blob: 913db9e65a9d40b1ca8a08cf69697fb04027a6e7 [file] [log] [blame]
Jerry Yu305bfc32021-11-24 16:04:47 +08001#!/usr/bin/env python3
2
3# generate_tls13_compat_tests.py
4#
5# Copyright The Mbed TLS Contributors
6# SPDX-License-Identifier: Apache-2.0
7#
8# Licensed under the Apache License, Version 2.0 (the "License"); you may
9# not use this file except in compliance with the License.
10# You may obtain a copy of the License at
11#
12# http://www.apache.org/licenses/LICENSE-2.0
13#
14# Unless required by applicable law or agreed to in writing, software
15# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
16# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17# See the License for the specific language governing permissions and
18# limitations under the License.
19
20"""
21Generate TLSv1.3 Compat test cases
22
23"""
24
25import sys
Jerry Yudda036d2021-11-30 11:19:41 +080026import os
Jerry Yu305bfc32021-11-24 16:04:47 +080027import abc
28import argparse
Jerry Yuc4aa1522021-11-26 11:13:58 +080029import itertools
Jerry Yu882c30d2021-12-01 10:59:59 +080030from collections import namedtuple
Jerry Yu305bfc32021-11-24 16:04:47 +080031# pylint: disable=useless-super-delegation
32
Jerry Yu882c30d2021-12-01 10:59:59 +080033# define certificates configuration entry
34Certificate = namedtuple("Certificate", ['cafile', 'certfile', 'keyfile'])
35# define the certificate parameters for signature algorithms
Jerry Yu305bfc32021-11-24 16:04:47 +080036CERTIFICATES = {
Jerry Yu882c30d2021-12-01 10:59:59 +080037 'ecdsa_secp256r1_sha256': Certificate('data_files/test-ca2.crt',
38 'data_files/ecdsa_secp256r1.crt',
39 'data_files/ecdsa_secp256r1.key'),
40 'ecdsa_secp384r1_sha384': Certificate('data_files/test-ca2.crt',
41 'data_files/ecdsa_secp384r1.crt',
42 'data_files/ecdsa_secp384r1.key'),
43 'ecdsa_secp521r1_sha512': Certificate('data_files/test-ca2.crt',
44 'data_files/ecdsa_secp521r1.crt',
45 'data_files/ecdsa_secp521r1.key'),
46 'rsa_pss_rsae_sha256': Certificate('data_files/test-ca_cat12.crt',
47 'data_files/server2-sha256.crt', 'data_files/server2.key'
48 )
Jerry Yu29deed42021-11-25 11:09:54 +080049}
Jerry Yu305bfc32021-11-24 16:04:47 +080050
51CIPHER_SUITE_IANA_VALUE = {
52 "TLS_AES_128_GCM_SHA256": 0x1301,
53 "TLS_AES_256_GCM_SHA384": 0x1302,
54 "TLS_CHACHA20_POLY1305_SHA256": 0x1303,
55 "TLS_AES_128_CCM_SHA256": 0x1304,
56 "TLS_AES_128_CCM_8_SHA256": 0x1305
57}
58
59SIG_ALG_IANA_VALUE = {
60 "ecdsa_secp256r1_sha256": 0x0403,
61 "ecdsa_secp384r1_sha384": 0x0503,
62 "ecdsa_secp521r1_sha512": 0x0603,
Jerry Yu29deed42021-11-25 11:09:54 +080063 'rsa_pss_rsae_sha256': 0x0804,
Jerry Yu305bfc32021-11-24 16:04:47 +080064}
65
66NAMED_GROUP_IANA_VALUE = {
67 'secp256r1': 0x17,
68 'secp384r1': 0x18,
69 'secp521r1': 0x19,
70 'x25519': 0x1d,
71 'x448': 0x1e,
72}
73
74
75def remove_duplicates(seq):
76 seen = set()
77 seen_add = seen.add
78 return [x for x in seq if not (x in seen or seen_add(x))]
79
80
81class TLSProgram(metaclass=abc.ABCMeta):
82 """
83 Base class for generate server/client command.
84 """
Jerry Yu29deed42021-11-25 11:09:54 +080085
Jerry Yu305bfc32021-11-24 16:04:47 +080086 def __init__(self, ciphersuite, signature_algorithm, named_group):
87 self._cipher = ciphersuite
88 self._sig_alg = signature_algorithm
89 self._named_group = named_group
90 self.add_ciphersuites(ciphersuite)
91 self.add_named_groups(named_group)
92 self.add_signature_algorithms(signature_algorithm)
93
94 @abc.abstractmethod
95 def add_ciphersuites(self, *ciphersuites):
96 pass
97
98 @abc.abstractmethod
99 def add_signature_algorithms(self, *signature_algorithms):
100 pass
101
102 @abc.abstractmethod
103 def add_named_groups(self, *named_groups):
104 pass
105
106 @abc.abstractmethod
107 def pre_checks(self):
108 return []
109
110 @abc.abstractmethod
111 def cmd(self):
112 pass
113
114 @abc.abstractmethod
115 def post_checks(self):
116 return []
117
118
119class OpenSSLServ(TLSProgram):
120 """
121 Generate test commands for OpenSSL server.
122 """
123 program = '$OPENSSL_NEXT'
124
125 def __init__(
126 self,
127 ciphersuite,
128 signature_algorithm,
129 named_group):
130 self.ciphersuites = []
131 self.named_groups = []
132 self.signature_algorithms = []
133 self.certificates = []
134 super().__init__(ciphersuite, signature_algorithm, named_group)
135
Jerry Yu305bfc32021-11-24 16:04:47 +0800136 def add_ciphersuites(self, *ciphersuites):
137 self.ciphersuites.extend(ciphersuites)
138
139 def add_signature_algorithms(self, *signature_algorithms):
140 self.signature_algorithms.extend(signature_algorithms)
141 for sig_alg in signature_algorithms:
142 self.certificates.append(CERTIFICATES[sig_alg])
143
144 NAMED_GROUP = {
145 'secp256r1': 'P-256',
146 'secp384r1': 'P-384',
147 'secp521r1': 'P-521',
148 'x25519': 'X25519',
149 'x448': 'X448',
150 }
151
152 def add_named_groups(self, *named_groups):
153 for named_group in named_groups:
154 self.named_groups.append(self.NAMED_GROUP[named_group])
155
156 def cmd(self):
157 ret = ['$O_NEXT_SRV_NO_CERT']
Jerry Yu882c30d2021-12-01 10:59:59 +0800158 for i in self.certificates:
159 print(i)
160 for _, cert, key in self.certificates:
Jerry Yu305bfc32021-11-24 16:04:47 +0800161 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)]
162 ret += ['-accept $SRV_PORT']
163 ciphersuites = ','.join(self.ciphersuites)
164 signature_algorithms = ','.join(self.signature_algorithms)
165 named_groups = ','.join(self.named_groups)
166 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites),
167 "-sigalgs {signature_algorithms}".format(
168 signature_algorithms=signature_algorithms),
169 "-groups {named_groups}".format(named_groups=named_groups)]
170 ret += ['-msg -tls1_3 -no_middlebox -num_tickets 0 -no_resume_ephemeral -no_cache']
171 return ' '.join(ret)
172
173 def pre_checks(self):
174 return ["requires_openssl_tls1_3"]
175
176 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800177 return ['-c "HTTP/1.0 200 ok"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800178
179
180class GnuTLSServ(TLSProgram):
181 """
