mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-03 20:17:36 +03:00
Correctly handle HelloRetryRequest
This commit is contained in:
parent
3fe91d9822
commit
1188641a16
7 changed files with 307 additions and 2 deletions
|
@ -142,6 +142,23 @@ func TestUTLSHandshakeClientParrotChrome_58_setclienthello(t *testing.T) {
|
|||
runUTLSClientTestTLS12(t, test, helloID)
|
||||
}
|
||||
|
||||
// tests consistency of fingerprint after HelloRetryRequest
|
||||
// chrome 70 is used, due to only specifying X25519 in keyshare, but being able to generate P-256 curve too
|
||||
// openssl server, configured to use P-256, will send HelloRetryRequest
|
||||
func TestUTLSHelloRetryRequest(t *testing.T) {
|
||||
helloID := HelloChrome_70
|
||||
config := testConfig.Clone()
|
||||
config.CurvePreferences = []CurveID{X25519, CurveP256}
|
||||
|
||||
test := &clientTest{
|
||||
name: "UTLS-HelloRetryRequest-" + helloID.Str(),
|
||||
command: []string{"openssl", "s_server", "-cipher", "ECDHE-RSA-AES128-GCM-SHA256", "-curves", "P-256"},
|
||||
config: config,
|
||||
}
|
||||
|
||||
runUTLSClientTestTLS13(t, test, helloID)
|
||||
}
|
||||
|
||||
/*
|
||||
*
|
||||
HELPER FUNCTIONS BELOW
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue