--- /dev/null
+# Description
+
+Test quic parsing with ACK frame number 3
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 3
+ - filter:
+ count: 0
+ match:
+ event_type: anomaly
--- /dev/null
+# Description
+
+Test quic parsing with crypto fragments over multiple (>2) packets, crypto fragments being out of order, and with the last packet covering a crypto fragment in the middle of the TLS handshake message
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 3
+ quic.extensions[0].name: "key_share"
+ quic.extensions[8].name: "server_name"
+ quic.extensions[8].values[0]: "optimizationguide-pa.googleapis.com"
+ - filter:
+ count: 0
+ match:
+ event_type: anomaly
--- /dev/null
+# Description
+
+Test quic parsing with crypto fragments over multiple packets, and crypto fragments being out of order
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 2
+ quic.extensions[0].name: "supported_groups"
+ quic.extensions[7].name: "server_name"
+ quic.extensions[7].values[0]: "mastodon.social"
--- /dev/null
+# Description
+
+Test quic parsing with crypto fragments over multiple packets, crypto fragments being out of order, and with a packet in the middle without new crypto fragment
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 6
+ quic.extensions[0].name: "key_share"
+ - filter:
+ count: 0
+ match:
+ event_type: anomaly
--- /dev/null
+# Description
+
+Test quic parsing with crypto fragments over multiple packets
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 2
+ quic.extensions[0].name: "status_request"
+ quic.extensions[4].name: "alpn"
+ quic.extensions[4].values[0]: "h3"
--- /dev/null
+# Description
+
+Test quic parsing initial (as per quic definition) packet not being the first one
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 8
+ quic.extensions[0].name: "supported_versions"
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 1
+ quic.extensions[1].name: "server_name"
+ - filter:
+ count: 0
+ match:
+ event_type: anomaly
--- /dev/null
+# Description
+
+Test quic parsing with retry packets
+
+# Ticket
+
+https://redmine.openinfosecfoundation.org/issues/7556
+
+# PCAP
+
+The pcap comes from https://redmine.openinfosecfoundation.org/issues/7556
--- /dev/null
+requires:
+ min-version: 8
+
+checks:
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 2
+ quic.extensions[0].name: "supported_groups"
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 6
+ quic.extensions[0].name: "supported_groups"
+ - filter:
+ count: 1
+ match:
+ event_type: quic
+ pcap_cnt: 8
+ quic.extensions[0].name: "supported_versions"
+ - filter:
+ count: 0
+ match:
+ event_type: anomaly