Update client SCT list during TLS 1.3 handshake, fixes #76

Este commit está contenido en:
Evan Klitzke 2018-06-23 18:58:58 -07:00 cometido por Henry Dorsett Case
padre b1d6c0aeaa
commit 67bc308e04
Se han modificado 2 ficheros con 1 adiciones y 2 borrados

1
13.go
Ver fichero

@ -953,6 +953,7 @@ func (hs *clientHandshakeState) doTLS13Handshake() error {
hash := hashForSuite(hs.suite) hash := hashForSuite(hs.suite)
hashSize := hash.Size() hashSize := hash.Size()
serverHello := hs.serverHello serverHello := hs.serverHello
c.scts = serverHello.scts
// middlebox compatibility mode, send CCS before second flight. // middlebox compatibility mode, send CCS before second flight.
if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil { if _, err := c.writeRecord(recordTypeChangeCipherSpec, []byte{1}); err != nil {

Ver fichero

@ -394,8 +394,6 @@ func TestSCTHandshake(t *testing.T) {
PrivateKey: testRSAPrivateKey, PrivateKey: testRSAPrivateKey,
SignedCertificateTimestamps: expected, SignedCertificateTimestamps: expected,
}}, }},
// See GH#76
MaxVersion: VersionTLS12,
} }
clientConfig := &Config{ clientConfig := &Config{
InsecureSkipVerify: true, InsecureSkipVerify: true,