mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-11-23 03:45:39 +01:00
Add missing dependencies on trunc HMAC ext in ssl-opt.sh
Noticed that the test cases in ssl-opt.sh exercising the truncated HMAC extension do not depend on MBEDTLS_SSL_TRUNCATED_HMAC being enabled in config.h. This commit fixes this.
This commit is contained in:
parent
81c7b18351
commit
32c550141f
@ -832,6 +832,7 @@ run_test "Truncated HMAC: client default, server default" \
|
|||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client disabled, server default" \
|
run_test "Truncated HMAC: client disabled, server default" \
|
||||||
"$P_SRV debug_level=4" \
|
"$P_SRV debug_level=4" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
||||||
@ -840,6 +841,7 @@ run_test "Truncated HMAC: client disabled, server default" \
|
|||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server default" \
|
run_test "Truncated HMAC: client enabled, server default" \
|
||||||
"$P_SRV debug_level=4" \
|
"$P_SRV debug_level=4" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
||||||
@ -848,6 +850,7 @@ run_test "Truncated HMAC: client enabled, server default" \
|
|||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server disabled" \
|
run_test "Truncated HMAC: client enabled, server disabled" \
|
||||||
"$P_SRV debug_level=4 trunc_hmac=0" \
|
"$P_SRV debug_level=4 trunc_hmac=0" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
||||||
@ -856,6 +859,7 @@ run_test "Truncated HMAC: client enabled, server disabled" \
|
|||||||
-s "dumping 'expected mac' (20 bytes)" \
|
-s "dumping 'expected mac' (20 bytes)" \
|
||||||
-S "dumping 'expected mac' (10 bytes)"
|
-S "dumping 'expected mac' (10 bytes)"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Truncated HMAC: client enabled, server enabled" \
|
run_test "Truncated HMAC: client enabled, server enabled" \
|
||||||
"$P_SRV debug_level=4 trunc_hmac=1" \
|
"$P_SRV debug_level=4 trunc_hmac=1" \
|
||||||
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
"$P_CLI force_ciphersuite=TLS-RSA-WITH-AES-128-CBC-SHA \
|
||||||
@ -3288,6 +3292,7 @@ run_test "Small packet TLS 1.0 BlockCipher without EtM" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 BlockCipher truncated MAC" \
|
run_test "Small packet TLS 1.0 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
@ -3296,6 +3301,7 @@ run_test "Small packet TLS 1.0 BlockCipher truncated MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.0 StreamCipher truncated MAC" \
|
run_test "Small packet TLS 1.0 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1 \
|
"$P_CLI request_size=1 force_version=tls1 \
|
||||||
@ -3325,6 +3331,7 @@ run_test "Small packet TLS 1.1 StreamCipher" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 BlockCipher truncated MAC" \
|
run_test "Small packet TLS 1.1 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
@ -3333,6 +3340,7 @@ run_test "Small packet TLS 1.1 BlockCipher truncated MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.1 StreamCipher truncated MAC" \
|
run_test "Small packet TLS 1.1 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_1 \
|
"$P_CLI request_size=1 force_version=tls1_1 \
|
||||||
@ -3362,6 +3370,7 @@ run_test "Small packet TLS 1.2 BlockCipher larger MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 BlockCipher truncated MAC" \
|
run_test "Small packet TLS 1.2 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
@ -3377,6 +3386,7 @@ run_test "Small packet TLS 1.2 StreamCipher" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 1 bytes read"
|
-s "Read from client: 1 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Small packet TLS 1.2 StreamCipher truncated MAC" \
|
run_test "Small packet TLS 1.2 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=1 force_version=tls1_2 \
|
"$P_CLI request_size=1 force_version=tls1_2 \
|
||||||
@ -3434,6 +3444,7 @@ run_test "Large packet TLS 1.0 BlockCipher" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 BlockCipher truncated MAC" \
|
run_test "Large packet TLS 1.0 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1 recsplit=0 \
|
"$P_CLI request_size=16384 force_version=tls1 recsplit=0 \
|
||||||
@ -3442,6 +3453,7 @@ run_test "Large packet TLS 1.0 BlockCipher truncated MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.0 StreamCipher truncated MAC" \
|
run_test "Large packet TLS 1.0 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1 \
|
"$P_CLI request_size=16384 force_version=tls1 \
|
||||||
@ -3464,6 +3476,7 @@ run_test "Large packet TLS 1.1 StreamCipher" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 BlockCipher truncated MAC" \
|
run_test "Large packet TLS 1.1 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
@ -3472,6 +3485,7 @@ run_test "Large packet TLS 1.1 BlockCipher truncated MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.1 StreamCipher truncated MAC" \
|
run_test "Large packet TLS 1.1 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1_1 \
|
"$P_CLI request_size=16384 force_version=tls1_1 \
|
||||||
@ -3494,6 +3508,7 @@ run_test "Large packet TLS 1.2 BlockCipher larger MAC" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 BlockCipher truncated MAC" \
|
run_test "Large packet TLS 1.2 BlockCipher truncated MAC" \
|
||||||
"$P_SRV" \
|
"$P_SRV" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
@ -3509,6 +3524,7 @@ run_test "Large packet TLS 1.2 StreamCipher" \
|
|||||||
0 \
|
0 \
|
||||||
-s "Read from client: 16384 bytes read"
|
-s "Read from client: 16384 bytes read"
|
||||||
|
|
||||||
|
requires_config_enabled MBEDTLS_SSL_TRUNCATED_HMAC
|
||||||
run_test "Large packet TLS 1.2 StreamCipher truncated MAC" \
|
run_test "Large packet TLS 1.2 StreamCipher truncated MAC" \
|
||||||
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
"$P_SRV arc4=1 force_ciphersuite=TLS-RSA-WITH-RC4-128-SHA" \
|
||||||
"$P_CLI request_size=16384 force_version=tls1_2 \
|
"$P_CLI request_size=16384 force_version=tls1_2 \
|
||||||
|
Loading…
Reference in New Issue
Block a user