_config_enabled PSA_WANT_ALG_ECDH
8818run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
8819         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8820         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
8821         0 \
8822         -c "HTTP/1.0 200 OK" \
8823         -c "Protocol is TLSv1.3" \
8824         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8825         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8826         -c "NamedGroup: secp521r1 ( 19 )" \
8827         -c "Verifying peer X.509 certificate... ok" \
8828         -C "received HelloRetryRequest message"
8829
8830requires_gnutls_tls1_3
8831requires_gnutls_next_no_ticket
8832requires_gnutls_next_disable_tls13_compat
8833requires_config_enabled MBEDTLS_SSL_CLI_C
8834requires_config_enabled MBEDTLS_DEBUG_C
8835requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8836requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8837requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8838requires_config_enabled PSA_WANT_ALG_ECDH
8839run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
8840         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
8841         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
8842         0 \
8843         -c "HTTP/1.0 200 OK" \
8844         -c "Protocol is TLSv1.3" \
8845         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8846         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8847         -c "NamedGroup: secp521r1 ( 19 )" \
8848         -c "Verifying peer X.509 certificate... ok" \
8849         -C "received HelloRetryRequest message"
8850
8851requires_gnutls_tls1_3
8852requires_gnutls_next_no_ticket
8853requires_gnutls_next_disable_tls13_compat
8854requires_config_enabled MBEDTLS_SSL_CLI_C
8855requires_config_enabled MBEDTLS_DEBUG_C
8856requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8857requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8858requires_config_enabled PSA_WANT_ALG_ECDH
8859run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
8860         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8861         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
8862         0 \
8863         -c "HTTP/1.0 200 OK" \
8864         -c "Protocol is TLSv1.3" \
8865         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8866         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8867         -c "NamedGroup: x25519 ( 1d )" \
8868         -c "Verifying peer X.509 certificate... ok" \
8869         -C "received HelloRetryRequest message"
8870
8871requires_gnutls_tls1_3
8872requires_gnutls_next_no_ticket
8873requires_gnutls_next_disable_tls13_compat
8874requires_config_enabled MBEDTLS_SSL_CLI_C
8875requires_config_enabled MBEDTLS_DEBUG_C
8876requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8878requires_config_enabled PSA_WANT_ALG_ECDH
8879run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
8880         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8881         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
8882         0 \
8883         -c "HTTP/1.0 200 OK" \
8884         -c "Protocol is TLSv1.3" \
8885         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8886         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8887         -c "NamedGroup: x25519 ( 1d )" \
8888         -c "Verifying peer X.509 certificate... ok" \
8889         -C "received HelloRetryRequest message"
8890
8891requires_gnutls_tls1_3
8892requires_gnutls_next_no_ticket
8893requires_gnutls_next_disable_tls13_compat
8894requires_config_enabled MBEDTLS_SSL_CLI_C
8895requires_config_enabled MBEDTLS_DEBUG_C
8896requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8898requires_config_enabled PSA_WANT_ALG_ECDH
8899run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
8900         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8901         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
8902         0 \
8903         -c "HTTP/1.0 200 OK" \
8904         -c "Protocol is TLSv1.3" \
8905         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8906         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8907         -c "NamedGroup: x25519 ( 1d )" \
8908         -c "Verifying peer X.509 certificate... ok" \
8909         -C "received HelloRetryRequest message"
8910
8911requires_gnutls_tls1_3
8912requires_gnutls_next_no_ticket
8913requires_gnutls_next_disable_tls13_compat
8914requires_config_enabled MBEDTLS_SSL_CLI_C
8915requires_config_enabled MBEDTLS_DEBUG_C
8916requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8917requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8918requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
8919requires_config_enabled PSA_WANT_ALG_ECDH
8920run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
8921         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
8922         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
8923         0 \
8924         -c "HTTP/1.0 200 OK" \
8925         -c "Protocol is TLSv1.3" \
8926         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8927         -c "Certificate Verify: Signature algorithm ( 0804 )" \
8928         -c "NamedGroup: x25519 ( 1d )" \
8929         -c "Verifying peer X.509 certificate... ok" \
8930         -C "received HelloRetryRequest message"
8931
8932requires_gnutls_tls1_3
8933requires_gnutls_next_no_ticket
8934requires_gnutls_next_disable_tls13_compat
8935requires_config_enabled MBEDTLS_SSL_CLI_C
8936requires_config_enabled MBEDTLS_DEBUG_C
8937requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8938requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8939requires_config_enabled PSA_WANT_ALG_ECDH
8940run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
8941         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8942         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
8943         0 \
8944         -c "HTTP/1.0 200 OK" \
8945         -c "Protocol is TLSv1.3" \
8946         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8947         -c "Certificate Verify: Signature algorithm ( 0403 )" \
8948         -c "NamedGroup: x448 ( 1e )" \
8949         -c "Verifying peer X.509 certificate... ok" \
8950         -C "received HelloRetryRequest message"
8951
8952requires_gnutls_tls1_3
8953requires_gnutls_next_no_ticket
8954requires_gnutls_next_disable_tls13_compat
8955requires_config_enabled MBEDTLS_SSL_CLI_C
8956requires_config_enabled MBEDTLS_DEBUG_C
8957requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8958requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8959requires_config_enabled PSA_WANT_ALG_ECDH
8960run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
8961         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8962         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
8963         0 \
8964         -c "HTTP/1.0 200 OK" \
8965         -c "Protocol is TLSv1.3" \
8966         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8967         -c "Certificate Verify: Signature algorithm ( 0503 )" \
8968         -c "NamedGroup: x448 ( 1e )" \
8969         -c "Verifying peer X.509 certificate... ok" \
8970         -C "received HelloRetryRequest message"
8971
8972requires_gnutls_tls1_3
8973requires_gnutls_next_no_ticket
8974requires_gnutls_next_disable_tls13_compat
8975requires_config_enabled MBEDTLS_SSL_CLI_C
8976requires_config_enabled MBEDTLS_DEBUG_C
8977requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8978requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8979requires_config_enabled PSA_WANT_ALG_ECDH
8980run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
8981         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
8982         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
8983         0 \
8984         -c "HTTP/1.0 200 OK" \
8985         -c "Protocol is TLSv1.3" \
8986         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
8987         -c "Certificate Verify: Signature algorithm ( 0603 )" \
8988         -c "NamedGroup: x448 ( 1e )" \
8989         -c "Verifying peer X.509 certificate... ok" \
8990         -C "received HelloRetryRequest message"
8991
8992requires_gnutls_tls1_3
8993requires_gnutls_next_no_ticket
8994requires_gnutls_next_disable_tls13_compat
8995requires_config_enabled MBEDTLS_SSL_CLI_C
8996requires_config_enabled MBEDTLS_DEBUG_C
8997requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
8998requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
8999requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9000requires_config_enabled PSA_WANT_ALG_ECDH
9001run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
9002         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
9003         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
9004         0 \
9005         -c "HTTP/1.0 200 OK" \
9006         -c "Protocol is TLSv1.3" \
9007         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9008         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9009         -c "NamedGroup: x448 ( 1e )" \
9010         -c "Verifying peer X.509 certificate... ok" \
9011         -C "received HelloRetryRequest message"
9012
9013requires_gnutls_tls1_3
9014requires_gnutls_next_no_ticket
9015requires_gnutls_next_disable_tls13_compat
9016requires_config_enabled MBEDTLS_SSL_CLI_C
9017requires_config_enabled MBEDTLS_DEBUG_C
9018requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9019requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9020requires_config_enabled PSA_WANT_ALG_FFDH
9021requires_config_enabled PSA_WANT_DH_RFC7919_2048
9022run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
9023         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP256R1-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
9024         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
9025         0 \
9026         -c "HTTP/1.0 200 OK" \
9027         -c "Protocol is TLSv1.3" \
9028         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9029         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9030         -c "NamedGroup: ffdhe2048 ( 100 )" \
9031         -c "Verifying peer X.509 certificate... ok" \
9032         -C "received HelloRetryRequest message"
9033
9034requires_gnutls_tls1_3
9035requires_gnutls_next_no_ticket
9036requires_gnutls_next_disable_tls13_compat
9037requires_config_enabled MBEDTLS_SSL_CLI_C
9038requires_config_enabled MBEDTLS_DEBUG_C
9039requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9040requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9041requires_config_enabled PSA_WANT_ALG_FFDH
9042requires_config_enabled PSA_WANT_DH_RFC7919_2048
9043run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
9044         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp384r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp384r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP384R1-SHA384:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
9045         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
9046         0 \
9047         -c "HTTP/1.0 200 OK" \
9048         -c "Protocol is TLSv1.3" \
9049         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9050         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9051         -c "NamedGroup: ffdhe2048 ( 100 )" \
9052         -c "Verifying peer X.509 certificate... ok" \
9053         -C "received HelloRetryRequest message"
9054
9055requires_gnutls_tls1_3
9056requires_gnutls_next_no_ticket
9057requires_gnutls_next_disable_tls13_compat
9058requires_config_enabled MBEDTLS_SSL_CLI_C
9059requires_config_enabled MBEDTLS_DEBUG_C
9060requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9061requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9062requires_config_enabled PSA_WANT_ALG_FFDH
9063requires_config_enabled PSA_WANT_DH_RFC7919_2048
9064run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
9065         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp521r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp521r1.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-ECDSA-SECP521R1-SHA512:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
9066         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
9067         0 \
9068         -c "HTTP/1.0 200 OK" \
9069         -c "Protocol is TLSv1.3" \
9070         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9071         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9072         -c "NamedGroup: ffdhe2048 ( 100 )" \
9073         -c "Verifying peer X.509 certificate... ok" \
9074         -C "received HelloRetryRequest message"
9075
9076requires_gnutls_tls1_3
9077requires_gnutls_next_no_ticket
9078requires_gnutls_next_disable_tls13_compat
9079requires_config_enabled MBEDTLS_SSL_CLI_C
9080requires_config_enabled MBEDTLS_DEBUG_C
9081requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9082requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9083requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9084requires_config_enabled PSA_WANT_ALG_FFDH
9085requires_config_enabled PSA_WANT_DH_RFC7919_2048
9086run_test "TLS 1.3 m->G: AES_128_CCM_8_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
9087         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/server2-sha256.crt --x509keyfile $DATA_FILES_PATH/server2.key --priority=NONE:+AES-128-CCM-8:+SHA256:+AEAD:+SIGN-RSA-PSS-RSAE-SHA256:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
9088         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
9089         0 \
9090         -c "HTTP/1.0 200 OK" \
9091         -c "Protocol is TLSv1.3" \
9092         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
9093         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9094         -c "NamedGroup: ffdhe2048 ( 100 )" \
9095         -c "Verifying peer X.509 certificate... ok" \
9096         -C "received HelloRetryRequest message"
9097
9098requires_config_enabled MBEDTLS_SSL_SRV_C
9099requires_config_enabled MBEDTLS_DEBUG_C
9100requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9102requires_config_enabled PSA_WANT_ALG_ECDH
9103requires_config_enabled MBEDTLS_SSL_CLI_C
9104requires_config_enabled MBEDTLS_DEBUG_C
9105requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9106requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9107requires_config_enabled PSA_WANT_ALG_ECDH
9108run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
9109         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9110         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
9111         0 \
9112         -s "Protocol is TLSv1.3" \
9113         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9114         -s "received signature algorithm: 0x403" \
9115         -s "got named group: secp256r1(0017)" \
9116         -s "Certificate verification was skipped" \
9117         -c "Protocol is TLSv1.3" \
9118         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9119         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9120         -c "NamedGroup: secp256r1 ( 17 )" \
9121         -c "Verifying peer X.509 certificate... ok" \
9122         -C "received HelloRetryRequest message"
9123
9124requires_config_enabled MBEDTLS_SSL_SRV_C
9125requires_config_enabled MBEDTLS_DEBUG_C
9126requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9127requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9128requires_config_enabled PSA_WANT_ALG_ECDH
9129requires_config_enabled MBEDTLS_SSL_CLI_C
9130requires_config_enabled MBEDTLS_DEBUG_C
9131requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9132requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9133requires_config_enabled PSA_WANT_ALG_ECDH
9134run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
9135         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9136         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
9137         0 \
9138         -s "Protocol is TLSv1.3" \
9139         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9140         -s "received signature algorithm: 0x503" \
9141         -s "got named group: secp256r1(0017)" \
9142         -s "Certificate verification was skipped" \
9143         -c "Protocol is TLSv1.3" \
9144         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9145         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9146         -c "NamedGroup: secp256r1 ( 17 )" \
9147         -c "Verifying peer X.509 certificate... ok" \
9148         -C "received HelloRetryRequest message"
9149
9150requires_config_enabled MBEDTLS_SSL_SRV_C
9151requires_config_enabled MBEDTLS_DEBUG_C
9152requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9153requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9154requires_config_enabled PSA_WANT_ALG_ECDH
9155requires_config_enabled MBEDTLS_SSL_CLI_C
9156requires_config_enabled MBEDTLS_DEBUG_C
9157requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9159requires_config_enabled PSA_WANT_ALG_ECDH
9160run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
9161         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9162         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
9163         0 \
9164         -s "Protocol is TLSv1.3" \
9165         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9166         -s "received signature algorithm: 0x603" \
9167         -s "got named group: secp256r1(0017)" \
9168         -s "Certificate verification was skipped" \
9169         -c "Protocol is TLSv1.3" \
9170         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9171         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9172         -c "NamedGroup: secp256r1 ( 17 )" \
9173         -c "Verifying peer X.509 certificate... ok" \
9174         -C "received HelloRetryRequest message"
9175
9176requires_config_enabled MBEDTLS_SSL_SRV_C
9177requires_config_enabled MBEDTLS_DEBUG_C
9178requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9180requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9181requires_config_enabled PSA_WANT_ALG_ECDH
9182requires_config_enabled MBEDTLS_SSL_CLI_C
9183requires_config_enabled MBEDTLS_DEBUG_C
9184requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9185requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9186requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9187requires_config_enabled PSA_WANT_ALG_ECDH
9188run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
9189         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9190         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
9191         0 \
9192         -s "Protocol is TLSv1.3" \
9193         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9194         -s "received signature algorithm: 0x804" \
9195         -s "got named group: secp256r1(0017)" \
9196         -s "Certificate verification was skipped" \
9197         -c "Protocol is TLSv1.3" \
9198         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9199         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9200         -c "NamedGroup: secp256r1 ( 17 )" \
9201         -c "Verifying peer X.509 certificate... ok" \
9202         -C "received HelloRetryRequest message"
9203
9204requires_config_enabled MBEDTLS_SSL_SRV_C
9205requires_config_enabled MBEDTLS_DEBUG_C
9206requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9207requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9208requires_config_enabled PSA_WANT_ALG_ECDH
9209requires_config_enabled MBEDTLS_SSL_CLI_C
9210requires_config_enabled MBEDTLS_DEBUG_C
9211requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9212requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9213requires_config_enabled PSA_WANT_ALG_ECDH
9214run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
9215         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9216         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
9217         0 \
9218         -s "Protocol is TLSv1.3" \
9219         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9220         -s "received signature algorithm: 0x403" \
9221         -s "got named group: secp384r1(0018)" \
9222         -s "Certificate verification was skipped" \
9223         -c "Protocol is TLSv1.3" \
9224         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9225         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9226         -c "NamedGroup: secp384r1 ( 18 )" \
9227         -c "Verifying peer X.509 certificate... ok" \
9228         -C "received HelloRetryRequest message"
9229
9230requires_config_enabled MBEDTLS_SSL_SRV_C
9231requires_config_enabled MBEDTLS_DEBUG_C
9232requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9233requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9234requires_config_enabled PSA_WANT_ALG_ECDH
9235requires_config_enabled MBEDTLS_SSL_CLI_C
9236requires_config_enabled MBEDTLS_DEBUG_C
9237requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9238requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9239requires_config_enabled PSA_WANT_ALG_ECDH
9240run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
9241         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9242         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
9243         0 \
9244         -s "Protocol is TLSv1.3" \
9245         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9246         -s "received signature algorithm: 0x503" \
9247         -s "got named group: secp384r1(0018)" \
9248         -s "Certificate verification was skipped" \
9249         -c "Protocol is TLSv1.3" \
9250         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9251         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9252         -c "NamedGroup: secp384r1 ( 18 )" \
9253         -c "Verifying peer X.509 certificate... ok" \
9254         -C "received HelloRetryRequest message"
9255
9256requires_config_enabled MBEDTLS_SSL_SRV_C
9257requires_config_enabled MBEDTLS_DEBUG_C
9258requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9259requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9260requires_config_enabled PSA_WANT_ALG_ECDH
9261requires_config_enabled MBEDTLS_SSL_CLI_C
9262requires_config_enabled MBEDTLS_DEBUG_C
9263requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9264requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9265requires_config_enabled PSA_WANT_ALG_ECDH
9266run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
9267         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9268         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
9269         0 \
9270         -s "Protocol is TLSv1.3" \
9271         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9272         -s "received signature algorithm: 0x603" \
9273         -s "got named group: secp384r1(0018)" \
9274         -s "Certificate verification was skipped" \
9275         -c "Protocol is TLSv1.3" \
9276         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9277         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9278         -c "NamedGroup: secp384r1 ( 18 )" \
9279         -c "Verifying peer X.509 certificate... ok" \
9280         -C "received HelloRetryRequest message"
9281
9282requires_config_enabled MBEDTLS_SSL_SRV_C
9283requires_config_enabled MBEDTLS_DEBUG_C
9284requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9285requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9286requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9287requires_config_enabled PSA_WANT_ALG_ECDH
9288requires_config_enabled MBEDTLS_SSL_CLI_C
9289requires_config_enabled MBEDTLS_DEBUG_C
9290requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9292requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9293requires_config_enabled PSA_WANT_ALG_ECDH
9294run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
9295         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9296         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
9297         0 \
9298         -s "Protocol is TLSv1.3" \
9299         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9300         -s "received signature algorithm: 0x804" \
9301         -s "got named group: secp384r1(0018)" \
9302         -s "Certificate verification was skipped" \
9303         -c "Protocol is TLSv1.3" \
9304         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9305         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9306         -c "NamedGroup: secp384r1 ( 18 )" \
9307         -c "Verifying peer X.509 certificate... ok" \
9308         -C "received HelloRetryRequest message"
9309
9310requires_config_enabled MBEDTLS_SSL_SRV_C
9311requires_config_enabled MBEDTLS_DEBUG_C
9312requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9313requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9314requires_config_enabled PSA_WANT_ALG_ECDH
9315requires_config_enabled MBEDTLS_SSL_CLI_C
9316requires_config_enabled MBEDTLS_DEBUG_C
9317requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9318requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9319requires_config_enabled PSA_WANT_ALG_ECDH
9320run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
9321         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9322         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
9323         0 \
9324         -s "Protocol is TLSv1.3" \
9325         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9326         -s "received signature algorithm: 0x403" \
9327         -s "got named group: secp521r1(0019)" \
9328         -s "Certificate verification was skipped" \
9329         -c "Protocol is TLSv1.3" \
9330         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9331         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9332         -c "NamedGroup: secp521r1 ( 19 )" \
9333         -c "Verifying peer X.509 certificate... ok" \
9334         -C "received HelloRetryRequest message"
9335
9336requires_config_enabled MBEDTLS_SSL_SRV_C
9337requires_config_enabled MBEDTLS_DEBUG_C
9338requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9339requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9340requires_config_enabled PSA_WANT_ALG_ECDH
9341requires_config_enabled MBEDTLS_SSL_CLI_C
9342requires_config_enabled MBEDTLS_DEBUG_C
9343requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9344requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9345requires_config_enabled PSA_WANT_ALG_ECDH
9346run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
9347         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9348         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
9349         0 \
9350         -s "Protocol is TLSv1.3" \
9351         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9352         -s "received signature algorithm: 0x503" \
9353         -s "got named group: secp521r1(0019)" \
9354         -s "Certificate verification was skipped" \
9355         -c "Protocol is TLSv1.3" \
9356         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9357         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9358         -c "NamedGroup: secp521r1 ( 19 )" \
9359         -c "Verifying peer X.509 certificate... ok" \
9360         -C "received HelloRetryRequest message"
9361
9362requires_config_enabled MBEDTLS_SSL_SRV_C
9363requires_config_enabled MBEDTLS_DEBUG_C
9364requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9365requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9366requires_config_enabled PSA_WANT_ALG_ECDH
9367requires_config_enabled MBEDTLS_SSL_CLI_C
9368requires_config_enabled MBEDTLS_DEBUG_C
9369requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9370requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9371requires_config_enabled PSA_WANT_ALG_ECDH
9372run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
9373         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9374         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
9375         0 \
9376         -s "Protocol is TLSv1.3" \
9377         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9378         -s "received signature algorithm: 0x603" \
9379         -s "got named group: secp521r1(0019)" \
9380         -s "Certificate verification was skipped" \
9381         -c "Protocol is TLSv1.3" \
9382         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9383         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9384         -c "NamedGroup: secp521r1 ( 19 )" \
9385         -c "Verifying peer X.509 certificate... ok" \
9386         -C "received HelloRetryRequest message"
9387
9388requires_config_enabled MBEDTLS_SSL_SRV_C
9389requires_config_enabled MBEDTLS_DEBUG_C
9390requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9391requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9392requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9393requires_config_enabled PSA_WANT_ALG_ECDH
9394requires_config_enabled MBEDTLS_SSL_CLI_C
9395requires_config_enabled MBEDTLS_DEBUG_C
9396requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9397requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9398requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9399requires_config_enabled PSA_WANT_ALG_ECDH
9400run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
9401         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9402         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
9403         0 \
9404         -s "Protocol is TLSv1.3" \
9405         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9406         -s "received signature algorithm: 0x804" \
9407         -s "got named group: secp521r1(0019)" \
9408         -s "Certificate verification was skipped" \
9409         -c "Protocol is TLSv1.3" \
9410         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9411         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9412         -c "NamedGroup: secp521r1 ( 19 )" \
9413         -c "Verifying peer X.509 certificate... ok" \
9414         -C "received HelloRetryRequest message"
9415
9416requires_config_enabled MBEDTLS_SSL_SRV_C
9417requires_config_enabled MBEDTLS_DEBUG_C
9418requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9419requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9420requires_config_enabled PSA_WANT_ALG_ECDH
9421requires_config_enabled MBEDTLS_SSL_CLI_C
9422requires_config_enabled MBEDTLS_DEBUG_C
9423requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9424requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9425requires_config_enabled PSA_WANT_ALG_ECDH
9426run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
9427         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9428         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
9429         0 \
9430         -s "Protocol is TLSv1.3" \
9431         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9432         -s "received signature algorithm: 0x403" \
9433         -s "got named group: x25519(001d)" \
9434         -s "Certificate verification was skipped" \
9435         -c "Protocol is TLSv1.3" \
9436         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9437         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9438         -c "NamedGroup: x25519 ( 1d )" \
9439         -c "Verifying peer X.509 certificate... ok" \
9440         -C "received HelloRetryRequest message"
9441
9442requires_config_enabled MBEDTLS_SSL_SRV_C
9443requires_config_enabled MBEDTLS_DEBUG_C
9444requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9445requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9446requires_config_enabled PSA_WANT_ALG_ECDH
9447requires_config_enabled MBEDTLS_SSL_CLI_C
9448requires_config_enabled MBEDTLS_DEBUG_C
9449requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9450requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9451requires_config_enabled PSA_WANT_ALG_ECDH
9452run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
9453         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9454         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
9455         0 \
9456         -s "Protocol is TLSv1.3" \
9457         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9458         -s "received signature algorithm: 0x503" \
9459         -s "got named group: x25519(001d)" \
9460         -s "Certificate verification was skipped" \
9461         -c "Protocol is TLSv1.3" \
9462         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9463         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9464         -c "NamedGroup: x25519 ( 1d )" \
9465         -c "Verifying peer X.509 certificate... ok" \
9466         -C "received HelloRetryRequest message"
9467
9468requires_config_enabled MBEDTLS_SSL_SRV_C
9469requires_config_enabled MBEDTLS_DEBUG_C
9470requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9471requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9472requires_config_enabled PSA_WANT_ALG_ECDH
9473requires_config_enabled MBEDTLS_SSL_CLI_C
9474requires_config_enabled MBEDTLS_DEBUG_C
9475requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9476requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9477requires_config_enabled PSA_WANT_ALG_ECDH
9478run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
9479         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9480         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
9481         0 \
9482         -s "Protocol is TLSv1.3" \
9483         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9484         -s "received signature algorithm: 0x603" \
9485         -s "got named group: x25519(001d)" \
9486         -s "Certificate verification was skipped" \
9487         -c "Protocol is TLSv1.3" \
9488         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9489         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9490         -c "NamedGroup: x25519 ( 1d )" \
9491         -c "Verifying peer X.509 certificate... ok" \
9492         -C "received HelloRetryRequest message"
9493
9494requires_config_enabled MBEDTLS_SSL_SRV_C
9495requires_config_enabled MBEDTLS_DEBUG_C
9496requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9497requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9498requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9499requires_config_enabled PSA_WANT_ALG_ECDH
9500requires_config_enabled MBEDTLS_SSL_CLI_C
9501requires_config_enabled MBEDTLS_DEBUG_C
9502requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9503requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9504requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9505requires_config_enabled PSA_WANT_ALG_ECDH
9506run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x25519,rsa_pss_rsae_sha256" \
9507         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9508         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
9509         0 \
9510         -s "Protocol is TLSv1.3" \
9511         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9512         -s "received signature algorithm: 0x804" \
9513         -s "got named group: x25519(001d)" \
9514         -s "Certificate verification was skipped" \
9515         -c "Protocol is TLSv1.3" \
9516         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9517         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9518         -c "NamedGroup: x25519 ( 1d )" \
9519         -c "Verifying peer X.509 certificate... ok" \
9520         -C "received HelloRetryRequest message"
9521
9522requires_config_enabled MBEDTLS_SSL_SRV_C
9523requires_config_enabled MBEDTLS_DEBUG_C
9524requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9525requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9526requires_config_enabled PSA_WANT_ALG_ECDH
9527requires_config_enabled MBEDTLS_SSL_CLI_C
9528requires_config_enabled MBEDTLS_DEBUG_C
9529requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9530requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9531requires_config_enabled PSA_WANT_ALG_ECDH
9532run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp256r1_sha256" \
9533         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9534         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
9535         0 \
9536         -s "Protocol is TLSv1.3" \
9537         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9538         -s "received signature algorithm: 0x403" \
9539         -s "got named group: x448(001e)" \
9540         -s "Certificate verification was skipped" \
9541         -c "Protocol is TLSv1.3" \
9542         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9543         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9544         -c "NamedGroup: x448 ( 1e )" \
9545         -c "Verifying peer X.509 certificate... ok" \
9546         -C "received HelloRetryRequest message"
9547
9548requires_config_enabled MBEDTLS_SSL_SRV_C
9549requires_config_enabled MBEDTLS_DEBUG_C
9550requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9552requires_config_enabled PSA_WANT_ALG_ECDH
9553requires_config_enabled MBEDTLS_SSL_CLI_C
9554requires_config_enabled MBEDTLS_DEBUG_C
9555requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9556requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9557requires_config_enabled PSA_WANT_ALG_ECDH
9558run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp384r1_sha384" \
9559         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9560         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
9561         0 \
9562         -s "Protocol is TLSv1.3" \
9563         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9564         -s "received signature algorithm: 0x503" \
9565         -s "got named group: x448(001e)" \
9566         -s "Certificate verification was skipped" \
9567         -c "Protocol is TLSv1.3" \
9568         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9569         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9570         -c "NamedGroup: x448 ( 1e )" \
9571         -c "Verifying peer X.509 certificate... ok" \
9572         -C "received HelloRetryRequest message"
9573
9574requires_config_enabled MBEDTLS_SSL_SRV_C
9575requires_config_enabled MBEDTLS_DEBUG_C
9576requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9578requires_config_enabled PSA_WANT_ALG_ECDH
9579requires_config_enabled MBEDTLS_SSL_CLI_C
9580requires_config_enabled MBEDTLS_DEBUG_C
9581requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9582requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9583requires_config_enabled PSA_WANT_ALG_ECDH
9584run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,ecdsa_secp521r1_sha512" \
9585         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9586         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
9587         0 \
9588         -s "Protocol is TLSv1.3" \
9589         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9590         -s "received signature algorithm: 0x603" \
9591         -s "got named group: x448(001e)" \
9592         -s "Certificate verification was skipped" \
9593         -c "Protocol is TLSv1.3" \
9594         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9595         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9596         -c "NamedGroup: x448 ( 1e )" \
9597         -c "Verifying peer X.509 certificate... ok" \
9598         -C "received HelloRetryRequest message"
9599
9600requires_config_enabled MBEDTLS_SSL_SRV_C
9601requires_config_enabled MBEDTLS_DEBUG_C
9602requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9603requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9604requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9605requires_config_enabled PSA_WANT_ALG_ECDH
9606requires_config_enabled MBEDTLS_SSL_CLI_C
9607requires_config_enabled MBEDTLS_DEBUG_C
9608requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9610requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9611requires_config_enabled PSA_WANT_ALG_ECDH
9612run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,x448,rsa_pss_rsae_sha256" \
9613         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9614         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
9615         0 \
9616         -s "Protocol is TLSv1.3" \
9617         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9618         -s "received signature algorithm: 0x804" \
9619         -s "got named group: x448(001e)" \
9620         -s "Certificate verification was skipped" \
9621         -c "Protocol is TLSv1.3" \
