From 73b72d189026b7d060bda0d3c7df04a9287c24d4 Mon Sep 17 00:00:00 2001 From: Hanno Becker Date: Fri, 26 Jul 2019 12:00:38 +0100 Subject: [PATCH 1/5] ssl-opt.sh: Auto-skip tests using TLS if TLS is disabled --- tests/ssl-opt.sh | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh index 9ebd009a9..a013792cd 100755 --- a/tests/ssl-opt.sh +++ b/tests/ssl-opt.sh @@ -539,6 +539,13 @@ check_cmdline_param_compat() { fi } +check_cmdline_check_tls() { + detect_dtls "$CMD" + if [ "$DTLS" = "0" ]; then + requires_config_disabled MBEDTLS_SSL_PROTO_NO_TLS + fi +} + check_cmdline_authmode_compat() { __VAL="$( get_config_value_or_default "MBEDTLS_SSL_CONF_AUTHMODE" )" if [ ! -z "$__VAL" ]; then @@ -669,6 +676,9 @@ check_cmdline_compat() { check_cmdline_param_compat "badmac_limit" \ "MBEDTLS_SSL_CONF_BADMAC_LIMIT" + # Skip tests that use TLS in configs disabling TLS + check_cmdline_check_tls + # Authentication mode check_cmdline_authmode_compat From baac25d2bf2c17d024a9896aaba0d6af37c8b7a9 Mon Sep 17 00:00:00 2001 From: Hanno Becker Date: Fri, 26 Jul 2019 12:22:50 +0100 Subject: [PATCH 2/5] Add DTLS-only build + test to all.sh --- tests/scripts/all.sh | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/tests/scripts/all.sh b/tests/scripts/all.sh index ef5dfccd9..9d235574e 100755 --- a/tests/scripts/all.sh +++ b/tests/scripts/all.sh @@ -639,6 +639,19 @@ component_test_sslv3 () { if_build_succeeded tests/ssl-opt.sh } +component_test_dtls_only () { + msg "build: Default + DTLS only (ASan build)" # ~ 6 min + scripts/config.pl set MBEDTLS_SSL_PROTO_NO_TLS + CC=gcc cmake -D CMAKE_BUILD_TYPE:String=Asan . + make + + msg "test: DTLS only - main suites (inc. selftests) (ASan build)" # ~ 50s + make test + + msg "build: DTLS only - ssl-opt.sh (ASan build)" # ~ 6 min + if_build_succeeded tests/ssl-opt.sh +} + component_test_no_renegotiation () { msg "build: Default + !MBEDTLS_SSL_RENEGOTIATION (ASan build)" # ~ 6 min scripts/config.pl unset MBEDTLS_SSL_RENEGOTIATION From fcda6ddae1a50628dd3fefb72b418bb874f2aa18 Mon Sep 17 00:00:00 2001 From: Hanno Becker Date: Thu, 5 Sep 2019 14:49:53 +0100 Subject: [PATCH 3/5] Fixup: Correct typo in DTLS only component of all.sh --- tests/scripts/all.sh | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tests/scripts/all.sh b/tests/scripts/all.sh index 9d235574e..5e93021bd 100755 --- a/tests/scripts/all.sh +++ b/tests/scripts/all.sh @@ -648,7 +648,7 @@ component_test_dtls_only () { msg "test: DTLS only - main suites (inc. selftests) (ASan build)" # ~ 50s make test - msg "build: DTLS only - ssl-opt.sh (ASan build)" # ~ 6 min + msg "test: DTLS only - ssl-opt.sh (ASan build)" # ~ 6 min if_build_succeeded tests/ssl-opt.sh } From a43f85c9b299caedab7d09a5a82e80c854e16b77 Mon Sep 17 00:00:00 2001 From: Hanno Becker Date: Thu, 5 Sep 2019 14:51:20 +0100 Subject: [PATCH 4/5] ssl-opt.sh: Auto-skip tests depending on DTLS --- tests/ssl-opt.sh | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh index a013792cd..62463748d 100755 --- a/tests/ssl-opt.sh +++ b/tests/ssl-opt.sh @@ -539,10 +539,12 @@ check_cmdline_param_compat() { fi } -check_cmdline_check_tls() { +check_cmdline_check_tls_dtls() { detect_dtls "$CMD" if [ "$DTLS" = "0" ]; then requires_config_disabled MBEDTLS_SSL_PROTO_NO_TLS + elif [ "$DTLS" = "1" ]; then + requires_config_enabled MBEDTLS_SSL_PROTO_DTLS fi } @@ -676,8 +678,8 @@ check_cmdline_compat() { check_cmdline_param_compat "badmac_limit" \ "MBEDTLS_SSL_CONF_BADMAC_LIMIT" - # Skip tests that use TLS in configs disabling TLS - check_cmdline_check_tls + # Skip tests relying on TLS/DTLS in configs that disable it. + check_cmdline_check_tls_dtls # Authentication mode check_cmdline_authmode_compat From 963d49f79a373a1420b342d05329d545b716788b Mon Sep 17 00:00:00 2001 From: Hanno Becker Date: Thu, 5 Sep 2019 14:55:56 +0100 Subject: [PATCH 5/5] ssl-opt.sh: Remove now-redundant explicit DTLS dependencies Dependencies on DTLS are now auto-detected from the command line. --- tests/ssl-opt.sh | 58 ------------------------------------------------ 1 file changed, 58 deletions(-) diff --git a/tests/ssl-opt.sh b/tests/ssl-opt.sh index 62463748d..433418a77 100755 --- a/tests/ssl-opt.sh +++ b/tests/ssl-opt.sh @@ -5488,7 +5488,6 @@ run_test "Small client packet TLS 1.2 AEAD shorter tag" \ # Tests for small client packets in DTLS -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small