1 # TLS server: general ops and certificate extractions
3 # NOTE: OpenSSL libraries return faulty my-cert information prior to OpenSSL 1.1.1
4 # when more than one cert is loaded, which the conf for this testcase does.
5 # As a result the expansion done and logged is misleading.
6 # While the golden log output is set to the misleading result, the testcase
7 # would unfortunately fail on the fixed OpenSSL versions. This has been bodged
8 # by the addition of log/2102.openssl_1_1_1 and some detection coding in
9 # runtest to force a "flavour". This is fragile and bound to break in the future.
11 # Make RSA authentication the only acceptable
12 exim -DSERVER=server -DORDER=RSA -bd -oX PORT_D
14 client-ssl 127.0.0.1 PORT_D
27 rcpt to:<CALLER@test.ex>
31 This is a test encrypted message.
37 client-ssl 127.0.0.1 PORT_D
48 mail from:<"name with spaces"@test.ex>
50 rcpt to:<CALLER@test.ex>
54 This is a test encrypted message.
60 # nonloop addr conn rejected lacking cert
61 client-ssl HOSTIPV4 PORT_D
76 client-ssl HOSTIPV4 PORT_D DIR/aux-fixed/exim-ca/example.com/server2.example.com/server2.example.com.pem DIR/aux-fixed/exim-ca/example.com/server2.example.com/server2.example.com.unlocked.key
89 rcpt to:<CALLER@test.ex>
93 This is a test encrypted message from a verified host.
101 # make ECDSA authentication preferred
102 # DEFAULT:+RSA should work but does not seem to
103 # also, will fail under TLS1.3 because there is no choice of auth
104 # - so we disable that in the conf
105 exim -DSERVER=server -DORDER=ECDSA:RSA:!COMPLEMENTOFDEFAULT -bd -oX PORT_D
107 client-ssl 127.0.0.1 PORT_D
118 mail from:<c@test.ex>
120 rcpt to:<CALLER@test.ex>
124 This is a test encrypted message.
125 It should be sent under the EC server cert and with an ECDSA cipher.