9622         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9623         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9624         -c "NamedGroup: x448 ( 1e )" \
9625         -c "Verifying peer X.509 certificate... ok" \
9626         -C "received HelloRetryRequest message"
9627
9628requires_config_enabled MBEDTLS_SSL_SRV_C
9629requires_config_enabled MBEDTLS_DEBUG_C
9630requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9631requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9632requires_config_enabled PSA_WANT_ALG_FFDH
9633requires_config_enabled PSA_WANT_DH_RFC7919_2048
9634requires_config_enabled MBEDTLS_SSL_CLI_C
9635requires_config_enabled MBEDTLS_DEBUG_C
9636requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9637requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9638requires_config_enabled PSA_WANT_ALG_FFDH
9639requires_config_enabled PSA_WANT_DH_RFC7919_2048
9640run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
9641         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9642         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
9643         0 \
9644         -s "Protocol is TLSv1.3" \
9645         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9646         -s "received signature algorithm: 0x403" \
9647         -s "got named group: ffdhe2048(0100)" \
9648         -s "Certificate verification was skipped" \
9649         -c "Protocol is TLSv1.3" \
9650         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9651         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9652         -c "NamedGroup: ffdhe2048 ( 100 )" \
9653         -c "Verifying peer X.509 certificate... ok" \
9654         -C "received HelloRetryRequest message"
9655
9656requires_config_enabled MBEDTLS_SSL_SRV_C
9657requires_config_enabled MBEDTLS_DEBUG_C
9658requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9659requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9660requires_config_enabled PSA_WANT_ALG_FFDH
9661requires_config_enabled PSA_WANT_DH_RFC7919_2048
9662requires_config_enabled MBEDTLS_SSL_CLI_C
9663requires_config_enabled MBEDTLS_DEBUG_C
9664requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9665requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9666requires_config_enabled PSA_WANT_ALG_FFDH
9667requires_config_enabled PSA_WANT_DH_RFC7919_2048
9668run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
9669         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9670         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
9671         0 \
9672         -s "Protocol is TLSv1.3" \
9673         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9674         -s "received signature algorithm: 0x503" \
9675         -s "got named group: ffdhe2048(0100)" \
9676         -s "Certificate verification was skipped" \
9677         -c "Protocol is TLSv1.3" \
9678         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9679         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9680         -c "NamedGroup: ffdhe2048 ( 100 )" \
9681         -c "Verifying peer X.509 certificate... ok" \
9682         -C "received HelloRetryRequest message"
9683
9684requires_config_enabled MBEDTLS_SSL_SRV_C
9685requires_config_enabled MBEDTLS_DEBUG_C
9686requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9687requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9688requires_config_enabled PSA_WANT_ALG_FFDH
9689requires_config_enabled PSA_WANT_DH_RFC7919_2048
9690requires_config_enabled MBEDTLS_SSL_CLI_C
9691requires_config_enabled MBEDTLS_DEBUG_C
9692requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9693requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9694requires_config_enabled PSA_WANT_ALG_FFDH
9695requires_config_enabled PSA_WANT_DH_RFC7919_2048
9696run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
9697         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9698         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
9699         0 \
9700         -s "Protocol is TLSv1.3" \
9701         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9702         -s "received signature algorithm: 0x603" \
9703         -s "got named group: ffdhe2048(0100)" \
9704         -s "Certificate verification was skipped" \
9705         -c "Protocol is TLSv1.3" \
9706         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9707         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9708         -c "NamedGroup: ffdhe2048 ( 100 )" \
9709         -c "Verifying peer X.509 certificate... ok" \
9710         -C "received HelloRetryRequest message"
9711
9712requires_config_enabled MBEDTLS_SSL_SRV_C
9713requires_config_enabled MBEDTLS_DEBUG_C
9714requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9715requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9716requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9717requires_config_enabled PSA_WANT_ALG_FFDH
9718requires_config_enabled PSA_WANT_DH_RFC7919_2048
9719requires_config_enabled MBEDTLS_SSL_CLI_C
9720requires_config_enabled MBEDTLS_DEBUG_C
9721requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9722requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9723requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9724requires_config_enabled PSA_WANT_ALG_FFDH
9725requires_config_enabled PSA_WANT_DH_RFC7919_2048
9726run_test "TLS 1.3 m->m: AES_128_GCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
9727         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9728         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-GCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
9729         0 \
9730         -s "Protocol is TLSv1.3" \
9731         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-GCM-SHA256 ( id=4865 )" \
9732         -s "received signature algorithm: 0x804" \
9733         -s "got named group: ffdhe2048(0100)" \
9734         -s "Certificate verification was skipped" \
9735         -c "Protocol is TLSv1.3" \
9736         -c "server hello, chosen ciphersuite: ( 1301 ) - TLS1-3-AES-128-GCM-SHA256" \
9737         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9738         -c "NamedGroup: ffdhe2048 ( 100 )" \
9739         -c "Verifying peer X.509 certificate... ok" \
9740         -C "received HelloRetryRequest message"
9741
9742requires_config_enabled MBEDTLS_SSL_SRV_C
9743requires_config_enabled MBEDTLS_DEBUG_C
9744requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9745requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9746requires_config_enabled PSA_WANT_ALG_ECDH
9747requires_config_enabled MBEDTLS_SSL_CLI_C
9748requires_config_enabled MBEDTLS_DEBUG_C
9749requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9750requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9751requires_config_enabled PSA_WANT_ALG_ECDH
9752run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp256r1_sha256" \
9753         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9754         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
9755         0 \
9756         -s "Protocol is TLSv1.3" \
9757         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9758         -s "received signature algorithm: 0x403" \
9759         -s "got named group: secp256r1(0017)" \
9760         -s "Certificate verification was skipped" \
9761         -c "Protocol is TLSv1.3" \
9762         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9763         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9764         -c "NamedGroup: secp256r1 ( 17 )" \
9765         -c "Verifying peer X.509 certificate... ok" \
9766         -C "received HelloRetryRequest message"
9767
9768requires_config_enabled MBEDTLS_SSL_SRV_C
9769requires_config_enabled MBEDTLS_DEBUG_C
9770requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9771requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9772requires_config_enabled PSA_WANT_ALG_ECDH
9773requires_config_enabled MBEDTLS_SSL_CLI_C
9774requires_config_enabled MBEDTLS_DEBUG_C
9775requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9777requires_config_enabled PSA_WANT_ALG_ECDH
9778run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp384r1_sha384" \
9779         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9780         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
9781         0 \
9782         -s "Protocol is TLSv1.3" \
9783         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9784         -s "received signature algorithm: 0x503" \
9785         -s "got named group: secp256r1(0017)" \
9786         -s "Certificate verification was skipped" \
9787         -c "Protocol is TLSv1.3" \
9788         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9789         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9790         -c "NamedGroup: secp256r1 ( 17 )" \
9791         -c "Verifying peer X.509 certificate... ok" \
9792         -C "received HelloRetryRequest message"
9793
9794requires_config_enabled MBEDTLS_SSL_SRV_C
9795requires_config_enabled MBEDTLS_DEBUG_C
9796requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9797requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9798requires_config_enabled PSA_WANT_ALG_ECDH
9799requires_config_enabled MBEDTLS_SSL_CLI_C
9800requires_config_enabled MBEDTLS_DEBUG_C
9801requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9803requires_config_enabled PSA_WANT_ALG_ECDH
9804run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,ecdsa_secp521r1_sha512" \
9805         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9806         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
9807         0 \
9808         -s "Protocol is TLSv1.3" \
9809         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9810         -s "received signature algorithm: 0x603" \
9811         -s "got named group: secp256r1(0017)" \
9812         -s "Certificate verification was skipped" \
9813         -c "Protocol is TLSv1.3" \
9814         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9815         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9816         -c "NamedGroup: secp256r1 ( 17 )" \
9817         -c "Verifying peer X.509 certificate... ok" \
9818         -C "received HelloRetryRequest message"
9819
9820requires_config_enabled MBEDTLS_SSL_SRV_C
9821requires_config_enabled MBEDTLS_DEBUG_C
9822requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9823requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9824requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9825requires_config_enabled PSA_WANT_ALG_ECDH
9826requires_config_enabled MBEDTLS_SSL_CLI_C
9827requires_config_enabled MBEDTLS_DEBUG_C
9828requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9829requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9830requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9831requires_config_enabled PSA_WANT_ALG_ECDH
9832run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp256r1,rsa_pss_rsae_sha256" \
9833         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9834         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
9835         0 \
9836         -s "Protocol is TLSv1.3" \
9837         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9838         -s "received signature algorithm: 0x804" \
9839         -s "got named group: secp256r1(0017)" \
9840         -s "Certificate verification was skipped" \
9841         -c "Protocol is TLSv1.3" \
9842         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9843         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9844         -c "NamedGroup: secp256r1 ( 17 )" \
9845         -c "Verifying peer X.509 certificate... ok" \
9846         -C "received HelloRetryRequest message"
9847
9848requires_config_enabled MBEDTLS_SSL_SRV_C
9849requires_config_enabled MBEDTLS_DEBUG_C
9850requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9851requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9852requires_config_enabled PSA_WANT_ALG_ECDH
9853requires_config_enabled MBEDTLS_SSL_CLI_C
9854requires_config_enabled MBEDTLS_DEBUG_C
9855requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9856requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9857requires_config_enabled PSA_WANT_ALG_ECDH
9858run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp256r1_sha256" \
9859         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9860         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
9861         0 \
9862         -s "Protocol is TLSv1.3" \
9863         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9864         -s "received signature algorithm: 0x403" \
9865         -s "got named group: secp384r1(0018)" \
9866         -s "Certificate verification was skipped" \
9867         -c "Protocol is TLSv1.3" \
9868         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9869         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9870         -c "NamedGroup: secp384r1 ( 18 )" \
9871         -c "Verifying peer X.509 certificate... ok" \
9872         -C "received HelloRetryRequest message"
9873
9874requires_config_enabled MBEDTLS_SSL_SRV_C
9875requires_config_enabled MBEDTLS_DEBUG_C
9876requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9877requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9878requires_config_enabled PSA_WANT_ALG_ECDH
9879requires_config_enabled MBEDTLS_SSL_CLI_C
9880requires_config_enabled MBEDTLS_DEBUG_C
9881requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9882requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9883requires_config_enabled PSA_WANT_ALG_ECDH
9884run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp384r1_sha384" \
9885         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9886         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
9887         0 \
9888         -s "Protocol is TLSv1.3" \
9889         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9890         -s "received signature algorithm: 0x503" \
9891         -s "got named group: secp384r1(0018)" \
9892         -s "Certificate verification was skipped" \
9893         -c "Protocol is TLSv1.3" \
9894         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9895         -c "Certificate Verify: Signature algorithm ( 0503 )" \
9896         -c "NamedGroup: secp384r1 ( 18 )" \
9897         -c "Verifying peer X.509 certificate... ok" \
9898         -C "received HelloRetryRequest message"
9899
9900requires_config_enabled MBEDTLS_SSL_SRV_C
9901requires_config_enabled MBEDTLS_DEBUG_C
9902requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9903requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9904requires_config_enabled PSA_WANT_ALG_ECDH
9905requires_config_enabled MBEDTLS_SSL_CLI_C
9906requires_config_enabled MBEDTLS_DEBUG_C
9907requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9908requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9909requires_config_enabled PSA_WANT_ALG_ECDH
9910run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,ecdsa_secp521r1_sha512" \
9911         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9912         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
9913         0 \
9914         -s "Protocol is TLSv1.3" \
9915         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9916         -s "received signature algorithm: 0x603" \
9917         -s "got named group: secp384r1(0018)" \
9918         -s "Certificate verification was skipped" \
9919         -c "Protocol is TLSv1.3" \
9920         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9921         -c "Certificate Verify: Signature algorithm ( 0603 )" \
9922         -c "NamedGroup: secp384r1 ( 18 )" \
9923         -c "Verifying peer X.509 certificate... ok" \
9924         -C "received HelloRetryRequest message"
9925
9926requires_config_enabled MBEDTLS_SSL_SRV_C
9927requires_config_enabled MBEDTLS_DEBUG_C
9928requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9929requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9930requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9931requires_config_enabled PSA_WANT_ALG_ECDH
9932requires_config_enabled MBEDTLS_SSL_CLI_C
9933requires_config_enabled MBEDTLS_DEBUG_C
9934requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9935requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9936requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
9937requires_config_enabled PSA_WANT_ALG_ECDH
9938run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp384r1,rsa_pss_rsae_sha256" \
9939         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9940         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
9941         0 \
9942         -s "Protocol is TLSv1.3" \
9943         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9944         -s "received signature algorithm: 0x804" \
9945         -s "got named group: secp384r1(0018)" \
9946         -s "Certificate verification was skipped" \
9947         -c "Protocol is TLSv1.3" \
9948         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9949         -c "Certificate Verify: Signature algorithm ( 0804 )" \
9950         -c "NamedGroup: secp384r1 ( 18 )" \
9951         -c "Verifying peer X.509 certificate... ok" \
9952         -C "received HelloRetryRequest message"
9953
9954requires_config_enabled MBEDTLS_SSL_SRV_C
9955requires_config_enabled MBEDTLS_DEBUG_C
9956requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9957requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9958requires_config_enabled PSA_WANT_ALG_ECDH
9959requires_config_enabled MBEDTLS_SSL_CLI_C
9960requires_config_enabled MBEDTLS_DEBUG_C
9961requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9962requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9963requires_config_enabled PSA_WANT_ALG_ECDH
9964run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp256r1_sha256" \
9965         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9966         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
9967         0 \
9968         -s "Protocol is TLSv1.3" \
9969         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9970         -s "received signature algorithm: 0x403" \
9971         -s "got named group: secp521r1(0019)" \
9972         -s "Certificate verification was skipped" \
9973         -c "Protocol is TLSv1.3" \
9974         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
9975         -c "Certificate Verify: Signature algorithm ( 0403 )" \
9976         -c "NamedGroup: secp521r1 ( 19 )" \
9977         -c "Verifying peer X.509 certificate... ok" \
9978         -C "received HelloRetryRequest message"
9979
9980requires_config_enabled MBEDTLS_SSL_SRV_C
9981requires_config_enabled MBEDTLS_DEBUG_C
9982requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9983requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9984requires_config_enabled PSA_WANT_ALG_ECDH
9985requires_config_enabled MBEDTLS_SSL_CLI_C
9986requires_config_enabled MBEDTLS_DEBUG_C
9987requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
9988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
9989requires_config_enabled PSA_WANT_ALG_ECDH
9990run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp384r1_sha384" \
9991         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
9992         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
9993         0 \
9994         -s "Protocol is TLSv1.3" \
9995         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
9996         -s "received signature algorithm: 0x503" \
9997         -s "got named group: secp521r1(0019)" \
9998         -s "Certificate verification was skipped" \
9999         -c "Protocol is TLSv1.3" \
10000         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10001         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10002         -c "NamedGroup: secp521r1 ( 19 )" \
10003         -c "Verifying peer X.509 certificate... ok" \
10004         -C "received HelloRetryRequest message"
10005
10006requires_config_enabled MBEDTLS_SSL_SRV_C
10007requires_config_enabled MBEDTLS_DEBUG_C
10008requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10009requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10010requires_config_enabled PSA_WANT_ALG_ECDH
10011requires_config_enabled MBEDTLS_SSL_CLI_C
10012requires_config_enabled MBEDTLS_DEBUG_C
10013requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10014requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10015requires_config_enabled PSA_WANT_ALG_ECDH
10016run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,ecdsa_secp521r1_sha512" \
10017         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10018         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
10019         0 \
10020         -s "Protocol is TLSv1.3" \
10021         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10022         -s "received signature algorithm: 0x603" \
10023         -s "got named group: secp521r1(0019)" \
10024         -s "Certificate verification was skipped" \
10025         -c "Protocol is TLSv1.3" \
10026         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10027         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10028         -c "NamedGroup: secp521r1 ( 19 )" \
10029         -c "Verifying peer X.509 certificate... ok" \
10030         -C "received HelloRetryRequest message"
10031
10032requires_config_enabled MBEDTLS_SSL_SRV_C
10033requires_config_enabled MBEDTLS_DEBUG_C
10034requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10035requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10036requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10037requires_config_enabled PSA_WANT_ALG_ECDH
10038requires_config_enabled MBEDTLS_SSL_CLI_C
10039requires_config_enabled MBEDTLS_DEBUG_C
10040requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10041requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10042requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10043requires_config_enabled PSA_WANT_ALG_ECDH
10044run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,secp521r1,rsa_pss_rsae_sha256" \
10045         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10046         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
10047         0 \
10048         -s "Protocol is TLSv1.3" \
10049         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10050         -s "received signature algorithm: 0x804" \
10051         -s "got named group: secp521r1(0019)" \
10052         -s "Certificate verification was skipped" \
10053         -c "Protocol is TLSv1.3" \
10054         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10055         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10056         -c "NamedGroup: secp521r1 ( 19 )" \
10057         -c "Verifying peer X.509 certificate... ok" \
10058         -C "received HelloRetryRequest message"
10059
10060requires_config_enabled MBEDTLS_SSL_SRV_C
10061requires_config_enabled MBEDTLS_DEBUG_C
10062requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10063requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10064requires_config_enabled PSA_WANT_ALG_ECDH
10065requires_config_enabled MBEDTLS_SSL_CLI_C
10066requires_config_enabled MBEDTLS_DEBUG_C
10067requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10069requires_config_enabled PSA_WANT_ALG_ECDH
10070run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp256r1_sha256" \
10071         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10072         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
10073         0 \
10074         -s "Protocol is TLSv1.3" \
10075         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10076         -s "received signature algorithm: 0x403" \
10077         -s "got named group: x25519(001d)" \
10078         -s "Certificate verification was skipped" \
10079         -c "Protocol is TLSv1.3" \
10080         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10081         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10082         -c "NamedGroup: x25519 ( 1d )" \
10083         -c "Verifying peer X.509 certificate... ok" \
10084         -C "received HelloRetryRequest message"
10085
10086requires_config_enabled MBEDTLS_SSL_SRV_C
10087requires_config_enabled MBEDTLS_DEBUG_C
10088requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10090requires_config_enabled PSA_WANT_ALG_ECDH
10091requires_config_enabled MBEDTLS_SSL_CLI_C
10092requires_config_enabled MBEDTLS_DEBUG_C
10093requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10094requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10095requires_config_enabled PSA_WANT_ALG_ECDH
10096run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp384r1_sha384" \
10097         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10098         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
10099         0 \
10100         -s "Protocol is TLSv1.3" \
10101         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10102         -s "received signature algorithm: 0x503" \
10103         -s "got named group: x25519(001d)" \
10104         -s "Certificate verification was skipped" \
10105         -c "Protocol is TLSv1.3" \
10106         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10107         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10108         -c "NamedGroup: x25519 ( 1d )" \
10109         -c "Verifying peer X.509 certificate... ok" \
10110         -C "received HelloRetryRequest message"
10111
10112requires_config_enabled MBEDTLS_SSL_SRV_C
10113requires_config_enabled MBEDTLS_DEBUG_C
10114requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10115requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10116requires_config_enabled PSA_WANT_ALG_ECDH
10117requires_config_enabled MBEDTLS_SSL_CLI_C
10118requires_config_enabled MBEDTLS_DEBUG_C
10119requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10120requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10121requires_config_enabled PSA_WANT_ALG_ECDH
10122run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,ecdsa_secp521r1_sha512" \
10123         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10124         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
10125         0 \
10126         -s "Protocol is TLSv1.3" \
10127         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10128         -s "received signature algorithm: 0x603" \
10129         -s "got named group: x25519(001d)" \
10130         -s "Certificate verification was skipped" \
10131         -c "Protocol is TLSv1.3" \
10132         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10133         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10134         -c "NamedGroup: x25519 ( 1d )" \
10135         -c "Verifying peer X.509 certificate... ok" \
10136         -C "received HelloRetryRequest message"
10137
10138requires_config_enabled MBEDTLS_SSL_SRV_C
10139requires_config_enabled MBEDTLS_DEBUG_C
10140requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10141requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10142requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10143requires_config_enabled PSA_WANT_ALG_ECDH
10144requires_config_enabled MBEDTLS_SSL_CLI_C
10145requires_config_enabled MBEDTLS_DEBUG_C
10146requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10147requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10148requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10149requires_config_enabled PSA_WANT_ALG_ECDH
10150run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x25519,rsa_pss_rsae_sha256" \
10151         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10152         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
10153         0 \
10154         -s "Protocol is TLSv1.3" \
10155         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10156         -s "received signature algorithm: 0x804" \
10157         -s "got named group: x25519(001d)" \
10158         -s "Certificate verification was skipped" \
10159         -c "Protocol is TLSv1.3" \
10160         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10161         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10162         -c "NamedGroup: x25519 ( 1d )" \
10163         -c "Verifying peer X.509 certificate... ok" \
10164         -C "received HelloRetryRequest message"
10165
10166requires_config_enabled MBEDTLS_SSL_SRV_C
10167requires_config_enabled MBEDTLS_DEBUG_C
10168requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10169requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10170requires_config_enabled PSA_WANT_ALG_ECDH
10171requires_config_enabled MBEDTLS_SSL_CLI_C
10172requires_config_enabled MBEDTLS_DEBUG_C
10173requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10174requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10175requires_config_enabled PSA_WANT_ALG_ECDH
10176run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp256r1_sha256" \
10177         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10178         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
10179         0 \
10180         -s "Protocol is TLSv1.3" \
10181         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10182         -s "received signature algorithm: 0x403" \
10183         -s "got named group: x448(001e)" \
10184         -s "Certificate verification was skipped" \
10185         -c "Protocol is TLSv1.3" \
10186         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10187         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10188         -c "NamedGroup: x448 ( 1e )" \
10189         -c "Verifying peer X.509 certificate... ok" \
10190         -C "received HelloRetryRequest message"
10191
10192requires_config_enabled MBEDTLS_SSL_SRV_C
10193requires_config_enabled MBEDTLS_DEBUG_C
10194requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10195requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10196requires_config_enabled PSA_WANT_ALG_ECDH
10197requires_config_enabled MBEDTLS_SSL_CLI_C
10198requires_config_enabled MBEDTLS_DEBUG_C
10199requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10201requires_config_enabled PSA_WANT_ALG_ECDH
10202run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp384r1_sha384" \
10203         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10204         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
10205         0 \
10206         -s "Protocol is TLSv1.3" \
10207         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10208         -s "received signature algorithm: 0x503" \
10209         -s "got named group: x448(001e)" \
10210         -s "Certificate verification was skipped" \
10211         -c "Protocol is TLSv1.3" \
10212         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10213         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10214         -c "NamedGroup: x448 ( 1e )" \
10215         -c "Verifying peer X.509 certificate... ok" \
10216         -C "received HelloRetryRequest message"
10217
10218requires_config_enabled MBEDTLS_SSL_SRV_C
10219requires_config_enabled MBEDTLS_DEBUG_C
10220requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10221requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10222requires_config_enabled PSA_WANT_ALG_ECDH
10223requires_config_enabled MBEDTLS_SSL_CLI_C
10224requires_config_enabled MBEDTLS_DEBUG_C
10225requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10226requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10227requires_config_enabled PSA_WANT_ALG_ECDH
10228run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,ecdsa_secp521r1_sha512" \
10229         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10230         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
10231         0 \
10232         -s "Protocol is TLSv1.3" \
10233         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10234         -s "received signature algorithm: 0x603" \
10235         -s "got named group: x448(001e)" \
10236         -s "Certificate verification was skipped" \
10237         -c "Protocol is TLSv1.3" \
10238         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10239         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10240         -c "NamedGroup: x448 ( 1e )" \
10241         -c "Verifying peer X.509 certificate... ok" \
10242         -C "received HelloRetryRequest message"
10243
10244requires_config_enabled MBEDTLS_SSL_SRV_C
10245requires_config_enabled MBEDTLS_DEBUG_C
10246requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10247requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10248requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10249requires_config_enabled PSA_WANT_ALG_ECDH
10250requires_config_enabled MBEDTLS_SSL_CLI_C
10251requires_config_enabled MBEDTLS_DEBUG_C
10252requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10253requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10254requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10255requires_config_enabled PSA_WANT_ALG_ECDH
10256run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,x448,rsa_pss_rsae_sha256" \
10257         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10258         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
10259         0 \
10260         -s "Protocol is TLSv1.3" \
10261         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10262         -s "received signature algorithm: 0x804" \
10263         -s "got named group: x448(001e)" \
10264         -s "Certificate verification was skipped" \
10265         -c "Protocol is TLSv1.3" \
10266         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10267         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10268         -c "NamedGroup: x448 ( 1e )" \
10269         -c "Verifying peer X.509 certificate... ok" \
10270         -C "received HelloRetryRequest message"
10271
10272requires_config_enabled MBEDTLS_SSL_SRV_C
10273requires_config_enabled MBEDTLS_DEBUG_C
10274requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10275requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10276requires_config_enabled PSA_WANT_ALG_FFDH
10277requires_config_enabled PSA_WANT_DH_RFC7919_2048
10278requires_config_enabled MBEDTLS_SSL_CLI_C
10279requires_config_enabled MBEDTLS_DEBUG_C
10280requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10281requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10282requires_config_enabled PSA_WANT_ALG_FFDH
10283requires_config_enabled PSA_WANT_DH_RFC7919_2048
10284run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp256r1_sha256" \
10285         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10286         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
10287         0 \
10288         -s "Protocol is TLSv1.3" \
10289         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10290         -s "received signature algorithm: 0x403" \
10291         -s "got named group: ffdhe2048(0100)" \
10292         -s "Certificate verification was skipped" \
10293         -c "Protocol is TLSv1.3" \
10294         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10295         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10296         -c "NamedGroup: ffdhe2048 ( 100 )" \
10297         -c "Verifying peer X.509 certificate... ok" \
10298         -C "received HelloRetryRequest message"
10299
10300requires_config_enabled MBEDTLS_SSL_SRV_C
10301requires_config_enabled MBEDTLS_DEBUG_C
10302requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10303requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10304requires_config_enabled PSA_WANT_ALG_FFDH
10305requires_config_enabled PSA_WANT_DH_RFC7919_2048
10306requires_config_enabled MBEDTLS_SSL_CLI_C
10307requires_config_enabled MBEDTLS_DEBUG_C
10308requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10309requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10310requires_config_enabled PSA_WANT_ALG_FFDH
10311requires_config_enabled PSA_WANT_DH_RFC7919_2048
10312run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp384r1_sha384" \
10313         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10314         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
10315         0 \
10316         -s "Protocol is TLSv1.3" \
10317         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10318         -s "received signature algorithm: 0x503" \
10319         -s "got named group: ffdhe2048(0100)" \
10320         -s "Certificate verification was skipped" \
10321         -c "Protocol is TLSv1.3" \
10322         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10323         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10324         -c "NamedGroup: ffdhe2048 ( 100 )" \
10325         -c "Verifying peer X.509 certificate... ok" \
10326         -C "received HelloRetryRequest message"
10327
10328requires_config_enabled MBEDTLS_SSL_SRV_C
10329requires_config_enabled MBEDTLS_DEBUG_C
10330requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10331requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10332requires_config_enabled PSA_WANT_ALG_FFDH
10333requires_config_enabled PSA_WANT_DH_RFC7919_2048
10334requires_config_enabled MBEDTLS_SSL_CLI_C
10335requires_config_enabled MBEDTLS_DEBUG_C
10336requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10337requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10338requires_config_enabled PSA_WANT_ALG_FFDH
10339requires_config_enabled PSA_WANT_DH_RFC7919_2048
10340run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,ffdhe2048,ecdsa_secp521r1_sha512" \
10341         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10342         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
10343         0 \
10344         -s "Protocol is TLSv1.3" \
10345         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10346         -s "received signature algorithm: 0x603" \
10347         -s "got named group: ffdhe2048(0100)" \
10348         -s "Certificate verification was skipped" \
10349         -c "Protocol is TLSv1.3" \
10350         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10351         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10352         -c "NamedGroup: ffdhe2048 ( 100 )" \
10353         -c "Verifying peer X.509 certificate... ok" \
10354         -C "received HelloRetryRequest message"
10355
10356requires_config_enabled MBEDTLS_SSL_SRV_C
10357requires_config_enabled MBEDTLS_DEBUG_C
10358requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10359requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10360requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10361requires_config_enabled PSA_WANT_ALG_FFDH
10362requires_config_enabled PSA_WANT_DH_RFC7919_2048
10363requires_config_enabled MBEDTLS_SSL_CLI_C
10364requires_config_enabled MBEDTLS_DEBUG_C
10365requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10367requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10368requires_config_enabled PSA_WANT_ALG_FFDH
10369requires_config_enabled PSA_WANT_DH_RFC7919_2048
10370run_test "TLS 1.3 m->m: AES_256_GCM_SHA384,ffdhe2048,rsa_pss_rsae_sha256" \
10371         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10372         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-256-GCM-SHA384 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
10373         0 \
10374         -s "Protocol is TLSv1.3" \
10375         -s "server hello, chosen ciphersuite: TLS1-3-AES-256-GCM-SHA384 ( id=4866 )" \
10376         -s "received signature algorithm: 0x804" \
10377         -s "got named group: ffdhe2048(0100)" \
10378         -s "Certificate verification was skipped" \
10379         -c "Protocol is TLSv1.3" \
10380         -c "server hello, chosen ciphersuite: ( 1302 ) - TLS1-3-AES-256-GCM-SHA384" \
10381         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10382         -c "NamedGroup: ffdhe2048 ( 100 )" \
10383         -c "Verifying peer X.509 certificate... ok" \
10384         -C "received HelloRetryRequest message"
10385
10386requires_config_enabled MBEDTLS_SSL_SRV_C
10387requires_config_enabled MBEDTLS_DEBUG_C
10388requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10389requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10390requires_config_enabled PSA_WANT_ALG_ECDH
10391requires_config_enabled MBEDTLS_SSL_CLI_C
10392requires_config_enabled MBEDTLS_DEBUG_C
10393requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10394requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10395requires_config_enabled PSA_WANT_ALG_ECDH
