forked from wolfSSL/wolfssl
Added test case for TLS v1.3 with HRR (hello_retry_request)
This commit is contained in:
@@ -91,6 +91,7 @@ EXTRA_DIST += scripts/testsuite.pcap \
|
|||||||
scripts/sniffer-tls13-dh.pcap \
|
scripts/sniffer-tls13-dh.pcap \
|
||||||
scripts/sniffer-tls13-ecc.pcap \
|
scripts/sniffer-tls13-ecc.pcap \
|
||||||
scripts/sniffer-tls13-gen.sh \
|
scripts/sniffer-tls13-gen.sh \
|
||||||
|
scripts/sniffer-tls13-hrr.pcap \
|
||||||
scripts/ping.test \
|
scripts/ping.test \
|
||||||
scripts/benchmark.test \
|
scripts/benchmark.test \
|
||||||
scripts/memtest.sh
|
scripts/memtest.sh
|
||||||
|
@@ -39,6 +39,16 @@ then
|
|||||||
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 DH\n" && exit 1
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 DH\n" && exit 1
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
# TLS v1.3 sniffer test hello_retry_request (HRR) with ECDHE
|
||||||
|
if test $# -ne 0
|
||||||
|
then
|
||||||
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-hrr.pcap ./certs/statickeys/ecc-secp256r1.pem 127.0.0.1 11111
|
||||||
|
|
||||||
|
RESULT=$?
|
||||||
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 HRR\n" && exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
# IPv6
|
# IPv6
|
||||||
if test $# -ne 0 && test "x$1" = "x-6";
|
if test $# -ne 0 && test "x$1" = "x-6";
|
||||||
then
|
then
|
||||||
|
@@ -22,3 +22,8 @@
|
|||||||
./examples/client/client -v 4 -l TLS13-AES256-GCM-SHA384 -r
|
./examples/client/client -v 4 -l TLS13-AES256-GCM-SHA384 -r
|
||||||
./examples/server/server -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r &
|
./examples/server/server -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r &
|
||||||
./examples/client/client -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r
|
./examples/client/client -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r
|
||||||
|
|
||||||
|
# TLS v1.3 Hello Retry Request (save this as sniffer-tls13-hrr.pcap)
|
||||||
|
# ./configure --enable-sniffer CFLAGS="-DWOLFSSL_SNIFFER_WATCH" --disable-dh && make
|
||||||
|
./examples/server/server -v 4 -i -x -g &
|
||||||
|
./examples/client/client -v 4 -J
|
||||||
|
BIN
scripts/sniffer-tls13-hrr.pcap
Normal file
BIN
scripts/sniffer-tls13-hrr.pcap
Normal file
Binary file not shown.
@@ -113,6 +113,5 @@ STRINGTABLE
|
|||||||
92, "Store Data callback failed"
|
92, "Store Data callback failed"
|
||||||
93, "Loading chain input"
|
93, "Loading chain input"
|
||||||
94, "Got encrypted extension"
|
94, "Got encrypted extension"
|
||||||
95, "Hello retry request"
|
95, "Got Hello Retry Request"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user