sniffer-tls13-gen.sh 1.3 KB

1234567891011121314151617181920212223242526272829
  1. #!/bin/bash
  2. # Run these configures and the example server/client below
  3. # Script to generate wireshark trace for sniffer-tls13-ecc.pcap
  4. #./configure --enable-sniffer --enable-session-ticket && make
  5. # Script to generate wireshark trace for sniffer-tls13-dh.pcap
  6. #./configure --enable-sniffer --enable-session-ticket --disable-ecc && make
  7. # TLS v1.3
  8. ./examples/server/server -v 4 -l TLS13-AES128-GCM-SHA256 &
  9. ./examples/client/client -v 4 -l TLS13-AES128-GCM-SHA256
  10. ./examples/server/server -v 4 -l TLS13-AES256-GCM-SHA384 &
  11. ./examples/client/client -v 4 -l TLS13-AES256-GCM-SHA384
  12. ./examples/server/server -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 &
  13. ./examples/client/client -v 4 -l TLS13-CHACHA20-POLY1305-SHA256
  14. # TLS v1.3 Resumption
  15. ./examples/server/server -v 4 -l TLS13-AES128-GCM-SHA256 -r &
  16. ./examples/client/client -v 4 -l TLS13-AES128-GCM-SHA256 -r
  17. ./examples/server/server -v 4 -l TLS13-AES256-GCM-SHA384 -r &
  18. ./examples/client/client -v 4 -l TLS13-AES256-GCM-SHA384 -r
  19. ./examples/server/server -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r &
  20. ./examples/client/client -v 4 -l TLS13-CHACHA20-POLY1305-SHA256 -r
  21. # TLS v1.3 Hello Retry Request (save this as sniffer-tls13-hrr.pcap)
  22. # ./configure --enable-sniffer CFLAGS="-DWOLFSSL_SNIFFER_WATCH" --disable-dh && make
  23. ./examples/server/server -v 4 -i -x -g &
  24. ./examples/client/client -v 4 -J