10396run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
10397         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10398         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
10399         0 \
10400         -s "Protocol is TLSv1.3" \
10401         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10402         -s "received signature algorithm: 0x403" \
10403         -s "got named group: secp256r1(0017)" \
10404         -s "Certificate verification was skipped" \
10405         -c "Protocol is TLSv1.3" \
10406         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10407         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10408         -c "NamedGroup: secp256r1 ( 17 )" \
10409         -c "Verifying peer X.509 certificate... ok" \
10410         -C "received HelloRetryRequest message"
10411
10412requires_config_enabled MBEDTLS_SSL_SRV_C
10413requires_config_enabled MBEDTLS_DEBUG_C
10414requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10415requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10416requires_config_enabled PSA_WANT_ALG_ECDH
10417requires_config_enabled MBEDTLS_SSL_CLI_C
10418requires_config_enabled MBEDTLS_DEBUG_C
10419requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10421requires_config_enabled PSA_WANT_ALG_ECDH
10422run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
10423         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10424         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
10425         0 \
10426         -s "Protocol is TLSv1.3" \
10427         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10428         -s "received signature algorithm: 0x503" \
10429         -s "got named group: secp256r1(0017)" \
10430         -s "Certificate verification was skipped" \
10431         -c "Protocol is TLSv1.3" \
10432         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10433         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10434         -c "NamedGroup: secp256r1 ( 17 )" \
10435         -c "Verifying peer X.509 certificate... ok" \
10436         -C "received HelloRetryRequest message"
10437
10438requires_config_enabled MBEDTLS_SSL_SRV_C
10439requires_config_enabled MBEDTLS_DEBUG_C
10440requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10441requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10442requires_config_enabled PSA_WANT_ALG_ECDH
10443requires_config_enabled MBEDTLS_SSL_CLI_C
10444requires_config_enabled MBEDTLS_DEBUG_C
10445requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10446requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10447requires_config_enabled PSA_WANT_ALG_ECDH
10448run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
10449         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10450         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
10451         0 \
10452         -s "Protocol is TLSv1.3" \
10453         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10454         -s "received signature algorithm: 0x603" \
10455         -s "got named group: secp256r1(0017)" \
10456         -s "Certificate verification was skipped" \
10457         -c "Protocol is TLSv1.3" \
10458         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10459         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10460         -c "NamedGroup: secp256r1 ( 17 )" \
10461         -c "Verifying peer X.509 certificate... ok" \
10462         -C "received HelloRetryRequest message"
10463
10464requires_config_enabled MBEDTLS_SSL_SRV_C
10465requires_config_enabled MBEDTLS_DEBUG_C
10466requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10467requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10468requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10469requires_config_enabled PSA_WANT_ALG_ECDH
10470requires_config_enabled MBEDTLS_SSL_CLI_C
10471requires_config_enabled MBEDTLS_DEBUG_C
10472requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10473requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10474requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10475requires_config_enabled PSA_WANT_ALG_ECDH
10476run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp256r1,rsa_pss_rsae_sha256" \
10477         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10478         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
10479         0 \
10480         -s "Protocol is TLSv1.3" \
10481         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10482         -s "received signature algorithm: 0x804" \
10483         -s "got named group: secp256r1(0017)" \
10484         -s "Certificate verification was skipped" \
10485         -c "Protocol is TLSv1.3" \
10486         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10487         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10488         -c "NamedGroup: secp256r1 ( 17 )" \
10489         -c "Verifying peer X.509 certificate... ok" \
10490         -C "received HelloRetryRequest message"
10491
10492requires_config_enabled MBEDTLS_SSL_SRV_C
10493requires_config_enabled MBEDTLS_DEBUG_C
10494requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10495requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10496requires_config_enabled PSA_WANT_ALG_ECDH
10497requires_config_enabled MBEDTLS_SSL_CLI_C
10498requires_config_enabled MBEDTLS_DEBUG_C
10499requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10500requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10501requires_config_enabled PSA_WANT_ALG_ECDH
10502run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
10503         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10504         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
10505         0 \
10506         -s "Protocol is TLSv1.3" \
10507         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10508         -s "received signature algorithm: 0x403" \
10509         -s "got named group: secp384r1(0018)" \
10510         -s "Certificate verification was skipped" \
10511         -c "Protocol is TLSv1.3" \
10512         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10513         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10514         -c "NamedGroup: secp384r1 ( 18 )" \
10515         -c "Verifying peer X.509 certificate... ok" \
10516         -C "received HelloRetryRequest message"
10517
10518requires_config_enabled MBEDTLS_SSL_SRV_C
10519requires_config_enabled MBEDTLS_DEBUG_C
10520requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10521requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10522requires_config_enabled PSA_WANT_ALG_ECDH
10523requires_config_enabled MBEDTLS_SSL_CLI_C
10524requires_config_enabled MBEDTLS_DEBUG_C
10525requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10527requires_config_enabled PSA_WANT_ALG_ECDH
10528run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
10529         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10530         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
10531         0 \
10532         -s "Protocol is TLSv1.3" \
10533         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10534         -s "received signature algorithm: 0x503" \
10535         -s "got named group: secp384r1(0018)" \
10536         -s "Certificate verification was skipped" \
10537         -c "Protocol is TLSv1.3" \
10538         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10539         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10540         -c "NamedGroup: secp384r1 ( 18 )" \
10541         -c "Verifying peer X.509 certificate... ok" \
10542         -C "received HelloRetryRequest message"
10543
10544requires_config_enabled MBEDTLS_SSL_SRV_C
10545requires_config_enabled MBEDTLS_DEBUG_C
10546requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10547requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10548requires_config_enabled PSA_WANT_ALG_ECDH
10549requires_config_enabled MBEDTLS_SSL_CLI_C
10550requires_config_enabled MBEDTLS_DEBUG_C
10551requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10552requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10553requires_config_enabled PSA_WANT_ALG_ECDH
10554run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
10555         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10556         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
10557         0 \
10558         -s "Protocol is TLSv1.3" \
10559         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10560         -s "received signature algorithm: 0x603" \
10561         -s "got named group: secp384r1(0018)" \
10562         -s "Certificate verification was skipped" \
10563         -c "Protocol is TLSv1.3" \
10564         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10565         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10566         -c "NamedGroup: secp384r1 ( 18 )" \
10567         -c "Verifying peer X.509 certificate... ok" \
10568         -C "received HelloRetryRequest message"
10569
10570requires_config_enabled MBEDTLS_SSL_SRV_C
10571requires_config_enabled MBEDTLS_DEBUG_C
10572requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10573requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10574requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10575requires_config_enabled PSA_WANT_ALG_ECDH
10576requires_config_enabled MBEDTLS_SSL_CLI_C
10577requires_config_enabled MBEDTLS_DEBUG_C
10578requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10580requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10581requires_config_enabled PSA_WANT_ALG_ECDH
10582run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp384r1,rsa_pss_rsae_sha256" \
10583         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10584         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
10585         0 \
10586         -s "Protocol is TLSv1.3" \
10587         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10588         -s "received signature algorithm: 0x804" \
10589         -s "got named group: secp384r1(0018)" \
10590         -s "Certificate verification was skipped" \
10591         -c "Protocol is TLSv1.3" \
10592         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10593         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10594         -c "NamedGroup: secp384r1 ( 18 )" \
10595         -c "Verifying peer X.509 certificate... ok" \
10596         -C "received HelloRetryRequest message"
10597
10598requires_config_enabled MBEDTLS_SSL_SRV_C
10599requires_config_enabled MBEDTLS_DEBUG_C
10600requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10601requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10602requires_config_enabled PSA_WANT_ALG_ECDH
10603requires_config_enabled MBEDTLS_SSL_CLI_C
10604requires_config_enabled MBEDTLS_DEBUG_C
10605requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10606requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10607requires_config_enabled PSA_WANT_ALG_ECDH
10608run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
10609         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10610         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
10611         0 \
10612         -s "Protocol is TLSv1.3" \
10613         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10614         -s "received signature algorithm: 0x403" \
10615         -s "got named group: secp521r1(0019)" \
10616         -s "Certificate verification was skipped" \
10617         -c "Protocol is TLSv1.3" \
10618         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10619         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10620         -c "NamedGroup: secp521r1 ( 19 )" \
10621         -c "Verifying peer X.509 certificate... ok" \
10622         -C "received HelloRetryRequest message"
10623
10624requires_config_enabled MBEDTLS_SSL_SRV_C
10625requires_config_enabled MBEDTLS_DEBUG_C
10626requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10627requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10628requires_config_enabled PSA_WANT_ALG_ECDH
10629requires_config_enabled MBEDTLS_SSL_CLI_C
10630requires_config_enabled MBEDTLS_DEBUG_C
10631requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10632requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10633requires_config_enabled PSA_WANT_ALG_ECDH
10634run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
10635         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10636         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
10637         0 \
10638         -s "Protocol is TLSv1.3" \
10639         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10640         -s "received signature algorithm: 0x503" \
10641         -s "got named group: secp521r1(0019)" \
10642         -s "Certificate verification was skipped" \
10643         -c "Protocol is TLSv1.3" \
10644         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10645         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10646         -c "NamedGroup: secp521r1 ( 19 )" \
10647         -c "Verifying peer X.509 certificate... ok" \
10648         -C "received HelloRetryRequest message"
10649
10650requires_config_enabled MBEDTLS_SSL_SRV_C
10651requires_config_enabled MBEDTLS_DEBUG_C
10652requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10653requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10654requires_config_enabled PSA_WANT_ALG_ECDH
10655requires_config_enabled MBEDTLS_SSL_CLI_C
10656requires_config_enabled MBEDTLS_DEBUG_C
10657requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10658requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10659requires_config_enabled PSA_WANT_ALG_ECDH
10660run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
10661         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10662         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
10663         0 \
10664         -s "Protocol is TLSv1.3" \
10665         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10666         -s "received signature algorithm: 0x603" \
10667         -s "got named group: secp521r1(0019)" \
10668         -s "Certificate verification was skipped" \
10669         -c "Protocol is TLSv1.3" \
10670         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10671         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10672         -c "NamedGroup: secp521r1 ( 19 )" \
10673         -c "Verifying peer X.509 certificate... ok" \
10674         -C "received HelloRetryRequest message"
10675
10676requires_config_enabled MBEDTLS_SSL_SRV_C
10677requires_config_enabled MBEDTLS_DEBUG_C
10678requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10680requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10681requires_config_enabled PSA_WANT_ALG_ECDH
10682requires_config_enabled MBEDTLS_SSL_CLI_C
10683requires_config_enabled MBEDTLS_DEBUG_C
10684requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10685requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10686requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10687requires_config_enabled PSA_WANT_ALG_ECDH
10688run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,secp521r1,rsa_pss_rsae_sha256" \
10689         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10690         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
10691         0 \
10692         -s "Protocol is TLSv1.3" \
10693         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10694         -s "received signature algorithm: 0x804" \
10695         -s "got named group: secp521r1(0019)" \
10696         -s "Certificate verification was skipped" \
10697         -c "Protocol is TLSv1.3" \
10698         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10699         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10700         -c "NamedGroup: secp521r1 ( 19 )" \
10701         -c "Verifying peer X.509 certificate... ok" \
10702         -C "received HelloRetryRequest message"
10703
10704requires_config_enabled MBEDTLS_SSL_SRV_C
10705requires_config_enabled MBEDTLS_DEBUG_C
10706requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10707requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10708requires_config_enabled PSA_WANT_ALG_ECDH
10709requires_config_enabled MBEDTLS_SSL_CLI_C
10710requires_config_enabled MBEDTLS_DEBUG_C
10711requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10712requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10713requires_config_enabled PSA_WANT_ALG_ECDH
10714run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp256r1_sha256" \
10715         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10716         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
10717         0 \
10718         -s "Protocol is TLSv1.3" \
10719         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10720         -s "received signature algorithm: 0x403" \
10721         -s "got named group: x25519(001d)" \
10722         -s "Certificate verification was skipped" \
10723         -c "Protocol is TLSv1.3" \
10724         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10725         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10726         -c "NamedGroup: x25519 ( 1d )" \
10727         -c "Verifying peer X.509 certificate... ok" \
10728         -C "received HelloRetryRequest message"
10729
10730requires_config_enabled MBEDTLS_SSL_SRV_C
10731requires_config_enabled MBEDTLS_DEBUG_C
10732requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10733requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10734requires_config_enabled PSA_WANT_ALG_ECDH
10735requires_config_enabled MBEDTLS_SSL_CLI_C
10736requires_config_enabled MBEDTLS_DEBUG_C
10737requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10738requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10739requires_config_enabled PSA_WANT_ALG_ECDH
10740run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp384r1_sha384" \
10741         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10742         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
10743         0 \
10744         -s "Protocol is TLSv1.3" \
10745         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10746         -s "received signature algorithm: 0x503" \
10747         -s "got named group: x25519(001d)" \
10748         -s "Certificate verification was skipped" \
10749         -c "Protocol is TLSv1.3" \
10750         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10751         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10752         -c "NamedGroup: x25519 ( 1d )" \
10753         -c "Verifying peer X.509 certificate... ok" \
10754         -C "received HelloRetryRequest message"
10755
10756requires_config_enabled MBEDTLS_SSL_SRV_C
10757requires_config_enabled MBEDTLS_DEBUG_C
10758requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10759requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10760requires_config_enabled PSA_WANT_ALG_ECDH
10761requires_config_enabled MBEDTLS_SSL_CLI_C
10762requires_config_enabled MBEDTLS_DEBUG_C
10763requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10764requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10765requires_config_enabled PSA_WANT_ALG_ECDH
10766run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,ecdsa_secp521r1_sha512" \
10767         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10768         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
10769         0 \
10770         -s "Protocol is TLSv1.3" \
10771         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10772         -s "received signature algorithm: 0x603" \
10773         -s "got named group: x25519(001d)" \
10774         -s "Certificate verification was skipped" \
10775         -c "Protocol is TLSv1.3" \
10776         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10777         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10778         -c "NamedGroup: x25519 ( 1d )" \
10779         -c "Verifying peer X.509 certificate... ok" \
10780         -C "received HelloRetryRequest message"
10781
10782requires_config_enabled MBEDTLS_SSL_SRV_C
10783requires_config_enabled MBEDTLS_DEBUG_C
10784requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10785requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10786requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10787requires_config_enabled PSA_WANT_ALG_ECDH
10788requires_config_enabled MBEDTLS_SSL_CLI_C
10789requires_config_enabled MBEDTLS_DEBUG_C
10790requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10791requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10792requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10793requires_config_enabled PSA_WANT_ALG_ECDH
10794run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x25519,rsa_pss_rsae_sha256" \
10795         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10796         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
10797         0 \
10798         -s "Protocol is TLSv1.3" \
10799         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10800         -s "received signature algorithm: 0x804" \
10801         -s "got named group: x25519(001d)" \
10802         -s "Certificate verification was skipped" \
10803         -c "Protocol is TLSv1.3" \
10804         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10805         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10806         -c "NamedGroup: x25519 ( 1d )" \
10807         -c "Verifying peer X.509 certificate... ok" \
10808         -C "received HelloRetryRequest message"
10809
10810requires_config_enabled MBEDTLS_SSL_SRV_C
10811requires_config_enabled MBEDTLS_DEBUG_C
10812requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10813requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10814requires_config_enabled PSA_WANT_ALG_ECDH
10815requires_config_enabled MBEDTLS_SSL_CLI_C
10816requires_config_enabled MBEDTLS_DEBUG_C
10817requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10818requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10819requires_config_enabled PSA_WANT_ALG_ECDH
10820run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp256r1_sha256" \
10821         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10822         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
10823         0 \
10824         -s "Protocol is TLSv1.3" \
10825         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10826         -s "received signature algorithm: 0x403" \
10827         -s "got named group: x448(001e)" \
10828         -s "Certificate verification was skipped" \
10829         -c "Protocol is TLSv1.3" \
10830         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10831         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10832         -c "NamedGroup: x448 ( 1e )" \
10833         -c "Verifying peer X.509 certificate... ok" \
10834         -C "received HelloRetryRequest message"
10835
10836requires_config_enabled MBEDTLS_SSL_SRV_C
10837requires_config_enabled MBEDTLS_DEBUG_C
10838requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10839requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10840requires_config_enabled PSA_WANT_ALG_ECDH
10841requires_config_enabled MBEDTLS_SSL_CLI_C
10842requires_config_enabled MBEDTLS_DEBUG_C
10843requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10844requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10845requires_config_enabled PSA_WANT_ALG_ECDH
10846run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp384r1_sha384" \
10847         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10848         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
10849         0 \
10850         -s "Protocol is TLSv1.3" \
10851         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10852         -s "received signature algorithm: 0x503" \
10853         -s "got named group: x448(001e)" \
10854         -s "Certificate verification was skipped" \
10855         -c "Protocol is TLSv1.3" \
10856         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10857         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10858         -c "NamedGroup: x448 ( 1e )" \
10859         -c "Verifying peer X.509 certificate... ok" \
10860         -C "received HelloRetryRequest message"
10861
10862requires_config_enabled MBEDTLS_SSL_SRV_C
10863requires_config_enabled MBEDTLS_DEBUG_C
10864requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10865requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10866requires_config_enabled PSA_WANT_ALG_ECDH
10867requires_config_enabled MBEDTLS_SSL_CLI_C
10868requires_config_enabled MBEDTLS_DEBUG_C
10869requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10870requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10871requires_config_enabled PSA_WANT_ALG_ECDH
10872run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,ecdsa_secp521r1_sha512" \
10873         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10874         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
10875         0 \
10876         -s "Protocol is TLSv1.3" \
10877         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10878         -s "received signature algorithm: 0x603" \
10879         -s "got named group: x448(001e)" \
10880         -s "Certificate verification was skipped" \
10881         -c "Protocol is TLSv1.3" \
10882         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10883         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10884         -c "NamedGroup: x448 ( 1e )" \
10885         -c "Verifying peer X.509 certificate... ok" \
10886         -C "received HelloRetryRequest message"
10887
10888requires_config_enabled MBEDTLS_SSL_SRV_C
10889requires_config_enabled MBEDTLS_DEBUG_C
10890requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10891requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10892requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10893requires_config_enabled PSA_WANT_ALG_ECDH
10894requires_config_enabled MBEDTLS_SSL_CLI_C
10895requires_config_enabled MBEDTLS_DEBUG_C
10896requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10897requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10898requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
10899requires_config_enabled PSA_WANT_ALG_ECDH
10900run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,x448,rsa_pss_rsae_sha256" \
10901         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10902         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
10903         0 \
10904         -s "Protocol is TLSv1.3" \
10905         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10906         -s "received signature algorithm: 0x804" \
10907         -s "got named group: x448(001e)" \
10908         -s "Certificate verification was skipped" \
10909         -c "Protocol is TLSv1.3" \
10910         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10911         -c "Certificate Verify: Signature algorithm ( 0804 )" \
10912         -c "NamedGroup: x448 ( 1e )" \
10913         -c "Verifying peer X.509 certificate... ok" \
10914         -C "received HelloRetryRequest message"
10915
10916requires_config_enabled MBEDTLS_SSL_SRV_C
10917requires_config_enabled MBEDTLS_DEBUG_C
10918requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10919requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10920requires_config_enabled PSA_WANT_ALG_FFDH
10921requires_config_enabled PSA_WANT_DH_RFC7919_2048
10922requires_config_enabled MBEDTLS_SSL_CLI_C
10923requires_config_enabled MBEDTLS_DEBUG_C
10924requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10925requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10926requires_config_enabled PSA_WANT_ALG_FFDH
10927requires_config_enabled PSA_WANT_DH_RFC7919_2048
10928run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
10929         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10930         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
10931         0 \
10932         -s "Protocol is TLSv1.3" \
10933         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10934         -s "received signature algorithm: 0x403" \
10935         -s "got named group: ffdhe2048(0100)" \
10936         -s "Certificate verification was skipped" \
10937         -c "Protocol is TLSv1.3" \
10938         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10939         -c "Certificate Verify: Signature algorithm ( 0403 )" \
10940         -c "NamedGroup: ffdhe2048 ( 100 )" \
10941         -c "Verifying peer X.509 certificate... ok" \
10942         -C "received HelloRetryRequest message"
10943
10944requires_config_enabled MBEDTLS_SSL_SRV_C
10945requires_config_enabled MBEDTLS_DEBUG_C
10946requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10947requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10948requires_config_enabled PSA_WANT_ALG_FFDH
10949requires_config_enabled PSA_WANT_DH_RFC7919_2048
10950requires_config_enabled MBEDTLS_SSL_CLI_C
10951requires_config_enabled MBEDTLS_DEBUG_C
10952requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10953requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10954requires_config_enabled PSA_WANT_ALG_FFDH
10955requires_config_enabled PSA_WANT_DH_RFC7919_2048
10956run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
10957         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10958         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
10959         0 \
10960         -s "Protocol is TLSv1.3" \
10961         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10962         -s "received signature algorithm: 0x503" \
10963         -s "got named group: ffdhe2048(0100)" \
10964         -s "Certificate verification was skipped" \
10965         -c "Protocol is TLSv1.3" \
10966         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10967         -c "Certificate Verify: Signature algorithm ( 0503 )" \
10968         -c "NamedGroup: ffdhe2048 ( 100 )" \
10969         -c "Verifying peer X.509 certificate... ok" \
10970         -C "received HelloRetryRequest message"
10971
10972requires_config_enabled MBEDTLS_SSL_SRV_C
10973requires_config_enabled MBEDTLS_DEBUG_C
10974requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10975requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10976requires_config_enabled PSA_WANT_ALG_FFDH
10977requires_config_enabled PSA_WANT_DH_RFC7919_2048
10978requires_config_enabled MBEDTLS_SSL_CLI_C
10979requires_config_enabled MBEDTLS_DEBUG_C
10980requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
10981requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
10982requires_config_enabled PSA_WANT_ALG_FFDH
10983requires_config_enabled PSA_WANT_DH_RFC7919_2048
10984run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
10985         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
10986         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
10987         0 \
10988         -s "Protocol is TLSv1.3" \
10989         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
10990         -s "received signature algorithm: 0x603" \
10991         -s "got named group: ffdhe2048(0100)" \
10992         -s "Certificate verification was skipped" \
10993         -c "Protocol is TLSv1.3" \
10994         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
10995         -c "Certificate Verify: Signature algorithm ( 0603 )" \
10996         -c "NamedGroup: ffdhe2048 ( 100 )" \
10997         -c "Verifying peer X.509 certificate... ok" \
10998         -C "received HelloRetryRequest message"
10999
11000requires_config_enabled MBEDTLS_SSL_SRV_C
11001requires_config_enabled MBEDTLS_DEBUG_C
11002requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11003requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11004requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11005requires_config_enabled PSA_WANT_ALG_FFDH
11006requires_config_enabled PSA_WANT_DH_RFC7919_2048
11007requires_config_enabled MBEDTLS_SSL_CLI_C
11008requires_config_enabled MBEDTLS_DEBUG_C
11009requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11010requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11011requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11012requires_config_enabled PSA_WANT_ALG_FFDH
11013requires_config_enabled PSA_WANT_DH_RFC7919_2048
11014run_test "TLS 1.3 m->m: CHACHA20_POLY1305_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
11015         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11016         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-CHACHA20-POLY1305-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
11017         0 \
11018         -s "Protocol is TLSv1.3" \
11019         -s "server hello, chosen ciphersuite: TLS1-3-CHACHA20-POLY1305-SHA256 ( id=4867 )" \
11020         -s "received signature algorithm: 0x804" \
11021         -s "got named group: ffdhe2048(0100)" \
11022         -s "Certificate verification was skipped" \
11023         -c "Protocol is TLSv1.3" \
11024         -c "server hello, chosen ciphersuite: ( 1303 ) - TLS1-3-CHACHA20-POLY1305-SHA256" \
11025         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11026         -c "NamedGroup: ffdhe2048 ( 100 )" \
11027         -c "Verifying peer X.509 certificate... ok" \
11028         -C "received HelloRetryRequest message"
11029
11030requires_config_enabled MBEDTLS_SSL_SRV_C
11031requires_config_enabled MBEDTLS_DEBUG_C
11032requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11033requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11034requires_config_enabled PSA_WANT_ALG_ECDH
11035requires_config_enabled MBEDTLS_SSL_CLI_C
11036requires_config_enabled MBEDTLS_DEBUG_C
11037requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11038requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11039requires_config_enabled PSA_WANT_ALG_ECDH
11040run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
11041         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11042         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
11043         0 \
11044         -s "Protocol is TLSv1.3" \
11045         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11046         -s "received signature algorithm: 0x403" \
11047         -s "got named group: secp256r1(0017)" \
11048         -s "Certificate verification was skipped" \
11049         -c "Protocol is TLSv1.3" \
11050         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11051         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11052         -c "NamedGroup: secp256r1 ( 17 )" \
11053         -c "Verifying peer X.509 certificate... ok" \
11054         -C "received HelloRetryRequest message"
11055
11056requires_config_enabled MBEDTLS_SSL_SRV_C
11057requires_config_enabled MBEDTLS_DEBUG_C
11058requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11059requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11060requires_config_enabled PSA_WANT_ALG_ECDH
11061requires_config_enabled MBEDTLS_SSL_CLI_C
11062requires_config_enabled MBEDTLS_DEBUG_C
11063requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11064requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11065requires_config_enabled PSA_WANT_ALG_ECDH
11066run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
11067         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11068         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
11069         0 \
11070         -s "Protocol is TLSv1.3" \
11071         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11072         -s "received signature algorithm: 0x503" \
11073         -s "got named group: secp256r1(0017)" \
11074         -s "Certificate verification was skipped" \
11075         -c "Protocol is TLSv1.3" \
11076         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11077         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11078         -c "NamedGroup: secp256r1 ( 17 )" \
11079         -c "Verifying peer X.509 certificate... ok" \
11080         -C "received HelloRetryRequest message"
11081
11082requires_config_enabled MBEDTLS_SSL_SRV_C
11083requires_config_enabled MBEDTLS_DEBUG_C
11084requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11086requires_config_enabled PSA_WANT_ALG_ECDH
11087requires_config_enabled MBEDTLS_SSL_CLI_C
11088requires_config_enabled MBEDTLS_DEBUG_C
11089requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11090requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11091requires_config_enabled PSA_WANT_ALG_ECDH
11092run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
11093         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11094         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
11095         0 \
11096         -s "Protocol is TLSv1.3" \
11097         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11098         -s "received signature algorithm: 0x603" \
11099         -s "got named group: secp256r1(0017)" \
11100         -s "Certificate verification was skipped" \
11101         -c "Protocol is TLSv1.3" \
11102         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11103         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11104         -c "NamedGroup: secp256r1 ( 17 )" \
11105         -c "Verifying peer X.509 certificate... ok" \
11106         -C "received HelloRetryRequest message"
11107
11108requires_config_enabled MBEDTLS_SSL_SRV_C
11109requires_config_enabled MBEDTLS_DEBUG_C
11110requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11111requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11112requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11113requires_config_enabled PSA_WANT_ALG_ECDH
11114requires_config_enabled MBEDTLS_SSL_CLI_C
11115requires_config_enabled MBEDTLS_DEBUG_C
11116requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11117requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11118requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11119requires_config_enabled PSA_WANT_ALG_ECDH
11120run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp256r1,rsa_pss_rsae_sha256" \
11121         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11122         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
11123         0 \
11124         -s "Protocol is TLSv1.3" \
11125         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11126         -s "received signature algorithm: 0x804" \
11127         -s "got named group: secp256r1(0017)" \
11128         -s "Certificate verification was skipped" \
11129         -c "Protocol is TLSv1.3" \
11130         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11131         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11132         -c "NamedGroup: secp256r1 ( 17 )" \
11133         -c "Verifying peer X.509 certificate... ok" \
11134         -C "received HelloRetryRequest message"
11135
11136requires_config_enabled MBEDTLS_SSL_SRV_C
11137requires_config_enabled MBEDTLS_DEBUG_C
11138requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11139requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11140requires_config_enabled PSA_WANT_ALG_ECDH
11141requires_config_enabled MBEDTLS_SSL_CLI_C
11142requires_config_enabled MBEDTLS_DEBUG_C
11143requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11144requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11145requires_config_enabled PSA_WANT_ALG_ECDH
11146run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
11147         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11148         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
11149         0 \
11150         -s "Protocol is TLSv1.3" \
11151         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11152         -s "received signature algorithm: 0x403" \
11153         -s "got named group: secp384r1(0018)" \
11154         -s "Certificate verification was skipped" \
11155         -c "Protocol is TLSv1.3" \
11156         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11157         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11158         -c "NamedGroup: secp384r1 ( 18 )" \
11159         -c "Verifying peer X.509 certificate... ok" \
11160         -C "received HelloRetryRequest message"
11161
11162requires_config_enabled MBEDTLS_SSL_SRV_C
11163requires_config_enabled MBEDTLS_DEBUG_C
11164requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11166requires_config_enabled PSA_WANT_ALG_ECDH
