mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2024-12-29 14:05:29 +00:00
3b490a0a01
The tests are supposed to be failing now (in all.sh component test_memsan_constant_flow), but they don't as apparently MemSan doesn't complain when the src argument of memcpy() is uninitialized, see https://github.com/google/sanitizers/issues/1296 The next commit will add an option to test constant flow with valgrind, which will hopefully correctly flag the current non-constant-flow implementation. Signed-off-by: Manuel Pégourié-Gonnard <manuel.pegourie-gonnard@arm.com>
88 lines
2.8 KiB
Plaintext
88 lines
2.8 KiB
Plaintext
SSL DTLS replay: initial state, seqnum 0
|
|
ssl_dtls_replay:"":"000000000000":0
|
|
|
|
SSL DTLS replay: 0 seen, 1 arriving
|
|
ssl_dtls_replay:"000000000000":"000000000001":0
|
|
|
|
SSL DTLS replay: 0 seen, 0 replayed
|
|
ssl_dtls_replay:"000000000000":"000000000000":-1
|
|
|
|
SSL DTLS replay: 0-1 seen, 2 arriving
|
|
ssl_dtls_replay:"000000000000,000000000001":"000000000002":0
|
|
|
|
SSL DTLS replay: 0-1 seen, 1 replayed
|
|
ssl_dtls_replay:"000000000000,000000000001":"000000000001":-1
|
|
|
|
SSL DTLS replay: 0-1 seen, 0 replayed
|
|
ssl_dtls_replay:"000000000000,000000000001":"000000000000":-1
|
|
|
|
SSL DTLS replay: new
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd12340003":"abcd12340004":0
|
|
|
|
SSL DTLS replay: way new
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd12340003":"abcd12350000":0
|
|
|
|
SSL DTLS replay: delayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd12340003":"abcd12340002":0
|
|
|
|
SSL DTLS replay: lastest replayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd12340003":"abcd12340003":-1
|
|
|
|
SSL DTLS replay: older replayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd12340003":"abcd12340001":-1
|
|
|
|
SSL DTLS replay: most recent in window, replayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340002,abcd12340003":"abcd12340002":-1
|
|
|
|
SSL DTLS replay: oldest in window, replayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340001,abcd1234003f":"abcd12340000":-1
|
|
|
|
SSL DTLS replay: oldest in window, not replayed
|
|
ssl_dtls_replay:"abcd12340001,abcd12340002,abcd1234003f":"abcd12340000":0
|
|
|
|
SSL DTLS replay: just out of the window
|
|
ssl_dtls_replay:"abcd12340001,abcd12340002,abcd1234003f":"abcd1233ffff":-1
|
|
|
|
SSL DTLS replay: way out of the window
|
|
ssl_dtls_replay:"abcd12340001,abcd12340002,abcd1234003f":"abcd12330000":-1
|
|
|
|
SSL DTLS replay: big jump then replay
|
|
ssl_dtls_replay:"abcd12340000,abcd12340100":"abcd12340100":-1
|
|
|
|
SSL DTLS replay: big jump then new
|
|
ssl_dtls_replay:"abcd12340000,abcd12340100":"abcd12340101":0
|
|
|
|
SSL DTLS replay: big jump then just delayed
|
|
ssl_dtls_replay:"abcd12340000,abcd12340100":"abcd123400ff":0
|
|
|
|
SSL SET_HOSTNAME memory leak: call ssl_set_hostname twice
|
|
ssl_set_hostname_twice:"server0":"server1"
|
|
|
|
Constant-flow HMAC: MD5
|
|
depends_on:MBEDTLS_MD5_C
|
|
ssl_cf_hmac:MBEDTLS_MD_MD5
|
|
|
|
Constant-flow HMAC: SHA1
|
|
depends_on:MBEDTLS_SHA1_C
|
|
ssl_cf_hmac:MBEDTLS_MD_SHA1
|
|
|
|
Constant-flow HMAC: SHA256
|
|
depends_on:MBEDTLS_SHA256_C
|
|
ssl_cf_hmac:MBEDTLS_MD_SHA256
|
|
|
|
Constant-flow HMAC: SHA384
|
|
depends_on:MBEDTLS_SHA512_C:!MBEDTLS_SHA512_NO_SHA384
|
|
ssl_cf_hmac:MBEDTLS_MD_SHA384
|
|
|
|
# these are the numbers we'd get with an empty plaintext and truncated HMAC
|
|
Constant-flow memcpy from offset: small
|
|
ssl_cf_memcpy_offset:0:5:10
|
|
|
|
# we could get this with 255-bytes plaintext and untruncated SHA-256
|
|
Constant-flow memcpy from offset: medium
|
|
ssl_cf_memcpy_offset:0:255:32
|
|
|
|
# we could get this with 355-bytes plaintext and untruncated SHA-384
|
|
Constant-flow memcpy from offset: large
|
|
ssl_cf_memcpy_offset:100:339:48
|