182 Generate test commands for GnuTLS server.
183 """
184
185 def __init__(self, ciphersuite, signature_algorithm, named_group):
186 self.priority_strings = []
187 self.certificates = []
188 super().__init__(ciphersuite, signature_algorithm, named_group)
189
190 CIPHER_SUITE = {
191 'TLS_AES_256_GCM_SHA384': [
192 'AES-256-GCM',
193 'SHA384',
194 'AEAD'],
195 'TLS_AES_128_GCM_SHA256': [
196 'AES-128-GCM',
197 'SHA256',
198 'AEAD'],
199 'TLS_CHACHA20_POLY1305_SHA256': [
200 'CHACHA20-POLY1305',
201 'SHA256',
202 'AEAD'],
203 'TLS_AES_128_CCM_SHA256': [
204 'AES-128-CCM',
205 'SHA256',
206 'AEAD'],
207 'TLS_AES_128_CCM_8_SHA256': [
208 'AES-128-CCM-8',
209 'SHA256',
210 'AEAD']}
211
212 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800213 for ciphersuite in ciphersuites:
214 self.priority_strings.extend(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800215
216 SIGNATURE_ALGORITHM = {
217 'ecdsa_secp256r1_sha256': ['SIGN-ECDSA-SECP256R1-SHA256'],
218 'ecdsa_secp521r1_sha512': ['SIGN-ECDSA-SECP521R1-SHA512'],
Jerry Yu29deed42021-11-25 11:09:54 +0800219 'ecdsa_secp384r1_sha384': ['SIGN-ECDSA-SECP384R1-SHA384'],
220 'rsa_pss_rsae_sha256': ['SIGN-RSA-PSS-RSAE-SHA256']}
Jerry Yu305bfc32021-11-24 16:04:47 +0800221
222 def add_signature_algorithms(self, *signature_algorithms):
223 for sig_alg in signature_algorithms:
224 self.priority_strings.extend(self.SIGNATURE_ALGORITHM[sig_alg])
225 self.certificates.append(CERTIFICATES[sig_alg])
226
227 NAMED_GROUP = {
228 'secp256r1': ['GROUP-SECP256R1'],
229 'secp384r1': ['GROUP-SECP384R1'],
230 'secp521r1': ['GROUP-SECP521R1'],
231 'x25519': ['GROUP-X25519'],
232 'x448': ['GROUP-X448'],
233 }
234
235 def add_named_groups(self, *named_groups):
236 for named_group in named_groups:
237 self.priority_strings.extend(self.NAMED_GROUP[named_group])
238
239 def pre_checks(self):
240 return ["requires_gnutls_tls1_3",
241 "requires_gnutls_next_no_ticket",
242 "requires_gnutls_next_disable_tls13_compat", ]
243
244 def post_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800245 return ['-c "HTTP/1.0 200 OK"']
Jerry Yu305bfc32021-11-24 16:04:47 +0800246
247 def cmd(self):
248 ret = [
249 '$G_NEXT_SRV_NO_CERT',
250 '--http',
251 '--disable-client-cert',
252 '--debug=4']
Jerry Yu882c30d2021-12-01 10:59:59 +0800253 for _, cert, key in self.certificates:
Jerry Yu305bfc32021-11-24 16:04:47 +0800254 ret += ['--x509certfile {cert} --x509keyfile {key}'.format(
255 cert=cert, key=key)]
256 priority_strings = ':+'.join(['NONE'] +
Jerry Yudda036d2021-11-30 11:19:41 +0800257 list(sorted(self.priority_strings)) +
Jerry Yu305bfc32021-11-24 16:04:47 +0800258 ['VERS-TLS1.3'])
259 priority_strings += ':%NO_TICKETS:%DISABLE_TLS13_COMPAT_MODE'
260 ret += ['--priority={priority_strings}'.format(
261 priority_strings=priority_strings)]
262 ret = ' '.join(ret)
263 return ret
264
265
266class MbedTLSCli(TLSProgram):
267 """
