⚝
One Hat Cyber Team
⚝
Your IP:
216.73.216.124
Server IP:
50.28.103.30
Server:
Linux host.jcukjv-lwsites.com 4.18.0-553.22.1.el8_10.x86_64 #1 SMP Tue Sep 24 05:16:59 EDT 2024 x86_64
Server Software:
nginx/1.28.0
PHP Version:
8.3.12
Buat File
|
Buat Folder
Eksekusi
Dir :
~
/
www
/
server
/
nginx
/
src
/
openssl
/
test
/
ssl-tests
/
View File Name :
05-sni.conf.in
# -*- mode: perl; -*- # Copyright 2016-2016 The OpenSSL Project Authors. All Rights Reserved. # # Licensed under the OpenSSL license (the "License"). You may not use # this file except in compliance with the License. You can obtain a copy # in the file LICENSE in the source distribution or at # https://www.openssl.org/source/license.html ## SSL test configurations use strict; use warnings; package ssltests; use OpenSSL::Test::Utils; our @tests = ( { name => "SNI-switch-context", server => { extra => { "ServerNameCallback" => "IgnoreMismatch", }, }, client => { extra => { "ServerName" => "server2", }, }, test => { "ExpectedServerName" => "server2", "ExpectedResult" => "Success" }, }, { name => "SNI-keep-context", server => { extra => { "ServerNameCallback" => "IgnoreMismatch", }, }, client => { extra => { "ServerName" => "server1", }, }, test => { "ExpectedServerName" => "server1", "ExpectedResult" => "Success" }, }, { name => "SNI-no-server-support", server => { }, client => { extra => { "ServerName" => "server1", }, }, test => { "ExpectedResult" => "Success" }, }, { name => "SNI-no-client-support", server => { extra => { "ServerNameCallback" => "IgnoreMismatch", }, }, client => { }, test => { # We expect that the callback is still called # to let the application decide whether they tolerate # missing SNI (as our test callback does). "ExpectedServerName" => "server1", "ExpectedResult" => "Success" }, }, { name => "SNI-bad-sni-ignore-mismatch", server => { extra => { "ServerNameCallback" => "IgnoreMismatch", }, }, client => { extra => { "ServerName" => "invalid", }, }, test => { "ExpectedServerName" => "server1", "ExpectedResult" => "Success" }, }, { name => "SNI-bad-sni-reject-mismatch", server => { extra => { "ServerNameCallback" => "RejectMismatch", }, }, client => { extra => { "ServerName" => "invalid", }, }, test => { "ExpectedResult" => "ServerFail", "ExpectedServerAlert" => "UnrecognizedName" }, }, { name => "SNI-bad-clienthello-sni-ignore-mismatch", server => { extra => { "ServerNameCallback" => "ClientHelloIgnoreMismatch", }, }, client => { extra => { "ServerName" => "invalid", }, }, test => { "ExpectedServerName" => "server1", "ExpectedResult" => "Success" }, }, { name => "SNI-bad-clienthello-sni-reject-mismatch", server => { extra => { "ServerNameCallback" => "ClientHelloRejectMismatch", }, }, client => { extra => { "ServerName" => "invalid", }, }, test => { "ExpectedResult" => "ServerFail", "ExpectedServerAlert" => "UnrecognizedName" }, }, ); our @tests_tls_1_1 = ( { name => "SNI-clienthello-disable-v12", server => { extra => { "ServerNameCallback" => "ClientHelloNoV12", }, }, client => { extra => { "ServerName" => "server2", }, }, test => { "ExpectedProtocol" => "TLSv1.1", "ExpectedServerName" => "server2", }, }, ); push @tests, @tests_tls_1_1 unless disabled("tls1_1");