Skip to content

Commit d301ac7

Browse files
committed
Move new tests to their own data file
Signed-off-by: Manuel Pégourié-Gonnard <[email protected]>
1 parent 5977a59 commit d301ac7

File tree

2 files changed

+181
-182
lines changed

2 files changed

+181
-182
lines changed

tests/suites/test_suite_ssl.data

Lines changed: 0 additions & 182 deletions
Original file line numberDiff line numberDiff line change
@@ -3445,185 +3445,3 @@ tls13_srv_max_early_data_size:TEST_EARLY_DATA_HRR:3:3
34453445

34463446
TLS 1.3 srv, max early data size, HRR, 98, wsz=49
34473447
tls13_srv_max_early_data_size:TEST_EARLY_DATA_HRR:97:0
3448-
3449-
# (Minimal) ClientHello breakdown:
3450-
# 160303rlrl - record header, 2-byte record contents len
3451-
# 01hlhlhl - handshake header, 3-byte handshake message len
3452-
# 0303 - protocol version: 1.2
3453-
# 0123456789abcdef (repeated, 4 times total) - 32-byte "random"
3454-
# 00 - session ID (empty)
3455-
# 0002cvcv - ciphersuite list: 2-byte len + list of 2-byte values (see below)
3456-
# 0100 - compression methods: 1-byte len then "null" (only legal value now)
3457-
# [then end, or extensions, see notes below]
3458-
# elel - 2-byte extensions length
3459-
# ...
3460-
# 000a - elliptic_curves aka supported_groups
3461-
# 0004 - extension length
3462-
# 0002 - length of named_curve_list / named_group_list
3463-
# 0017 - secp256r1 aka NIST P-256
3464-
# ...
3465-
# 002b - supported version (for TLS 1.3)
3466-
# 0003 - extension length
3467-
# 02 - length of versions
3468-
# 0304 - TLS 1.3 ("SSL 3.4")
3469-
# ...
3470-
# 000d - signature algorithms
3471-
# 0004 - extension length
3472-
# 0002 - SignatureSchemeList length
3473-
# 0403 - ecdsa_secp256r1_sha256
3474-
# ...
3475-
# 0033 - key share
3476-
# 0002 - extension length
3477-
# 0000 - length of client_shares (empty is valid)
3478-
#
3479-
# Note: currently our TLS "1.3 or 1.2" code requires extension length to be
3480-
# present even it it's 0. This is not strictly compliant but doesn't matter
3481-
# much in practice as these days everyone wants to use signature_algorithms
3482-
# (for hashes better than SHA-1), secure_renego (even if you have renego
3483-
# disabled), and most people want either ECC or PSK related extensions.
3484-
# See https://github.com/Mbed-TLS/mbedtls/issues/9963
3485-
#
3486-
# Also, currently we won't negotiate ECC ciphersuites unless at least the
3487-
# supported_groups extension is present, see
3488-
# https://github.com/Mbed-TLS/mbedtls/issues/7458
3489-
#
3490-
# For TLS 1.3 with ephemeral key exchange, mandatory extensions are:
3491-
# - supported versions (as for all of TLS 1.3)
3492-
# - supported groups
3493-
# - key share
3494-
# - signature algorithms
3495-
# (see ssl_tls13_client_hello_has_exts_for_ephemeral_key_exchange()).
3496-
#
3497-
# Note: cccc is currently not assigned, so can be used get a consistent
3498-
# "no matching ciphersuite" behaviour regardless of the configuration.
3499-
# c02b is MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (1.2)
3500-
# 1301 is MBEDTLS_TLS1_3_AES_128_GCM_SHA256 (1.3)
3501-
3502-
# See "ClientHello breakdown" above
3503-
# MBEDTLS_TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 with secp256r1
3504-
Inject ClientHello - TLS 1.2 good (for reference)
3505-
depends_on:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_MD_CAN_SHA1
3506-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"16030300370100003303030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef000002c02b01000008000a000400020017":"<= parse client hello":0
3507-
3508-
# See "ClientHello breakdown" above
3509-
# Same as the above test with s/c02b/cccc/ as the ciphersuite
3510-
Inject ClientHello - TLS 1.2 unknown ciphersuite (for reference)
3511-
depends_on:MBEDTLS_SSL_PROTO_TLS1_2:MBEDTLS_KEY_EXCHANGE_ECDHE_ECDSA_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_MD_CAN_SHA1
3512-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303002f0100002b03030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef000002cccc01000000":"got no ciphersuites in common":MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE
3513-
3514-
# See "ClientHello breakdown" above
3515-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3516-
Inject ClientHello - TLS 1.3 good (for reference)
3517-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3518-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303004c0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"key exchange mode\: ephemeral":0
3519-
3520-
# See "ClientHello breakdown" above
3521-
# Same as the above test with s/1301/cccc/ as the ciphersuite
3522-
Inject ClientHello - TLS 1.3 unknown ciphersuite (for reference)
3523-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3524-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303004c0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef000002cccc0100001d000a000400020017002b0003020304000d000400020403003300020000":"No matched ciphersuite":MBEDTLS_ERR_SSL_HANDSHAKE_FAILURE
3525-
3526-
# See "ClientHello breakdown" above
3527-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3528-
Inject ClientHello - TLS 1.3 fragmented 4 + 72 OK
3529-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3530-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000401000048160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"reassembled record":0
3531-
3532-
# See "ClientHello breakdown" above
3533-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3534-
Inject ClientHello - TLS 1.3 fragmented 3 + 73 rejected
3535-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3536-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000301000016030300494803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"handshake message too short":MBEDTLS_ERR_SSL_INVALID_RECORD
3537-
3538-
# See "ClientHello breakdown" above
3539-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3540-
Inject ClientHello - TLS 1.3 fragmented 2 + 74 rejected
3541-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3542-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"16030300020100160303004a004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"handshake message too short":MBEDTLS_ERR_SSL_INVALID_RECORD
3543-
3544-
# See "ClientHello breakdown" above
3545-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3546-
Inject ClientHello - TLS 1.3 fragmented 1 + 75 rejected
3547-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3548-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000101160303004b00004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"handshake message too short":MBEDTLS_ERR_SSL_INVALID_RECORD
3549-
3550-
# See "ClientHello breakdown" above
3551-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3552-
Inject ClientHello - TLS 1.3 fragmented 0 + 76 rejected
3553-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3554-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"1603030000160303004c0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"ssl_get_next_record() returned":MBEDTLS_ERR_SSL_INVALID_RECORD
3555-
3556-
# See "ClientHello breakdown" above
3557-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3558-
Inject ClientHello - TLS 1.3 fragmented 72 + 4 OK
3559-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3560-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"16030300480100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d0004000204030033160303000400020000":"reassembled record":0
3561-
3562-
# See "ClientHello breakdown" above
3563-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3564-
Inject ClientHello - TLS 1.3 fragmented 73 + 3 OK
3565-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3566-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"16030300490100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d0004000204030033001603030003020000":"reassembled record":0
3567-
3568-
# See "ClientHello breakdown" above
3569-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3570-
Inject ClientHello - TLS 1.3 fragmented 74 + 2 OK
3571-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3572-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303004a0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d0004000204030033000216030300020000":"reassembled record":0
3573-
3574-
# See "ClientHello breakdown" above
3575-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3576-
Inject ClientHello - TLS 1.3 fragmented 73 + 1 OK
3577-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3578-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303004b0100004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d0004000204030033000200160303000100":"reassembled record":0
3579-
3580-
# See "ClientHello breakdown" above
3581-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3582-
Inject ClientHello - TLS 1.3 fragmented 4 + appdata + 72 rejected
3583-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3584-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"16030300040100004817030300020102160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"Receive unexpected handshake message":MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE
3585-
3586-
# See "ClientHello breakdown" above
3587-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3588-
##Inject ClientHello - TLS 1.3 fragmented 4 + alert(warn) + 72 ~rejected~ (currently loops forever)
3589-
##depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3590-
##inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"1603030004010000481503030002015a160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"received unexpected message type during handshake":MBEDTLS_ERR_SSL_UNEXPECTED_MESSAGE
3591-
3592-
# See "ClientHello breakdown" above
3593-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3594-
Inject ClientHello - TLS 1.3 fragmented 4 + alert(fatal) + 72 rejected
3595-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3596-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"1603030004010000481503030002025a160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"is a fatal alert message":MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE
3597-
3598-
# See "ClientHello breakdown" above
3599-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3600-
##Inject ClientHello - TLS 1.3 fragmented 4 + CCS + 72 ~rejected~ (currently loops forever)
3601-
##depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3602-
##inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"160303000401000048140303000101160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"is a fatal alert message":MBEDTLS_ERR_SSL_FATAL_ALERT_MESSAGE
3603-
3604-
# See "ClientHello breakdown" above
3605-
# ephemeral with secp256r1 + MBEDTLS_TLS1_3_AES_128_GCM_SHA256
3606-
Inject ClientHello - TLS 1.3 fragmented 4 + invalid type + 72 rejected
3607-
depends_on:MBEDTLS_SSL_PROTO_TLS1_3:MBEDTLS_SSL_TLS1_3_KEY_EXCHANGE_MODE_EPHEMERAL_ENABLED:MBEDTLS_SSL_HAVE_AES:MBEDTLS_MD_CAN_SHA256:MBEDTLS_SSL_HAVE_GCM:MBEDTLS_ECP_HAVE_SECP256R1:MBEDTLS_ECP_HAVE_SECP384R1:MBEDTLS_PK_CAN_ECDSA_SIGN:MBEDTLS_PK_CAN_ECDSA_VERIFY
3608-
inject_client_content_on_the_wire:MBEDTLS_PK_ECDSA:MBEDTLS_SSL_CLIENT_HELLO:"1603030004010000481003030002015a160303004803030123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef00000213010100001d000a000400020017002b0003020304000d000400020403003300020000":"unknown record type":MBEDTLS_ERR_SSL_INVALID_RECORD
3609-
3610-
Send large fragmented ClientHello: 4 bytes too large
3611-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN:0:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3612-
3613-
Send large fragmented ClientHello: 1 byte too large
3614-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 3:0:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3615-
3616-
Send large fragmented ClientHello: would fit without overhead #1
3617-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 4:0:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3618-
3619-
Send large fragmented ClientHello: would fit without overhead #2
3620-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 4:1:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3621-
3622-
Send large fragmented ClientHello: would fit without overhead #3
3623-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 4:2:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3624-
3625-
Send large fragmented ClientHello: would fit without overhead #4
3626-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 4:3:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA
3627-
3628-
Send large fragmented ClientHello: would fit without overhead #5
3629-
send_large_fragmented_hello:MBEDTLS_SSL_IN_CONTENT_LEN - 4:4:"requesting more data than fits":MBEDTLS_ERR_SSL_BAD_INPUT_DATA

0 commit comments

Comments
 (0)