268 Generate test commands for mbedTLS client.
269 """
Jerry Yu29deed42021-11-25 11:09:54 +0800270
Jerry Yu305bfc32021-11-24 16:04:47 +0800271 def __init__(self, ciphersuite, signature_algorithm, named_group):
272 self.ciphersuites = []
273 self.certificates = []
274 self.signature_algorithms = []
275 self.named_groups = []
276 self.needed_named_groups = []
277 super().__init__(ciphersuite, signature_algorithm, named_group)
278
279 CIPHER_SUITE = {
280 'TLS_AES_256_GCM_SHA384': 'TLS1-3-AES-256-GCM-SHA384',
281 'TLS_AES_128_GCM_SHA256': 'TLS1-3-AES-128-GCM-SHA256',
282 'TLS_CHACHA20_POLY1305_SHA256': 'TLS1-3-CHACHA20-POLY1305-SHA256',
283 'TLS_AES_128_CCM_SHA256': 'TLS1-3-AES-128-CCM-SHA256',
284 'TLS_AES_128_CCM_8_SHA256': 'TLS1-3-AES-128-CCM-8-SHA256'}
285
286 def add_ciphersuites(self, *ciphersuites):
Jerry Yud64e20d2021-11-26 10:50:01 +0800287 for ciphersuite in ciphersuites:
288 self.ciphersuites.append(self.CIPHER_SUITE[ciphersuite])
Jerry Yu305bfc32021-11-24 16:04:47 +0800289
290 def add_signature_algorithms(self, *signature_algorithms):
291 for sig_alg in signature_algorithms:
292 self.signature_algorithms.append(sig_alg)
293 if sig_alg == 'ecdsa_secp256r1_sha256':
294 self.needed_named_groups.append('secp256r1')
295 elif sig_alg == 'ecdsa_secp521r1_sha512':
296 self.needed_named_groups.append('secp521r1')
297 elif sig_alg == 'ecdsa_secp384r1_sha384':
298 self.needed_named_groups.append('secp384r1')
299
300 self.certificates.append(CERTIFICATES[sig_alg])
301
302 def add_named_groups(self, *named_groups):
303 for named_group in named_groups:
304 self.named_groups.append(named_group)
305
306 def pre_checks(self):
Jerry Yu29deed42021-11-25 11:09:54 +0800307
308 ret = ['requires_config_enabled MBEDTLS_DEBUG_C',
309 'requires_config_enabled MBEDTLS_SSL_CLI_C',
310 'requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3_EXPERIMENTAL',
311 'requires_config_disabled MBEDTLS_USE_PSA_CRYPTO']
312 if 'rsa_pss_rsae_sha256' in self.signature_algorithms:
313 ret.append(
314 'requires_config_enabled MBEDTLS_X509_RSASSA_PSS_SUPPORT')
315 return ret
Jerry Yu305bfc32021-11-24 16:04:47 +0800316
317 def post_checks(self):
318
319 check_strings = ["ECDH curve: {group}".format(group=self._named_group),
320 "server hello, chosen ciphersuite: ( {:04x} ) - {}".format(
321 CIPHER_SUITE_IANA_VALUE[self._cipher],
322 self.CIPHER_SUITE[self._cipher]),
323 "Certificate Verify: Signature algorithm ( {:04x} )".format(
324 SIG_ALG_IANA_VALUE[self._sig_alg]),
325 "Verifying peer X.509 certificate... ok", ]
326 return ['-c "{}"'.format(i) for i in check_strings]
327
328 def cmd(self):
329 ret = ['$P_CLI']
330 ret += [
331 'server_addr=127.0.0.1 server_port=$SRV_PORT',
332 'debug_level=4 force_version=tls1_3']
Jerry Yu882c30d2021-12-01 10:59:59 +0800333 ret += ['ca_file={cafile}'.format(
334 cafile=CERTIFICATES[self._sig_alg].cafile)]
Jerry Yu305bfc32021-11-24 16:04:47 +0800335 self.ciphersuites = list(set(self.ciphersuites))
336 cipher = ','.join(self.ciphersuites)
337 if cipher:
338 ret += ["force_ciphersuite={cipher}".format(cipher=cipher)]
339 self.named_groups = remove_duplicates(
340 self.named_groups + self.needed_named_groups)
341 group = ','.join(self.named_groups)
342 if group:
343 ret += ["curves={group}".format(group=group)]
344 sig_alg = ','.join(self.signature_algorithms)
345 ret += ['sig_algs={sig_alg}'.format(sig_alg=sig_alg)]
346 ret = ' '.join(ret)
347 return ret
348
349
Jerry Yub4ac8f32021-12-01 10:41:37 +0800350SERVER_CLASSES = {'OpenSSL': OpenSSLServ, 'GnuTLS': GnuTLSServ}
351CLIENT_CLASSES = {'mbedTLS': MbedTLSCli}
Jerry Yu305bfc32021-11-24 16:04:47 +0800352
353
Jerry Yub4ac8f32021-12-01 10:41:37 +0800354def generate_compat_test(server=None, client=None, cipher=None, sig_alg=None, named_group=None):
Jerry Yu305bfc32021-11-24 16:04:47 +0800355 """
356 Generate test case with `ssl-opt.sh` format.
357 """
Jerry Yudda036d2021-11-30 11:19:41 +0800358 name = 'TLS 1.3 {client[0]}->{server[0]}: {cipher},{named_group},{sig_alg}'.format(
Jerry Yu305bfc32021-11-24 16:04:47 +0800359 client=client, server=server, cipher=cipher, sig_alg=sig_alg, named_group=named_group)
Jerry Yub4ac8f32021-12-01 10:41:37 +0800360 server_object = SERVER_CLASSES[server](cipher, sig_alg, named_group)
361 client_object = CLIENT_CLASSES[client](cipher, sig_alg, named_group)
Jerry Yu305bfc32021-11-24 16:04:47 +0800362
363 cmd = ['run_test "{}"'.format(name), '"{}"'.format(
Jerry Yub4ac8f32021-12-01 10:41:37 +0800364 server_object.cmd()), '"{}"'.format(client_object.cmd()), '0']
365 cmd += server_object.post_checks()
366 cmd += client_object.post_checks()
Jerry Yucdcb6832021-11-29 16:50:13 +0800367 prefix = ' \\\n' + (' '*9)
Jerry Yu305bfc32021-11-24 16:04:47 +0800368 cmd = prefix.join(cmd)
Jerry Yub4ac8f32021-12-01 10:41:37 +0800369 return '\n'.join(server_object.pre_checks() + client_object.pre_checks() + [cmd])
Jerry Yu29deed42021-11-25 11:09:54 +0800370
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800371
372SSL_OUTPUT_HEADER = '''#!/bin/sh
Jerry Yucdcb6832021-11-29 16:50:13 +0800373
374# {filename}
375#
376# Copyright The Mbed TLS Contributors
377# SPDX-License-Identifier: Apache-2.0
378#
379# Licensed under the Apache License, Version 2.0 (the "License"); you may
380# not use this file except in compliance with the License.
381# You may obtain a copy of the License at
382#
383# http://www.apache.org/licenses/LICENSE-2.0
384#
385# Unless required by applicable law or agreed to in writing, software
386# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
387# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
388# See the License for the specific language governing permissions and
389# limitations under the License.
390#
391# Purpose
392#
393# List TLS1.3 compat test cases. They are generated by
394# `generate_tls13_compat_tests.py -a`.
395#
396# PLEASE DO NOT EDIT THIS FILE. IF NEEDED, PLEASE MODIFY `generate_tls13_compat_tests.py`
397# AND REGENERATE THIS FILE.
398#
399'''
Jerry Yu29deed42021-11-25 11:09:54 +0800400
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800401
Jerry Yu305bfc32021-11-24 16:04:47 +0800402def main():
Jerry Yudda036d2021-11-30 11:19:41 +0800403 """
404 Main function of this program
405 """
Jerry Yu305bfc32021-11-24 16:04:47 +0800406 parser = argparse.ArgumentParser()
407
Jerry Yucdcb6832021-11-29 16:50:13 +0800408 parser.add_argument('-o', '--output', nargs='?',
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800409 default=None, help='Output file path if `-a` was set')
Jerry Yucdcb6832021-11-29 16:50:13 +0800410
Jerry Yuc4aa1522021-11-26 11:13:58 +0800411 parser.add_argument('-a', '--generate-all-tls13-compat-tests', action='store_true',
412 default=False, help='Generate all available tls13 compat tests')
413
Jerry Yu305bfc32021-11-24 16:04:47 +0800414 parser.add_argument('--list-ciphers', action='store_true',
415 default=False, help='List supported ciphersuites')
416
417 parser.add_argument('--list-sig-algs', action='store_true',
418 default=False, help='List supported signature algorithms')
419
420 parser.add_argument('--list-named-groups', action='store_true',
421 default=False, help='List supported named groups')
422
423 parser.add_argument('--list-servers', action='store_true',
424 default=False, help='List supported TLS servers')
425
426 parser.add_argument('--list-clients', action='store_true',
427 default=False, help='List supported TLS Clients')
428
