@ -15613,6 +15613,9 @@ func addRSAKeyUsageTests() {
} ,
} ,
shouldFail : true ,
shouldFail : true ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
flags : [ ] string {
"-enforce-rsa-key-usage" ,
} ,
} )
} )
testCases = append ( testCases , testCase {
testCases = append ( testCases , testCase {
@ -15624,6 +15627,9 @@ func addRSAKeyUsageTests() {
Certificates : [ ] Certificate { dsCert } ,
Certificates : [ ] Certificate { dsCert } ,
CipherSuites : dsSuites ,
CipherSuites : dsSuites ,
} ,
} ,
flags : [ ] string {
"-enforce-rsa-key-usage" ,
} ,
} )
} )
// TLS 1.3 removes the encipherment suites.
// TLS 1.3 removes the encipherment suites.
@ -15637,6 +15643,9 @@ func addRSAKeyUsageTests() {
Certificates : [ ] Certificate { encCert } ,
Certificates : [ ] Certificate { encCert } ,
CipherSuites : encSuites ,
CipherSuites : encSuites ,
} ,
} ,
flags : [ ] string {
"-enforce-rsa-key-usage" ,
} ,
} )
} )
testCases = append ( testCases , testCase {
testCases = append ( testCases , testCase {
@ -15650,6 +15659,9 @@ func addRSAKeyUsageTests() {
} ,
} ,
shouldFail : true ,
shouldFail : true ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
flags : [ ] string {
"-enforce-rsa-key-usage" ,
} ,
} )
} )
// In 1.2 and below, we should not enforce without the enforce-rsa-key-usage flag.
// In 1.2 and below, we should not enforce without the enforce-rsa-key-usage flag.
@ -15662,7 +15674,6 @@ func addRSAKeyUsageTests() {
Certificates : [ ] Certificate { dsCert } ,
Certificates : [ ] Certificate { dsCert } ,
CipherSuites : encSuites ,
CipherSuites : encSuites ,
} ,
} ,
flags : [ ] string { "-no-enforce-rsa-key-usage" } ,
} )
} )
testCases = append ( testCases , testCase {
testCases = append ( testCases , testCase {
@ -15674,22 +15685,20 @@ func addRSAKeyUsageTests() {
Certificates : [ ] Certificate { encCert } ,
Certificates : [ ] Certificate { encCert } ,
CipherSuites : dsSuites ,
CipherSuites : dsSuites ,
} ,
} ,
flags : [ ] string { "-no-enforce-rsa-key-usage" } ,
} )
} )
}
}
if ver . version >= VersionTLS13 {
if ver . version >= VersionTLS13 {
// In 1.3 and above, we enforce keyUsage even when disabled .
// In 1.3 and above, we enforce keyUsage even without the flag .
testCases = append ( testCases , testCase {
testCases = append ( testCases , testCase {
testType : clientTest ,
testType : clientTest ,
name : "RSAKeyUsage-Client-WantSignature-GotEncipherment-Always Enforced" + ver . name ,
name : "RSAKeyUsage-Client-WantSignature-GotEncipherment-Enforced" + ver . name ,
config : Config {
config : Config {
MinVersion : ver . version ,
MinVersion : ver . version ,
MaxVersion : ver . version ,
MaxVersion : ver . version ,
Certificates : [ ] Certificate { encCert } ,
Certificates : [ ] Certificate { encCert } ,
CipherSuites : dsSuites ,
CipherSuites : dsSuites ,
} ,
} ,
flags : [ ] string { "-no-enforce-rsa-key-usage" } ,
shouldFail : true ,
shouldFail : true ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
expectedError : ":KEY_USAGE_BIT_INCORRECT:" ,
} )
} )