Update client SCT list during TLS 1.3 handshake, fixes #76
This commit is contained in:
parent
b1d6c0aeaa
commit
67bc308e04
1
13.go
1
13.go
@ -953,6 +953,7 @@ func (hs *clientHandshakeState) doTLS13Handshake() error {
|
|||||||
hash := hashForSuite(hs.suite)
|
hash := hashForSuite(hs.suite)
|
||||||
hashSize := hash.Size()
|
hashSize := hash.Size()
|
||||||
serverHello := hs.serverHello
|
serverHello := hs.serverHello
|
||||||
|
c.scts = serverHello.scts
|
||||||
|
|
||||||
// middlebox compatibility mode, send CCS before second flight.
|
// middlebox compatibility mode, send CCS before second flight.
|
||||||
if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil {
|
if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil {
|
||||||
|
@ -394,8 +394,6 @@ func TestSCTHandshake(t *testing.T) {
|
|||||||
PrivateKey: testRSAPrivateKey,
|
PrivateKey: testRSAPrivateKey,
|
||||||
SignedCertificateTimestamps: expected,
|
SignedCertificateTimestamps: expected,
|
||||||
}},
|
}},
|
||||||
// See GH#76
|
|
||||||
MaxVersion: VersionTLS12,
|
|
||||||
}
|
}
|
||||||
clientConfig := &Config{
|
clientConfig := &Config{
|
||||||
InsecureSkipVerify: true,
|
InsecureSkipVerify: true,
|
||||||
|
Loading…
Reference in New Issue
Block a user