Jerry Yub4ac8f32021-12-01 10:41:37 +0800429 parser.add_argument('server', choices=SERVER_CLASSES.keys(), nargs='?',
430 default=list(SERVER_CLASSES.keys())[0],
Jerry Yu305bfc32021-11-24 16:04:47 +0800431 help='Choose TLS server program for test')
Jerry Yub4ac8f32021-12-01 10:41:37 +0800432 parser.add_argument('client', choices=CLIENT_CLASSES.keys(), nargs='?',
433 default=list(CLIENT_CLASSES.keys())[0],
Jerry Yu305bfc32021-11-24 16:04:47 +0800434 help='Choose TLS client program for test')
435 parser.add_argument('cipher', choices=CIPHER_SUITE_IANA_VALUE.keys(), nargs='?',
436 default=list(CIPHER_SUITE_IANA_VALUE.keys())[0],
437 help='Choose cipher suite for test')
438 parser.add_argument('sig_alg', choices=SIG_ALG_IANA_VALUE.keys(), nargs='?',
439 default=list(SIG_ALG_IANA_VALUE.keys())[0],
440 help='Choose cipher suite for test')
441 parser.add_argument('named_group', choices=NAMED_GROUP_IANA_VALUE.keys(), nargs='?',
442 default=list(NAMED_GROUP_IANA_VALUE.keys())[0],
443 help='Choose cipher suite for test')
444
445 args = parser.parse_args()
Jerry Yucdcb6832021-11-29 16:50:13 +0800446
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800447 def get_all_test_cases():
Jerry Yub4ac8f32021-12-01 10:41:37 +0800448 for cipher, sig_alg, named_group, server, client in \
449 itertools.product(CIPHER_SUITE_IANA_VALUE.keys(), SIG_ALG_IANA_VALUE.keys(),
450 NAMED_GROUP_IANA_VALUE.keys(), SERVER_CLASSES.keys(),
451 CLIENT_CLASSES.keys()):
452 yield generate_compat_test(cipher=cipher, sig_alg=sig_alg, named_group=named_group,
453 server=server, client=client)
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800454
455 if args.generate_all_tls13_compat_tests:
456 if args.output:
457 with open(args.output, 'w', encoding="utf-8") as f:
Jerry Yub4ac8f32021-12-01 10:41:37 +0800458 f.write(SSL_OUTPUT_HEADER.format(
459 filename=os.path.basename(args.output)))
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800460 f.write('\n\n'.join(get_all_test_cases()))
Jerry Yudda036d2021-11-30 11:19:41 +0800461 f.write('\n')
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800462 else:
463 print('\n'.join(get_all_test_cases()))
Jerry Yuc4aa1522021-11-26 11:13:58 +0800464 return 0
465
Jerry Yu305bfc32021-11-24 16:04:47 +0800466 if args.list_ciphers or args.list_sig_algs or args.list_named_groups \
Jerry Yu29deed42021-11-25 11:09:54 +0800467 or args.list_servers or args.list_clients:
Jerry Yu305bfc32021-11-24 16:04:47 +0800468 if args.list_ciphers:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800469 print(*CIPHER_SUITE_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800470 if args.list_sig_algs:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800471 print(*SIG_ALG_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800472 if args.list_named_groups:
Jerry Yu7f5e5ad2021-11-29 17:37:19 +0800473 print(*NAMED_GROUP_IANA_VALUE.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800474 if args.list_servers:
Jerry Yub4ac8f32021-12-01 10:41:37 +0800475 print(*SERVER_CLASSES.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800476 if args.list_clients:
Jerry Yub4ac8f32021-12-01 10:41:37 +0800477 print(*CLIENT_CLASSES.keys())
Jerry Yu305bfc32021-11-24 16:04:47 +0800478 return 0
Jerry Yucdcb6832021-11-29 16:50:13 +0800479
Jerry Yu882c30d2021-12-01 10:59:59 +0800480 print(generate_compat_test(server=args.server, client=args.client, sig_alg=args.sig_alg,
481 cipher=args.cipher, named_group=args.named_group))
Jerry Yucdcb6832021-11-29 16:50:13 +0800482 return 0
Jerry Yu305bfc32021-11-24 16:04:47 +0800483
Jerry Yu29deed42021-11-25 11:09:54 +0800484
Jerry Yu305bfc32021-11-24 16:04:47 +0800485if __name__ == "__main__":
486 sys.exit(main())