@@ -29130,6 +29130,10 @@ static int test_dtls13_bad_epoch_ch(void)
2913029130 WOLFSSL *ssl_s = NULL;
2913129131 struct test_memio_ctx test_ctx;
2913229132 const int EPOCH_OFF = 3;
29133+ int groups[] = {
29134+ WOLFSSL_ECC_SECP256R1,
29135+ WOLFSSL_ECC_SECP384R1,
29136+ };
2913329137
2913429138 XMEMSET(&test_ctx, 0, sizeof(test_ctx));
2913529139 ExpectIntEQ(test_memio_setup(&test_ctx, &ctx_c, &ctx_s, &ssl_c, &ssl_s,
@@ -29139,6 +29143,9 @@ static int test_dtls13_bad_epoch_ch(void)
2913929143 * with just one message */
2914029144 ExpectIntEQ(wolfSSL_disable_hrr_cookie(ssl_s), WOLFSSL_SUCCESS);
2914129145
29146+ /* Set client groups to traditional only to avoid CH fragmentation */
29147+ ExpectIntEQ(wolfSSL_set_groups(ssl_c, groups, 2), WOLFSSL_SUCCESS);
29148+
2914229149 ExpectIntNE(wolfSSL_connect(ssl_c), WOLFSSL_SUCCESS);
2914329150 ExpectIntEQ(wolfSSL_get_error(ssl_c, WC_NO_ERR_TRACE(WOLFSSL_FATAL_ERROR)),
2914429151 WOLFSSL_ERROR_WANT_READ);
@@ -29161,9 +29168,6 @@ static int test_dtls13_bad_epoch_ch(void)
2916129168 /* resend the CH */
2916229169 ExpectIntEQ(wolfSSL_dtls_got_timeout(ssl_c), WOLFSSL_SUCCESS);
2916329170
29164- /* Re-enable HRR cookie to account for potential CH fragmentation */
29165- ExpectIntEQ(wolfSSL_send_hrr_cookie(ssl_s, NULL, 0), WOLFSSL_SUCCESS);
29166-
2916729171 ExpectIntEQ(test_memio_do_handshake(ssl_c, ssl_s, 10, NULL), 0);
2916829172
2916929173 wolfSSL_free(ssl_c);
0 commit comments