1[
2    {
3        "server_command": [
4            "@SELFSERV@", "-w", "nss", "-d", "@SERVERDIR@",
5            "-V", "tls1.0:", "-H", "1",
6            "-n", "rsa",
7            "-n", "rsa-pss",
8	    "-J", "rsa_pss_rsae_sha256,rsa_pss_rsae_sha384,rsa_pss_rsae_sha512,rsa_pss_pss_sha256",
9            "-u", "-Z", "-p", "@PORT@"
10        ],
11        "server_hostname": "@HOSTADDR@",
12        "server_port": @PORT@,
13        "tests" : [
14            {
15                "name" : "test-tls13-conversation.py",
16                "arguments": [
17                    "-p", "@PORT@"
18                ]
19            },
20            {
21                "name" : "test-tls13-count-tickets.py",
22                "arguments": [
23                    "-p", "@PORT@", "-t", "1"
24                ]
25            },
26            {
27                "name" : "test-tls13-dhe-shared-secret-padding.py",
28                "comment": "https://bugzilla.mozilla.org/show_bug.cgi?id=1305243",
29                "arguments": [
30                    "-p", "@PORT@",
31                    "-e", "TLS 1.3 with x448"
32                ]
33            },
34            {
35                "name" : "test-tls13-empty-alert.py",
36                "arguments": [
37                    "-p", "@PORT@"
38                ],
39                "comment": "https://bugzilla.mozilla.org/show_bug.cgi?id=1471656",
40                "exp_pass": false
41            },
42            {
43                "name" : "test-tls13-ffdhe-sanity.py",
44                "arguments": [
45                    "-p", "@PORT@"
46                ]
47            },
48            {
49                "name" : "test-tls13-finished.py",
50                "arguments": [
51                    "-p", "@PORT@"
52                ],
53                "comment" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1472747",
54                "exp_pass": false
55            },
56            {
57                "name" : "test-tls13-0rtt-garbage.py",
58                "comment": "the disabled test timeouts because of https://bugzilla.mozilla.org/show_bug.cgi?id=1472747",
59                "arguments": [
60                    "-p", "@PORT@", "--cookie",
61                    "-e", "undecryptable record later in handshake together with early_data"
62                ]
63            },
64            {
65                "name" : "test-tls13-hrr.py",
66                "arguments": [
67                    "-p", "@PORT@", "--cookie"
68                ]
69            },
70            {
71                "name" : "test-tls13-legacy-version.py",
72                "arguments": [
73                    "-p", "@PORT@"
74                ]
75            },
76            {
77                "name" : "test-tls13-nociphers.py",
78                "arguments": [
79                    "-p", "@PORT@"
80                ]
81            },
82            {
83                "name" : "test-tls13-pkcs-signature.py",
84                "comment": "https://bugzilla.mozilla.org/show_bug.cgi?id=1489997",
85                "arguments": [
86                    "-p", "@PORT@",
87                    "-e", "rsa_pkcs1_sha256 signature",
88                    "-e", "rsa_pkcs1_sha384 signature",
89                    "-e", "rsa_pkcs1_sha512 signature"
90                ]
91            },
92            {
93                "name" : "test-tls13-rsa-signatures.py",
94		"comment": "selfserv can be set up to use multiple certs, but only one for each auth type",
95                "arguments": [
96                    "-p", "@PORT@", "-b",
97		    "-e", "tls13 signature rsa_pss_pss_sha384",
98		    "-e", "tls13 signature rsa_pss_pss_sha512"
99                ]
100            },
101            {
102                "name" : "test-tls13-rsapss-signatures.py",
103		"comment": "selfserv can be set up to use multiple certs, but only one to each auth type",
104                "arguments": [
105                    "-p", "@PORT@", "-b",
106		    "-e", "tls13 signature rsa_pss_pss_sha384",
107		    "-e", "tls13 signature rsa_pss_pss_sha512"
108                ]
109            },
110            {
111                "name" : "test-tls13-record-padding.py",
112                "arguments": [
113                    "-p", "@PORT@"
114                ]
115            },
116            {
117                "name" : "test-tls13-session-resumption.py",
118                "arguments": [
119                    "-p", "@PORT@"
120                ]
121            },
122            {
123                "name" : "test-tls13-signature-algorithms.py",
124                "arguments": [
125                    "-p", "@PORT@"
126                ],
127                "comment": "https://bugzilla.mozilla.org/show_bug.cgi?id=1482386",
128                "exp_pass": false
129            },
130            {
131                "name" : "test-tls13-unrecognised-groups.py",
132                "arguments": [
133                    "-p", "@PORT@", "--cookie"
134                ]
135            },
136            {
137                "name" : "test-tls13-version-negotiation.py",
138                "comment": "the disabled test timeouts because of https://github.com/tomato42/tlsfuzzer/issues/452",
139                "arguments": [
140                    "-p", "@PORT@",
141                    "-e", "SSL 2.0 ClientHello with TLS 1.3 version and TLS 1.3 only ciphersuites"
142                ]
143            },
144            {
145                "name" : "test-tls13-zero-length-data.py",
146                "arguments": [
147                    "-p", "@PORT@"
148                ]
149            },
150            {
151                "name" : "test-dhe-no-shared-secret-padding.py",
152                "comment": "https://bugzilla.mozilla.org/show_bug.cgi?id=1494221 and SSLv3 cannot be enabled in server",
153                "arguments": [
154                    "-p", "@PORT@",
155                    "-e", "Protocol (3, 0) in SSLv2 compatible ClientHello",
156                    "-e", "Protocol (3, 1) in SSLv2 compatible ClientHello",
157                    "-e", "Protocol (3, 2) in SSLv2 compatible ClientHello",
158                    "-e", "Protocol (3, 3) in SSLv2 compatible ClientHello",
159                    "-e", "Protocol (3, 0)"
160                ]
161            }
162        ]
163    },
164    {
165        "server_command": [
166            "@SELFSERV@", "-w", "nss", "-d", "@SERVERDIR@",
167            "-V", "tls1.0:", "-H", "1",
168            "-n", "rsa",
169            "-c", ":C028",
170            "-p", "@PORT@"
171        ],
172        "server_hostname": "@HOSTADDR@",
173        "server_port": @PORT@,
174        "tests" : [
175            {
176                "name" : "test-atypical-padding.py",
177                "arguments": [
178                    "-p", "@PORT@",
179                    "2^14 bytes of AppData with 256 bytes of padding (SHA384)"
180                ]
181            }
182        ]
183    }
184]
185