Update client SCT list during TLS 1.3 handshake, fixes #76
This commit is contained in:
parent
b1d6c0aeaa
commit
67bc308e04
1
13.go
1
13.go
@ -953,6 +953,7 @@ func (hs *clientHandshakeState) doTLS13Handshake() error {
|
||||
hash := hashForSuite(hs.suite)
|
||||
hashSize := hash.Size()
|
||||
serverHello := hs.serverHello
|
||||
c.scts = serverHello.scts
|
||||
|
||||
// middlebox compatibility mode, send CCS before second flight.
|
||||
if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil {
|
||||
|
@ -394,8 +394,6 @@ func TestSCTHandshake(t *testing.T) {
|
||||
PrivateKey: testRSAPrivateKey,
|
||||
SignedCertificateTimestamps: expected,
|
||||
}},
|
||||
// See GH#76
|
||||
MaxVersion: VersionTLS12,
|
||||
}
|
||||
clientConfig := &Config{
|
||||
InsecureSkipVerify: true,
|
||||
|
Loading…
Reference in New Issue
Block a user