![]() System : Linux absol.cf 5.4.0-198-generic #218-Ubuntu SMP Fri Sep 27 20:18:53 UTC 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.33 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, Directory : /usr/local/lib/node_modules/mediasoup/worker/deps/openssl/openssl/test/ssl-tests/ |
Upload File : |
# -*- mode: perl; -*- # Copyright 2017 The OpenSSL Project Authors. All Rights Reserved. # # Licensed under the OpenSSL license (the "License"). You may not use # this file except in compliance with the License. You can obtain a copy # in the file LICENSE in the source distribution or at # https://www.openssl.org/source/license.html use strict; use warnings; package ssltests; # SRP is only supported up to TLSv1.2 our @tests = ( { name => "srp", server => { "CipherString" => "SRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, client => { "CipherString" => "SRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, test => { "ExpectedResult" => "Success" }, }, { name => "srp-bad-password", server => { "CipherString" => "SRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, client => { "CipherString" => "SRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "passw0rd", }, }, test => { # Server fails first with bad client Finished. "ExpectedResult" => "ServerFail" }, }, { name => "srp-auth", server => { "CipherString" => "aSRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, client => { "CipherString" => "aSRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, test => { "ExpectedResult" => "Success" }, }, { name => "srp-auth-bad-password", server => { "CipherString" => "aSRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "password", }, }, client => { "CipherString" => "aSRP", "MaxProtocol" => "TLSv1.2", extra => { "SRPUser" => "user", "SRPPassword" => "passw0rd", }, }, test => { # Server fails first with bad client Finished. "ExpectedResult" => "ServerFail" }, }, );