client packet DTLS 1.0" \ "$P_SRV dtls=1 force_version=dtls1" \ "$P_CLI dtls=1 request_size=1 \ @@ -5496,7 +5495,6 @@ run_test "Small client packet DTLS 1.0" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small client packet DTLS 1.0, without EtM" \ "$P_SRV dtls=1 force_version=dtls1 etm=0" \ "$P_CLI dtls=1 request_size=1 \ @@ -5504,7 +5502,6 @@ run_test "Small client packet DTLS 1.0, without EtM" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small client packet DTLS 1.0, truncated hmac" \ "$P_SRV dtls=1 force_version=dtls1 trunc_hmac=1" \ @@ -5513,7 +5510,6 @@ run_test "Small client packet DTLS 1.0, truncated hmac" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small client packet DTLS 1.0, without EtM, truncated MAC" \ "$P_SRV dtls=1 force_version=dtls1 trunc_hmac=1 etm=0" \ @@ -5522,7 +5518,6 @@ run_test "Small client packet DTLS 1.0, without EtM, truncated MAC" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small client packet DTLS 1.2" \ "$P_SRV dtls=1 force_version=dtls1_2" \ "$P_CLI dtls=1 request_size=1 \ @@ -5530,7 +5525,6 @@ run_test "Small client packet DTLS 1.2" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small client packet DTLS 1.2, without EtM" \ "$P_SRV dtls=1 force_version=dtls1_2 etm=0" \ "$P_CLI dtls=1 request_size=1 \ @@ -5538,7 +5532,6 @@ run_test "Small client packet DTLS 1.2, without EtM" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small client packet DTLS 1.2, truncated hmac" \ "$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1" \ @@ -5547,7 +5540,6 @@ run_test "Small client packet DTLS 1.2, truncated hmac" \ 0 \ -s "Read from client: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small client packet DTLS 1.2, without EtM, truncated MAC" \ "$P_SRV dtls=1 force_version=dtls1_2 trunc_hmac=1 etm=0" \ @@ -5777,7 +5769,6 @@ run_test "Small server packet TLS 1.2 AEAD shorter tag" \ # Tests for small server packets in DTLS -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small server packet DTLS 1.0" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1" \ "$P_CLI dtls=1 \ @@ -5785,7 +5776,6 @@ run_test "Small server packet DTLS 1.0" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small server packet DTLS 1.0, without EtM" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1 etm=0" \ "$P_CLI dtls=1 \ @@ -5793,7 +5783,6 @@ run_test "Small server packet DTLS 1.0, without EtM" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small server packet DTLS 1.0, truncated hmac" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1 trunc_hmac=1" \ @@ -5802,7 +5791,6 @@ run_test "Small server packet DTLS 1.0, truncated hmac" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small server packet DTLS 1.0, without EtM, truncated MAC" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1 trunc_hmac=1 etm=0" \ @@ -5811,7 +5799,6 @@ run_test "Small server packet DTLS 1.0, without EtM, truncated MAC" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small server packet DTLS 1.2" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1_2" \ "$P_CLI dtls=1 \ @@ -5819,7 +5806,6 @@ run_test "Small server packet DTLS 1.2" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS run_test "Small server packet DTLS 1.2, without EtM" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1_2 etm=0" \ "$P_CLI dtls=1 \ @@ -5827,7 +5813,6 @@ run_test "Small server packet DTLS 1.2, without EtM" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small server packet DTLS 1.2, truncated hmac" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1_2 trunc_hmac=1" \ @@ -5836,7 +5821,6 @@ run_test "Small server packet DTLS 1.2, truncated hmac" \ 0 \ -c "Read from server: 1 bytes read" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC run_test "Small server packet DTLS 1.2, without EtM, truncated MAC" \ "$P_SRV dtls=1 response_size=1 force_version=dtls1_2 trunc_hmac=1 etm=0" \ @@ -7114,7 +7098,6 @@ run_test "DTLS reassembly: fragmentation, nbio (openssl server)" \ # - all others below 512B # All those tests assume MAX_CONTENT_LEN is at least 2048 -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7136,7 +7119,6 @@ run_test "DTLS fragmenting: none (for reference)" \ -C "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7162,7 +7144,6 @@ run_test "DTLS fragmenting: server only (max_frag_len)" \ # the client to not exceed a certain MTU; hence, the following # test can't be replicated with an MTU proxy such as the one # `client-initiated, server only (max_frag_len)` below. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7184,7 +7165,6 @@ run_test "DTLS fragmenting: server only (more) (max_frag_len)" \ -c "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7213,7 +7193,6 @@ run_test "DTLS fragmenting: client-initiated, server only (max_frag_len)" \ # to the peer. # The next test checks that no datagrams significantly larger than the # negotiated MFL are sent. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7236,7 +7215,6 @@ run_test "DTLS fragmenting: client-initiated, server only (max_frag_len), pro -c "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7265,7 +7243,6 @@ run_test "DTLS fragmenting: client-initiated, both (max_frag_len)" \ # to the peer. # The next test checks that no datagrams significantly larger than the # negotiated MFL are sent. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_MAX_FRAGMENT_LENGTH @@ -7288,7 +7265,6 @@ run_test "DTLS fragmenting: client-initiated, both (max_frag_len), proxy MTU" -c "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: none (for reference) (MTU)" \ @@ -7309,7 +7285,6 @@ run_test "DTLS fragmenting: none (for reference) (MTU)" \ -C "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: client (MTU)" \ @@ -7330,7 +7305,6 @@ run_test "DTLS fragmenting: client (MTU)" \ -C "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: server (MTU)" \ @@ -7351,7 +7325,6 @@ run_test "DTLS fragmenting: server (MTU)" \ -c "found fragmented DTLS handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: both (MTU=1024)" \ @@ -7374,7 +7347,6 @@ run_test "DTLS fragmenting: both (MTU=1024)" \ -C "error" # Forcing ciphersuite for this test to fit the MTU of 512 with full config. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7408,7 +7380,6 @@ run_test "DTLS fragmenting: both (MTU=512)" \ # fragmentation and auto-reduction) an extra retransmission might occur, # hence the ratio of 8. not_with_valgrind -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7434,7 +7405,6 @@ run_test "DTLS fragmenting: proxy MTU: auto-reduction" \ # Forcing ciphersuite for this test to fit the MTU of 508 with full config. only_with_valgrind -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7462,7 +7432,6 @@ run_test "DTLS fragmenting: proxy MTU: auto-reduction" \ # OTOH the client might resend if the server is to slow to reset after sending # a HelloVerifyRequest, so only check for no retransmission server-side not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=1024)" \ @@ -7490,7 +7459,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=1024)" \ # OTOH the client might resend if the server is to slow to reset after sending # a HelloVerifyRequest, so only check for no retransmission server-side not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7518,7 +7486,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake (MTU=512)" \ -C "error" not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=1024)" \ @@ -7543,7 +7510,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=1024)" \ # Forcing ciphersuite for this test to fit the MTU of 512 with full config. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7581,7 +7547,6 @@ run_test "DTLS fragmenting: proxy MTU, simple handshake, nbio (MTU=512)" \ # reco_delay avoids races where the client reconnects before the server has # resumed listening, which would result in a spurious autoreduction. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7611,7 +7576,6 @@ run_test "DTLS fragmenting: proxy MTU, resumed handshake" \ # An autoreduction on the client-side might happen if the server is # slow to reset, therefore omitting '-C "autoreduction"' below. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7644,7 +7608,6 @@ run_test "DTLS fragmenting: proxy MTU, ChachaPoly renego" \ # An autoreduction on the client-side might happen if the server is # slow to reset, therefore omitting '-C "autoreduction"' below. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7678,7 +7641,6 @@ run_test "DTLS fragmenting: proxy MTU, AES-GCM renego" \ # An autoreduction on the client-side might happen if the server is # slow to reset, therefore omitting '-C "autoreduction"' below. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7712,7 +7674,6 @@ run_test "DTLS fragmenting: proxy MTU, AES-CCM renego" \ # An autoreduction on the client-side might happen if the server is # slow to reset, therefore omitting '-C "autoreduction"' below. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7747,7 +7708,6 @@ run_test "DTLS fragmenting: proxy MTU, AES-CBC EtM renego" \ # An autoreduction on the client-side might happen if the server is # slow to reset, therefore omitting '-C "autoreduction"' below. not_with_valgrind # spurious autoreduction due to timeout -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SHA256_C @@ -7779,7 +7739,6 @@ run_test "DTLS fragmenting: proxy MTU, AES-CBC non-EtM renego" \ -C "error" # Forcing ciphersuite for this test to fit the MTU of 512 with full config. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7805,7 +7764,6 @@ run_test "DTLS fragmenting: proxy MTU + 3d" \ -C "error" # Forcing ciphersuite for this test to fit the MTU of 512 with full config. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA @@ -7834,7 +7792,6 @@ run_test "DTLS fragmenting: proxy MTU + 3d, nbio" \ # # here and below we just want to test that the we fragment in a way that # pleases other implementations, so we don't need the peer to fragment -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -7850,7 +7807,6 @@ run_test "DTLS fragmenting: gnutls server, DTLS 1.2" \ -c "fragmenting handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -7873,7 +7829,6 @@ run_test "DTLS fragmenting: gnutls server, DTLS 1.0" \ # as the server name in the certificate. This will make the # certifiate validation fail, but passing --insecure makes # GnuTLS continue the connection nonetheless. -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -7890,7 +7845,6 @@ run_test "DTLS fragmenting: gnutls client, DTLS 1.2" \ -s "fragmenting handshake message" # See previous test for the reason to use --insecure -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -7906,7 +7860,6 @@ run_test "DTLS fragmenting: gnutls client, DTLS 1.0" \ 0 \ -s "fragmenting handshake message" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -7921,7 +7874,6 @@ run_test "DTLS fragmenting: openssl server, DTLS 1.2" \ -c "fragmenting handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -7936,7 +7888,6 @@ run_test "DTLS fragmenting: openssl server, DTLS 1.0" \ -c "fragmenting handshake message" \ -C "error" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -7950,7 +7901,6 @@ run_test "DTLS fragmenting: openssl client, DTLS 1.2" \ 0 \ -s "fragmenting handshake message" -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -7969,7 +7919,6 @@ run_test "DTLS fragmenting: openssl client, DTLS 1.0" \ # again we just want to test that the we fragment in a way that # pleases other implementations, so we don't need the peer to fragment requires_gnutls_next -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -7987,7 +7936,6 @@ run_test "DTLS fragmenting: 3d, gnutls server, DTLS 1.2" \ -C "error" requires_gnutls_next -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -8005,7 +7953,6 @@ run_test "DTLS fragmenting: 3d, gnutls server, DTLS 1.0" \ -C "error" requires_gnutls_next -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -8022,7 +7969,6 @@ run_test "DTLS fragmenting: 3d, gnutls client, DTLS 1.2" \ -s "fragmenting handshake message" requires_gnutls_next -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -8044,7 +7990,6 @@ run_test "DTLS fragmenting: 3d, gnutls client, DTLS 1.0" \ ## They should be re-enabled once a fixed version of OpenSSL is available ## (this should happen in some 1.1.1_ release according to the ticket). skip_next_test -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -8062,7 +8007,6 @@ run_test "DTLS fragmenting: 3d, openssl server, DTLS 1.2" \ -C "error" skip_next_test -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1 @@ -8080,7 +8024,6 @@ run_test "DTLS fragmenting: 3d, openssl server, DTLS 1.0" \ -C "error" skip_next_test -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2 @@ -8099,7 +8042,6 @@ run_test "DTLS fragmenting: 3d, openssl client, DTLS 1.2" \ # -nbio is added to prevent s_client from blocking in case of duplicated # messages at the end of the handshake skip_next_test -requires_config_enabled MBEDTLS_SSL_PROTO_DTLS requires_config_enabled MBEDTLS_RSA_C requires_config_enabled MBEDTLS_ECDSA_C requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_1