/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ #include #include #include "api/s2n.h" #include "crypto/s2n_cipher.h" #include "crypto/s2n_hmac.h" #include "s2n_test.h" #include "stuffer/s2n_stuffer.h" #include "testlib/s2n_testlib.h" #include "tls/s2n_cipher_suites.h" #include "tls/s2n_prf.h" #include "tls/s2n_record.h" #include "utils/s2n_random.h" #include "utils/s2n_safety.h" static int destroy_server_keys(struct s2n_connection *server_conn) { POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->destroy_key(&server_conn->initial->server_key)); POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->destroy_key(&server_conn->initial->client_key)); return 0; } static int setup_server_keys(struct s2n_connection *server_conn, struct s2n_blob *key) { POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->init(&server_conn->initial->server_key)); POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->init(&server_conn->initial->client_key)); POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->set_encryption_key(&server_conn->initial->server_key, key)); POSIX_GUARD(server_conn->initial->cipher_suite->record_alg->cipher->set_decryption_key(&server_conn->initial->client_key, key)); return 0; } int main(int argc, char **argv) { struct s2n_connection *conn; uint8_t random_data[S2N_SMALL_FRAGMENT_LENGTH + 1]; uint8_t aes128_key[] = "123456789012345"; uint8_t aes256_key[] = "1234567890123456789012345678901"; struct s2n_blob aes128 = { 0 }; EXPECT_SUCCESS(s2n_blob_init(&aes128, aes128_key, sizeof(aes128_key))); struct s2n_blob aes256 = { 0 }; EXPECT_SUCCESS(s2n_blob_init(&aes256, aes256_key, sizeof(aes256_key))); struct s2n_blob r = { 0 }; EXPECT_SUCCESS(s2n_blob_init(&r, random_data, sizeof(random_data))); BEGIN_TEST(); EXPECT_SUCCESS(s2n_disable_tls13_in_test()); EXPECT_NOT_NULL(conn = s2n_connection_new(S2N_SERVER)); EXPECT_OK(s2n_get_public_random_data(&r)); /* Peer and we are in sync */ conn->server = conn->initial; conn->client = conn->initial; /* test the AES128 cipher */ conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); int max_fragment = S2N_SMALL_FRAGMENT_LENGTH; for (size_t i = 0; i <= max_fragment + 1; i++) { struct s2n_blob in = { 0 }; EXPECT_SUCCESS(s2n_blob_init(&in, random_data, i)); int bytes_written; /* TLS packet on the wire using AES-GCM: * https://tools.ietf.org/html/rfc5246#section-6.2.3.3 * https://tools.ietf.org/html/rfc5288#section-3 * ---------------------------------------------- * |TLS header|explicit IV|encrypted payload|TAG| * ---------------------------------------------- * Length: * S2N_TLS_RECORD_HEADER_LENGTH + S2N_TLS_GCM_EXPLICIT_IV_LEN + i + S2N_TLS_GCM_TAG_LEN */ EXPECT_SUCCESS(s2n_connection_wipe(conn)); EXPECT_SUCCESS(s2n_connection_prefer_low_latency(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->server = conn->initial; conn->client = conn->initial; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); s2n_result result = s2n_record_write(conn, TLS_APPLICATION_DATA, &in); if (i <= max_fragment) { EXPECT_OK(result); bytes_written = i; } else { EXPECT_ERROR_WITH_ERRNO(result, S2N_ERR_FRAGMENT_LENGTH_TOO_LARGE); bytes_written = max_fragment; } uint16_t predicted_length = bytes_written; predicted_length += conn->initial->cipher_suite->record_alg->cipher->io.aead.record_iv_size; predicted_length += conn->initial->cipher_suite->record_alg->cipher->io.aead.tag_size; const int overhead = S2N_TLS_GCM_EXPLICIT_IV_LEN /* Explicit IV */ + S2N_TLS_GCM_TAG_LEN /* TAG */; EXPECT_EQUAL(predicted_length, bytes_written + overhead); EXPECT_EQUAL(conn->out.blob.data[0], TLS_APPLICATION_DATA); EXPECT_EQUAL(conn->out.blob.data[1], 3); EXPECT_EQUAL(conn->out.blob.data[2], 3); EXPECT_EQUAL(conn->out.blob.data[3], (predicted_length >> 8) & 0xff); EXPECT_EQUAL(conn->out.blob.data[4], predicted_length & 0xff); /* The data should be encrypted */ if (bytes_written > 10) { EXPECT_NOT_EQUAL(memcmp(conn->out.blob.data + S2N_TLS_RECORD_HEADER_LENGTH, random_data, bytes_written), 0); } /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); /* Let's decrypt it */ uint8_t content_type; uint16_t fragment_length; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_SUCCESS(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_EQUAL(fragment_length, predicted_length); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); /* Start over */ EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Now lets corrupt some data and ensure the tests pass */ /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); /* Tamper the protocol version in the header, and ensure decryption fails, as we use this in the AAD */ EXPECT_EQUAL(conn->header_in.blob.data[0], TLS_APPLICATION_DATA); conn->header_in.blob.data[0] ^= 1; /* Flip a bit in the content_type of the TLS Record Header */ EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA ^ 1); /** * We are trying to test the case when the Additional Authenticated Data in AEAD ciphers is tampered with. * * AEAD Ciphers authenticate several fields, including the TLS Record content_type, so this should fail since * we flipped a bit. See s2n_aead_aad_init() for which fields are added to the additional authenticated data. * * We