mirror of https://github.com/ctz/rustls
77 lines
1.6 KiB
Rust
77 lines
1.6 KiB
Rust
// Engineer a handshake using each suite supported by both
|
|
// us and openssl
|
|
|
|
#[allow(dead_code)]
|
|
mod common;
|
|
use crate::common::TlsServer;
|
|
|
|
#[test]
|
|
fn ecdhe_rsa_aes_128_gcm_sha256() {
|
|
let test_ca = common::new_test_ca();
|
|
|
|
let mut server = TlsServer::new(test_ca.path(), 7000);
|
|
|
|
server.echo_mode()
|
|
.suite("TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256")
|
|
.run();
|
|
|
|
server.client()
|
|
.expect("Cipher : ECDHE-RSA-AES128-GCM-SHA256")
|
|
.go();
|
|
|
|
server.kill();
|
|
}
|
|
|
|
#[test]
|
|
fn ecdhe_rsa_aes_256_gcm_sha384() {
|
|
let test_ca = common::new_test_ca();
|
|
|
|
let mut server = TlsServer::new(test_ca.path(), 7010);
|
|
|
|
server.echo_mode()
|
|
.suite("TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384")
|
|
.run();
|
|
|
|
server.client()
|
|
.expect("Cipher : ECDHE-RSA-AES256-GCM-SHA384")
|
|
.go();
|
|
|
|
server.kill();
|
|
}
|
|
|
|
#[test]
|
|
fn ecdhe_ecdsa_aes_128_gcm_sha256() {
|
|
let test_ca = common::new_test_ca();
|
|
|
|
let mut server = TlsServer::new_keytype(test_ca.path(), 7020, "ecdsa");
|
|
|
|
server.echo_mode()
|
|
.suite("TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256")
|
|
.run();
|
|
|
|
server.client()
|
|
.expect("Cipher : ECDHE-ECDSA-AES128-GCM-SHA256")
|
|
.go();
|
|
|
|
server.kill();
|
|
}
|
|
|
|
#[test]
|
|
fn ecdhe_ecdsa_aes_256_gcm_sha384() {
|
|
let test_ca = common::new_test_ca();
|
|
|
|
let mut server = TlsServer::new_keytype(test_ca.path(), 7030, "ecdsa");
|
|
|
|
server.echo_mode()
|
|
.suite("TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384")
|
|
.run();
|
|
|
|
server.client()
|
|
.expect("Cipher : ECDHE-ECDSA-AES256-GCM-SHA384")
|
|
.go();
|
|
|
|
server.kill();
|
|
}
|
|
|
|
// cannot do chacha20poly1305 because openssl doesn't support it.
|