11167requires_config_enabled MBEDTLS_SSL_CLI_C
11168requires_config_enabled MBEDTLS_DEBUG_C
11169requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11171requires_config_enabled PSA_WANT_ALG_ECDH
11172run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
11173         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11174         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
11175         0 \
11176         -s "Protocol is TLSv1.3" \
11177         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11178         -s "received signature algorithm: 0x503" \
11179         -s "got named group: secp384r1(0018)" \
11180         -s "Certificate verification was skipped" \
11181         -c "Protocol is TLSv1.3" \
11182         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11183         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11184         -c "NamedGroup: secp384r1 ( 18 )" \
11185         -c "Verifying peer X.509 certificate... ok" \
11186         -C "received HelloRetryRequest message"
11187
11188requires_config_enabled MBEDTLS_SSL_SRV_C
11189requires_config_enabled MBEDTLS_DEBUG_C
11190requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11191requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11192requires_config_enabled PSA_WANT_ALG_ECDH
11193requires_config_enabled MBEDTLS_SSL_CLI_C
11194requires_config_enabled MBEDTLS_DEBUG_C
11195requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11196requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11197requires_config_enabled PSA_WANT_ALG_ECDH
11198run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
11199         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11200         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
11201         0 \
11202         -s "Protocol is TLSv1.3" \
11203         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11204         -s "received signature algorithm: 0x603" \
11205         -s "got named group: secp384r1(0018)" \
11206         -s "Certificate verification was skipped" \
11207         -c "Protocol is TLSv1.3" \
11208         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11209         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11210         -c "NamedGroup: secp384r1 ( 18 )" \
11211         -c "Verifying peer X.509 certificate... ok" \
11212         -C "received HelloRetryRequest message"
11213
11214requires_config_enabled MBEDTLS_SSL_SRV_C
11215requires_config_enabled MBEDTLS_DEBUG_C
11216requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11217requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11218requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11219requires_config_enabled PSA_WANT_ALG_ECDH
11220requires_config_enabled MBEDTLS_SSL_CLI_C
11221requires_config_enabled MBEDTLS_DEBUG_C
11222requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11223requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11224requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11225requires_config_enabled PSA_WANT_ALG_ECDH
11226run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp384r1,rsa_pss_rsae_sha256" \
11227         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11228         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
11229         0 \
11230         -s "Protocol is TLSv1.3" \
11231         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11232         -s "received signature algorithm: 0x804" \
11233         -s "got named group: secp384r1(0018)" \
11234         -s "Certificate verification was skipped" \
11235         -c "Protocol is TLSv1.3" \
11236         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11237         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11238         -c "NamedGroup: secp384r1 ( 18 )" \
11239         -c "Verifying peer X.509 certificate... ok" \
11240         -C "received HelloRetryRequest message"
11241
11242requires_config_enabled MBEDTLS_SSL_SRV_C
11243requires_config_enabled MBEDTLS_DEBUG_C
11244requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11245requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11246requires_config_enabled PSA_WANT_ALG_ECDH
11247requires_config_enabled MBEDTLS_SSL_CLI_C
11248requires_config_enabled MBEDTLS_DEBUG_C
11249requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11250requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11251requires_config_enabled PSA_WANT_ALG_ECDH
11252run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
11253         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11254         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
11255         0 \
11256         -s "Protocol is TLSv1.3" \
11257         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11258         -s "received signature algorithm: 0x403" \
11259         -s "got named group: secp521r1(0019)" \
11260         -s "Certificate verification was skipped" \
11261         -c "Protocol is TLSv1.3" \
11262         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11263         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11264         -c "NamedGroup: secp521r1 ( 19 )" \
11265         -c "Verifying peer X.509 certificate... ok" \
11266         -C "received HelloRetryRequest message"
11267
11268requires_config_enabled MBEDTLS_SSL_SRV_C
11269requires_config_enabled MBEDTLS_DEBUG_C
11270requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11271requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11272requires_config_enabled PSA_WANT_ALG_ECDH
11273requires_config_enabled MBEDTLS_SSL_CLI_C
11274requires_config_enabled MBEDTLS_DEBUG_C
11275requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11276requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11277requires_config_enabled PSA_WANT_ALG_ECDH
11278run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
11279         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11280         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
11281         0 \
11282         -s "Protocol is TLSv1.3" \
11283         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11284         -s "received signature algorithm: 0x503" \
11285         -s "got named group: secp521r1(0019)" \
11286         -s "Certificate verification was skipped" \
11287         -c "Protocol is TLSv1.3" \
11288         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11289         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11290         -c "NamedGroup: secp521r1 ( 19 )" \
11291         -c "Verifying peer X.509 certificate... ok" \
11292         -C "received HelloRetryRequest message"
11293
11294requires_config_enabled MBEDTLS_SSL_SRV_C
11295requires_config_enabled MBEDTLS_DEBUG_C
11296requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11297requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11298requires_config_enabled PSA_WANT_ALG_ECDH
11299requires_config_enabled MBEDTLS_SSL_CLI_C
11300requires_config_enabled MBEDTLS_DEBUG_C
11301requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11303requires_config_enabled PSA_WANT_ALG_ECDH
11304run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
11305         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11306         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
11307         0 \
11308         -s "Protocol is TLSv1.3" \
11309         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11310         -s "received signature algorithm: 0x603" \
11311         -s "got named group: secp521r1(0019)" \
11312         -s "Certificate verification was skipped" \
11313         -c "Protocol is TLSv1.3" \
11314         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11315         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11316         -c "NamedGroup: secp521r1 ( 19 )" \
11317         -c "Verifying peer X.509 certificate... ok" \
11318         -C "received HelloRetryRequest message"
11319
11320requires_config_enabled MBEDTLS_SSL_SRV_C
11321requires_config_enabled MBEDTLS_DEBUG_C
11322requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11323requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11324requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11325requires_config_enabled PSA_WANT_ALG_ECDH
11326requires_config_enabled MBEDTLS_SSL_CLI_C
11327requires_config_enabled MBEDTLS_DEBUG_C
11328requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11329requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11330requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11331requires_config_enabled PSA_WANT_ALG_ECDH
11332run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,secp521r1,rsa_pss_rsae_sha256" \
11333         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11334         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
11335         0 \
11336         -s "Protocol is TLSv1.3" \
11337         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11338         -s "received signature algorithm: 0x804" \
11339         -s "got named group: secp521r1(0019)" \
11340         -s "Certificate verification was skipped" \
11341         -c "Protocol is TLSv1.3" \
11342         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11343         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11344         -c "NamedGroup: secp521r1 ( 19 )" \
11345         -c "Verifying peer X.509 certificate... ok" \
11346         -C "received HelloRetryRequest message"
11347
11348requires_config_enabled MBEDTLS_SSL_SRV_C
11349requires_config_enabled MBEDTLS_DEBUG_C
11350requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11351requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11352requires_config_enabled PSA_WANT_ALG_ECDH
11353requires_config_enabled MBEDTLS_SSL_CLI_C
11354requires_config_enabled MBEDTLS_DEBUG_C
11355requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11356requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11357requires_config_enabled PSA_WANT_ALG_ECDH
11358run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp256r1_sha256" \
11359         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11360         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
11361         0 \
11362         -s "Protocol is TLSv1.3" \
11363         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11364         -s "received signature algorithm: 0x403" \
11365         -s "got named group: x25519(001d)" \
11366         -s "Certificate verification was skipped" \
11367         -c "Protocol is TLSv1.3" \
11368         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11369         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11370         -c "NamedGroup: x25519 ( 1d )" \
11371         -c "Verifying peer X.509 certificate... ok" \
11372         -C "received HelloRetryRequest message"
11373
11374requires_config_enabled MBEDTLS_SSL_SRV_C
11375requires_config_enabled MBEDTLS_DEBUG_C
11376requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11377requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11378requires_config_enabled PSA_WANT_ALG_ECDH
11379requires_config_enabled MBEDTLS_SSL_CLI_C
11380requires_config_enabled MBEDTLS_DEBUG_C
11381requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11382requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11383requires_config_enabled PSA_WANT_ALG_ECDH
11384run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp384r1_sha384" \
11385         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11386         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
11387         0 \
11388         -s "Protocol is TLSv1.3" \
11389         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11390         -s "received signature algorithm: 0x503" \
11391         -s "got named group: x25519(001d)" \
11392         -s "Certificate verification was skipped" \
11393         -c "Protocol is TLSv1.3" \
11394         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11395         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11396         -c "NamedGroup: x25519 ( 1d )" \
11397         -c "Verifying peer X.509 certificate... ok" \
11398         -C "received HelloRetryRequest message"
11399
11400requires_config_enabled MBEDTLS_SSL_SRV_C
11401requires_config_enabled MBEDTLS_DEBUG_C
11402requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11403requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11404requires_config_enabled PSA_WANT_ALG_ECDH
11405requires_config_enabled MBEDTLS_SSL_CLI_C
11406requires_config_enabled MBEDTLS_DEBUG_C
11407requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11409requires_config_enabled PSA_WANT_ALG_ECDH
11410run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,ecdsa_secp521r1_sha512" \
11411         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11412         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
11413         0 \
11414         -s "Protocol is TLSv1.3" \
11415         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11416         -s "received signature algorithm: 0x603" \
11417         -s "got named group: x25519(001d)" \
11418         -s "Certificate verification was skipped" \
11419         -c "Protocol is TLSv1.3" \
11420         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11421         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11422         -c "NamedGroup: x25519 ( 1d )" \
11423         -c "Verifying peer X.509 certificate... ok" \
11424         -C "received HelloRetryRequest message"
11425
11426requires_config_enabled MBEDTLS_SSL_SRV_C
11427requires_config_enabled MBEDTLS_DEBUG_C
11428requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11429requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11430requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11431requires_config_enabled PSA_WANT_ALG_ECDH
11432requires_config_enabled MBEDTLS_SSL_CLI_C
11433requires_config_enabled MBEDTLS_DEBUG_C
11434requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11435requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11436requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11437requires_config_enabled PSA_WANT_ALG_ECDH
11438run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x25519,rsa_pss_rsae_sha256" \
11439         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11440         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
11441         0 \
11442         -s "Protocol is TLSv1.3" \
11443         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11444         -s "received signature algorithm: 0x804" \
11445         -s "got named group: x25519(001d)" \
11446         -s "Certificate verification was skipped" \
11447         -c "Protocol is TLSv1.3" \
11448         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11449         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11450         -c "NamedGroup: x25519 ( 1d )" \
11451         -c "Verifying peer X.509 certificate... ok" \
11452         -C "received HelloRetryRequest message"
11453
11454requires_config_enabled MBEDTLS_SSL_SRV_C
11455requires_config_enabled MBEDTLS_DEBUG_C
11456requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11458requires_config_enabled PSA_WANT_ALG_ECDH
11459requires_config_enabled MBEDTLS_SSL_CLI_C
11460requires_config_enabled MBEDTLS_DEBUG_C
11461requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11462requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11463requires_config_enabled PSA_WANT_ALG_ECDH
11464run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp256r1_sha256" \
11465         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11466         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
11467         0 \
11468         -s "Protocol is TLSv1.3" \
11469         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11470         -s "received signature algorithm: 0x403" \
11471         -s "got named group: x448(001e)" \
11472         -s "Certificate verification was skipped" \
11473         -c "Protocol is TLSv1.3" \
11474         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11475         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11476         -c "NamedGroup: x448 ( 1e )" \
11477         -c "Verifying peer X.509 certificate... ok" \
11478         -C "received HelloRetryRequest message"
11479
11480requires_config_enabled MBEDTLS_SSL_SRV_C
11481requires_config_enabled MBEDTLS_DEBUG_C
11482requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11483requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11484requires_config_enabled PSA_WANT_ALG_ECDH
11485requires_config_enabled MBEDTLS_SSL_CLI_C
11486requires_config_enabled MBEDTLS_DEBUG_C
11487requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11489requires_config_enabled PSA_WANT_ALG_ECDH
11490run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp384r1_sha384" \
11491         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11492         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
11493         0 \
11494         -s "Protocol is TLSv1.3" \
11495         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11496         -s "received signature algorithm: 0x503" \
11497         -s "got named group: x448(001e)" \
11498         -s "Certificate verification was skipped" \
11499         -c "Protocol is TLSv1.3" \
11500         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11501         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11502         -c "NamedGroup: x448 ( 1e )" \
11503         -c "Verifying peer X.509 certificate... ok" \
11504         -C "received HelloRetryRequest message"
11505
11506requires_config_enabled MBEDTLS_SSL_SRV_C
11507requires_config_enabled MBEDTLS_DEBUG_C
11508requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11509requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11510requires_config_enabled PSA_WANT_ALG_ECDH
11511requires_config_enabled MBEDTLS_SSL_CLI_C
11512requires_config_enabled MBEDTLS_DEBUG_C
11513requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11514requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11515requires_config_enabled PSA_WANT_ALG_ECDH
11516run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,ecdsa_secp521r1_sha512" \
11517         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11518         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
11519         0 \
11520         -s "Protocol is TLSv1.3" \
11521         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11522         -s "received signature algorithm: 0x603" \
11523         -s "got named group: x448(001e)" \
11524         -s "Certificate verification was skipped" \
11525         -c "Protocol is TLSv1.3" \
11526         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11527         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11528         -c "NamedGroup: x448 ( 1e )" \
11529         -c "Verifying peer X.509 certificate... ok" \
11530         -C "received HelloRetryRequest message"
11531
11532requires_config_enabled MBEDTLS_SSL_SRV_C
11533requires_config_enabled MBEDTLS_DEBUG_C
11534requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11535requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11536requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11537requires_config_enabled PSA_WANT_ALG_ECDH
11538requires_config_enabled MBEDTLS_SSL_CLI_C
11539requires_config_enabled MBEDTLS_DEBUG_C
11540requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11541requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11542requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11543requires_config_enabled PSA_WANT_ALG_ECDH
11544run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,x448,rsa_pss_rsae_sha256" \
11545         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11546         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
11547         0 \
11548         -s "Protocol is TLSv1.3" \
11549         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11550         -s "received signature algorithm: 0x804" \
11551         -s "got named group: x448(001e)" \
11552         -s "Certificate verification was skipped" \
11553         -c "Protocol is TLSv1.3" \
11554         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11555         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11556         -c "NamedGroup: x448 ( 1e )" \
11557         -c "Verifying peer X.509 certificate... ok" \
11558         -C "received HelloRetryRequest message"
11559
11560requires_config_enabled MBEDTLS_SSL_SRV_C
11561requires_config_enabled MBEDTLS_DEBUG_C
11562requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11563requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11564requires_config_enabled PSA_WANT_ALG_FFDH
11565requires_config_enabled PSA_WANT_DH_RFC7919_2048
11566requires_config_enabled MBEDTLS_SSL_CLI_C
11567requires_config_enabled MBEDTLS_DEBUG_C
11568requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11569requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11570requires_config_enabled PSA_WANT_ALG_FFDH
11571requires_config_enabled PSA_WANT_DH_RFC7919_2048
11572run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
11573         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11574         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
11575         0 \
11576         -s "Protocol is TLSv1.3" \
11577         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11578         -s "received signature algorithm: 0x403" \
11579         -s "got named group: ffdhe2048(0100)" \
11580         -s "Certificate verification was skipped" \
11581         -c "Protocol is TLSv1.3" \
11582         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11583         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11584         -c "NamedGroup: ffdhe2048 ( 100 )" \
11585         -c "Verifying peer X.509 certificate... ok" \
11586         -C "received HelloRetryRequest message"
11587
11588requires_config_enabled MBEDTLS_SSL_SRV_C
11589requires_config_enabled MBEDTLS_DEBUG_C
11590requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11591requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11592requires_config_enabled PSA_WANT_ALG_FFDH
11593requires_config_enabled PSA_WANT_DH_RFC7919_2048
11594requires_config_enabled MBEDTLS_SSL_CLI_C
11595requires_config_enabled MBEDTLS_DEBUG_C
11596requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11597requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11598requires_config_enabled PSA_WANT_ALG_FFDH
11599requires_config_enabled PSA_WANT_DH_RFC7919_2048
11600run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
11601         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11602         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
11603         0 \
11604         -s "Protocol is TLSv1.3" \
11605         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11606         -s "received signature algorithm: 0x503" \
11607         -s "got named group: ffdhe2048(0100)" \
11608         -s "Certificate verification was skipped" \
11609         -c "Protocol is TLSv1.3" \
11610         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11611         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11612         -c "NamedGroup: ffdhe2048 ( 100 )" \
11613         -c "Verifying peer X.509 certificate... ok" \
11614         -C "received HelloRetryRequest message"
11615
11616requires_config_enabled MBEDTLS_SSL_SRV_C
11617requires_config_enabled MBEDTLS_DEBUG_C
11618requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11619requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11620requires_config_enabled PSA_WANT_ALG_FFDH
11621requires_config_enabled PSA_WANT_DH_RFC7919_2048
11622requires_config_enabled MBEDTLS_SSL_CLI_C
11623requires_config_enabled MBEDTLS_DEBUG_C
11624requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11626requires_config_enabled PSA_WANT_ALG_FFDH
11627requires_config_enabled PSA_WANT_DH_RFC7919_2048
11628run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
11629         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11630         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
11631         0 \
11632         -s "Protocol is TLSv1.3" \
11633         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11634         -s "received signature algorithm: 0x603" \
11635         -s "got named group: ffdhe2048(0100)" \
11636         -s "Certificate verification was skipped" \
11637         -c "Protocol is TLSv1.3" \
11638         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11639         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11640         -c "NamedGroup: ffdhe2048 ( 100 )" \
11641         -c "Verifying peer X.509 certificate... ok" \
11642         -C "received HelloRetryRequest message"
11643
11644requires_config_enabled MBEDTLS_SSL_SRV_C
11645requires_config_enabled MBEDTLS_DEBUG_C
11646requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11647requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11648requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11649requires_config_enabled PSA_WANT_ALG_FFDH
11650requires_config_enabled PSA_WANT_DH_RFC7919_2048
11651requires_config_enabled MBEDTLS_SSL_CLI_C
11652requires_config_enabled MBEDTLS_DEBUG_C
11653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11655requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11656requires_config_enabled PSA_WANT_ALG_FFDH
11657requires_config_enabled PSA_WANT_DH_RFC7919_2048
11658run_test "TLS 1.3 m->m: AES_128_CCM_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
11659         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11660         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
11661         0 \
11662         -s "Protocol is TLSv1.3" \
11663         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-SHA256 ( id=4868 )" \
11664         -s "received signature algorithm: 0x804" \
11665         -s "got named group: ffdhe2048(0100)" \
11666         -s "Certificate verification was skipped" \
11667         -c "Protocol is TLSv1.3" \
11668         -c "server hello, chosen ciphersuite: ( 1304 ) - TLS1-3-AES-128-CCM-SHA256" \
11669         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11670         -c "NamedGroup: ffdhe2048 ( 100 )" \
11671         -c "Verifying peer X.509 certificate... ok" \
11672         -C "received HelloRetryRequest message"
11673
11674requires_config_enabled MBEDTLS_SSL_SRV_C
11675requires_config_enabled MBEDTLS_DEBUG_C
11676requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11677requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11678requires_config_enabled PSA_WANT_ALG_ECDH
11679requires_config_enabled MBEDTLS_SSL_CLI_C
11680requires_config_enabled MBEDTLS_DEBUG_C
11681requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11682requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11683requires_config_enabled PSA_WANT_ALG_ECDH
11684run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp256r1_sha256" \
11685         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11686         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1" \
11687         0 \
11688         -s "Protocol is TLSv1.3" \
11689         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11690         -s "received signature algorithm: 0x403" \
11691         -s "got named group: secp256r1(0017)" \
11692         -s "Certificate verification was skipped" \
11693         -c "Protocol is TLSv1.3" \
11694         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11695         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11696         -c "NamedGroup: secp256r1 ( 17 )" \
11697         -c "Verifying peer X.509 certificate... ok" \
11698         -C "received HelloRetryRequest message"
11699
11700requires_config_enabled MBEDTLS_SSL_SRV_C
11701requires_config_enabled MBEDTLS_DEBUG_C
11702requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11703requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11704requires_config_enabled PSA_WANT_ALG_ECDH
11705requires_config_enabled MBEDTLS_SSL_CLI_C
11706requires_config_enabled MBEDTLS_DEBUG_C
11707requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11708requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11709requires_config_enabled PSA_WANT_ALG_ECDH
11710run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp384r1_sha384" \
11711         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11712         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp256r1" \
11713         0 \
11714         -s "Protocol is TLSv1.3" \
11715         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11716         -s "received signature algorithm: 0x503" \
11717         -s "got named group: secp256r1(0017)" \
11718         -s "Certificate verification was skipped" \
11719         -c "Protocol is TLSv1.3" \
11720         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11721         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11722         -c "NamedGroup: secp256r1 ( 17 )" \
11723         -c "Verifying peer X.509 certificate... ok" \
11724         -C "received HelloRetryRequest message"
11725
11726requires_config_enabled MBEDTLS_SSL_SRV_C
11727requires_config_enabled MBEDTLS_DEBUG_C
11728requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11729requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11730requires_config_enabled PSA_WANT_ALG_ECDH
11731requires_config_enabled MBEDTLS_SSL_CLI_C
11732requires_config_enabled MBEDTLS_DEBUG_C
11733requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11734requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11735requires_config_enabled PSA_WANT_ALG_ECDH
11736run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,ecdsa_secp521r1_sha512" \
11737         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11738         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp256r1" \
11739         0 \
11740         -s "Protocol is TLSv1.3" \
11741         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11742         -s "received signature algorithm: 0x603" \
11743         -s "got named group: secp256r1(0017)" \
11744         -s "Certificate verification was skipped" \
11745         -c "Protocol is TLSv1.3" \
11746         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11747         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11748         -c "NamedGroup: secp256r1 ( 17 )" \
11749         -c "Verifying peer X.509 certificate... ok" \
11750         -C "received HelloRetryRequest message"
11751
11752requires_config_enabled MBEDTLS_SSL_SRV_C
11753requires_config_enabled MBEDTLS_DEBUG_C
11754requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11755requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11756requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11757requires_config_enabled PSA_WANT_ALG_ECDH
11758requires_config_enabled MBEDTLS_SSL_CLI_C
11759requires_config_enabled MBEDTLS_DEBUG_C
11760requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11761requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11762requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11763requires_config_enabled PSA_WANT_ALG_ECDH
11764run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp256r1,rsa_pss_rsae_sha256" \
11765         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11766         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp256r1" \
11767         0 \
11768         -s "Protocol is TLSv1.3" \
11769         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11770         -s "received signature algorithm: 0x804" \
11771         -s "got named group: secp256r1(0017)" \
11772         -s "Certificate verification was skipped" \
11773         -c "Protocol is TLSv1.3" \
11774         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11775         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11776         -c "NamedGroup: secp256r1 ( 17 )" \
11777         -c "Verifying peer X.509 certificate... ok" \
11778         -C "received HelloRetryRequest message"
11779
11780requires_config_enabled MBEDTLS_SSL_SRV_C
11781requires_config_enabled MBEDTLS_DEBUG_C
11782requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11783requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11784requires_config_enabled PSA_WANT_ALG_ECDH
11785requires_config_enabled MBEDTLS_SSL_CLI_C
11786requires_config_enabled MBEDTLS_DEBUG_C
11787requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11788requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11789requires_config_enabled PSA_WANT_ALG_ECDH
11790run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp256r1_sha256" \
11791         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11792         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1" \
11793         0 \
11794         -s "Protocol is TLSv1.3" \
11795         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11796         -s "received signature algorithm: 0x403" \
11797         -s "got named group: secp384r1(0018)" \
11798         -s "Certificate verification was skipped" \
11799         -c "Protocol is TLSv1.3" \
11800         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11801         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11802         -c "NamedGroup: secp384r1 ( 18 )" \
11803         -c "Verifying peer X.509 certificate... ok" \
11804         -C "received HelloRetryRequest message"
11805
11806requires_config_enabled MBEDTLS_SSL_SRV_C
11807requires_config_enabled MBEDTLS_DEBUG_C
11808requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11809requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11810requires_config_enabled PSA_WANT_ALG_ECDH
11811requires_config_enabled MBEDTLS_SSL_CLI_C
11812requires_config_enabled MBEDTLS_DEBUG_C
11813requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11814requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11815requires_config_enabled PSA_WANT_ALG_ECDH
11816run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp384r1_sha384" \
11817         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11818         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp384r1" \
11819         0 \
11820         -s "Protocol is TLSv1.3" \
11821         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11822         -s "received signature algorithm: 0x503" \
11823         -s "got named group: secp384r1(0018)" \
11824         -s "Certificate verification was skipped" \
11825         -c "Protocol is TLSv1.3" \
11826         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11827         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11828         -c "NamedGroup: secp384r1 ( 18 )" \
11829         -c "Verifying peer X.509 certificate... ok" \
11830         -C "received HelloRetryRequest message"
11831
11832requires_config_enabled MBEDTLS_SSL_SRV_C
11833requires_config_enabled MBEDTLS_DEBUG_C
11834requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11835requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11836requires_config_enabled PSA_WANT_ALG_ECDH
11837requires_config_enabled MBEDTLS_SSL_CLI_C
11838requires_config_enabled MBEDTLS_DEBUG_C
11839requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11840requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11841requires_config_enabled PSA_WANT_ALG_ECDH
11842run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,ecdsa_secp521r1_sha512" \
11843         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11844         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp384r1" \
11845         0 \
11846         -s "Protocol is TLSv1.3" \
11847         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11848         -s "received signature algorithm: 0x603" \
11849         -s "got named group: secp384r1(0018)" \
11850         -s "Certificate verification was skipped" \
11851         -c "Protocol is TLSv1.3" \
11852         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11853         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11854         -c "NamedGroup: secp384r1 ( 18 )" \
11855         -c "Verifying peer X.509 certificate... ok" \
11856         -C "received HelloRetryRequest message"
11857
11858requires_config_enabled MBEDTLS_SSL_SRV_C
11859requires_config_enabled MBEDTLS_DEBUG_C
11860requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11861requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11862requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11863requires_config_enabled PSA_WANT_ALG_ECDH
11864requires_config_enabled MBEDTLS_SSL_CLI_C
11865requires_config_enabled MBEDTLS_DEBUG_C
11866requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11867requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11868requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11869requires_config_enabled PSA_WANT_ALG_ECDH
11870run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp384r1,rsa_pss_rsae_sha256" \
11871         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11872         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp384r1" \
11873         0 \
11874         -s "Protocol is TLSv1.3" \
11875         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11876         -s "received signature algorithm: 0x804" \
11877         -s "got named group: secp384r1(0018)" \
11878         -s "Certificate verification was skipped" \
11879         -c "Protocol is TLSv1.3" \
11880         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11881         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11882         -c "NamedGroup: secp384r1 ( 18 )" \
11883         -c "Verifying peer X.509 certificate... ok" \
11884         -C "received HelloRetryRequest message"
11885
11886requires_config_enabled MBEDTLS_SSL_SRV_C
11887requires_config_enabled MBEDTLS_DEBUG_C
11888requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11889requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11890requires_config_enabled PSA_WANT_ALG_ECDH
11891requires_config_enabled MBEDTLS_SSL_CLI_C
11892requires_config_enabled MBEDTLS_DEBUG_C
11893requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11895requires_config_enabled PSA_WANT_ALG_ECDH
11896run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp256r1_sha256" \
11897         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11898         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1" \
11899         0 \
11900         -s "Protocol is TLSv1.3" \
11901         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11902         -s "received signature algorithm: 0x403" \
11903         -s "got named group: secp521r1(0019)" \
11904         -s "Certificate verification was skipped" \
11905         -c "Protocol is TLSv1.3" \
11906         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11907         -c "Certificate Verify: Signature algorithm ( 0403 )" \
11908         -c "NamedGroup: secp521r1 ( 19 )" \
11909         -c "Verifying peer X.509 certificate... ok" \
11910         -C "received HelloRetryRequest message"
11911
11912requires_config_enabled MBEDTLS_SSL_SRV_C
11913requires_config_enabled MBEDTLS_DEBUG_C
11914requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11915requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11916requires_config_enabled PSA_WANT_ALG_ECDH
11917requires_config_enabled MBEDTLS_SSL_CLI_C
11918requires_config_enabled MBEDTLS_DEBUG_C
11919requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11920requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11921requires_config_enabled PSA_WANT_ALG_ECDH
11922run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp384r1_sha384" \
11923         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11924         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=secp521r1" \
11925         0 \
11926         -s "Protocol is TLSv1.3" \
11927         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11928         -s "received signature algorithm: 0x503" \
11929         -s "got named group: secp521r1(0019)" \
11930         -s "Certificate verification was skipped" \
11931         -c "Protocol is TLSv1.3" \
11932         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11933         -c "Certificate Verify: Signature algorithm ( 0503 )" \
11934         -c "NamedGroup: secp521r1 ( 19 )" \
11935         -c "Verifying peer X.509 certificate... ok" \
11936         -C "received HelloRetryRequest message"
11937
11938requires_config_enabled MBEDTLS_SSL_SRV_C
11939requires_config_enabled MBEDTLS_DEBUG_C
