mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 14:48:21 +00:00

Ensure the client side also uses the initial destination connection ID for decryption purposes instead of the one from the current long header packet. PCAP from local WiFi hotspot.
12 lines
734 B
Text
12 lines
734 B
Text
# @TEST-DOC: PCAP for which decryption failed due to not using the initial destination connection ID consistently.
|
|
|
|
# @TEST-REQUIRES: ${SCRIPTS}/have-spicy
|
|
# @TEST-EXEC: zeek -Cr $TRACES/quic/quic-decrypt-fail-google-de-51833.pcap base/protocols/quic
|
|
# @TEST-EXEC: test ! -f analyzer.log
|
|
# @TEST-EXEC: test ! -f dpd.log
|
|
# @TEST-EXEC: zeek-cut -m ts uid history service < conn.log > conn.log.cut
|
|
# @TEST-EXEC: btest-diff conn.log.cut
|
|
# @TEST-EXEC: zeek-cut -m ts uid server_name history < quic.log > quic.log.cut
|
|
# @TEST-EXEC: btest-diff quic.log.cut
|
|
# @TEST-EXEC: zeek-cut -m ts uid version cipher curve server_name resumed last_alert next_protocol established ssl_history < ssl.log > ssl.log.cut
|
|
# @TEST-EXEC: btest-diff ssl.log.cut
|