@@ -13875,8 +13875,9 @@ run_test "TLS 1.2 ClientHello indicating support for deflate compression meth
1387513875# Handshake defragmentation testing
1387613876
1387713877# To warrant that the handhake messages are large enough and need to be split
13878- # into fragments, the tests require certificate authentication, and will
13879- # use either the default per configuration certificate or the server5.crt (548 Bytes).
13878+ # into fragments, the tests require certificate authentication. The party in control
13879+ # of the fragmentation operations is OpenSSL and will always use server5.crt (548 Bytes)
13880+ # either from O_NEXT_SRV or test data.
1388013881requires_openssl_3_x
1388113882requires_protocol_version tls13
1388213883requires_certificate_authentication
@@ -14282,11 +14283,13 @@ run_test "Handshake defragmentation on server: len=3, TLS 1.3" \
1428214283 -s "handshake message too short: 3" \
1428314284 -s "SSL - An invalid SSL record was received"
1428414285
14286+ # Server-side ClientHello degfragmentation is only supported for MBEDTLS_SSL_PROTO_TLS1_3. For TLS 1.2 testing
14287+ # the server should suport both protocols and downgrade to client-requested TL1.2 after proccessing the ClientHello.
1428514288requires_openssl_3_x
1428614289requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_2
1428714290requires_config_enabled MBEDTLS_SSL_PROTO_TLS1_3
1428814291requires_certificate_authentication
14289- run_test "Handshake defragmentation on server: len=3, TLS 1.3" \
14292+ run_test "Handshake defragmentation on server: len=3, TLS 1.3 -> 1.2 " \
1429014293 "$P_SRV debug_level=4 auth_mode=required" \
1429114294 "$O_NEXT_CLI -tls1_2 -split_send_frag 3 -cert $DATA_FILES_PATH/server5.crt -key $DATA_FILES_PATH/server5.key" \
1429214295 1 \
0 commit comments