11940requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11941requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11942requires_config_enabled PSA_WANT_ALG_ECDH
11943requires_config_enabled MBEDTLS_SSL_CLI_C
11944requires_config_enabled MBEDTLS_DEBUG_C
11945requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11946requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11947requires_config_enabled PSA_WANT_ALG_ECDH
11948run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,ecdsa_secp521r1_sha512" \
11949         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11950         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=secp521r1" \
11951         0 \
11952         -s "Protocol is TLSv1.3" \
11953         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11954         -s "received signature algorithm: 0x603" \
11955         -s "got named group: secp521r1(0019)" \
11956         -s "Certificate verification was skipped" \
11957         -c "Protocol is TLSv1.3" \
11958         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11959         -c "Certificate Verify: Signature algorithm ( 0603 )" \
11960         -c "NamedGroup: secp521r1 ( 19 )" \
11961         -c "Verifying peer X.509 certificate... ok" \
11962         -C "received HelloRetryRequest message"
11963
11964requires_config_enabled MBEDTLS_SSL_SRV_C
11965requires_config_enabled MBEDTLS_DEBUG_C
11966requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11967requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11968requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11969requires_config_enabled PSA_WANT_ALG_ECDH
11970requires_config_enabled MBEDTLS_SSL_CLI_C
11971requires_config_enabled MBEDTLS_DEBUG_C
11972requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11973requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11974requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
11975requires_config_enabled PSA_WANT_ALG_ECDH
11976run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,secp521r1,rsa_pss_rsae_sha256" \
11977         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
11978         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=secp521r1" \
11979         0 \
11980         -s "Protocol is TLSv1.3" \
11981         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
11982         -s "received signature algorithm: 0x804" \
11983         -s "got named group: secp521r1(0019)" \
11984         -s "Certificate verification was skipped" \
11985         -c "Protocol is TLSv1.3" \
11986         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
11987         -c "Certificate Verify: Signature algorithm ( 0804 )" \
11988         -c "NamedGroup: secp521r1 ( 19 )" \
11989         -c "Verifying peer X.509 certificate... ok" \
11990         -C "received HelloRetryRequest message"
11991
11992requires_config_enabled MBEDTLS_SSL_SRV_C
11993requires_config_enabled MBEDTLS_DEBUG_C
11994requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
11995requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
11996requires_config_enabled PSA_WANT_ALG_ECDH
11997requires_config_enabled MBEDTLS_SSL_CLI_C
11998requires_config_enabled MBEDTLS_DEBUG_C
11999requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12000requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12001requires_config_enabled PSA_WANT_ALG_ECDH
12002run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp256r1_sha256" \
12003         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12004         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x25519" \
12005         0 \
12006         -s "Protocol is TLSv1.3" \
12007         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12008         -s "received signature algorithm: 0x403" \
12009         -s "got named group: x25519(001d)" \
12010         -s "Certificate verification was skipped" \
12011         -c "Protocol is TLSv1.3" \
12012         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12013         -c "Certificate Verify: Signature algorithm ( 0403 )" \
12014         -c "NamedGroup: x25519 ( 1d )" \
12015         -c "Verifying peer X.509 certificate... ok" \
12016         -C "received HelloRetryRequest message"
12017
12018requires_config_enabled MBEDTLS_SSL_SRV_C
12019requires_config_enabled MBEDTLS_DEBUG_C
12020requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12021requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12022requires_config_enabled PSA_WANT_ALG_ECDH
12023requires_config_enabled MBEDTLS_SSL_CLI_C
12024requires_config_enabled MBEDTLS_DEBUG_C
12025requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12026requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12027requires_config_enabled PSA_WANT_ALG_ECDH
12028run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp384r1_sha384" \
12029         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12030         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x25519" \
12031         0 \
12032         -s "Protocol is TLSv1.3" \
12033         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12034         -s "received signature algorithm: 0x503" \
12035         -s "got named group: x25519(001d)" \
12036         -s "Certificate verification was skipped" \
12037         -c "Protocol is TLSv1.3" \
12038         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12039         -c "Certificate Verify: Signature algorithm ( 0503 )" \
12040         -c "NamedGroup: x25519 ( 1d )" \
12041         -c "Verifying peer X.509 certificate... ok" \
12042         -C "received HelloRetryRequest message"
12043
12044requires_config_enabled MBEDTLS_SSL_SRV_C
12045requires_config_enabled MBEDTLS_DEBUG_C
12046requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12047requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12048requires_config_enabled PSA_WANT_ALG_ECDH
12049requires_config_enabled MBEDTLS_SSL_CLI_C
12050requires_config_enabled MBEDTLS_DEBUG_C
12051requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12052requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12053requires_config_enabled PSA_WANT_ALG_ECDH
12054run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,ecdsa_secp521r1_sha512" \
12055         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12056         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x25519" \
12057         0 \
12058         -s "Protocol is TLSv1.3" \
12059         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12060         -s "received signature algorithm: 0x603" \
12061         -s "got named group: x25519(001d)" \
12062         -s "Certificate verification was skipped" \
12063         -c "Protocol is TLSv1.3" \
12064         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12065         -c "Certificate Verify: Signature algorithm ( 0603 )" \
12066         -c "NamedGroup: x25519 ( 1d )" \
12067         -c "Verifying peer X.509 certificate... ok" \
12068         -C "received HelloRetryRequest message"
12069
12070requires_config_enabled MBEDTLS_SSL_SRV_C
12071requires_config_enabled MBEDTLS_DEBUG_C
12072requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12073requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12074requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12075requires_config_enabled PSA_WANT_ALG_ECDH
12076requires_config_enabled MBEDTLS_SSL_CLI_C
12077requires_config_enabled MBEDTLS_DEBUG_C
12078requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12079requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12080requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12081requires_config_enabled PSA_WANT_ALG_ECDH
12082run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x25519,rsa_pss_rsae_sha256" \
12083         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12084         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x25519" \
12085         0 \
12086         -s "Protocol is TLSv1.3" \
12087         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12088         -s "received signature algorithm: 0x804" \
12089         -s "got named group: x25519(001d)" \
12090         -s "Certificate verification was skipped" \
12091         -c "Protocol is TLSv1.3" \
12092         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12093         -c "Certificate Verify: Signature algorithm ( 0804 )" \
12094         -c "NamedGroup: x25519 ( 1d )" \
12095         -c "Verifying peer X.509 certificate... ok" \
12096         -C "received HelloRetryRequest message"
12097
12098requires_config_enabled MBEDTLS_SSL_SRV_C
12099requires_config_enabled MBEDTLS_DEBUG_C
12100requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12101requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12102requires_config_enabled PSA_WANT_ALG_ECDH
12103requires_config_enabled MBEDTLS_SSL_CLI_C
12104requires_config_enabled MBEDTLS_DEBUG_C
12105requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12106requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12107requires_config_enabled PSA_WANT_ALG_ECDH
12108run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp256r1_sha256" \
12109         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12110         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=x448" \
12111         0 \
12112         -s "Protocol is TLSv1.3" \
12113         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12114         -s "received signature algorithm: 0x403" \
12115         -s "got named group: x448(001e)" \
12116         -s "Certificate verification was skipped" \
12117         -c "Protocol is TLSv1.3" \
12118         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12119         -c "Certificate Verify: Signature algorithm ( 0403 )" \
12120         -c "NamedGroup: x448 ( 1e )" \
12121         -c "Verifying peer X.509 certificate... ok" \
12122         -C "received HelloRetryRequest message"
12123
12124requires_config_enabled MBEDTLS_SSL_SRV_C
12125requires_config_enabled MBEDTLS_DEBUG_C
12126requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12127requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12128requires_config_enabled PSA_WANT_ALG_ECDH
12129requires_config_enabled MBEDTLS_SSL_CLI_C
12130requires_config_enabled MBEDTLS_DEBUG_C
12131requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12132requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12133requires_config_enabled PSA_WANT_ALG_ECDH
12134run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp384r1_sha384" \
12135         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12136         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=x448" \
12137         0 \
12138         -s "Protocol is TLSv1.3" \
12139         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12140         -s "received signature algorithm: 0x503" \
12141         -s "got named group: x448(001e)" \
12142         -s "Certificate verification was skipped" \
12143         -c "Protocol is TLSv1.3" \
12144         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12145         -c "Certificate Verify: Signature algorithm ( 0503 )" \
12146         -c "NamedGroup: x448 ( 1e )" \
12147         -c "Verifying peer X.509 certificate... ok" \
12148         -C "received HelloRetryRequest message"
12149
12150requires_config_enabled MBEDTLS_SSL_SRV_C
12151requires_config_enabled MBEDTLS_DEBUG_C
12152requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12153requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12154requires_config_enabled PSA_WANT_ALG_ECDH
12155requires_config_enabled MBEDTLS_SSL_CLI_C
12156requires_config_enabled MBEDTLS_DEBUG_C
12157requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12158requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12159requires_config_enabled PSA_WANT_ALG_ECDH
12160run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,ecdsa_secp521r1_sha512" \
12161         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12162         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=x448" \
12163         0 \
12164         -s "Protocol is TLSv1.3" \
12165         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12166         -s "received signature algorithm: 0x603" \
12167         -s "got named group: x448(001e)" \
12168         -s "Certificate verification was skipped" \
12169         -c "Protocol is TLSv1.3" \
12170         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12171         -c "Certificate Verify: Signature algorithm ( 0603 )" \
12172         -c "NamedGroup: x448 ( 1e )" \
12173         -c "Verifying peer X.509 certificate... ok" \
12174         -C "received HelloRetryRequest message"
12175
12176requires_config_enabled MBEDTLS_SSL_SRV_C
12177requires_config_enabled MBEDTLS_DEBUG_C
12178requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12179requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12180requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12181requires_config_enabled PSA_WANT_ALG_ECDH
12182requires_config_enabled MBEDTLS_SSL_CLI_C
12183requires_config_enabled MBEDTLS_DEBUG_C
12184requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12185requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12186requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12187requires_config_enabled PSA_WANT_ALG_ECDH
12188run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,x448,rsa_pss_rsae_sha256" \
12189         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12190         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=x448" \
12191         0 \
12192         -s "Protocol is TLSv1.3" \
12193         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12194         -s "received signature algorithm: 0x804" \
12195         -s "got named group: x448(001e)" \
12196         -s "Certificate verification was skipped" \
12197         -c "Protocol is TLSv1.3" \
12198         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12199         -c "Certificate Verify: Signature algorithm ( 0804 )" \
12200         -c "NamedGroup: x448 ( 1e )" \
12201         -c "Verifying peer X.509 certificate... ok" \
12202         -C "received HelloRetryRequest message"
12203
12204requires_config_enabled MBEDTLS_SSL_SRV_C
12205requires_config_enabled MBEDTLS_DEBUG_C
12206requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12207requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12208requires_config_enabled PSA_WANT_ALG_FFDH
12209requires_config_enabled PSA_WANT_DH_RFC7919_2048
12210requires_config_enabled MBEDTLS_SSL_CLI_C
12211requires_config_enabled MBEDTLS_DEBUG_C
12212requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12213requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12214requires_config_enabled PSA_WANT_ALG_FFDH
12215requires_config_enabled PSA_WANT_DH_RFC7919_2048
12216run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp256r1_sha256" \
12217         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12218         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048" \
12219         0 \
12220         -s "Protocol is TLSv1.3" \
12221         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12222         -s "received signature algorithm: 0x403" \
12223         -s "got named group: ffdhe2048(0100)" \
12224         -s "Certificate verification was skipped" \
12225         -c "Protocol is TLSv1.3" \
12226         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12227         -c "Certificate Verify: Signature algorithm ( 0403 )" \
12228         -c "NamedGroup: ffdhe2048 ( 100 )" \
12229         -c "Verifying peer X.509 certificate... ok" \
12230         -C "received HelloRetryRequest message"
12231
12232requires_config_enabled MBEDTLS_SSL_SRV_C
12233requires_config_enabled MBEDTLS_DEBUG_C
12234requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12235requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12236requires_config_enabled PSA_WANT_ALG_FFDH
12237requires_config_enabled PSA_WANT_DH_RFC7919_2048
12238requires_config_enabled MBEDTLS_SSL_CLI_C
12239requires_config_enabled MBEDTLS_DEBUG_C
12240requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12241requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12242requires_config_enabled PSA_WANT_ALG_FFDH
12243requires_config_enabled PSA_WANT_DH_RFC7919_2048
12244run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp384r1_sha384" \
12245         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp384r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp384r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12246         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp384r1_sha384 groups=ffdhe2048" \
12247         0 \
12248         -s "Protocol is TLSv1.3" \
12249         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12250         -s "received signature algorithm: 0x503" \
12251         -s "got named group: ffdhe2048(0100)" \
12252         -s "Certificate verification was skipped" \
12253         -c "Protocol is TLSv1.3" \
12254         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12255         -c "Certificate Verify: Signature algorithm ( 0503 )" \
12256         -c "NamedGroup: ffdhe2048 ( 100 )" \
12257         -c "Verifying peer X.509 certificate... ok" \
12258         -C "received HelloRetryRequest message"
12259
12260requires_config_enabled MBEDTLS_SSL_SRV_C
12261requires_config_enabled MBEDTLS_DEBUG_C
12262requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12263requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12264requires_config_enabled PSA_WANT_ALG_FFDH
12265requires_config_enabled PSA_WANT_DH_RFC7919_2048
12266requires_config_enabled MBEDTLS_SSL_CLI_C
12267requires_config_enabled MBEDTLS_DEBUG_C
12268requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12269requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12270requires_config_enabled PSA_WANT_ALG_FFDH
12271requires_config_enabled PSA_WANT_DH_RFC7919_2048
12272run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,ffdhe2048,ecdsa_secp521r1_sha512" \
12273         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp521r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp521r1.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12274         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=ecdsa_secp521r1_sha512 groups=ffdhe2048" \
12275         0 \
12276         -s "Protocol is TLSv1.3" \
12277         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12278         -s "received signature algorithm: 0x603" \
12279         -s "got named group: ffdhe2048(0100)" \
12280         -s "Certificate verification was skipped" \
12281         -c "Protocol is TLSv1.3" \
12282         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12283         -c "Certificate Verify: Signature algorithm ( 0603 )" \
12284         -c "NamedGroup: ffdhe2048 ( 100 )" \
12285         -c "Verifying peer X.509 certificate... ok" \
12286         -C "received HelloRetryRequest message"
12287
12288requires_config_enabled MBEDTLS_SSL_SRV_C
12289requires_config_enabled MBEDTLS_DEBUG_C
12290requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12291requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12292requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12293requires_config_enabled PSA_WANT_ALG_FFDH
12294requires_config_enabled PSA_WANT_DH_RFC7919_2048
12295requires_config_enabled MBEDTLS_SSL_CLI_C
12296requires_config_enabled MBEDTLS_DEBUG_C
12297requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12298requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12299requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT
12300requires_config_enabled PSA_WANT_ALG_FFDH
12301requires_config_enabled PSA_WANT_DH_RFC7919_2048
12302run_test "TLS 1.3 m->m: AES_128_CCM_8_SHA256,ffdhe2048,rsa_pss_rsae_sha256" \
12303         "$P_SRV crt_file=$DATA_FILES_PATH/server2-sha256.crt key_file=$DATA_FILES_PATH/server2.key debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12304         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca_cat12.crt debug_level=4 force_ciphersuite=TLS1-3-AES-128-CCM-8-SHA256 sig_algs=rsa_pss_rsae_sha256 groups=ffdhe2048" \
12305         0 \
12306         -s "Protocol is TLSv1.3" \
12307         -s "server hello, chosen ciphersuite: TLS1-3-AES-128-CCM-8-SHA256 ( id=4869 )" \
12308         -s "received signature algorithm: 0x804" \
12309         -s "got named group: ffdhe2048(0100)" \
12310         -s "Certificate verification was skipped" \
12311         -c "Protocol is TLSv1.3" \
12312         -c "server hello, chosen ciphersuite: ( 1305 ) - TLS1-3-AES-128-CCM-8-SHA256" \
12313         -c "Certificate Verify: Signature algorithm ( 0804 )" \
12314         -c "NamedGroup: ffdhe2048 ( 100 )" \
12315         -c "Verifying peer X.509 certificate... ok" \
12316         -C "received HelloRetryRequest message"
12317
12318requires_config_enabled MBEDTLS_SSL_SRV_C
12319requires_config_enabled MBEDTLS_DEBUG_C
12320requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12321requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12322requires_config_enabled PSA_WANT_ALG_ECDH
12323requires_openssl_tls1_3
12324run_test "TLS 1.3 O->m: HRR secp256r1 -> secp384r1" \
12325         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12326         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-256:P-384 -msg -tls1_3" \
12327         0 \
12328         -s "Protocol is TLSv1.3" \
12329         -s "got named group: secp384r1(0018)" \
12330         -s "Certificate verification was skipped" \
12331         -s "HRR selected_group: secp384r1"
12332
12333requires_config_enabled MBEDTLS_SSL_SRV_C
12334requires_config_enabled MBEDTLS_DEBUG_C
12335requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12336requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12337requires_config_enabled PSA_WANT_ALG_ECDH
12338requires_openssl_tls1_3
12339run_test "TLS 1.3 O->m: HRR secp256r1 -> secp521r1" \
12340         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12341         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-256:P-521 -msg -tls1_3" \
12342         0 \
12343         -s "Protocol is TLSv1.3" \
12344         -s "got named group: secp521r1(0019)" \
12345         -s "Certificate verification was skipped" \
12346         -s "HRR selected_group: secp521r1"
12347
12348requires_config_enabled MBEDTLS_SSL_SRV_C
12349requires_config_enabled MBEDTLS_DEBUG_C
12350requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12351requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12352requires_config_enabled PSA_WANT_ALG_ECDH
12353requires_openssl_tls1_3
12354run_test "TLS 1.3 O->m: HRR secp256r1 -> x25519" \
12355         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12356         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-256:X25519 -msg -tls1_3" \
12357         0 \
12358         -s "Protocol is TLSv1.3" \
12359         -s "got named group: x25519(001d)" \
12360         -s "Certificate verification was skipped" \
12361         -s "HRR selected_group: x25519"
12362
12363requires_config_enabled MBEDTLS_SSL_SRV_C
12364requires_config_enabled MBEDTLS_DEBUG_C
12365requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12366requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12367requires_config_enabled PSA_WANT_ALG_ECDH
12368requires_openssl_tls1_3
12369run_test "TLS 1.3 O->m: HRR secp256r1 -> x448" \
12370         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12371         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-256:X448 -msg -tls1_3" \
12372         0 \
12373         -s "Protocol is TLSv1.3" \
12374         -s "got named group: x448(001e)" \
12375         -s "Certificate verification was skipped" \
12376         -s "HRR selected_group: x448"
12377
12378requires_config_enabled MBEDTLS_SSL_SRV_C
12379requires_config_enabled MBEDTLS_DEBUG_C
12380requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12381requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12382requires_config_enabled PSA_WANT_ALG_FFDH
12383requires_config_enabled PSA_WANT_DH_RFC7919_2048
12384requires_openssl_tls1_3_with_ffdh
12385run_test "TLS 1.3 O->m: HRR secp256r1 -> ffdhe2048" \
12386         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12387         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-256:ffdhe2048 -msg -tls1_3" \
12388         0 \
12389         -s "Protocol is TLSv1.3" \
12390         -s "got named group: ffdhe2048(0100)" \
12391         -s "Certificate verification was skipped" \
12392         -s "HRR selected_group: ffdhe2048"
12393
12394requires_config_enabled MBEDTLS_SSL_SRV_C
12395requires_config_enabled MBEDTLS_DEBUG_C
12396requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12397requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12398requires_config_enabled PSA_WANT_ALG_ECDH
12399requires_openssl_tls1_3
12400run_test "TLS 1.3 O->m: HRR secp384r1 -> secp256r1" \
12401         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12402         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-384:P-256 -msg -tls1_3" \
12403         0 \
12404         -s "Protocol is TLSv1.3" \
12405         -s "got named group: secp256r1(0017)" \
12406         -s "Certificate verification was skipped" \
12407         -s "HRR selected_group: secp256r1"
12408
12409requires_config_enabled MBEDTLS_SSL_SRV_C
12410requires_config_enabled MBEDTLS_DEBUG_C
12411requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12412requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12413requires_config_enabled PSA_WANT_ALG_ECDH
12414requires_openssl_tls1_3
12415run_test "TLS 1.3 O->m: HRR secp384r1 -> secp521r1" \
12416         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12417         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-384:P-521 -msg -tls1_3" \
12418         0 \
12419         -s "Protocol is TLSv1.3" \
12420         -s "got named group: secp521r1(0019)" \
12421         -s "Certificate verification was skipped" \
12422         -s "HRR selected_group: secp521r1"
12423
12424requires_config_enabled MBEDTLS_SSL_SRV_C
12425requires_config_enabled MBEDTLS_DEBUG_C
12426requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12427requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12428requires_config_enabled PSA_WANT_ALG_ECDH
12429requires_openssl_tls1_3
12430run_test "TLS 1.3 O->m: HRR secp384r1 -> x25519" \
12431         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12432         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-384:X25519 -msg -tls1_3" \
12433         0 \
12434         -s "Protocol is TLSv1.3" \
12435         -s "got named group: x25519(001d)" \
12436         -s "Certificate verification was skipped" \
12437         -s "HRR selected_group: x25519"
12438
12439requires_config_enabled MBEDTLS_SSL_SRV_C
12440requires_config_enabled MBEDTLS_DEBUG_C
12441requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12442requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12443requires_config_enabled PSA_WANT_ALG_ECDH
12444requires_openssl_tls1_3
12445run_test "TLS 1.3 O->m: HRR secp384r1 -> x448" \
12446         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12447         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-384:X448 -msg -tls1_3" \
12448         0 \
12449         -s "Protocol is TLSv1.3" \
12450         -s "got named group: x448(001e)" \
12451         -s "Certificate verification was skipped" \
12452         -s "HRR selected_group: x448"
12453
12454requires_config_enabled MBEDTLS_SSL_SRV_C
12455requires_config_enabled MBEDTLS_DEBUG_C
12456requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12457requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12458requires_config_enabled PSA_WANT_ALG_FFDH
12459requires_config_enabled PSA_WANT_DH_RFC7919_2048
12460requires_openssl_tls1_3_with_ffdh
12461run_test "TLS 1.3 O->m: HRR secp384r1 -> ffdhe2048" \
12462         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12463         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-384:ffdhe2048 -msg -tls1_3" \
12464         0 \
12465         -s "Protocol is TLSv1.3" \
12466         -s "got named group: ffdhe2048(0100)" \
12467         -s "Certificate verification was skipped" \
12468         -s "HRR selected_group: ffdhe2048"
12469
12470requires_config_enabled MBEDTLS_SSL_SRV_C
12471requires_config_enabled MBEDTLS_DEBUG_C
12472requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12473requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12474requires_config_enabled PSA_WANT_ALG_ECDH
12475requires_openssl_tls1_3
12476run_test "TLS 1.3 O->m: HRR secp521r1 -> secp256r1" \
12477         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12478         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-521:P-256 -msg -tls1_3" \
12479         0 \
12480         -s "Protocol is TLSv1.3" \
12481         -s "got named group: secp256r1(0017)" \
12482         -s "Certificate verification was skipped" \
12483         -s "HRR selected_group: secp256r1"
12484
12485requires_config_enabled MBEDTLS_SSL_SRV_C
12486requires_config_enabled MBEDTLS_DEBUG_C
12487requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12488requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12489requires_config_enabled PSA_WANT_ALG_ECDH
12490requires_openssl_tls1_3
12491run_test "TLS 1.3 O->m: HRR secp521r1 -> secp384r1" \
12492         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12493         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-521:P-384 -msg -tls1_3" \
12494         0 \
12495         -s "Protocol is TLSv1.3" \
12496         -s "got named group: secp384r1(0018)" \
12497         -s "Certificate verification was skipped" \
12498         -s "HRR selected_group: secp384r1"
12499
12500requires_config_enabled MBEDTLS_SSL_SRV_C
12501requires_config_enabled MBEDTLS_DEBUG_C
12502requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12503requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12504requires_config_enabled PSA_WANT_ALG_ECDH
12505requires_openssl_tls1_3
12506run_test "TLS 1.3 O->m: HRR secp521r1 -> x25519" \
12507         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12508         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-521:X25519 -msg -tls1_3" \
12509         0 \
12510         -s "Protocol is TLSv1.3" \
12511         -s "got named group: x25519(001d)" \
12512         -s "Certificate verification was skipped" \
12513         -s "HRR selected_group: x25519"
12514
12515requires_config_enabled MBEDTLS_SSL_SRV_C
12516requires_config_enabled MBEDTLS_DEBUG_C
12517requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12518requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12519requires_config_enabled PSA_WANT_ALG_ECDH
12520requires_openssl_tls1_3
12521run_test "TLS 1.3 O->m: HRR secp521r1 -> x448" \
12522         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12523         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-521:X448 -msg -tls1_3" \
12524         0 \
12525         -s "Protocol is TLSv1.3" \
12526         -s "got named group: x448(001e)" \
12527         -s "Certificate verification was skipped" \
12528         -s "HRR selected_group: x448"
12529
12530requires_config_enabled MBEDTLS_SSL_SRV_C
12531requires_config_enabled MBEDTLS_DEBUG_C
12532requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12533requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12534requires_config_enabled PSA_WANT_ALG_FFDH
12535requires_config_enabled PSA_WANT_DH_RFC7919_2048
12536requires_openssl_tls1_3_with_ffdh
12537run_test "TLS 1.3 O->m: HRR secp521r1 -> ffdhe2048" \
12538         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12539         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups P-521:ffdhe2048 -msg -tls1_3" \
12540         0 \
12541         -s "Protocol is TLSv1.3" \
12542         -s "got named group: ffdhe2048(0100)" \
12543         -s "Certificate verification was skipped" \
12544         -s "HRR selected_group: ffdhe2048"
12545
12546requires_config_enabled MBEDTLS_SSL_SRV_C
12547requires_config_enabled MBEDTLS_DEBUG_C
12548requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12549requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12550requires_config_enabled PSA_WANT_ALG_ECDH
12551requires_openssl_tls1_3
12552run_test "TLS 1.3 O->m: HRR x25519 -> secp256r1" \
12553         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12554         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X25519:P-256 -msg -tls1_3" \
12555         0 \
12556         -s "Protocol is TLSv1.3" \
12557         -s "got named group: secp256r1(0017)" \
12558         -s "Certificate verification was skipped" \
12559         -s "HRR selected_group: secp256r1"
12560
12561requires_config_enabled MBEDTLS_SSL_SRV_C
12562requires_config_enabled MBEDTLS_DEBUG_C
12563requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12564requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12565requires_config_enabled PSA_WANT_ALG_ECDH
12566requires_openssl_tls1_3
12567run_test "TLS 1.3 O->m: HRR x25519 -> secp384r1" \
12568         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12569         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X25519:P-384 -msg -tls1_3" \
12570         0 \
12571         -s "Protocol is TLSv1.3" \
12572         -s "got named group: secp384r1(0018)" \
12573         -s "Certificate verification was skipped" \
12574         -s "HRR selected_group: secp384r1"
12575
12576requires_config_enabled MBEDTLS_SSL_SRV_C
12577requires_config_enabled MBEDTLS_DEBUG_C
12578requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12579requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12580requires_config_enabled PSA_WANT_ALG_ECDH
12581requires_openssl_tls1_3
12582run_test "TLS 1.3 O->m: HRR x25519 -> secp521r1" \
12583         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12584         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X25519:P-521 -msg -tls1_3" \
12585         0 \
12586         -s "Protocol is TLSv1.3" \
12587         -s "got named group: secp521r1(0019)" \
12588         -s "Certificate verification was skipped" \
12589         -s "HRR selected_group: secp521r1"
12590
12591requires_config_enabled MBEDTLS_SSL_SRV_C
12592requires_config_enabled MBEDTLS_DEBUG_C
12593requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12594requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12595requires_config_enabled PSA_WANT_ALG_ECDH
12596requires_openssl_tls1_3
12597run_test "TLS 1.3 O->m: HRR x25519 -> x448" \
12598         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12599         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X25519:X448 -msg -tls1_3" \
12600         0 \
12601         -s "Protocol is TLSv1.3" \
12602         -s "got named group: x448(001e)" \
12603         -s "Certificate verification was skipped" \
12604         -s "HRR selected_group: x448"
12605
12606requires_config_enabled MBEDTLS_SSL_SRV_C
12607requires_config_enabled MBEDTLS_DEBUG_C
12608requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12609requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12610requires_config_enabled PSA_WANT_ALG_FFDH
12611requires_config_enabled PSA_WANT_DH_RFC7919_2048
12612requires_openssl_tls1_3_with_ffdh
12613run_test "TLS 1.3 O->m: HRR x25519 -> ffdhe2048" \
12614         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12615         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X25519:ffdhe2048 -msg -tls1_3" \
12616         0 \
12617         -s "Protocol is TLSv1.3" \
12618         -s "got named group: ffdhe2048(0100)" \
12619         -s "Certificate verification was skipped" \
12620         -s "HRR selected_group: ffdhe2048"
12621
12622requires_config_enabled MBEDTLS_SSL_SRV_C
12623requires_config_enabled MBEDTLS_DEBUG_C
12624requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12625requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12626requires_config_enabled PSA_WANT_ALG_ECDH
12627requires_openssl_tls1_3
12628run_test "TLS 1.3 O->m: HRR x448 -> secp256r1" \
12629         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12630         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X448:P-256 -msg -tls1_3" \
12631         0 \
12632         -s "Protocol is TLSv1.3" \
12633         -s "got named group: secp256r1(0017)" \
12634         -s "Certificate verification was skipped" \
12635         -s "HRR selected_group: secp256r1"
12636
12637requires_config_enabled MBEDTLS_SSL_SRV_C
12638requires_config_enabled MBEDTLS_DEBUG_C
12639requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12640requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12641requires_config_enabled PSA_WANT_ALG_ECDH
12642requires_openssl_tls1_3
12643run_test "TLS 1.3 O->m: HRR x448 -> secp384r1" \
12644         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12645         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X448:P-384 -msg -tls1_3" \
12646         0 \
12647         -s "Protocol is TLSv1.3" \
12648         -s "got named group: secp384r1(0018)" \
12649         -s "Certificate verification was skipped" \
12650         -s "HRR selected_group: secp384r1"
12651
12652requires_config_enabled MBEDTLS_SSL_SRV_C
12653requires_config_enabled MBEDTLS_DEBUG_C
12654requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12655requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12656requires_config_enabled PSA_WANT_ALG_ECDH
12657requires_openssl_tls1_3
12658run_test "TLS 1.3 O->m: HRR x448 -> secp521r1" \
12659         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12660         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X448:P-521 -msg -tls1_3" \
12661         0 \
12662         -s "Protocol is TLSv1.3" \
12663         -s "got named group: secp521r1(0019)" \
12664         -s "Certificate verification was skipped" \
12665         -s "HRR selected_group: secp521r1"
12666
12667requires_config_enabled MBEDTLS_SSL_SRV_C
12668requires_config_enabled MBEDTLS_DEBUG_C
12669requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12670requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12671requires_config_enabled PSA_WANT_ALG_ECDH
12672requires_openssl_tls1_3
12673run_test "TLS 1.3 O->m: HRR x448 -> x25519" \
12674         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12675         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X448:X25519 -msg -tls1_3" \
12676         0 \
12677         -s "Protocol is TLSv1.3" \
12678         -s "got named group: x25519(001d)" \
12679         -s "Certificate verification was skipped" \
12680         -s "HRR selected_group: x25519"
12681
12682requires_config_enabled MBEDTLS_SSL_SRV_C
12683requires_config_enabled MBEDTLS_DEBUG_C
12684requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12685requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12686requires_config_enabled PSA_WANT_ALG_FFDH
12687requires_config_enabled PSA_WANT_DH_RFC7919_2048
12688requires_openssl_tls1_3_with_ffdh
12689run_test "TLS 1.3 O->m: HRR x448 -> ffdhe2048" \
12690         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12691         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups X448:ffdhe2048 -msg -tls1_3" \
12692         0 \
12693         -s "Protocol is TLSv1.3" \
12694         -s "got named group: ffdhe2048(0100)" \
12695         -s "Certificate verification was skipped" \
12696         -s "HRR selected_group: ffdhe2048"
12697
12698requires_config_enabled MBEDTLS_SSL_SRV_C
12699requires_config_enabled MBEDTLS_DEBUG_C
12700requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12701requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12702requires_config_enabled PSA_WANT_ALG_ECDH
12703requires_openssl_tls1_3_with_ffdh
12704run_test "TLS 1.3 O->m: HRR ffdhe2048 -> secp256r1" \
12705         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12706         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups ffdhe2048:P-256 -msg -tls1_3" \
12707         0 \
12708         -s "Protocol is TLSv1.3" \
12709         -s "got named group: secp256r1(0017)" \
12710         -s "Certificate verification was skipped" \
12711         -s "HRR selected_group: secp256r1"
12712
12713requires_config_enabled MBEDTLS_SSL_SRV_C
12714requires_config_enabled MBEDTLS_DEBUG_C
12715requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12716requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12717requires_config_enabled PSA_WANT_ALG_ECDH
12718requires_openssl_tls1_3_with_ffdh