can't flip the TLS Protocol Version bits here because s2n_record_header_parse() will error before we * attempt decryption with AES-GCM because the Protocol version doesn't match "conn->actual_protocol_version". */ EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); /* Tamper with the explicit IV and ensure decryption fails */ for (size_t j = 0; j < S2N_TLS_GCM_EXPLICIT_IV_LEN; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[j]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } /* Tamper with the TAG and ensure decryption fails */ for (size_t j = 0; j < S2N_TLS_GCM_TAG_LEN; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[s2n_stuffer_data_available(&conn->in) - j - 1]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } /* Tamper with the encrypted payload in the ciphertext and ensure decryption fails */ for (size_t j = 0; j < i; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes128_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes128)); EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[S2N_TLS_GCM_EXPLICIT_IV_LEN + j]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } } EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(s2n_connection_free(conn)); /* test the AES256 cipher */ EXPECT_NOT_NULL(conn = s2n_connection_new(S2N_SERVER)); conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; for (size_t i = 0; i <= max_fragment + 1; i++) { struct s2n_blob in = { 0 }; EXPECT_SUCCESS(s2n_blob_init(&in, random_data, i)); int bytes_written; EXPECT_SUCCESS(s2n_connection_wipe(conn)); /* Set prefer low latency for S2N_SMALL_FRAGMENT_LENGTH for */ EXPECT_SUCCESS(s2n_connection_prefer_low_latency(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; s2n_result result = s2n_record_write(conn, TLS_APPLICATION_DATA, &in); if (i <= max_fragment) { EXPECT_OK(result); bytes_written = i; } else { EXPECT_ERROR_WITH_ERRNO(result, S2N_ERR_FRAGMENT_LENGTH_TOO_LARGE); bytes_written = max_fragment; } uint16_t predicted_length = bytes_written; predicted_length += conn->initial->cipher_suite->record_alg->cipher->io.aead.record_iv_size; predicted_length += conn->initial->cipher_suite->record_alg->cipher->io.aead.tag_size; const int overhead = S2N_TLS_GCM_EXPLICIT_IV_LEN /* Explicit IV */ + S2N_TLS_GCM_TAG_LEN /* TAG */; EXPECT_EQUAL(predicted_length, bytes_written + overhead); EXPECT_EQUAL(conn->out.blob.data[0], TLS_APPLICATION_DATA); EXPECT_EQUAL(conn->out.blob.data[1], 3); EXPECT_EQUAL(conn->out.blob.data[2], 3); EXPECT_EQUAL(conn->out.blob.data[3], (predicted_length >> 8) & 0xff); EXPECT_EQUAL(conn->out.blob.data[4], predicted_length & 0xff); /* The data should be encrypted */ if (bytes_written > 10) { EXPECT_NOT_EQUAL(memcmp(conn->out.blob.data + S2N_TLS_RECORD_HEADER_LENGTH, random_data, bytes_written), 0); } /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); /* Let's decrypt it */ uint8_t content_type; uint16_t fragment_length; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_SUCCESS(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_EQUAL(fragment_length, predicted_length); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Now lets corrupt some data and ensure the tests pass */ /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); /* Tamper with the protocol version in the header, and ensure decryption fails, as we use this in the AAD */ conn->in.blob.data[2] = 2; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); /* Tamper with the IV and ensure decryption fails */ for (size_t j = 0; j < S2N_TLS_GCM_EXPLICIT_IV_LEN; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[j]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } /* Tamper with the TAG and ensure decryption fails */ for (size_t j = 0; j < S2N_TLS_GCM_TAG_LEN; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[s2n_stuffer_data_available(&conn->in) - j - 1]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } /* Tamper with the encrypted payload in the ciphertext and ensure decryption fails */ for (size_t j = 0; j < i; j++) { EXPECT_SUCCESS(s2n_connection_wipe(conn)); conn->actual_protocol_version_established = 1; conn->server_protocol_version = S2N_TLS12; conn->client_protocol_version = S2N_TLS12; conn->actual_protocol_version = S2N_TLS12; conn->initial->cipher_suite->record_alg = &s2n_record_alg_aes256_gcm; EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(setup_server_keys(conn, &aes256)); conn->actual_protocol_version = S2N_TLS12; EXPECT_OK(s2n_record_write(conn, TLS_APPLICATION_DATA, &in)); /* Copy the encrypted out data to the in data */ EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->header_in, S2N_TLS_RECORD_HEADER_LENGTH)); EXPECT_SUCCESS(s2n_stuffer_copy(&conn->out, &conn->in, s2n_stuffer_data_available(&conn->out))); conn->in.blob.data[S2N_TLS_GCM_EXPLICIT_IV_LEN + j]++; EXPECT_SUCCESS(s2n_record_header_parse(conn, &content_type, &fragment_length)); EXPECT_FAILURE(s2n_record_parse(conn)); EXPECT_EQUAL(content_type, TLS_APPLICATION_DATA); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->header_in)); EXPECT_SUCCESS(s2n_stuffer_wipe(&conn->in)); } } EXPECT_SUCCESS(destroy_server_keys(conn)); EXPECT_SUCCESS(s2n_connection_free(conn)); END_TEST(); }