1 # TLS server: general ops and certificate extractions
3 # NOTE: OpenSSL libraries return faulty my-cert information prior to OpenSSL 1.1.1
4 # when more than one cert is loaded, which the conf for this testcase does.
5 # As a result the expansion done and logged is misleading.
6 # While the golden log output is set to the misleading result, the testcase
7 # would unfortunately fail on the fixed OpenSSL versions. This has been bodged
8 # by the addition of log/2102.openssl_1_1_1 and some detection coding in
9 # runtest to force a "flavour". This is fragile and bound to break in the future.
11 # Make RSA authentication the only acceptable
12 exim -DSERVER=server -DORDER=RSA -bd -oX PORT_D
14 client-ssl 127.0.0.1 PORT_D
35 rcpt to:<CALLER@test.ex>
39 This is a test encrypted message.
45 client-ssl 127.0.0.1 PORT_D
64 mail from:<"name with spaces"@test.ex>
66 rcpt to:<CALLER@test.ex>
70 This is a test encrypted message.
76 # nonloop addr conn rejected lacking cert
77 client-ssl HOSTIPV4 PORT_D
93 client-ssl HOSTIPV4 PORT_D DIR/aux-fixed/exim-ca/example.com/server2.example.com/server2.example.com.pem DIR/aux-fixed/exim-ca/example.com/server2.example.com/server2.example.com.unlocked.key
112 mail from:<b@test.ex>
114 rcpt to:<CALLER@test.ex>
118 This is a test encrypted message from a verified host.
126 # make ECDSA authentication preferred
127 # DEFAULT:+RSA should work but does not seem to
128 # also, will fail under TLS1.3 because there is no choice of auth
129 # - so we disable that in the conf
130 exim -DSERVER=server -DORDER=ECDSA:RSA:!COMPLEMENTOFDEFAULT -bd -oX PORT_D
132 client-ssl 127.0.0.1 PORT_D
151 mail from:<c@test.ex>
153 rcpt to:<CALLER@test.ex>
157 This is a test encrypted message.
158 It should be sent under the EC server cert and with an ECDSA cipher.