12719run_test "TLS 1.3 O->m: HRR ffdhe2048 -> secp384r1" \
12720         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12721         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups ffdhe2048:P-384 -msg -tls1_3" \
12722         0 \
12723         -s "Protocol is TLSv1.3" \
12724         -s "got named group: secp384r1(0018)" \
12725         -s "Certificate verification was skipped" \
12726         -s "HRR selected_group: secp384r1"
12727
12728requires_config_enabled MBEDTLS_SSL_SRV_C
12729requires_config_enabled MBEDTLS_DEBUG_C
12730requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12731requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12732requires_config_enabled PSA_WANT_ALG_ECDH
12733requires_openssl_tls1_3_with_ffdh
12734run_test "TLS 1.3 O->m: HRR ffdhe2048 -> secp521r1" \
12735         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12736         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups ffdhe2048:P-521 -msg -tls1_3" \
12737         0 \
12738         -s "Protocol is TLSv1.3" \
12739         -s "got named group: secp521r1(0019)" \
12740         -s "Certificate verification was skipped" \
12741         -s "HRR selected_group: secp521r1"
12742
12743requires_config_enabled MBEDTLS_SSL_SRV_C
12744requires_config_enabled MBEDTLS_DEBUG_C
12745requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12746requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12747requires_config_enabled PSA_WANT_ALG_ECDH
12748requires_openssl_tls1_3_with_ffdh
12749run_test "TLS 1.3 O->m: HRR ffdhe2048 -> x25519" \
12750         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12751         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups ffdhe2048:X25519 -msg -tls1_3" \
12752         0 \
12753         -s "Protocol is TLSv1.3" \
12754         -s "got named group: x25519(001d)" \
12755         -s "Certificate verification was skipped" \
12756         -s "HRR selected_group: x25519"
12757
12758requires_config_enabled MBEDTLS_SSL_SRV_C
12759requires_config_enabled MBEDTLS_DEBUG_C
12760requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12761requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12762requires_config_enabled PSA_WANT_ALG_ECDH
12763requires_openssl_tls1_3_with_ffdh
12764run_test "TLS 1.3 O->m: HRR ffdhe2048 -> x448" \
12765         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12766         "$O_NEXT_CLI_NO_CERT -CAfile $DATA_FILES_PATH/test-ca2.crt -groups ffdhe2048:X448 -msg -tls1_3" \
12767         0 \
12768         -s "Protocol is TLSv1.3" \
12769         -s "got named group: x448(001e)" \
12770         -s "Certificate verification was skipped" \
12771         -s "HRR selected_group: x448"
12772
12773requires_config_enabled MBEDTLS_SSL_SRV_C
12774requires_config_enabled MBEDTLS_DEBUG_C
12775requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12776requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12777requires_config_enabled PSA_WANT_ALG_ECDH
12778requires_gnutls_tls1_3
12779requires_gnutls_next_no_ticket
12780requires_gnutls_next_disable_tls13_compat
12781run_test "TLS 1.3 G->m: HRR secp256r1 -> secp384r1" \
12782         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12783         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
12784         0 \
12785         -s "Protocol is TLSv1.3" \
12786         -s "got named group: secp384r1(0018)" \
12787         -s "Certificate verification was skipped" \
12788         -s "HRR selected_group: secp384r1"
12789
12790requires_config_enabled MBEDTLS_SSL_SRV_C
12791requires_config_enabled MBEDTLS_DEBUG_C
12792requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12793requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12794requires_config_enabled PSA_WANT_ALG_ECDH
12795requires_gnutls_tls1_3
12796requires_gnutls_next_no_ticket
12797requires_gnutls_next_disable_tls13_compat
12798run_test "TLS 1.3 G->m: HRR secp256r1 -> secp521r1" \
12799         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12800         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
12801         0 \
12802         -s "Protocol is TLSv1.3" \
12803         -s "got named group: secp521r1(0019)" \
12804         -s "Certificate verification was skipped" \
12805         -s "HRR selected_group: secp521r1"
12806
12807requires_config_enabled MBEDTLS_SSL_SRV_C
12808requires_config_enabled MBEDTLS_DEBUG_C
12809requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12810requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12811requires_config_enabled PSA_WANT_ALG_ECDH
12812requires_gnutls_tls1_3
12813requires_gnutls_next_no_ticket
12814requires_gnutls_next_disable_tls13_compat
12815run_test "TLS 1.3 G->m: HRR secp256r1 -> x25519" \
12816         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12817         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
12818         0 \
12819         -s "Protocol is TLSv1.3" \
12820         -s "got named group: x25519(001d)" \
12821         -s "Certificate verification was skipped" \
12822         -s "HRR selected_group: x25519"
12823
12824requires_config_enabled MBEDTLS_SSL_SRV_C
12825requires_config_enabled MBEDTLS_DEBUG_C
12826requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12828requires_config_enabled PSA_WANT_ALG_ECDH
12829requires_gnutls_tls1_3
12830requires_gnutls_next_no_ticket
12831requires_gnutls_next_disable_tls13_compat
12832run_test "TLS 1.3 G->m: HRR secp256r1 -> x448" \
12833         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12834         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
12835         0 \
12836         -s "Protocol is TLSv1.3" \
12837         -s "got named group: x448(001e)" \
12838         -s "Certificate verification was skipped" \
12839         -s "HRR selected_group: x448"
12840
12841requires_config_enabled MBEDTLS_SSL_SRV_C
12842requires_config_enabled MBEDTLS_DEBUG_C
12843requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12844requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12845requires_config_enabled PSA_WANT_ALG_FFDH
12846requires_config_enabled PSA_WANT_DH_RFC7919_2048
12847requires_gnutls_tls1_3
12848requires_gnutls_next_no_ticket
12849requires_gnutls_next_disable_tls13_compat
12850run_test "TLS 1.3 G->m: HRR secp256r1 -> ffdhe2048" \
12851         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12852         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
12853         0 \
12854         -s "Protocol is TLSv1.3" \
12855         -s "got named group: ffdhe2048(0100)" \
12856         -s "Certificate verification was skipped" \
12857         -s "HRR selected_group: ffdhe2048"
12858
12859requires_config_enabled MBEDTLS_SSL_SRV_C
12860requires_config_enabled MBEDTLS_DEBUG_C
12861requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12862requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12863requires_config_enabled PSA_WANT_ALG_ECDH
12864requires_gnutls_tls1_3
12865requires_gnutls_next_no_ticket
12866requires_gnutls_next_disable_tls13_compat
12867run_test "TLS 1.3 G->m: HRR secp384r1 -> secp256r1" \
12868         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12869         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
12870         0 \
12871         -s "Protocol is TLSv1.3" \
12872         -s "got named group: secp256r1(0017)" \
12873         -s "Certificate verification was skipped" \
12874         -s "HRR selected_group: secp256r1"
12875
12876requires_config_enabled MBEDTLS_SSL_SRV_C
12877requires_config_enabled MBEDTLS_DEBUG_C
12878requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12879requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12880requires_config_enabled PSA_WANT_ALG_ECDH
12881requires_gnutls_tls1_3
12882requires_gnutls_next_no_ticket
12883requires_gnutls_next_disable_tls13_compat
12884run_test "TLS 1.3 G->m: HRR secp384r1 -> secp521r1" \
12885         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12886         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
12887         0 \
12888         -s "Protocol is TLSv1.3" \
12889         -s "got named group: secp521r1(0019)" \
12890         -s "Certificate verification was skipped" \
12891         -s "HRR selected_group: secp521r1"
12892
12893requires_config_enabled MBEDTLS_SSL_SRV_C
12894requires_config_enabled MBEDTLS_DEBUG_C
12895requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12896requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12897requires_config_enabled PSA_WANT_ALG_ECDH
12898requires_gnutls_tls1_3
12899requires_gnutls_next_no_ticket
12900requires_gnutls_next_disable_tls13_compat
12901run_test "TLS 1.3 G->m: HRR secp384r1 -> x25519" \
12902         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12903         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
12904         0 \
12905         -s "Protocol is TLSv1.3" \
12906         -s "got named group: x25519(001d)" \
12907         -s "Certificate verification was skipped" \
12908         -s "HRR selected_group: x25519"
12909
12910requires_config_enabled MBEDTLS_SSL_SRV_C
12911requires_config_enabled MBEDTLS_DEBUG_C
12912requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12913requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12914requires_config_enabled PSA_WANT_ALG_ECDH
12915requires_gnutls_tls1_3
12916requires_gnutls_next_no_ticket
12917requires_gnutls_next_disable_tls13_compat
12918run_test "TLS 1.3 G->m: HRR secp384r1 -> x448" \
12919         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12920         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
12921         0 \
12922         -s "Protocol is TLSv1.3" \
12923         -s "got named group: x448(001e)" \
12924         -s "Certificate verification was skipped" \
12925         -s "HRR selected_group: x448"
12926
12927requires_config_enabled MBEDTLS_SSL_SRV_C
12928requires_config_enabled MBEDTLS_DEBUG_C
12929requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12931requires_config_enabled PSA_WANT_ALG_FFDH
12932requires_config_enabled PSA_WANT_DH_RFC7919_2048
12933requires_gnutls_tls1_3
12934requires_gnutls_next_no_ticket
12935requires_gnutls_next_disable_tls13_compat
12936run_test "TLS 1.3 G->m: HRR secp384r1 -> ffdhe2048" \
12937         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12938         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
12939         0 \
12940         -s "Protocol is TLSv1.3" \
12941         -s "got named group: ffdhe2048(0100)" \
12942         -s "Certificate verification was skipped" \
12943         -s "HRR selected_group: ffdhe2048"
12944
12945requires_config_enabled MBEDTLS_SSL_SRV_C
12946requires_config_enabled MBEDTLS_DEBUG_C
12947requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12948requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12949requires_config_enabled PSA_WANT_ALG_ECDH
12950requires_gnutls_tls1_3
12951requires_gnutls_next_no_ticket
12952requires_gnutls_next_disable_tls13_compat
12953run_test "TLS 1.3 G->m: HRR secp521r1 -> secp256r1" \
12954         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12955         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
12956         0 \
12957         -s "Protocol is TLSv1.3" \
12958         -s "got named group: secp256r1(0017)" \
12959         -s "Certificate verification was skipped" \
12960         -s "HRR selected_group: secp256r1"
12961
12962requires_config_enabled MBEDTLS_SSL_SRV_C
12963requires_config_enabled MBEDTLS_DEBUG_C
12964requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12965requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12966requires_config_enabled PSA_WANT_ALG_ECDH
12967requires_gnutls_tls1_3
12968requires_gnutls_next_no_ticket
12969requires_gnutls_next_disable_tls13_compat
12970run_test "TLS 1.3 G->m: HRR secp521r1 -> secp384r1" \
12971         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12972         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
12973         0 \
12974         -s "Protocol is TLSv1.3" \
12975         -s "got named group: secp384r1(0018)" \
12976         -s "Certificate verification was skipped" \
12977         -s "HRR selected_group: secp384r1"
12978
12979requires_config_enabled MBEDTLS_SSL_SRV_C
12980requires_config_enabled MBEDTLS_DEBUG_C
12981requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12982requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
12983requires_config_enabled PSA_WANT_ALG_ECDH
12984requires_gnutls_tls1_3
12985requires_gnutls_next_no_ticket
12986requires_gnutls_next_disable_tls13_compat
12987run_test "TLS 1.3 G->m: HRR secp521r1 -> x25519" \
12988         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
12989         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
12990         0 \
12991         -s "Protocol is TLSv1.3" \
12992         -s "got named group: x25519(001d)" \
12993         -s "Certificate verification was skipped" \
12994         -s "HRR selected_group: x25519"
12995
12996requires_config_enabled MBEDTLS_SSL_SRV_C
12997requires_config_enabled MBEDTLS_DEBUG_C
12998requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
12999requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13000requires_config_enabled PSA_WANT_ALG_ECDH
13001requires_gnutls_tls1_3
13002requires_gnutls_next_no_ticket
13003requires_gnutls_next_disable_tls13_compat
13004run_test "TLS 1.3 G->m: HRR secp521r1 -> x448" \
13005         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13006         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
13007         0 \
13008         -s "Protocol is TLSv1.3" \
13009         -s "got named group: x448(001e)" \
13010         -s "Certificate verification was skipped" \
13011         -s "HRR selected_group: x448"
13012
13013requires_config_enabled MBEDTLS_SSL_SRV_C
13014requires_config_enabled MBEDTLS_DEBUG_C
13015requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13017requires_config_enabled PSA_WANT_ALG_FFDH
13018requires_config_enabled PSA_WANT_DH_RFC7919_2048
13019requires_gnutls_tls1_3
13020requires_gnutls_next_no_ticket
13021requires_gnutls_next_disable_tls13_compat
13022run_test "TLS 1.3 G->m: HRR secp521r1 -> ffdhe2048" \
13023         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13024         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
13025         0 \
13026         -s "Protocol is TLSv1.3" \
13027         -s "got named group: ffdhe2048(0100)" \
13028         -s "Certificate verification was skipped" \
13029         -s "HRR selected_group: ffdhe2048"
13030
13031requires_config_enabled MBEDTLS_SSL_SRV_C
13032requires_config_enabled MBEDTLS_DEBUG_C
13033requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13034requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13035requires_config_enabled PSA_WANT_ALG_ECDH
13036requires_gnutls_tls1_3
13037requires_gnutls_next_no_ticket
13038requires_gnutls_next_disable_tls13_compat
13039run_test "TLS 1.3 G->m: HRR x25519 -> secp256r1" \
13040         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13041         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
13042         0 \
13043         -s "Protocol is TLSv1.3" \
13044         -s "got named group: secp256r1(0017)" \
13045         -s "Certificate verification was skipped" \
13046         -s "HRR selected_group: secp256r1"
13047
13048requires_config_enabled MBEDTLS_SSL_SRV_C
13049requires_config_enabled MBEDTLS_DEBUG_C
13050requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13051requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13052requires_config_enabled PSA_WANT_ALG_ECDH
13053requires_gnutls_tls1_3
13054requires_gnutls_next_no_ticket
13055requires_gnutls_next_disable_tls13_compat
13056run_test "TLS 1.3 G->m: HRR x25519 -> secp384r1" \
13057         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13058         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
13059         0 \
13060         -s "Protocol is TLSv1.3" \
13061         -s "got named group: secp384r1(0018)" \
13062         -s "Certificate verification was skipped" \
13063         -s "HRR selected_group: secp384r1"
13064
13065requires_config_enabled MBEDTLS_SSL_SRV_C
13066requires_config_enabled MBEDTLS_DEBUG_C
13067requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13068requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13069requires_config_enabled PSA_WANT_ALG_ECDH
13070requires_gnutls_tls1_3
13071requires_gnutls_next_no_ticket
13072requires_gnutls_next_disable_tls13_compat
13073run_test "TLS 1.3 G->m: HRR x25519 -> secp521r1" \
13074         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13075         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
13076         0 \
13077         -s "Protocol is TLSv1.3" \
13078         -s "got named group: secp521r1(0019)" \
13079         -s "Certificate verification was skipped" \
13080         -s "HRR selected_group: secp521r1"
13081
13082requires_config_enabled MBEDTLS_SSL_SRV_C
13083requires_config_enabled MBEDTLS_DEBUG_C
13084requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13085requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13086requires_config_enabled PSA_WANT_ALG_ECDH
13087requires_gnutls_tls1_3
13088requires_gnutls_next_no_ticket
13089requires_gnutls_next_disable_tls13_compat
13090run_test "TLS 1.3 G->m: HRR x25519 -> x448" \
13091         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13092         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
13093         0 \
13094         -s "Protocol is TLSv1.3" \
13095         -s "got named group: x448(001e)" \
13096         -s "Certificate verification was skipped" \
13097         -s "HRR selected_group: x448"
13098
13099requires_config_enabled MBEDTLS_SSL_SRV_C
13100requires_config_enabled MBEDTLS_DEBUG_C
13101requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13102requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13103requires_config_enabled PSA_WANT_ALG_FFDH
13104requires_config_enabled PSA_WANT_DH_RFC7919_2048
13105requires_gnutls_tls1_3
13106requires_gnutls_next_no_ticket
13107requires_gnutls_next_disable_tls13_compat
13108run_test "TLS 1.3 G->m: HRR x25519 -> ffdhe2048" \
13109         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13110         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
13111         0 \
13112         -s "Protocol is TLSv1.3" \
13113         -s "got named group: ffdhe2048(0100)" \
13114         -s "Certificate verification was skipped" \
13115         -s "HRR selected_group: ffdhe2048"
13116
13117requires_config_enabled MBEDTLS_SSL_SRV_C
13118requires_config_enabled MBEDTLS_DEBUG_C
13119requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13120requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13121requires_config_enabled PSA_WANT_ALG_ECDH
13122requires_gnutls_tls1_3
13123requires_gnutls_next_no_ticket
13124requires_gnutls_next_disable_tls13_compat
13125run_test "TLS 1.3 G->m: HRR x448 -> secp256r1" \
13126         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13127         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
13128         0 \
13129         -s "Protocol is TLSv1.3" \
13130         -s "got named group: secp256r1(0017)" \
13131         -s "Certificate verification was skipped" \
13132         -s "HRR selected_group: secp256r1"
13133
13134requires_config_enabled MBEDTLS_SSL_SRV_C
13135requires_config_enabled MBEDTLS_DEBUG_C
13136requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13137requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13138requires_config_enabled PSA_WANT_ALG_ECDH
13139requires_gnutls_tls1_3
13140requires_gnutls_next_no_ticket
13141requires_gnutls_next_disable_tls13_compat
13142run_test "TLS 1.3 G->m: HRR x448 -> secp384r1" \
13143         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13144         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
13145         0 \
13146         -s "Protocol is TLSv1.3" \
13147         -s "got named group: secp384r1(0018)" \
13148         -s "Certificate verification was skipped" \
13149         -s "HRR selected_group: secp384r1"
13150
13151requires_config_enabled MBEDTLS_SSL_SRV_C
13152requires_config_enabled MBEDTLS_DEBUG_C
13153requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13154requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13155requires_config_enabled PSA_WANT_ALG_ECDH
13156requires_gnutls_tls1_3
13157requires_gnutls_next_no_ticket
13158requires_gnutls_next_disable_tls13_compat
13159run_test "TLS 1.3 G->m: HRR x448 -> secp521r1" \
13160         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13161         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
13162         0 \
13163         -s "Protocol is TLSv1.3" \
13164         -s "got named group: secp521r1(0019)" \
13165         -s "Certificate verification was skipped" \
13166         -s "HRR selected_group: secp521r1"
13167
13168requires_config_enabled MBEDTLS_SSL_SRV_C
13169requires_config_enabled MBEDTLS_DEBUG_C
13170requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13171requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13172requires_config_enabled PSA_WANT_ALG_ECDH
13173requires_gnutls_tls1_3
13174requires_gnutls_next_no_ticket
13175requires_gnutls_next_disable_tls13_compat
13176run_test "TLS 1.3 G->m: HRR x448 -> x25519" \
13177         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13178         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
13179         0 \
13180         -s "Protocol is TLSv1.3" \
13181         -s "got named group: x25519(001d)" \
13182         -s "Certificate verification was skipped" \
13183         -s "HRR selected_group: x25519"
13184
13185requires_config_enabled MBEDTLS_SSL_SRV_C
13186requires_config_enabled MBEDTLS_DEBUG_C
13187requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13188requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13189requires_config_enabled PSA_WANT_ALG_FFDH
13190requires_config_enabled PSA_WANT_DH_RFC7919_2048
13191requires_gnutls_tls1_3
13192requires_gnutls_next_no_ticket
13193requires_gnutls_next_disable_tls13_compat
13194run_test "TLS 1.3 G->m: HRR x448 -> ffdhe2048" \
13195         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13196         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
13197         0 \
13198         -s "Protocol is TLSv1.3" \
13199         -s "got named group: ffdhe2048(0100)" \
13200         -s "Certificate verification was skipped" \
13201         -s "HRR selected_group: ffdhe2048"
13202
13203requires_config_enabled MBEDTLS_SSL_SRV_C
13204requires_config_enabled MBEDTLS_DEBUG_C
13205requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13206requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13207requires_config_enabled PSA_WANT_ALG_ECDH
13208requires_gnutls_tls1_3
13209requires_gnutls_next_no_ticket
13210requires_gnutls_next_disable_tls13_compat
13211run_test "TLS 1.3 G->m: HRR ffdhe2048 -> secp256r1" \
13212         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13213         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
13214         0 \
13215         -s "Protocol is TLSv1.3" \
13216         -s "got named group: secp256r1(0017)" \
13217         -s "Certificate verification was skipped" \
13218         -s "HRR selected_group: secp256r1"
13219
13220requires_config_enabled MBEDTLS_SSL_SRV_C
13221requires_config_enabled MBEDTLS_DEBUG_C
13222requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13223requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13224requires_config_enabled PSA_WANT_ALG_ECDH
13225requires_gnutls_tls1_3
13226requires_gnutls_next_no_ticket
13227requires_gnutls_next_disable_tls13_compat
13228run_test "TLS 1.3 G->m: HRR ffdhe2048 -> secp384r1" \
13229         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13230         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
13231         0 \
13232         -s "Protocol is TLSv1.3" \
13233         -s "got named group: secp384r1(0018)" \
13234         -s "Certificate verification was skipped" \
13235         -s "HRR selected_group: secp384r1"
13236
13237requires_config_enabled MBEDTLS_SSL_SRV_C
13238requires_config_enabled MBEDTLS_DEBUG_C
13239requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13240requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13241requires_config_enabled PSA_WANT_ALG_ECDH
13242requires_gnutls_tls1_3
13243requires_gnutls_next_no_ticket
13244requires_gnutls_next_disable_tls13_compat
13245run_test "TLS 1.3 G->m: HRR ffdhe2048 -> secp521r1" \
13246         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13247         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
13248         0 \
13249         -s "Protocol is TLSv1.3" \
13250         -s "got named group: secp521r1(0019)" \
13251         -s "Certificate verification was skipped" \
13252         -s "HRR selected_group: secp521r1"
13253
13254requires_config_enabled MBEDTLS_SSL_SRV_C
13255requires_config_enabled MBEDTLS_DEBUG_C
13256requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13257requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13258requires_config_enabled PSA_WANT_ALG_ECDH
13259requires_gnutls_tls1_3
13260requires_gnutls_next_no_ticket
13261requires_gnutls_next_disable_tls13_compat
13262run_test "TLS 1.3 G->m: HRR ffdhe2048 -> x25519" \
13263         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13264         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
13265         0 \
13266         -s "Protocol is TLSv1.3" \
13267         -s "got named group: x25519(001d)" \
13268         -s "Certificate verification was skipped" \
13269         -s "HRR selected_group: x25519"
13270
13271requires_config_enabled MBEDTLS_SSL_SRV_C
13272requires_config_enabled MBEDTLS_DEBUG_C
13273requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13274requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13275requires_config_enabled PSA_WANT_ALG_ECDH
13276requires_gnutls_tls1_3
13277requires_gnutls_next_no_ticket
13278requires_gnutls_next_disable_tls13_compat
13279run_test "TLS 1.3 G->m: HRR ffdhe2048 -> x448" \
13280         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
13281         "$G_NEXT_CLI_NO_CERT --debug=4 --single-key-share --x509cafile $DATA_FILES_PATH/test-ca2.crt --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
13282         0 \
13283         -s "Protocol is TLSv1.3" \
13284         -s "got named group: x448(001e)" \
13285         -s "Certificate verification was skipped" \
13286         -s "HRR selected_group: x448"
13287
13288requires_openssl_tls1_3
13289requires_config_enabled MBEDTLS_SSL_CLI_C
13290requires_config_enabled MBEDTLS_DEBUG_C
13291requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13292requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13293requires_config_enabled PSA_WANT_ALG_ECDH
13294run_test "TLS 1.3 m->O: HRR secp256r1 -> secp384r1" \
13295         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13296         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp384r1" \
13297         0 \
13298         -c "HTTP/1.0 200 ok" \
13299         -c "Protocol is TLSv1.3" \
13300         -c "NamedGroup: secp256r1 ( 17 )" \
13301         -c "NamedGroup: secp384r1 ( 18 )" \
13302         -c "Verifying peer X.509 certificate... ok" \
13303         -c "received HelloRetryRequest message" \
13304         -c "selected_group ( 24 )"
13305
13306requires_openssl_tls1_3
13307requires_config_enabled MBEDTLS_SSL_CLI_C
13308requires_config_enabled MBEDTLS_DEBUG_C
13309requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13310requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13311requires_config_enabled PSA_WANT_ALG_ECDH
13312run_test "TLS 1.3 m->O: HRR secp256r1 -> secp521r1" \
13313         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13314         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp521r1" \
13315         0 \
13316         -c "HTTP/1.0 200 ok" \
13317         -c "Protocol is TLSv1.3" \
13318         -c "NamedGroup: secp256r1 ( 17 )" \
13319         -c "NamedGroup: secp521r1 ( 19 )" \
13320         -c "Verifying peer X.509 certificate... ok" \
13321         -c "received HelloRetryRequest message" \
13322         -c "selected_group ( 25 )"
13323
13324requires_openssl_tls1_3
13325requires_config_enabled MBEDTLS_SSL_CLI_C
13326requires_config_enabled MBEDTLS_DEBUG_C
13327requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13328requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13329requires_config_enabled PSA_WANT_ALG_ECDH
13330run_test "TLS 1.3 m->O: HRR secp256r1 -> x25519" \
13331         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13332         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x25519" \
13333         0 \
13334         -c "HTTP/1.0 200 ok" \
13335         -c "Protocol is TLSv1.3" \
13336         -c "NamedGroup: secp256r1 ( 17 )" \
13337         -c "NamedGroup: x25519 ( 1d )" \
13338         -c "Verifying peer X.509 certificate... ok" \
13339         -c "received HelloRetryRequest message" \
13340         -c "selected_group ( 29 )"
13341
13342requires_openssl_tls1_3
13343requires_config_enabled MBEDTLS_SSL_CLI_C
13344requires_config_enabled MBEDTLS_DEBUG_C
13345requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13346requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13347requires_config_enabled PSA_WANT_ALG_ECDH
13348run_test "TLS 1.3 m->O: HRR secp256r1 -> x448" \
13349         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13350         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x448" \
13351         0 \
13352         -c "HTTP/1.0 200 ok" \
13353         -c "Protocol is TLSv1.3" \
13354         -c "NamedGroup: secp256r1 ( 17 )" \
13355         -c "NamedGroup: x448 ( 1e )" \
13356         -c "Verifying peer X.509 certificate... ok" \
13357         -c "received HelloRetryRequest message" \
13358         -c "selected_group ( 30 )"
13359
13360requires_openssl_tls1_3_with_ffdh
13361requires_config_enabled MBEDTLS_SSL_CLI_C
13362requires_config_enabled MBEDTLS_DEBUG_C
13363requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13364requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13365requires_config_enabled PSA_WANT_ALG_ECDH
13366requires_config_enabled PSA_WANT_ALG_FFDH
13367requires_config_enabled PSA_WANT_DH_RFC7919_2048
13368run_test "TLS 1.3 m->O: HRR secp256r1 -> ffdhe2048" \
13369         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13370         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,ffdhe2048" \
13371         0 \
13372         -c "HTTP/1.0 200 ok" \
13373         -c "Protocol is TLSv1.3" \
13374         -c "NamedGroup: secp256r1 ( 17 )" \
13375         -c "NamedGroup: ffdhe2048 ( 100 )" \
13376         -c "Verifying peer X.509 certificate... ok" \
13377         -c "received HelloRetryRequest message" \
13378         -c "selected_group ( 256 )"
13379
13380requires_openssl_tls1_3
13381requires_config_enabled MBEDTLS_SSL_CLI_C
13382requires_config_enabled MBEDTLS_DEBUG_C
13383requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13384requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13385requires_config_enabled PSA_WANT_ALG_ECDH
13386run_test "TLS 1.3 m->O: HRR secp384r1 -> secp256r1" \
13387         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13388         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp256r1" \
13389         0 \
13390         -c "HTTP/1.0 200 ok" \
13391         -c "Protocol is TLSv1.3" \
13392         -c "NamedGroup: secp384r1 ( 18 )" \
13393         -c "NamedGroup: secp256r1 ( 17 )" \
13394         -c "Verifying peer X.509 certificate... ok" \
13395         -c "received HelloRetryRequest message" \
13396         -c "selected_group ( 23 )"
13397
13398requires_openssl_tls1_3
13399requires_config_enabled MBEDTLS_SSL_CLI_C
13400requires_config_enabled MBEDTLS_DEBUG_C
13401requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13402requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13403requires_config_enabled PSA_WANT_ALG_ECDH
13404run_test "TLS 1.3 m->O: HRR secp384r1 -> secp521r1" \
13405         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13406         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp521r1" \
13407         0 \
13408         -c "HTTP/1.0 200 ok" \
13409         -c "Protocol is TLSv1.3" \
13410         -c "NamedGroup: secp384r1 ( 18 )" \
13411         -c "NamedGroup: secp521r1 ( 19 )" \
13412         -c "Verifying peer X.509 certificate... ok" \
13413         -c "received HelloRetryRequest message" \
13414         -c "selected_group ( 25 )"
13415
13416requires_openssl_tls1_3
13417requires_config_enabled MBEDTLS_SSL_CLI_C
13418requires_config_enabled MBEDTLS_DEBUG_C
13419requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13420requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13421requires_config_enabled PSA_WANT_ALG_ECDH
13422run_test "TLS 1.3 m->O: HRR secp384r1 -> x25519" \
13423         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13424         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x25519" \
13425         0 \
13426         -c "HTTP/1.0 200 ok" \
13427         -c "Protocol is TLSv1.3" \
13428         -c "NamedGroup: secp384r1 ( 18 )" \
13429         -c "NamedGroup: x25519 ( 1d )" \
13430         -c "Verifying peer X.509 certificate... ok" \
13431         -c "received HelloRetryRequest message" \
13432         -c "selected_group ( 29 )"
13433
13434requires_openssl_tls1_3
13435requires_config_enabled MBEDTLS_SSL_CLI_C
13436requires_config_enabled MBEDTLS_DEBUG_C
13437requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13438requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13439requires_config_enabled PSA_WANT_ALG_ECDH
13440run_test "TLS 1.3 m->O: HRR secp384r1 -> x448" \
13441         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13442         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x448" \
13443         0 \
13444         -c "HTTP/1.0 200 ok" \
13445         -c "Protocol is TLSv1.3" \
13446         -c "NamedGroup: secp384r1 ( 18 )" \
13447         -c "NamedGroup: x448 ( 1e )" \
13448         -c "Verifying peer X.509 certificate... ok" \
13449         -c "received HelloRetryRequest message" \
13450         -c "selected_group ( 30 )"
13451
13452requires_openssl_tls1_3_with_ffdh
13453requires_config_enabled MBEDTLS_SSL_CLI_C
13454requires_config_enabled MBEDTLS_DEBUG_C
13455requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13456requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13457requires_config_enabled PSA_WANT_ALG_ECDH
13458requires_config_enabled PSA_WANT_ALG_FFDH
13459requires_config_enabled PSA_WANT_DH_RFC7919_2048
13460run_test "TLS 1.3 m->O: HRR secp384r1 -> ffdhe2048" \
13461         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13462         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,ffdhe2048" \
13463         0 \
13464         -c "HTTP/1.0 200 ok" \
13465         -c "Protocol is TLSv1.3" \
13466         -c "NamedGroup: secp384r1 ( 18 )" \
13467         -c "NamedGroup: ffdhe2048 ( 100 )" \
13468         -c "Verifying peer X.509 certificate... ok" \
13469         -c "received HelloRetryRequest message" \
13470         -c "selected_group ( 256 )"
13471
13472requires_openssl_tls1_3
13473requires_config_enabled MBEDTLS_SSL_CLI_C
13474requires_config_enabled MBEDTLS_DEBUG_C
13475requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13476requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13477requires_config_enabled PSA_WANT_ALG_ECDH
13478run_test "TLS 1.3 m->O: HRR secp521r1 -> secp256r1" \
13479         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13480         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp256r1" \
13481         0 \
13482         -c "HTTP/1.0 200 ok" \
13483         -c "Protocol is TLSv1.3" \
13484         -c "NamedGroup: secp521r1 ( 19 )" \
13485         -c "NamedGroup: secp256r1 ( 17 )" \
13486         -c "Verifying peer X.509 certificate... ok" \
13487         -c "received HelloRetryRequest message" \
13488         -c "selected_group ( 23 )"
13489
13490requires_openssl_tls1_3
13491requires_config_enabled MBEDTLS_SSL_CLI_C
13492requires_config_enabled MBEDTLS_DEBUG_C
13493requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13494requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13495requires_config_enabled PSA_WANT_ALG_ECDH
13496run_test "TLS 1.3 m->O: HRR secp521r1 -> secp384r1" \
13497         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13498         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp384r1" \
13499         0 \
13500         -c "HTTP/1.0 200 ok" \
13501         -c "Protocol is TLSv1.3" \
13502         -c "NamedGroup: secp521r1 ( 19 )" \
13503         -c "NamedGroup: secp384r1 ( 18 )" \
13504         -c "Verifying peer X.509 certificate... ok" \
13505         -c "received HelloRetryRequest message" \
13506         -c "selected_group ( 24 )"
13507
13508requires_openssl_tls1_3
13509requires_config_enabled MBEDTLS_SSL_CLI_C
13510requires_config_enabled MBEDTLS_DEBUG_C
13511requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13512requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13513requires_config_enabled PSA_WANT_ALG_ECDH
13514run_test "TLS 1.3 m->O: HRR secp521r1 -> x25519" \
13515         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13516         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x25519" \
13517         0 \
13518         -c "HTTP/1.0 200 ok" \
13519         -c "Protocol is TLSv1.3" \
13520         -c "NamedGroup: secp521r1 ( 19 )" \
13521         -c "NamedGroup: x25519 ( 1d )" \
13522         -c "Verifying peer X.509 certificate... ok" \
13523         -c "received HelloRetryRequest message" \
13524         -c "selected_group ( 29 )"
13525
13526requires_openssl_tls1_3
13527requires_config_enabled MBEDTLS_SSL_CLI_C
13528requires_config_enabled MBEDTLS_DEBUG_C
13529requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13530requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13531requires_config_enabled PSA_WANT_ALG_ECDH
13532run_test "TLS 1.3 m->O: HRR secp521r1 -> x448" \
13533         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13534         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x448" \
13535         0 \
13536         -c "HTTP/1.0 200 ok" \
13537         -c "Protocol is TLSv1.3" \
13538         -c "NamedGroup: secp521r1 ( 19 )" \
13539         -c "NamedGroup: x448 ( 1e )" \
13540         -c "Verifying peer X.509 certificate... ok" \
13541         -c "received HelloRetryRequest message" \
13542         -c "selected_group ( 30 )"
13543
13544requires_openssl_tls1_3_with_ffdh
13545requires_config_enabled MBEDTLS_SSL_CLI_C
13546requires_config_enabled MBEDTLS_DEBUG_C
13547requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13548requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13549requires_config_enabled PSA_WANT_ALG_ECDH
13550requires_config_enabled PSA_WANT_ALG_FFDH
13551requires_config_enabled PSA_WANT_DH_RFC7919_2048
13552run_test "TLS 1.3 m->O: HRR secp521r1 -> ffdhe2048" \
13553         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13554         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,ffdhe2048" \
13555         0 \
13556         -c "HTTP/1.0 200 ok" \
13557         -c "Protocol is TLSv1.3" \
13558         -c "NamedGroup: secp521r1 ( 19 )" \
13559         -c "NamedGroup: ffdhe2048 ( 100 )" \
13560         -c "Verifying peer X.509 certificate... ok" \
13561         -c "received HelloRetryRequest message" \
13562         -c "selected_group ( 256 )"
13563
13564requires_openssl_tls1_3
13565requires_config_enabled MBEDTLS_SSL_CLI_C
13566requires_config_enabled MBEDTLS_DEBUG_C
13567requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13568requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13569requires_config_enabled PSA_WANT_ALG_ECDH
13570run_test "TLS 1.3 m->O: HRR x25519 -> secp256r1" \
13571         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13572         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp256r1" \
13573         0 \
13574         -c "HTTP/1.0 200 ok" \
13575         -c "Protocol is TLSv1.3" \
13576         -c "NamedGroup: x25519 ( 1d )" \
13577         -c "NamedGroup: secp256r1 ( 17 )" \
13578         -c "Verifying peer X.509 certificate... ok" \
13579         -c "received HelloRetryRequest message" \
13580         -c "selected_group ( 23 )"
13581
13582requires_openssl_tls1_3
13583requires_config_enabled MBEDTLS_SSL_CLI_C
13584requires_config_enabled MBEDTLS_DEBUG_C
