![David Garske](/assets/img/avatar_default.png)
* Fixes for building with Ed/Curve25519 only. Fix for IoT safe demo to exit after running once. Added `WOLFSSL_DH_EXTRA` to `--enable-all` and `--enable-sniffer`. Cleanup uses of `==` in configure.ac. Various spelling fixes. * Fix for sniffer with TLS v1.3 session tickets. * Fix for ASN Template Ed25519 key export (missing version / not setting OID correctly). * Add key import/export support for Curve25519/Curve448. Refactor of the 25519/448 ASN code to combine duplicate code. * Refactor of Curve25519 code. Improved public key export to handle generation when only private is set. Improved private scalar buffer sizing. * Fix for static ephemeral loading of file buffer. * Added sniffer Curve25519 support and test case. * Fix for sniffer to not use ECC for X25519 if both are set. * Fix Curve448 public export when only private is set. * Fix for `dh_generate_test` for small stack size. * Reduce stack size use on new asymmetric DER import/export functions. Cleanup pub length calc. * Fix invalid comment.
75 lines
2.1 KiB
Bash
Executable File
75 lines
2.1 KiB
Bash
Executable File
#!/bin/sh
|
|
|
|
#sniffer-testsuite.test
|
|
|
|
# if we can, isolate the network namespace to eliminate port collisions.
|
|
if [ "${AM_BWRAPPED-}" != "yes" ]; then
|
|
bwrap_path="$(command -v bwrap)"
|
|
if [ -n "$bwrap_path" ]; then
|
|
export AM_BWRAPPED=yes
|
|
exec "$bwrap_path" --unshare-net --dev-bind / / "$0" "$@"
|
|
fi
|
|
unset AM_BWRAPPED
|
|
fi
|
|
|
|
# ./configure --enable-sniffer [--enable-session-ticket]
|
|
# Resumption tests require "--enable-session-ticket"
|
|
|
|
echo -e "\nStaring snifftest on testsuite.pcap...\n"
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/testsuite.pcap ./certs/server-key.pem 127.0.0.1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest failed\n" && exit 1
|
|
|
|
# TLS v1.3 sniffer test ECC (and resumption)
|
|
if test $# -ne 0
|
|
then
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-ecc.pcap ./certs/statickeys/ecc-secp256r1.pem 127.0.0.1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 ECC\n" && exit 1
|
|
fi
|
|
|
|
# TLS v1.3 sniffer test DH (and resumption)
|
|
if test $# -ne 0
|
|
then
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-dh.pcap ./certs/statickeys/dh-ffdhe2048.pem 127.0.0.1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 DH\n" && exit 1
|
|
fi
|
|
|
|
# TLS v1.3 sniffer test X25519 (and resumption)
|
|
if test $# -ne 0
|
|
then
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-x25519.pcap ./certs/statickeys/x25519.pem 127.0.0.1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 X25519\n" && exit 1
|
|
fi
|
|
|
|
|
|
# TLS v1.3 sniffer test hello_retry_request (HRR) with ECDHE
|
|
if test $# -ne 0
|
|
then
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-tls13-hrr.pcap ./certs/statickeys/ecc-secp256r1.pem 127.0.0.1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest TLS v1.3 HRR\n" && exit 1
|
|
fi
|
|
|
|
|
|
# IPv6
|
|
if test $# -ne 0 && test "x$1" = "x-6";
|
|
then
|
|
echo -e "\nStaring snifftest on sniffer-ipv6.pcap...\n"
|
|
./sslSniffer/sslSnifferTest/snifftest ./scripts/sniffer-ipv6.pcap ./certs/server-key.pem ::1 11111
|
|
|
|
RESULT=$?
|
|
[ $RESULT -ne 0 ] && echo -e "\nsnifftest (ipv6) failed\n" && exit 1
|
|
fi
|
|
|
|
echo -e "\nSuccess!\n"
|
|
|
|
exit 0
|