Skip to content

Commit b59caea

Browse files
committed
Add test cases for EOF in the middle of fragments
Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
1 parent 4712b3e commit b59caea

File tree

1 file changed

+16
-0
lines changed

1 file changed

+16
-0
lines changed

tests/suites/test_suite_ssl.tls-defrag.data

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,22 @@ Inject ClientHello - TLS 1.3 unknown ciphersuite (for reference)
7575
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
7676
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303004c0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef000002cccc0100001d000a000400020017002b0003020304000d000400020403003300020000":"No matched ciphersuite":MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE
7777

78+
# See "ClientHello breakdown" above
79+
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
80+
# The purpose of this test case is to ensure nothing bad happens when the
81+
# connection is closed while we're waiting for more fragments.
82+
Inject ClientHello - TLS 1.3 4 + 71 then EOF (missing 1 byte)
83+
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
84+
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000401000048160303004703030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d0004000204030033000200":"":MBEDTLS_ERR_SSL_WANT_READ
85+
86+
# See "ClientHello breakdown" above
87+
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
88+
# The purpose of this test case is to ensure nothing bad happens when the
89+
# connection is closed while we're waiting for more fragments.
90+
Inject ClientHello - TLS 1.3 4 then EOF (missing 72 bytes)
91+
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
92+
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000401000048":"":MBEDTLS_ERR_SSL_WANT_READ
93+
7894
# See "ClientHello breakdown" above
7995
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
8096
Inject ClientHello - TLS 1.3 fragmented 4 + 72 OK

0 commit comments

Comments
 (0)