13585requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13586requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13587requires_config_enabled PSA_WANT_ALG_ECDH
13588run_test "TLS 1.3 m->O: HRR x25519 -> secp384r1" \
13589         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13590         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp384r1" \
13591         0 \
13592         -c "HTTP/1.0 200 ok" \
13593         -c "Protocol is TLSv1.3" \
13594         -c "NamedGroup: x25519 ( 1d )" \
13595         -c "NamedGroup: secp384r1 ( 18 )" \
13596         -c "Verifying peer X.509 certificate... ok" \
13597         -c "received HelloRetryRequest message" \
13598         -c "selected_group ( 24 )"
13599
13600requires_openssl_tls1_3
13601requires_config_enabled MBEDTLS_SSL_CLI_C
13602requires_config_enabled MBEDTLS_DEBUG_C
13603requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13605requires_config_enabled PSA_WANT_ALG_ECDH
13606run_test "TLS 1.3 m->O: HRR x25519 -> secp521r1" \
13607         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13608         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp521r1" \
13609         0 \
13610         -c "HTTP/1.0 200 ok" \
13611         -c "Protocol is TLSv1.3" \
13612         -c "NamedGroup: x25519 ( 1d )" \
13613         -c "NamedGroup: secp521r1 ( 19 )" \
13614         -c "Verifying peer X.509 certificate... ok" \
13615         -c "received HelloRetryRequest message" \
13616         -c "selected_group ( 25 )"
13617
13618requires_openssl_tls1_3
13619requires_config_enabled MBEDTLS_SSL_CLI_C
13620requires_config_enabled MBEDTLS_DEBUG_C
13621requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13622requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13623requires_config_enabled PSA_WANT_ALG_ECDH
13624run_test "TLS 1.3 m->O: HRR x25519 -> x448" \
13625         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13626         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,x448" \
13627         0 \
13628         -c "HTTP/1.0 200 ok" \
13629         -c "Protocol is TLSv1.3" \
13630         -c "NamedGroup: x25519 ( 1d )" \
13631         -c "NamedGroup: x448 ( 1e )" \
13632         -c "Verifying peer X.509 certificate... ok" \
13633         -c "received HelloRetryRequest message" \
13634         -c "selected_group ( 30 )"
13635
13636requires_openssl_tls1_3_with_ffdh
13637requires_config_enabled MBEDTLS_SSL_CLI_C
13638requires_config_enabled MBEDTLS_DEBUG_C
13639requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13640requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13641requires_config_enabled PSA_WANT_ALG_ECDH
13642requires_config_enabled PSA_WANT_ALG_FFDH
13643requires_config_enabled PSA_WANT_DH_RFC7919_2048
13644run_test "TLS 1.3 m->O: HRR x25519 -> ffdhe2048" \
13645         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13646         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,ffdhe2048" \
13647         0 \
13648         -c "HTTP/1.0 200 ok" \
13649         -c "Protocol is TLSv1.3" \
13650         -c "NamedGroup: x25519 ( 1d )" \
13651         -c "NamedGroup: ffdhe2048 ( 100 )" \
13652         -c "Verifying peer X.509 certificate... ok" \
13653         -c "received HelloRetryRequest message" \
13654         -c "selected_group ( 256 )"
13655
13656requires_openssl_tls1_3
13657requires_config_enabled MBEDTLS_SSL_CLI_C
13658requires_config_enabled MBEDTLS_DEBUG_C
13659requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13660requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13661requires_config_enabled PSA_WANT_ALG_ECDH
13662run_test "TLS 1.3 m->O: HRR x448 -> secp256r1" \
13663         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13664         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp256r1" \
13665         0 \
13666         -c "HTTP/1.0 200 ok" \
13667         -c "Protocol is TLSv1.3" \
13668         -c "NamedGroup: x448 ( 1e )" \
13669         -c "NamedGroup: secp256r1 ( 17 )" \
13670         -c "Verifying peer X.509 certificate... ok" \
13671         -c "received HelloRetryRequest message" \
13672         -c "selected_group ( 23 )"
13673
13674requires_openssl_tls1_3
13675requires_config_enabled MBEDTLS_SSL_CLI_C
13676requires_config_enabled MBEDTLS_DEBUG_C
13677requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13678requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13679requires_config_enabled PSA_WANT_ALG_ECDH
13680run_test "TLS 1.3 m->O: HRR x448 -> secp384r1" \
13681         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13682         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp384r1" \
13683         0 \
13684         -c "HTTP/1.0 200 ok" \
13685         -c "Protocol is TLSv1.3" \
13686         -c "NamedGroup: x448 ( 1e )" \
13687         -c "NamedGroup: secp384r1 ( 18 )" \
13688         -c "Verifying peer X.509 certificate... ok" \
13689         -c "received HelloRetryRequest message" \
13690         -c "selected_group ( 24 )"
13691
13692requires_openssl_tls1_3
13693requires_config_enabled MBEDTLS_SSL_CLI_C
13694requires_config_enabled MBEDTLS_DEBUG_C
13695requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13696requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13697requires_config_enabled PSA_WANT_ALG_ECDH
13698run_test "TLS 1.3 m->O: HRR x448 -> secp521r1" \
13699         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13700         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp521r1" \
13701         0 \
13702         -c "HTTP/1.0 200 ok" \
13703         -c "Protocol is TLSv1.3" \
13704         -c "NamedGroup: x448 ( 1e )" \
13705         -c "NamedGroup: secp521r1 ( 19 )" \
13706         -c "Verifying peer X.509 certificate... ok" \
13707         -c "received HelloRetryRequest message" \
13708         -c "selected_group ( 25 )"
13709
13710requires_openssl_tls1_3
13711requires_config_enabled MBEDTLS_SSL_CLI_C
13712requires_config_enabled MBEDTLS_DEBUG_C
13713requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13714requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13715requires_config_enabled PSA_WANT_ALG_ECDH
13716run_test "TLS 1.3 m->O: HRR x448 -> x25519" \
13717         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13718         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,x25519" \
13719         0 \
13720         -c "HTTP/1.0 200 ok" \
13721         -c "Protocol is TLSv1.3" \
13722         -c "NamedGroup: x448 ( 1e )" \
13723         -c "NamedGroup: x25519 ( 1d )" \
13724         -c "Verifying peer X.509 certificate... ok" \
13725         -c "received HelloRetryRequest message" \
13726         -c "selected_group ( 29 )"
13727
13728requires_openssl_tls1_3_with_ffdh
13729requires_config_enabled MBEDTLS_SSL_CLI_C
13730requires_config_enabled MBEDTLS_DEBUG_C
13731requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13733requires_config_enabled PSA_WANT_ALG_ECDH
13734requires_config_enabled PSA_WANT_ALG_FFDH
13735requires_config_enabled PSA_WANT_DH_RFC7919_2048
13736run_test "TLS 1.3 m->O: HRR x448 -> ffdhe2048" \
13737         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups ffdhe2048 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13738         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,ffdhe2048" \
13739         0 \
13740         -c "HTTP/1.0 200 ok" \
13741         -c "Protocol is TLSv1.3" \
13742         -c "NamedGroup: x448 ( 1e )" \
13743         -c "NamedGroup: ffdhe2048 ( 100 )" \
13744         -c "Verifying peer X.509 certificate... ok" \
13745         -c "received HelloRetryRequest message" \
13746         -c "selected_group ( 256 )"
13747
13748requires_openssl_tls1_3
13749requires_config_enabled MBEDTLS_SSL_CLI_C
13750requires_config_enabled MBEDTLS_DEBUG_C
13751requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13752requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13753requires_config_enabled PSA_WANT_ALG_ECDH
13754requires_config_enabled PSA_WANT_ALG_FFDH
13755requires_config_enabled PSA_WANT_DH_RFC7919_2048
13756run_test "TLS 1.3 m->O: HRR ffdhe2048 -> secp256r1" \
13757         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-256 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13758         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp256r1" \
13759         0 \
13760         -c "HTTP/1.0 200 ok" \
13761         -c "Protocol is TLSv1.3" \
13762         -c "NamedGroup: ffdhe2048 ( 100 )" \
13763         -c "NamedGroup: secp256r1 ( 17 )" \
13764         -c "Verifying peer X.509 certificate... ok" \
13765         -c "received HelloRetryRequest message" \
13766         -c "selected_group ( 23 )"
13767
13768requires_openssl_tls1_3
13769requires_config_enabled MBEDTLS_SSL_CLI_C
13770requires_config_enabled MBEDTLS_DEBUG_C
13771requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13772requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13773requires_config_enabled PSA_WANT_ALG_ECDH
13774requires_config_enabled PSA_WANT_ALG_FFDH
13775requires_config_enabled PSA_WANT_DH_RFC7919_2048
13776run_test "TLS 1.3 m->O: HRR ffdhe2048 -> secp384r1" \
13777         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-384 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13778         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp384r1" \
13779         0 \
13780         -c "HTTP/1.0 200 ok" \
13781         -c "Protocol is TLSv1.3" \
13782         -c "NamedGroup: ffdhe2048 ( 100 )" \
13783         -c "NamedGroup: secp384r1 ( 18 )" \
13784         -c "Verifying peer X.509 certificate... ok" \
13785         -c "received HelloRetryRequest message" \
13786         -c "selected_group ( 24 )"
13787
13788requires_openssl_tls1_3
13789requires_config_enabled MBEDTLS_SSL_CLI_C
13790requires_config_enabled MBEDTLS_DEBUG_C
13791requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13792requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13793requires_config_enabled PSA_WANT_ALG_ECDH
13794requires_config_enabled PSA_WANT_ALG_FFDH
13795requires_config_enabled PSA_WANT_DH_RFC7919_2048
13796run_test "TLS 1.3 m->O: HRR ffdhe2048 -> secp521r1" \
13797         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups P-521 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13798         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp521r1" \
13799         0 \
13800         -c "HTTP/1.0 200 ok" \
13801         -c "Protocol is TLSv1.3" \
13802         -c "NamedGroup: ffdhe2048 ( 100 )" \
13803         -c "NamedGroup: secp521r1 ( 19 )" \
13804         -c "Verifying peer X.509 certificate... ok" \
13805         -c "received HelloRetryRequest message" \
13806         -c "selected_group ( 25 )"
13807
13808requires_openssl_tls1_3
13809requires_config_enabled MBEDTLS_SSL_CLI_C
13810requires_config_enabled MBEDTLS_DEBUG_C
13811requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13812requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13813requires_config_enabled PSA_WANT_ALG_ECDH
13814requires_config_enabled PSA_WANT_ALG_FFDH
13815requires_config_enabled PSA_WANT_DH_RFC7919_2048
13816run_test "TLS 1.3 m->O: HRR ffdhe2048 -> x25519" \
13817         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X25519 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13818         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x25519" \
13819         0 \
13820         -c "HTTP/1.0 200 ok" \
13821         -c "Protocol is TLSv1.3" \
13822         -c "NamedGroup: ffdhe2048 ( 100 )" \
13823         -c "NamedGroup: x25519 ( 1d )" \
13824         -c "Verifying peer X.509 certificate... ok" \
13825         -c "received HelloRetryRequest message" \
13826         -c "selected_group ( 29 )"
13827
13828requires_openssl_tls1_3
13829requires_config_enabled MBEDTLS_SSL_CLI_C
13830requires_config_enabled MBEDTLS_DEBUG_C
13831requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13832requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13833requires_config_enabled PSA_WANT_ALG_ECDH
13834requires_config_enabled PSA_WANT_ALG_FFDH
13835requires_config_enabled PSA_WANT_DH_RFC7919_2048
13836run_test "TLS 1.3 m->O: HRR ffdhe2048 -> x448" \
13837         "$O_NEXT_SRV_NO_CERT -cert $DATA_FILES_PATH/ecdsa_secp256r1.crt -key $DATA_FILES_PATH/ecdsa_secp256r1.key -groups X448 -msg -tls1_3 -num_tickets 0 -no_resume_ephemeral -no_cache" \
13838         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x448" \
13839         0 \
13840         -c "HTTP/1.0 200 ok" \
13841         -c "Protocol is TLSv1.3" \
13842         -c "NamedGroup: ffdhe2048 ( 100 )" \
13843         -c "NamedGroup: x448 ( 1e )" \
13844         -c "Verifying peer X.509 certificate... ok" \
13845         -c "received HelloRetryRequest message" \
13846         -c "selected_group ( 30 )"
13847
13848requires_gnutls_tls1_3
13849requires_gnutls_next_no_ticket
13850requires_gnutls_next_disable_tls13_compat
13851requires_config_enabled MBEDTLS_SSL_CLI_C
13852requires_config_enabled MBEDTLS_DEBUG_C
13853requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13854requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13855requires_config_enabled PSA_WANT_ALG_ECDH
13856run_test "TLS 1.3 m->G: HRR secp256r1 -> secp384r1" \
13857         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
13858         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp384r1" \
13859         0 \
13860         -c "HTTP/1.0 200 OK" \
13861         -c "Protocol is TLSv1.3" \
13862         -c "NamedGroup: secp256r1 ( 17 )" \
13863         -c "NamedGroup: secp384r1 ( 18 )" \
13864         -c "Verifying peer X.509 certificate... ok" \
13865         -c "received HelloRetryRequest message" \
13866         -c "selected_group ( 24 )"
13867
13868requires_gnutls_tls1_3
13869requires_gnutls_next_no_ticket
13870requires_gnutls_next_disable_tls13_compat
13871requires_config_enabled MBEDTLS_SSL_CLI_C
13872requires_config_enabled MBEDTLS_DEBUG_C
13873requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13874requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13875requires_config_enabled PSA_WANT_ALG_ECDH
13876run_test "TLS 1.3 m->G: HRR secp256r1 -> secp521r1" \
13877         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
13878         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp521r1" \
13879         0 \
13880         -c "HTTP/1.0 200 OK" \
13881         -c "Protocol is TLSv1.3" \
13882         -c "NamedGroup: secp256r1 ( 17 )" \
13883         -c "NamedGroup: secp521r1 ( 19 )" \
13884         -c "Verifying peer X.509 certificate... ok" \
13885         -c "received HelloRetryRequest message" \
13886         -c "selected_group ( 25 )"
13887
13888requires_gnutls_tls1_3
13889requires_gnutls_next_no_ticket
13890requires_gnutls_next_disable_tls13_compat
13891requires_config_enabled MBEDTLS_SSL_CLI_C
13892requires_config_enabled MBEDTLS_DEBUG_C
13893requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13894requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13895requires_config_enabled PSA_WANT_ALG_ECDH
13896run_test "TLS 1.3 m->G: HRR secp256r1 -> x25519" \
13897         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
13898         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x25519" \
13899         0 \
13900         -c "HTTP/1.0 200 OK" \
13901         -c "Protocol is TLSv1.3" \
13902         -c "NamedGroup: secp256r1 ( 17 )" \
13903         -c "NamedGroup: x25519 ( 1d )" \
13904         -c "Verifying peer X.509 certificate... ok" \
13905         -c "received HelloRetryRequest message" \
13906         -c "selected_group ( 29 )"
13907
13908requires_gnutls_tls1_3
13909requires_gnutls_next_no_ticket
13910requires_gnutls_next_disable_tls13_compat
13911requires_config_enabled MBEDTLS_SSL_CLI_C
13912requires_config_enabled MBEDTLS_DEBUG_C
13913requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13914requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13915requires_config_enabled PSA_WANT_ALG_ECDH
13916run_test "TLS 1.3 m->G: HRR secp256r1 -> x448" \
13917         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
13918         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x448" \
13919         0 \
13920         -c "HTTP/1.0 200 OK" \
13921         -c "Protocol is TLSv1.3" \
13922         -c "NamedGroup: secp256r1 ( 17 )" \
13923         -c "NamedGroup: x448 ( 1e )" \
13924         -c "Verifying peer X.509 certificate... ok" \
13925         -c "received HelloRetryRequest message" \
13926         -c "selected_group ( 30 )"
13927
13928requires_gnutls_tls1_3
13929requires_gnutls_next_no_ticket
13930requires_gnutls_next_disable_tls13_compat
13931requires_config_enabled MBEDTLS_SSL_CLI_C
13932requires_config_enabled MBEDTLS_DEBUG_C
13933requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13934requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13935requires_config_enabled PSA_WANT_ALG_ECDH
13936requires_config_enabled PSA_WANT_ALG_FFDH
13937requires_config_enabled PSA_WANT_DH_RFC7919_2048
13938run_test "TLS 1.3 m->G: HRR secp256r1 -> ffdhe2048" \
13939         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
13940         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,ffdhe2048" \
13941         0 \
13942         -c "HTTP/1.0 200 OK" \
13943         -c "Protocol is TLSv1.3" \
13944         -c "NamedGroup: secp256r1 ( 17 )" \
13945         -c "NamedGroup: ffdhe2048 ( 100 )" \
13946         -c "Verifying peer X.509 certificate... ok" \
13947         -c "received HelloRetryRequest message" \
13948         -c "selected_group ( 256 )"
13949
13950requires_gnutls_tls1_3
13951requires_gnutls_next_no_ticket
13952requires_gnutls_next_disable_tls13_compat
13953requires_config_enabled MBEDTLS_SSL_CLI_C
13954requires_config_enabled MBEDTLS_DEBUG_C
13955requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13956requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13957requires_config_enabled PSA_WANT_ALG_ECDH
13958run_test "TLS 1.3 m->G: HRR secp384r1 -> secp256r1" \
13959         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
13960         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp256r1" \
13961         0 \
13962         -c "HTTP/1.0 200 OK" \
13963         -c "Protocol is TLSv1.3" \
13964         -c "NamedGroup: secp384r1 ( 18 )" \
13965         -c "NamedGroup: secp256r1 ( 17 )" \
13966         -c "Verifying peer X.509 certificate... ok" \
13967         -c "received HelloRetryRequest message" \
13968         -c "selected_group ( 23 )"
13969
13970requires_gnutls_tls1_3
13971requires_gnutls_next_no_ticket
13972requires_gnutls_next_disable_tls13_compat
13973requires_config_enabled MBEDTLS_SSL_CLI_C
13974requires_config_enabled MBEDTLS_DEBUG_C
13975requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13976requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13977requires_config_enabled PSA_WANT_ALG_ECDH
13978run_test "TLS 1.3 m->G: HRR secp384r1 -> secp521r1" \
13979         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
13980         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp521r1" \
13981         0 \
13982         -c "HTTP/1.0 200 OK" \
13983         -c "Protocol is TLSv1.3" \
13984         -c "NamedGroup: secp384r1 ( 18 )" \
13985         -c "NamedGroup: secp521r1 ( 19 )" \
13986         -c "Verifying peer X.509 certificate... ok" \
13987         -c "received HelloRetryRequest message" \
13988         -c "selected_group ( 25 )"
13989
13990requires_gnutls_tls1_3
13991requires_gnutls_next_no_ticket
13992requires_gnutls_next_disable_tls13_compat
13993requires_config_enabled MBEDTLS_SSL_CLI_C
13994requires_config_enabled MBEDTLS_DEBUG_C
13995requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
13996requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
13997requires_config_enabled PSA_WANT_ALG_ECDH
13998run_test "TLS 1.3 m->G: HRR secp384r1 -> x25519" \
13999         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
14000         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x25519" \
14001         0 \
14002         -c "HTTP/1.0 200 OK" \
14003         -c "Protocol is TLSv1.3" \
14004         -c "NamedGroup: secp384r1 ( 18 )" \
14005         -c "NamedGroup: x25519 ( 1d )" \
14006         -c "Verifying peer X.509 certificate... ok" \
14007         -c "received HelloRetryRequest message" \
14008         -c "selected_group ( 29 )"
14009
14010requires_gnutls_tls1_3
14011requires_gnutls_next_no_ticket
14012requires_gnutls_next_disable_tls13_compat
14013requires_config_enabled MBEDTLS_SSL_CLI_C
14014requires_config_enabled MBEDTLS_DEBUG_C
14015requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14016requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14017requires_config_enabled PSA_WANT_ALG_ECDH
14018run_test "TLS 1.3 m->G: HRR secp384r1 -> x448" \
14019         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
14020         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x448" \
14021         0 \
14022         -c "HTTP/1.0 200 OK" \
14023         -c "Protocol is TLSv1.3" \
14024         -c "NamedGroup: secp384r1 ( 18 )" \
14025         -c "NamedGroup: x448 ( 1e )" \
14026         -c "Verifying peer X.509 certificate... ok" \
14027         -c "received HelloRetryRequest message" \
14028         -c "selected_group ( 30 )"
14029
14030requires_gnutls_tls1_3
14031requires_gnutls_next_no_ticket
14032requires_gnutls_next_disable_tls13_compat
14033requires_config_enabled MBEDTLS_SSL_CLI_C
14034requires_config_enabled MBEDTLS_DEBUG_C
14035requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14036requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14037requires_config_enabled PSA_WANT_ALG_ECDH
14038requires_config_enabled PSA_WANT_ALG_FFDH
14039requires_config_enabled PSA_WANT_DH_RFC7919_2048
14040run_test "TLS 1.3 m->G: HRR secp384r1 -> ffdhe2048" \
14041         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
14042         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,ffdhe2048" \
14043         0 \
14044         -c "HTTP/1.0 200 OK" \
14045         -c "Protocol is TLSv1.3" \
14046         -c "NamedGroup: secp384r1 ( 18 )" \
14047         -c "NamedGroup: ffdhe2048 ( 100 )" \
14048         -c "Verifying peer X.509 certificate... ok" \
14049         -c "received HelloRetryRequest message" \
14050         -c "selected_group ( 256 )"
14051
14052requires_gnutls_tls1_3
14053requires_gnutls_next_no_ticket
14054requires_gnutls_next_disable_tls13_compat
14055requires_config_enabled MBEDTLS_SSL_CLI_C
14056requires_config_enabled MBEDTLS_DEBUG_C
14057requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14058requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14059requires_config_enabled PSA_WANT_ALG_ECDH
14060run_test "TLS 1.3 m->G: HRR secp521r1 -> secp256r1" \
14061         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
14062         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp256r1" \
14063         0 \
14064         -c "HTTP/1.0 200 OK" \
14065         -c "Protocol is TLSv1.3" \
14066         -c "NamedGroup: secp521r1 ( 19 )" \
14067         -c "NamedGroup: secp256r1 ( 17 )" \
14068         -c "Verifying peer X.509 certificate... ok" \
14069         -c "received HelloRetryRequest message" \
14070         -c "selected_group ( 23 )"
14071
14072requires_gnutls_tls1_3
14073requires_gnutls_next_no_ticket
14074requires_gnutls_next_disable_tls13_compat
14075requires_config_enabled MBEDTLS_SSL_CLI_C
14076requires_config_enabled MBEDTLS_DEBUG_C
14077requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14078requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14079requires_config_enabled PSA_WANT_ALG_ECDH
14080run_test "TLS 1.3 m->G: HRR secp521r1 -> secp384r1" \
14081         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
14082         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp384r1" \
14083         0 \
14084         -c "HTTP/1.0 200 OK" \
14085         -c "Protocol is TLSv1.3" \
14086         -c "NamedGroup: secp521r1 ( 19 )" \
14087         -c "NamedGroup: secp384r1 ( 18 )" \
14088         -c "Verifying peer X.509 certificate... ok" \
14089         -c "received HelloRetryRequest message" \
14090         -c "selected_group ( 24 )"
14091
14092requires_gnutls_tls1_3
14093requires_gnutls_next_no_ticket
14094requires_gnutls_next_disable_tls13_compat
14095requires_config_enabled MBEDTLS_SSL_CLI_C
14096requires_config_enabled MBEDTLS_DEBUG_C
14097requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14098requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14099requires_config_enabled PSA_WANT_ALG_ECDH
14100run_test "TLS 1.3 m->G: HRR secp521r1 -> x25519" \
14101         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
14102         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x25519" \
14103         0 \
14104         -c "HTTP/1.0 200 OK" \
14105         -c "Protocol is TLSv1.3" \
14106         -c "NamedGroup: secp521r1 ( 19 )" \
14107         -c "NamedGroup: x25519 ( 1d )" \
14108         -c "Verifying peer X.509 certificate... ok" \
14109         -c "received HelloRetryRequest message" \
14110         -c "selected_group ( 29 )"
14111
14112requires_gnutls_tls1_3
14113requires_gnutls_next_no_ticket
14114requires_gnutls_next_disable_tls13_compat
14115requires_config_enabled MBEDTLS_SSL_CLI_C
14116requires_config_enabled MBEDTLS_DEBUG_C
14117requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14118requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14119requires_config_enabled PSA_WANT_ALG_ECDH
14120run_test "TLS 1.3 m->G: HRR secp521r1 -> x448" \
14121         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
14122         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x448" \
14123         0 \
14124         -c "HTTP/1.0 200 OK" \
14125         -c "Protocol is TLSv1.3" \
14126         -c "NamedGroup: secp521r1 ( 19 )" \
14127         -c "NamedGroup: x448 ( 1e )" \
14128         -c "Verifying peer X.509 certificate... ok" \
14129         -c "received HelloRetryRequest message" \
14130         -c "selected_group ( 30 )"
14131
14132requires_gnutls_tls1_3
14133requires_gnutls_next_no_ticket
14134requires_gnutls_next_disable_tls13_compat
14135requires_config_enabled MBEDTLS_SSL_CLI_C
14136requires_config_enabled MBEDTLS_DEBUG_C
14137requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14138requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14139requires_config_enabled PSA_WANT_ALG_ECDH
14140requires_config_enabled PSA_WANT_ALG_FFDH
14141requires_config_enabled PSA_WANT_DH_RFC7919_2048
14142run_test "TLS 1.3 m->G: HRR secp521r1 -> ffdhe2048" \
14143         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
14144         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,ffdhe2048" \
14145         0 \
14146         -c "HTTP/1.0 200 OK" \
14147         -c "Protocol is TLSv1.3" \
14148         -c "NamedGroup: secp521r1 ( 19 )" \
14149         -c "NamedGroup: ffdhe2048 ( 100 )" \
14150         -c "Verifying peer X.509 certificate... ok" \
14151         -c "received HelloRetryRequest message" \
14152         -c "selected_group ( 256 )"
14153
14154requires_gnutls_tls1_3
14155requires_gnutls_next_no_ticket
14156requires_gnutls_next_disable_tls13_compat
14157requires_config_enabled MBEDTLS_SSL_CLI_C
14158requires_config_enabled MBEDTLS_DEBUG_C
14159requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14160requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14161requires_config_enabled PSA_WANT_ALG_ECDH
14162run_test "TLS 1.3 m->G: HRR x25519 -> secp256r1" \
14163         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
14164         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp256r1" \
14165         0 \
14166         -c "HTTP/1.0 200 OK" \
14167         -c "Protocol is TLSv1.3" \
14168         -c "NamedGroup: x25519 ( 1d )" \
14169         -c "NamedGroup: secp256r1 ( 17 )" \
14170         -c "Verifying peer X.509 certificate... ok" \
14171         -c "received HelloRetryRequest message" \
14172         -c "selected_group ( 23 )"
14173
14174requires_gnutls_tls1_3
14175requires_gnutls_next_no_ticket
14176requires_gnutls_next_disable_tls13_compat
14177requires_config_enabled MBEDTLS_SSL_CLI_C
14178requires_config_enabled MBEDTLS_DEBUG_C
14179requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14180requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14181requires_config_enabled PSA_WANT_ALG_ECDH
14182run_test "TLS 1.3 m->G: HRR x25519 -> secp384r1" \
14183         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
14184         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp384r1" \
14185         0 \
14186         -c "HTTP/1.0 200 OK" \
14187         -c "Protocol is TLSv1.3" \
14188         -c "NamedGroup: x25519 ( 1d )" \
14189         -c "NamedGroup: secp384r1 ( 18 )" \
14190         -c "Verifying peer X.509 certificate... ok" \
14191         -c "received HelloRetryRequest message" \
14192         -c "selected_group ( 24 )"
14193
14194requires_gnutls_tls1_3
14195requires_gnutls_next_no_ticket
14196requires_gnutls_next_disable_tls13_compat
14197requires_config_enabled MBEDTLS_SSL_CLI_C
14198requires_config_enabled MBEDTLS_DEBUG_C
14199requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14200requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14201requires_config_enabled PSA_WANT_ALG_ECDH
14202run_test "TLS 1.3 m->G: HRR x25519 -> secp521r1" \
14203         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
14204         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp521r1" \
14205         0 \
14206         -c "HTTP/1.0 200 OK" \
14207         -c "Protocol is TLSv1.3" \
14208         -c "NamedGroup: x25519 ( 1d )" \
14209         -c "NamedGroup: secp521r1 ( 19 )" \
14210         -c "Verifying peer X.509 certificate... ok" \
14211         -c "received HelloRetryRequest message" \
14212         -c "selected_group ( 25 )"
14213
14214requires_gnutls_tls1_3
14215requires_gnutls_next_no_ticket
14216requires_gnutls_next_disable_tls13_compat
14217requires_config_enabled MBEDTLS_SSL_CLI_C
14218requires_config_enabled MBEDTLS_DEBUG_C
14219requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14220requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14221requires_config_enabled PSA_WANT_ALG_ECDH
14222run_test "TLS 1.3 m->G: HRR x25519 -> x448" \
14223         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
14224         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,x448" \
14225         0 \
14226         -c "HTTP/1.0 200 OK" \
14227         -c "Protocol is TLSv1.3" \
14228         -c "NamedGroup: x25519 ( 1d )" \
14229         -c "NamedGroup: x448 ( 1e )" \
14230         -c "Verifying peer X.509 certificate... ok" \
14231         -c "received HelloRetryRequest message" \
14232         -c "selected_group ( 30 )"
14233
14234requires_gnutls_tls1_3
14235requires_gnutls_next_no_ticket
14236requires_gnutls_next_disable_tls13_compat
14237requires_config_enabled MBEDTLS_SSL_CLI_C
14238requires_config_enabled MBEDTLS_DEBUG_C
14239requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14240requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14241requires_config_enabled PSA_WANT_ALG_ECDH
14242requires_config_enabled PSA_WANT_ALG_FFDH
14243requires_config_enabled PSA_WANT_DH_RFC7919_2048
14244run_test "TLS 1.3 m->G: HRR x25519 -> ffdhe2048" \
14245         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
14246         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,ffdhe2048" \
14247         0 \
14248         -c "HTTP/1.0 200 OK" \
14249         -c "Protocol is TLSv1.3" \
14250         -c "NamedGroup: x25519 ( 1d )" \
14251         -c "NamedGroup: ffdhe2048 ( 100 )" \
14252         -c "Verifying peer X.509 certificate... ok" \
14253         -c "received HelloRetryRequest message" \
14254         -c "selected_group ( 256 )"
14255
14256requires_gnutls_tls1_3
14257requires_gnutls_next_no_ticket
14258requires_gnutls_next_disable_tls13_compat
14259requires_config_enabled MBEDTLS_SSL_CLI_C
14260requires_config_enabled MBEDTLS_DEBUG_C
14261requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14262requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14263requires_config_enabled PSA_WANT_ALG_ECDH
14264run_test "TLS 1.3 m->G: HRR x448 -> secp256r1" \
14265         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
14266         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp256r1" \
14267         0 \
14268         -c "HTTP/1.0 200 OK" \
14269         -c "Protocol is TLSv1.3" \
14270         -c "NamedGroup: x448 ( 1e )" \
14271         -c "NamedGroup: secp256r1 ( 17 )" \
14272         -c "Verifying peer X.509 certificate... ok" \
14273         -c "received HelloRetryRequest message" \
14274         -c "selected_group ( 23 )"
14275
14276requires_gnutls_tls1_3
14277requires_gnutls_next_no_ticket
14278requires_gnutls_next_disable_tls13_compat
14279requires_config_enabled MBEDTLS_SSL_CLI_C
14280requires_config_enabled MBEDTLS_DEBUG_C
14281requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14282requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14283requires_config_enabled PSA_WANT_ALG_ECDH
14284run_test "TLS 1.3 m->G: HRR x448 -> secp384r1" \
14285         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
14286         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp384r1" \
14287         0 \
14288         -c "HTTP/1.0 200 OK" \
14289         -c "Protocol is TLSv1.3" \
14290         -c "NamedGroup: x448 ( 1e )" \
14291         -c "NamedGroup: secp384r1 ( 18 )" \
14292         -c "Verifying peer X.509 certificate... ok" \
14293         -c "received HelloRetryRequest message" \
14294         -c "selected_group ( 24 )"
14295
14296requires_gnutls_tls1_3
14297requires_gnutls_next_no_ticket
14298requires_gnutls_next_disable_tls13_compat
14299requires_config_enabled MBEDTLS_SSL_CLI_C
14300requires_config_enabled MBEDTLS_DEBUG_C
14301requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14302requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14303requires_config_enabled PSA_WANT_ALG_ECDH
14304run_test "TLS 1.3 m->G: HRR x448 -> secp521r1" \
14305         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
14306         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp521r1" \
14307         0 \
14308         -c "HTTP/1.0 200 OK" \
14309         -c "Protocol is TLSv1.3" \
14310         -c "NamedGroup: x448 ( 1e )" \
14311         -c "NamedGroup: secp521r1 ( 19 )" \
14312         -c "Verifying peer X.509 certificate... ok" \
14313         -c "received HelloRetryRequest message" \
14314         -c "selected_group ( 25 )"
14315
14316requires_gnutls_tls1_3
14317requires_gnutls_next_no_ticket
14318requires_gnutls_next_disable_tls13_compat
14319requires_config_enabled MBEDTLS_SSL_CLI_C
14320requires_config_enabled MBEDTLS_DEBUG_C
14321requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14322requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14323requires_config_enabled PSA_WANT_ALG_ECDH
14324run_test "TLS 1.3 m->G: HRR x448 -> x25519" \
14325         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
14326         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,x25519" \
14327         0 \
14328         -c "HTTP/1.0 200 OK" \
14329         -c "Protocol is TLSv1.3" \
14330         -c "NamedGroup: x448 ( 1e )" \
14331         -c "NamedGroup: x25519 ( 1d )" \
14332         -c "Verifying peer X.509 certificate... ok" \
14333         -c "received HelloRetryRequest message" \
14334         -c "selected_group ( 29 )"
14335
14336requires_gnutls_tls1_3
14337requires_gnutls_next_no_ticket
14338requires_gnutls_next_disable_tls13_compat
14339requires_config_enabled MBEDTLS_SSL_CLI_C
14340requires_config_enabled MBEDTLS_DEBUG_C
14341requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14342requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14343requires_config_enabled PSA_WANT_ALG_ECDH
14344requires_config_enabled PSA_WANT_ALG_FFDH
14345requires_config_enabled PSA_WANT_DH_RFC7919_2048
14346run_test "TLS 1.3 m->G: HRR x448 -> ffdhe2048" \
14347         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-FFDHE2048:+VERS-TLS1.3:%NO_TICKETS" \
14348         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,ffdhe2048" \
14349         0 \
14350         -c "HTTP/1.0 200 OK" \
14351         -c "Protocol is TLSv1.3" \
14352         -c "NamedGroup: x448 ( 1e )" \
14353         -c "NamedGroup: ffdhe2048 ( 100 )" \
14354         -c "Verifying peer X.509 certificate... ok" \
14355         -c "received HelloRetryRequest message" \
14356         -c "selected_group ( 256 )"
14357
14358requires_gnutls_tls1_3
14359requires_gnutls_next_no_ticket
14360requires_gnutls_next_disable_tls13_compat
14361requires_config_enabled MBEDTLS_SSL_CLI_C
14362requires_config_enabled MBEDTLS_DEBUG_C
14363requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14364requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14365requires_config_enabled PSA_WANT_ALG_ECDH
14366requires_config_enabled PSA_WANT_ALG_FFDH
14367requires_config_enabled PSA_WANT_DH_RFC7919_2048
14368run_test "TLS 1.3 m->G: HRR ffdhe2048 -> secp256r1" \
14369         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP256R1:+VERS-TLS1.3:%NO_TICKETS" \
14370         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp256r1" \
14371         0 \
14372         -c "HTTP/1.0 200 OK" \
14373         -c "Protocol is TLSv1.3" \
14374         -c "NamedGroup: ffdhe2048 ( 100 )" \
14375         -c "NamedGroup: secp256r1 ( 17 )" \
14376         -c "Verifying peer X.509 certificate... ok" \
14377         -c "received HelloRetryRequest message" \
14378         -c "selected_group ( 23 )"
14379
14380requires_gnutls_tls1_3
14381requires_gnutls_next_no_ticket
14382requires_gnutls_next_disable_tls13_compat
14383requires_config_enabled MBEDTLS_SSL_CLI_C
14384requires_config_enabled MBEDTLS_DEBUG_C
14385requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14386requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14387requires_config_enabled PSA_WANT_ALG_ECDH
14388requires_config_enabled PSA_WANT_ALG_FFDH
14389requires_config_enabled PSA_WANT_DH_RFC7919_2048
14390run_test "TLS 1.3 m->G: HRR ffdhe2048 -> secp384r1" \
14391         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP384R1:+VERS-TLS1.3:%NO_TICKETS" \
14392         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp384r1" \
14393         0 \
14394         -c "HTTP/1.0 200 OK" \
14395         -c "Protocol is TLSv1.3" \
14396         -c "NamedGroup: ffdhe2048 ( 100 )" \
14397         -c "NamedGroup: secp384r1 ( 18 )" \
14398         -c "Verifying peer X.509 certificate... ok" \
14399         -c "received HelloRetryRequest message" \
14400         -c "selected_group ( 24 )"
14401
14402requires_gnutls_tls1_3
14403requires_gnutls_next_no_ticket
14404requires_gnutls_next_disable_tls13_compat
14405requires_config_enabled MBEDTLS_SSL_CLI_C
14406requires_config_enabled MBEDTLS_DEBUG_C
14407requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14408requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14409requires_config_enabled PSA_WANT_ALG_ECDH
14410requires_config_enabled PSA_WANT_ALG_FFDH
14411requires_config_enabled PSA_WANT_DH_RFC7919_2048
14412run_test "TLS 1.3 m->G: HRR ffdhe2048 -> secp521r1" \
14413         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-SECP521R1:+VERS-TLS1.3:%NO_TICKETS" \
14414         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp521r1" \
14415         0 \
14416         -c "HTTP/1.0 200 OK" \
14417         -c "Protocol is TLSv1.3" \
14418         -c "NamedGroup: ffdhe2048 ( 100 )" \
14419         -c "NamedGroup: secp521r1 ( 19 )" \
14420         -c "Verifying peer X.509 certificate... ok" \
14421         -c "received HelloRetryRequest message" \
14422         -c "selected_group ( 25 )"
14423
14424requires_gnutls_tls1_3
14425requires_gnutls_next_no_ticket
14426requires_gnutls_next_disable_tls13_compat
14427requires_config_enabled MBEDTLS_SSL_CLI_C
14428requires_config_enabled MBEDTLS_DEBUG_C
14429requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14430requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14431requires_config_enabled PSA_WANT_ALG_ECDH
14432requires_config_enabled PSA_WANT_ALG_FFDH
14433requires_config_enabled PSA_WANT_DH_RFC7919_2048
14434run_test "TLS 1.3 m->G: HRR ffdhe2048 -> x25519" \
14435         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X25519:+VERS-TLS1.3:%NO_TICKETS" \
14436         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x25519" \
14437         0 \
14438         -c "HTTP/1.0 200 OK" \
14439         -c "Protocol is TLSv1.3" \
14440         -c "NamedGroup: ffdhe2048 ( 100 )" \
14441         -c "NamedGroup: x25519 ( 1d )" \
14442         -c "Verifying peer X.509 certificate... ok" \
14443         -c "received HelloRetryRequest message" \
14444         -c "selected_group ( 29 )"
14445
14446requires_gnutls_tls1_3
14447requires_gnutls_next_no_ticket
14448requires_gnutls_next_disable_tls13_compat
14449requires_config_enabled MBEDTLS_SSL_CLI_C
14450requires_config_enabled MBEDTLS_DEBUG_C
14451requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14452requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14453requires_config_enabled PSA_WANT_ALG_ECDH
14454requires_config_enabled PSA_WANT_ALG_FFDH
14455requires_config_enabled PSA_WANT_DH_RFC7919_2048
14456run_test "TLS 1.3 m->G: HRR ffdhe2048 -> x448" \
14457         "$G_NEXT_SRV_NO_CERT --http --disable-client-cert --debug=4 --x509certfile $DATA_FILES_PATH/ecdsa_secp256r1.crt --x509keyfile $DATA_FILES_PATH/ecdsa_secp256r1.key --priority=NONE:+CIPHER-ALL:+MAC-ALL:+SIGN-ALL:+GROUP-X448:+VERS-TLS1.3:%NO_TICKETS" \
14458         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x448" \
14459         0 \
14460         -c "HTTP/1.0 200 OK" \
14461         -c "Protocol is TLSv1.3" \
14462         -c "NamedGroup: ffdhe2048 ( 100 )" \
14463         -c "NamedGroup: x448 ( 1e )" \
14464         -c "Verifying peer X.509 certificate... ok" \
14465         -c "received HelloRetryRequest message" \
14466         -c "selected_group ( 30 )"
14467
14468requires_config_enabled MBEDTLS_SSL_SRV_C
14469requires_config_enabled MBEDTLS_DEBUG_C
14470requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14471requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14472requires_config_enabled PSA_WANT_ALG_ECDH
14473requires_config_enabled MBEDTLS_SSL_CLI_C
14474requires_config_enabled MBEDTLS_DEBUG_C
14475requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14476requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14477requires_config_enabled PSA_WANT_ALG_ECDH
14478run_test "TLS 1.3 m->m: HRR secp256r1 -> secp384r1" \
14479         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14480         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp384r1" \
14481         0 \
14482         -s "Protocol is TLSv1.3" \
14483         -s "got named group: secp384r1(0018)" \
14484         -s "Certificate verification was skipped" \
14485         -c "Protocol is TLSv1.3" \
14486         -c "NamedGroup: secp256r1 ( 17 )" \
14487         -c "NamedGroup: secp384r1 ( 18 )" \
14488         -c "Verifying peer X.509 certificate... ok" \
14489         -s "HRR selected_group: secp384r1" \
14490         -c "received HelloRetryRequest message" \
14491         -c "selected_group ( 24 )"
14492
14493requires_config_enabled MBEDTLS_SSL_SRV_C
14494requires_config_enabled MBEDTLS_DEBUG_C
14495requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14496requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14497requires_config_enabled PSA_WANT_ALG_ECDH
14498requires_config_enabled MBEDTLS_SSL_CLI_C
14499requires_config_enabled MBEDTLS_DEBUG_C
14500requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14501requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14502requires_config_enabled PSA_WANT_ALG_ECDH
14503run_test "TLS 1.3 m->m: HRR secp256r1 -> secp521r1" \
14504         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14505         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,secp521r1" \
14506         0 \
14507         -s "Protocol is TLSv1.3" \
14508         -s "got named group: secp521r1(0019)" \
14509         -s "Certificate verification was skipped" \
14510         -c "Protocol is TLSv1.3" \
14511         -c "NamedGroup: secp256r1 ( 17 )" \
14512         -c "NamedGroup: secp521r1 ( 19 )" \
14513         -c "Verifying peer X.509 certificate... ok" \
14514         -s "HRR selected_group: secp521r1" \
14515         -c "received HelloRetryRequest message" \
14516         -c "selected_group ( 25 )"
14517
14518requires_config_enabled MBEDTLS_SSL_SRV_C
14519requires_config_enabled MBEDTLS_DEBUG_C
14520requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14521requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14522requires_config_enabled PSA_WANT_ALG_ECDH
14523requires_config_enabled MBEDTLS_SSL_CLI_C
14524requires_config_enabled MBEDTLS_DEBUG_C
14525requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14526requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14527requires_config_enabled PSA_WANT_ALG_ECDH
14528run_test "TLS 1.3 m->m: HRR secp256r1 -> x25519" \
14529         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14530         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x25519" \
14531         0 \
14532         -s "Protocol is TLSv1.3" \
14533         -s "got named group: x25519(001d)" \
14534         -s "Certificate verification was skipped" \
14535         -c "Protocol is TLSv1.3" \
14536         -c "NamedGroup: secp256r1 ( 17 )" \
14537         -c "NamedGroup: x25519 ( 1d )" \
14538         -c "Verifying peer X.509 certificate... ok" \
14539         -s "HRR selected_group: x25519" \
14540         -c "received HelloRetryRequest message" \
14541         -c "selected_group ( 29 )"
14542
14543requires_config_enabled MBEDTLS_SSL_SRV_C
14544requires_config_enabled MBEDTLS_DEBUG_C
14545requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14546requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14547requires_config_enabled PSA_WANT_ALG_ECDH
14548requires_config_enabled MBEDTLS_SSL_CLI_C
14549requires_config_enabled MBEDTLS_DEBUG_C
14550requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14551requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14552requires_config_enabled PSA_WANT_ALG_ECDH
14553run_test "TLS 1.3 m->m: HRR secp256r1 -> x448" \
14554         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14555         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,x448" \
14556         0 \
14557         -s "Protocol is TLSv1.3" \
14558         -s "got named group: x448(001e)" \
14559         -s "Certificate verification was skipped" \
14560         -c "Protocol is TLSv1.3" \
14561         -c "NamedGroup: secp256r1 ( 17 )" \
14562         -c "NamedGroup: x448 ( 1e )" \
14563         -c "Verifying peer X.509 certificate... ok" \
14564         -s "HRR selected_group: x448" \
14565         -c "received HelloRetryRequest message" \
14566         -c "selected_group ( 30 )"
14567
14568requires_config_enabled MBEDTLS_SSL_SRV_C
14569requires_config_enabled MBEDTLS_DEBUG_C
14570requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14571requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14572requires_config_enabled PSA_WANT_ALG_FFDH
14573requires_config_enabled PSA_WANT_DH_RFC7919_2048
14574requires_config_enabled MBEDTLS_SSL_CLI_C
14575requires_config_enabled MBEDTLS_DEBUG_C
14576requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14577requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14578requires_config_enabled PSA_WANT_ALG_ECDH
14579requires_config_enabled PSA_WANT_ALG_FFDH
14580requires_config_enabled PSA_WANT_DH_RFC7919_2048
14581run_test "TLS 1.3 m->m: HRR secp256r1 -> ffdhe2048" \
14582         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14583         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1,ffdhe2048" \
14584         0 \
14585         -s "Protocol is TLSv1.3" \
14586         -s "got named group: ffdhe2048(0100)" \
14587         -s "Certificate verification was skipped" \
14588         -c "Protocol is TLSv1.3" \
14589         -c "NamedGroup: secp256r1 ( 17 )" \
14590         -c "NamedGroup: ffdhe2048 ( 100 )" \
14591         -c "Verifying peer X.509 certificate... ok" \
14592         -s "HRR selected_group: ffdhe2048" \
14593         -c "received HelloRetryRequest message" \
14594         -c "selected_group ( 256 )"
14595
14596requires_config_enabled MBEDTLS_SSL_SRV_C
14597requires_config_enabled MBEDTLS_DEBUG_C
14598requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14599requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14600requires_config_enabled PSA_WANT_ALG_ECDH
14601requires_config_enabled MBEDTLS_SSL_CLI_C
14602requires_config_enabled MBEDTLS_DEBUG_C
14603requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14604requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14605requires_config_enabled PSA_WANT_ALG_ECDH
14606run_test "TLS 1.3 m->m: HRR secp384r1 -> secp256r1" \
14607         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14608         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp256r1" \
14609         0 \
14610         -s "Protocol is TLSv1.3" \
14611         -s "got named group: secp256r1(0017)" \
14612         -s "Certificate verification was skipped" \
14613         -c "Protocol is TLSv1.3" \
14614         -c "NamedGroup: secp384r1 ( 18 )" \
14615         -c "NamedGroup: secp256r1 ( 17 )" \
14616         -c "Verifying peer X.509 certificate... ok" \
14617         -s "HRR selected_group: secp256r1" \
14618         -c "received HelloRetryRequest message" \
14619         -c "selected_group ( 23 )"
14620
14621requires_config_enabled MBEDTLS_SSL_SRV_C
14622requires_config_enabled MBEDTLS_DEBUG_C
14623requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14624requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14625requires_config_enabled PSA_WANT_ALG_ECDH
14626requires_config_enabled MBEDTLS_SSL_CLI_C
14627requires_config_enabled MBEDTLS_DEBUG_C
14628requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14629requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14630requires_config_enabled PSA_WANT_ALG_ECDH
14631run_test "TLS 1.3 m->m: HRR secp384r1 -> secp521r1" \
14632         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14633         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,secp521r1" \
14634         0 \
14635         -s "Protocol is TLSv1.3" \
14636         -s "got named group: secp521r1(0019)" \
14637         -s "Certificate verification was skipped" \
14638         -c "Protocol is TLSv1.3" \
14639         -c "NamedGroup: secp384r1 ( 18 )" \
14640         -c "NamedGroup: secp521r1 ( 19 )" \
14641         -c "Verifying peer X.509 certificate... ok" \
14642         -s "HRR selected_group: secp521r1" \
14643         -c "received HelloRetryRequest message" \
14644         -c "selected_group ( 25 )"
14645
14646requires_config_enabled MBEDTLS_SSL_SRV_C
14647requires_config_enabled MBEDTLS_DEBUG_C
14648requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14649requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14650requires_config_enabled PSA_WANT_ALG_ECDH
14651requires_config_enabled MBEDTLS_SSL_CLI_C
14652requires_config_enabled MBEDTLS_DEBUG_C
14653requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14654requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14655requires_config_enabled PSA_WANT_ALG_ECDH
14656run_test "TLS 1.3 m->m: HRR secp384r1 -> x25519" \
14657         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14658         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x25519" \
14659         0 \
14660         -s "Protocol is TLSv1.3" \
14661         -s "got named group: x25519(001d)" \
14662         -s "Certificate verification was skipped" \
14663         -c "Protocol is TLSv1.3" \
14664         -c "NamedGroup: secp384r1 ( 18 )" \
14665         -c "NamedGroup: x25519 ( 1d )" \
14666         -c "Verifying peer X.509 certificate... ok" \
14667         -s "HRR selected_group: x25519" \
14668         -c "received HelloRetryRequest message" \
14669         -c "selected_group ( 29 )"
14670
14671requires_config_enabled MBEDTLS_SSL_SRV_C
14672requires_config_enabled MBEDTLS_DEBUG_C
14673requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14674requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14675requires_config_enabled PSA_WANT_ALG_ECDH
14676requires_config_enabled MBEDTLS_SSL_CLI_C
14677requires_config_enabled MBEDTLS_DEBUG_C
14678requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14679requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14680requires_config_enabled PSA_WANT_ALG_ECDH
14681run_test "TLS 1.3 m->m: HRR secp384r1 -> x448" \
14682         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14683         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,x448" \
14684         0 \
14685         -s "Protocol is TLSv1.3" \
14686         -s "got named group: x448(001e)" \
14687         -s "Certificate verification was skipped" \
14688         -c "Protocol is TLSv1.3" \
14689         -c "NamedGroup: secp384r1 ( 18 )" \
14690         -c "NamedGroup: x448 ( 1e )" \
14691         -c "Verifying peer X.509 certificate... ok" \
14692         -s "HRR selected_group: x448" \
14693         -c "received HelloRetryRequest message" \
14694         -c "selected_group ( 30 )"
14695
14696requires_config_enabled MBEDTLS_SSL_SRV_C
14697requires_config_enabled MBEDTLS_DEBUG_C
14698requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14699requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14700requires_config_enabled PSA_WANT_ALG_FFDH
14701requires_config_enabled PSA_WANT_DH_RFC7919_2048
14702requires_config_enabled MBEDTLS_SSL_CLI_C
14703requires_config_enabled MBEDTLS_DEBUG_C
14704requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14705requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14706requires_config_enabled PSA_WANT_ALG_ECDH
14707requires_config_enabled PSA_WANT_ALG_FFDH
14708requires_config_enabled PSA_WANT_DH_RFC7919_2048
14709run_test "TLS 1.3 m->m: HRR secp384r1 -> ffdhe2048" \
14710         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14711         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1,ffdhe2048" \
14712         0 \
14713         -s "Protocol is TLSv1.3" \
14714         -s "got named group: ffdhe2048(0100)" \
14715         -s "Certificate verification was skipped" \
14716         -c "Protocol is TLSv1.3" \
14717         -c "NamedGroup: secp384r1 ( 18 )" \
14718         -c "NamedGroup: ffdhe2048 ( 100 )" \
14719         -c "Verifying peer X.509 certificate... ok" \
14720         -s "HRR selected_group: ffdhe2048" \
14721         -c "received HelloRetryRequest message" \
14722         -c "selected_group ( 256 )"
14723
14724requires_config_enabled MBEDTLS_SSL_SRV_C
14725requires_config_enabled MBEDTLS_DEBUG_C
14726requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14727requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14728requires_config_enabled PSA_WANT_ALG_ECDH
14729requires_config_enabled MBEDTLS_SSL_CLI_C
14730requires_config_enabled MBEDTLS_DEBUG_C
14731requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14732requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14733requires_config_enabled PSA_WANT_ALG_ECDH
14734run_test "TLS 1.3 m->m: HRR secp521r1 -> secp256r1" \
14735         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14736         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp256r1" \
14737         0 \
14738         -s "Protocol is TLSv1.3" \
14739         -s "got named group: secp256r1(0017)" \
14740         -s "Certificate verification was skipped" \
14741         -c "Protocol is TLSv1.3" \
14742         -c "NamedGroup: secp521r1 ( 19 )" \
14743         -c "NamedGroup: secp256r1 ( 17 )" \
14744         -c "Verifying peer X.509 certificate... ok" \
14745         -s "HRR selected_group: secp256r1" \
14746         -c "received HelloRetryRequest message" \
14747         -c "selected_group ( 23 )"
14748
14749requires_config_enabled MBEDTLS_SSL_SRV_C
14750requires_config_enabled MBEDTLS_DEBUG_C
14751requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14752requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14753requires_config_enabled PSA_WANT_ALG_ECDH
14754requires_config_enabled MBEDTLS_SSL_CLI_C
14755requires_config_enabled MBEDTLS_DEBUG_C
14756requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14757requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14758requires_config_enabled PSA_WANT_ALG_ECDH
14759run_test "TLS 1.3 m->m: HRR secp521r1 -> secp384r1" \
14760         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14761         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,secp384r1" \
14762         0 \
14763         -s "Protocol is TLSv1.3" \
14764         -s "got named group: secp384r1(0018)" \
14765         -s "Certificate verification was skipped" \
14766         -c "Protocol is TLSv1.3" \
14767         -c "NamedGroup: secp521r1 ( 19 )" \
14768         -c "NamedGroup: secp384r1 ( 18 )" \
14769         -c "Verifying peer X.509 certificate... ok" \
14770         -s "HRR selected_group: secp384r1" \
14771         -c "received HelloRetryRequest message" \
14772         -c "selected_group ( 24 )"
14773
14774requires_config_enabled MBEDTLS_SSL_SRV_C
14775requires_config_enabled MBEDTLS_DEBUG_C
14776requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14777requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14778requires_config_enabled PSA_WANT_ALG_ECDH
14779requires_config_enabled MBEDTLS_SSL_CLI_C
14780requires_config_enabled MBEDTLS_DEBUG_C
14781requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14782requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14783requires_config_enabled PSA_WANT_ALG_ECDH
14784run_test "TLS 1.3 m->m: HRR secp521r1 -> x25519" \
14785         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14786         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x25519" \
14787         0 \
14788         -s "Protocol is TLSv1.3" \
14789         -s "got named group: x25519(001d)" \
14790         -s "Certificate verification was skipped" \
14791         -c "Protocol is TLSv1.3" \
14792         -c "NamedGroup: secp521r1 ( 19 )" \
14793         -c "NamedGroup: x25519 ( 1d )" \
14794         -c "Verifying peer X.509 certificate... ok" \
14795         -s "HRR selected_group: x25519" \
14796         -c "received HelloRetryRequest message" \
14797         -c "selected_group ( 29 )"
14798
14799requires_config_enabled MBEDTLS_SSL_SRV_C
14800requires_config_enabled MBEDTLS_DEBUG_C
14801requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14802requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14803requires_config_enabled PSA_WANT_ALG_ECDH
14804requires_config_enabled MBEDTLS_SSL_CLI_C
14805requires_config_enabled MBEDTLS_DEBUG_C
14806requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14807requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14808requires_config_enabled PSA_WANT_ALG_ECDH
14809run_test "TLS 1.3 m->m: HRR secp521r1 -> x448" \
14810         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14811         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,x448" \
14812         0 \
14813         -s "Protocol is TLSv1.3" \
14814         -s "got named group: x448(001e)" \
14815         -s "Certificate verification was skipped" \
14816         -c "Protocol is TLSv1.3" \
14817         -c "NamedGroup: secp521r1 ( 19 )" \
14818         -c "NamedGroup: x448 ( 1e )" \
14819         -c "Verifying peer X.509 certificate... ok" \
14820         -s "HRR selected_group: x448" \
14821         -c "received HelloRetryRequest message" \
14822         -c "selected_group ( 30 )"
14823
14824requires_config_enabled MBEDTLS_SSL_SRV_C
14825requires_config_enabled MBEDTLS_DEBUG_C
14826requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14827requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14828requires_config_enabled PSA_WANT_ALG_FFDH
14829requires_config_enabled PSA_WANT_DH_RFC7919_2048
14830requires_config_enabled MBEDTLS_SSL_CLI_C
14831requires_config_enabled MBEDTLS_DEBUG_C
14832requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14833requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14834requires_config_enabled PSA_WANT_ALG_ECDH
14835requires_config_enabled PSA_WANT_ALG_FFDH
14836requires_config_enabled PSA_WANT_DH_RFC7919_2048
14837run_test "TLS 1.3 m->m: HRR secp521r1 -> ffdhe2048" \
14838         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14839         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1,ffdhe2048" \
14840         0 \
14841         -s "Protocol is TLSv1.3" \
14842         -s "got named group: ffdhe2048(0100)" \
14843         -s "Certificate verification was skipped" \
14844         -c "Protocol is TLSv1.3" \
14845         -c "NamedGroup: secp521r1 ( 19 )" \
14846         -c "NamedGroup: ffdhe2048 ( 100 )" \
14847         -c "Verifying peer X.509 certificate... ok" \
14848         -s "HRR selected_group: ffdhe2048" \
14849         -c "received HelloRetryRequest message" \
14850         -c "selected_group ( 256 )"
14851
14852requires_config_enabled MBEDTLS_SSL_SRV_C
14853requires_config_enabled MBEDTLS_DEBUG_C
14854requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14855requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14856requires_config_enabled PSA_WANT_ALG_ECDH
14857requires_config_enabled MBEDTLS_SSL_CLI_C
14858requires_config_enabled MBEDTLS_DEBUG_C
14859requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14860requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14861requires_config_enabled PSA_WANT_ALG_ECDH
14862run_test "TLS 1.3 m->m: HRR x25519 -> secp256r1" \
14863         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14864         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp256r1" \
14865         0 \
14866         -s "Protocol is TLSv1.3" \
14867         -s "got named group: secp256r1(0017)" \
14868         -s "Certificate verification was skipped" \
14869         -c "Protocol is TLSv1.3" \
14870         -c "NamedGroup: x25519 ( 1d )" \
14871         -c "NamedGroup: secp256r1 ( 17 )" \
14872         -c "Verifying peer X.509 certificate... ok" \
14873         -s "HRR selected_group: secp256r1" \
14874         -c "received HelloRetryRequest message" \
14875         -c "selected_group ( 23 )"
14876
14877requires_config_enabled MBEDTLS_SSL_SRV_C
14878requires_config_enabled MBEDTLS_DEBUG_C
14879requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14880requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14881requires_config_enabled PSA_WANT_ALG_ECDH
14882requires_config_enabled MBEDTLS_SSL_CLI_C
14883requires_config_enabled MBEDTLS_DEBUG_C
14884requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14885requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14886requires_config_enabled PSA_WANT_ALG_ECDH
14887run_test "TLS 1.3 m->m: HRR x25519 -> secp384r1" \
14888         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14889         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp384r1" \
14890         0 \
14891         -s "Protocol is TLSv1.3" \
14892         -s "got named group: secp384r1(0018)" \
14893         -s "Certificate verification was skipped" \
14894         -c "Protocol is TLSv1.3" \
14895         -c "NamedGroup: x25519 ( 1d )" \
14896         -c "NamedGroup: secp384r1 ( 18 )" \
14897         -c "Verifying peer X.509 certificate... ok" \
14898         -s "HRR selected_group: secp384r1" \
14899         -c "received HelloRetryRequest message" \
14900         -c "selected_group ( 24 )"
14901
14902requires_config_enabled MBEDTLS_SSL_SRV_C
14903requires_config_enabled MBEDTLS_DEBUG_C
14904requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14905requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14906requires_config_enabled PSA_WANT_ALG_ECDH
14907requires_config_enabled MBEDTLS_SSL_CLI_C
14908requires_config_enabled MBEDTLS_DEBUG_C
14909requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14910requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14911requires_config_enabled PSA_WANT_ALG_ECDH
14912run_test "TLS 1.3 m->m: HRR x25519 -> secp521r1" \
14913         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14914         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,secp521r1" \
14915         0 \
14916         -s "Protocol is TLSv1.3" \
14917         -s "got named group: secp521r1(0019)" \
14918         -s "Certificate verification was skipped" \
14919         -c "Protocol is TLSv1.3" \
14920         -c "NamedGroup: x25519 ( 1d )" \
14921         -c "NamedGroup: secp521r1 ( 19 )" \
14922         -c "Verifying peer X.509 certificate... ok" \
14923         -s "HRR selected_group: secp521r1" \
14924         -c "received HelloRetryRequest message" \
14925         -c "selected_group ( 25 )"
14926
14927requires_config_enabled MBEDTLS_SSL_SRV_C
14928requires_config_enabled MBEDTLS_DEBUG_C
14929requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14930requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14931requires_config_enabled PSA_WANT_ALG_ECDH
14932requires_config_enabled MBEDTLS_SSL_CLI_C
14933requires_config_enabled MBEDTLS_DEBUG_C
14934requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14935requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14936requires_config_enabled PSA_WANT_ALG_ECDH
14937run_test "TLS 1.3 m->m: HRR x25519 -> x448" \
14938         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14939         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,x448" \
14940         0 \
14941         -s "Protocol is TLSv1.3" \
14942         -s "got named group: x448(001e)" \
14943         -s "Certificate verification was skipped" \
14944         -c "Protocol is TLSv1.3" \
14945         -c "NamedGroup: x25519 ( 1d )" \
14946         -c "NamedGroup: x448 ( 1e )" \
14947         -c "Verifying peer X.509 certificate... ok" \
14948         -s "HRR selected_group: x448" \
14949         -c "received HelloRetryRequest message" \
14950         -c "selected_group ( 30 )"
14951
14952requires_config_enabled MBEDTLS_SSL_SRV_C
14953requires_config_enabled MBEDTLS_DEBUG_C
14954requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14955requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14956requires_config_enabled PSA_WANT_ALG_FFDH
14957requires_config_enabled PSA_WANT_DH_RFC7919_2048
14958requires_config_enabled MBEDTLS_SSL_CLI_C
14959requires_config_enabled MBEDTLS_DEBUG_C
14960requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14961requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14962requires_config_enabled PSA_WANT_ALG_ECDH
14963requires_config_enabled PSA_WANT_ALG_FFDH
14964requires_config_enabled PSA_WANT_DH_RFC7919_2048
14965run_test "TLS 1.3 m->m: HRR x25519 -> ffdhe2048" \
14966         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14967         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519,ffdhe2048" \
14968         0 \
14969         -s "Protocol is TLSv1.3" \
14970         -s "got named group: ffdhe2048(0100)" \
14971         -s "Certificate verification was skipped" \
14972         -c "Protocol is TLSv1.3" \
14973         -c "NamedGroup: x25519 ( 1d )" \
14974         -c "NamedGroup: ffdhe2048 ( 100 )" \
14975         -c "Verifying peer X.509 certificate... ok" \
14976         -s "HRR selected_group: ffdhe2048" \
14977         -c "received HelloRetryRequest message" \
14978         -c "selected_group ( 256 )"
14979
14980requires_config_enabled MBEDTLS_SSL_SRV_C
14981requires_config_enabled MBEDTLS_DEBUG_C
14982requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14983requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14984requires_config_enabled PSA_WANT_ALG_ECDH
14985requires_config_enabled MBEDTLS_SSL_CLI_C
14986requires_config_enabled MBEDTLS_DEBUG_C
14987requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
14988requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
14989requires_config_enabled PSA_WANT_ALG_ECDH
14990run_test "TLS 1.3 m->m: HRR x448 -> secp256r1" \
14991         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
14992         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp256r1" \
14993         0 \
14994         -s "Protocol is TLSv1.3" \
14995         -s "got named group: secp256r1(0017)" \
14996         -s "Certificate verification was skipped" \
14997         -c "Protocol is TLSv1.3" \
14998         -c "NamedGroup: x448 ( 1e )" \
14999         -c "NamedGroup: secp256r1 ( 17 )" \
15000         -c "Verifying peer X.509 certificate... ok" \
15001         -s "HRR selected_group: secp256r1" \
15002         -c "received HelloRetryRequest message" \
15003         -c "selected_group ( 23 )"
15004
15005requires_config_enabled MBEDTLS_SSL_SRV_C
15006requires_config_enabled MBEDTLS_DEBUG_C
15007requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15008requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15009requires_config_enabled PSA_WANT_ALG_ECDH
15010requires_config_enabled MBEDTLS_SSL_CLI_C
15011requires_config_enabled MBEDTLS_DEBUG_C
15012requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15013requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15014requires_config_enabled PSA_WANT_ALG_ECDH
15015run_test "TLS 1.3 m->m: HRR x448 -> secp384r1" \
15016         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15017         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp384r1" \
15018         0 \
15019         -s "Protocol is TLSv1.3" \
15020         -s "got named group: secp384r1(0018)" \
15021         -s "Certificate verification was skipped" \
15022         -c "Protocol is TLSv1.3" \
15023         -c "NamedGroup: x448 ( 1e )" \
15024         -c "NamedGroup: secp384r1 ( 18 )" \
15025         -c "Verifying peer X.509 certificate... ok" \
15026         -s "HRR selected_group: secp384r1" \
15027         -c "received HelloRetryRequest message" \
15028         -c "selected_group ( 24 )"
15029
15030requires_config_enabled MBEDTLS_SSL_SRV_C
15031requires_config_enabled MBEDTLS_DEBUG_C
15032requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15033requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15034requires_config_enabled PSA_WANT_ALG_ECDH
15035requires_config_enabled MBEDTLS_SSL_CLI_C
15036requires_config_enabled MBEDTLS_DEBUG_C
15037requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15038requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15039requires_config_enabled PSA_WANT_ALG_ECDH
15040run_test "TLS 1.3 m->m: HRR x448 -> secp521r1" \
15041         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15042         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,secp521r1" \
15043         0 \
15044         -s "Protocol is TLSv1.3" \
15045         -s "got named group: secp521r1(0019)" \
15046         -s "Certificate verification was skipped" \
15047         -c "Protocol is TLSv1.3" \
15048         -c "NamedGroup: x448 ( 1e )" \
15049         -c "NamedGroup: secp521r1 ( 19 )" \
15050         -c "Verifying peer X.509 certificate... ok" \
15051         -s "HRR selected_group: secp521r1" \
15052         -c "received HelloRetryRequest message" \
15053         -c "selected_group ( 25 )"
15054
15055requires_config_enabled MBEDTLS_SSL_SRV_C
15056requires_config_enabled MBEDTLS_DEBUG_C
15057requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15058requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15059requires_config_enabled PSA_WANT_ALG_ECDH
15060requires_config_enabled MBEDTLS_SSL_CLI_C
15061requires_config_enabled MBEDTLS_DEBUG_C
15062requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15063requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15064requires_config_enabled PSA_WANT_ALG_ECDH
15065run_test "TLS 1.3 m->m: HRR x448 -> x25519" \
15066         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15067         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,x25519" \
15068         0 \
15069         -s "Protocol is TLSv1.3" \
15070         -s "got named group: x25519(001d)" \
15071         -s "Certificate verification was skipped" \
15072         -c "Protocol is TLSv1.3" \
15073         -c "NamedGroup: x448 ( 1e )" \
15074         -c "NamedGroup: x25519 ( 1d )" \
15075         -c "Verifying peer X.509 certificate... ok" \
15076         -s "HRR selected_group: x25519" \
15077         -c "received HelloRetryRequest message" \
15078         -c "selected_group ( 29 )"
15079
15080requires_config_enabled MBEDTLS_SSL_SRV_C
15081requires_config_enabled MBEDTLS_DEBUG_C
15082requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15083requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15084requires_config_enabled PSA_WANT_ALG_FFDH
15085requires_config_enabled PSA_WANT_DH_RFC7919_2048
15086requires_config_enabled MBEDTLS_SSL_CLI_C
15087requires_config_enabled MBEDTLS_DEBUG_C
15088requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15089requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15090requires_config_enabled PSA_WANT_ALG_ECDH
15091requires_config_enabled PSA_WANT_ALG_FFDH
15092requires_config_enabled PSA_WANT_DH_RFC7919_2048
15093run_test "TLS 1.3 m->m: HRR x448 -> ffdhe2048" \
15094         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15095         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448,ffdhe2048" \
15096         0 \
15097         -s "Protocol is TLSv1.3" \
15098         -s "got named group: ffdhe2048(0100)" \
15099         -s "Certificate verification was skipped" \
15100         -c "Protocol is TLSv1.3" \
15101         -c "NamedGroup: x448 ( 1e )" \
15102         -c "NamedGroup: ffdhe2048 ( 100 )" \
15103         -c "Verifying peer X.509 certificate... ok" \
15104         -s "HRR selected_group: ffdhe2048" \
15105         -c "received HelloRetryRequest message" \
15106         -c "selected_group ( 256 )"
15107
15108requires_config_enabled MBEDTLS_SSL_SRV_C
15109requires_config_enabled MBEDTLS_DEBUG_C
15110requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15111requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15112requires_config_enabled PSA_WANT_ALG_ECDH
15113requires_config_enabled MBEDTLS_SSL_CLI_C
15114requires_config_enabled MBEDTLS_DEBUG_C
15115requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15116requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15117requires_config_enabled PSA_WANT_ALG_ECDH
15118requires_config_enabled PSA_WANT_ALG_FFDH
15119requires_config_enabled PSA_WANT_DH_RFC7919_2048
15120run_test "TLS 1.3 m->m: HRR ffdhe2048 -> secp256r1" \
15121         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp256r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15122         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp256r1" \
15123         0 \
15124         -s "Protocol is TLSv1.3" \
15125         -s "got named group: secp256r1(0017)" \
15126         -s "Certificate verification was skipped" \
15127         -c "Protocol is TLSv1.3" \
15128         -c "NamedGroup: ffdhe2048 ( 100 )" \
15129         -c "NamedGroup: secp256r1 ( 17 )" \
15130         -c "Verifying peer X.509 certificate... ok" \
15131         -s "HRR selected_group: secp256r1" \
15132         -c "received HelloRetryRequest message" \
15133         -c "selected_group ( 23 )"
15134
15135requires_config_enabled MBEDTLS_SSL_SRV_C
15136requires_config_enabled MBEDTLS_DEBUG_C
15137requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15138requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15139requires_config_enabled PSA_WANT_ALG_ECDH
15140requires_config_enabled MBEDTLS_SSL_CLI_C
15141requires_config_enabled MBEDTLS_DEBUG_C
15142requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15143requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15144requires_config_enabled PSA_WANT_ALG_ECDH
15145requires_config_enabled PSA_WANT_ALG_FFDH
15146requires_config_enabled PSA_WANT_DH_RFC7919_2048
15147run_test "TLS 1.3 m->m: HRR ffdhe2048 -> secp384r1" \
15148         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp384r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15149         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp384r1" \
15150         0 \
15151         -s "Protocol is TLSv1.3" \
15152         -s "got named group: secp384r1(0018)" \
15153         -s "Certificate verification was skipped" \
15154         -c "Protocol is TLSv1.3" \
15155         -c "NamedGroup: ffdhe2048 ( 100 )" \
15156         -c "NamedGroup: secp384r1 ( 18 )" \
15157         -c "Verifying peer X.509 certificate... ok" \
15158         -s "HRR selected_group: secp384r1" \
15159         -c "received HelloRetryRequest message" \
15160         -c "selected_group ( 24 )"
15161
15162requires_config_enabled MBEDTLS_SSL_SRV_C
15163requires_config_enabled MBEDTLS_DEBUG_C
15164requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15165requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15166requires_config_enabled PSA_WANT_ALG_ECDH
15167requires_config_enabled MBEDTLS_SSL_CLI_C
15168requires_config_enabled MBEDTLS_DEBUG_C
15169requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15170requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15171requires_config_enabled PSA_WANT_ALG_ECDH
15172requires_config_enabled PSA_WANT_ALG_FFDH
15173requires_config_enabled PSA_WANT_DH_RFC7919_2048
15174run_test "TLS 1.3 m->m: HRR ffdhe2048 -> secp521r1" \
15175         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=secp521r1 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15176         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,secp521r1" \
15177         0 \
15178         -s "Protocol is TLSv1.3" \
15179         -s "got named group: secp521r1(0019)" \
15180         -s "Certificate verification was skipped" \
15181         -c "Protocol is TLSv1.3" \
15182         -c "NamedGroup: ffdhe2048 ( 100 )" \
15183         -c "NamedGroup: secp521r1 ( 19 )" \
15184         -c "Verifying peer X.509 certificate... ok" \
15185         -s "HRR selected_group: secp521r1" \
15186         -c "received HelloRetryRequest message" \
15187         -c "selected_group ( 25 )"
15188
15189requires_config_enabled MBEDTLS_SSL_SRV_C
15190requires_config_enabled MBEDTLS_DEBUG_C
15191requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15192requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15193requires_config_enabled PSA_WANT_ALG_ECDH
15194requires_config_enabled MBEDTLS_SSL_CLI_C
15195requires_config_enabled MBEDTLS_DEBUG_C
15196requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15197requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15198requires_config_enabled PSA_WANT_ALG_ECDH
15199requires_config_enabled PSA_WANT_ALG_FFDH
15200requires_config_enabled PSA_WANT_DH_RFC7919_2048
15201run_test "TLS 1.3 m->m: HRR ffdhe2048 -> x25519" \
15202         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x25519 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15203         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x25519" \
15204         0 \
15205         -s "Protocol is TLSv1.3" \
15206         -s "got named group: x25519(001d)" \
15207         -s "Certificate verification was skipped" \
15208         -c "Protocol is TLSv1.3" \
15209         -c "NamedGroup: ffdhe2048 ( 100 )" \
15210         -c "NamedGroup: x25519 ( 1d )" \
15211         -c "Verifying peer X.509 certificate... ok" \
15212         -s "HRR selected_group: x25519" \
15213         -c "received HelloRetryRequest message" \
15214         -c "selected_group ( 29 )"
15215
15216requires_config_enabled MBEDTLS_SSL_SRV_C
15217requires_config_enabled MBEDTLS_DEBUG_C
15218requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15219requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15220requires_config_enabled PSA_WANT_ALG_ECDH
15221requires_config_enabled MBEDTLS_SSL_CLI_C
15222requires_config_enabled MBEDTLS_DEBUG_C
15223requires_config_enabled MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED
15224requires_config_enabled MBEDTLS_SSL_TLS1_3_COMPATIBILITY_MODE
15225requires_config_enabled PSA_WANT_ALG_ECDH
15226requires_config_enabled PSA_WANT_ALG_FFDH
15227requires_config_enabled PSA_WANT_DH_RFC7919_2048
15228run_test "TLS 1.3 m->m: HRR ffdhe2048 -> x448" \
15229         "$P_SRV crt_file=$DATA_FILES_PATH/ecdsa_secp256r1.crt key_file=$DATA_FILES_PATH/ecdsa_secp256r1.key debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=x448 tls13_kex_modes=ephemeral cookies=0 tickets=0" \
15230         "$P_CLI ca_file=$DATA_FILES_PATH/test-ca2.crt debug_level=4 sig_algs=ecdsa_secp256r1_sha256 groups=ffdhe2048,x448" \
15231         0 \
15232         -s "Protocol is TLSv1.3" \
15233         -s "got named group: x448(001e)" \
15234         -s "Certificate verification was skipped" \
15235         -c "Protocol is TLSv1.3" \
15236         -c "NamedGroup: ffdhe2048 ( 100 )" \
15237         -c "NamedGroup: x448 ( 1e )" \
15238         -c "Verifying peer X.509 certificate... ok" \
15239         -s "HRR selected_group: x448" \
15240         -c "received HelloRetryRequest message" \
15241         -c "selected_group ( 30 )"
15242