diff options
author | Bruce Yinhe <[email protected]> | 2014-07-07 15:58:43 +0200 |
---|---|---|
committer | Bruce Yinhe <[email protected]> | 2014-07-07 15:58:43 +0200 |
commit | a801af8e99b847bc4bd00bf8ba76a638ff90768f (patch) | |
tree | 4158f47cd7541b92af29f47fbc53f5af6b312f2a /lib/ssl/test | |
parent | eb0506045fffe52ab5c34779311ec63ef6aabbb0 (diff) | |
parent | 34e4094aabccc22b5b1be609eb8dfbe412dd4328 (diff) | |
download | otp-a801af8e99b847bc4bd00bf8ba76a638ff90768f.tar.gz otp-a801af8e99b847bc4bd00bf8ba76a638ff90768f.tar.bz2 otp-a801af8e99b847bc4bd00bf8ba76a638ff90768f.zip |
Merge branch 'dnet/parse_sni' into maint
* dnet/parse_sni:
added SNI decode test to SSL handshake suite
ssl: parse SNI in received client hello records
OTP-12048
Diffstat (limited to 'lib/ssl/test')
-rw-r--r-- | lib/ssl/test/ssl_handshake_SUITE.erl | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/lib/ssl/test/ssl_handshake_SUITE.erl b/lib/ssl/test/ssl_handshake_SUITE.erl index 5f36842f9e..e5e942ce1b 100644 --- a/lib/ssl/test/ssl_handshake_SUITE.erl +++ b/lib/ssl/test/ssl_handshake_SUITE.erl @@ -38,6 +38,7 @@ all() -> [decode_hello_handshake, decode_supported_elliptic_curves_hello_extension_correctly, decode_unknown_hello_extension_correctly, encode_single_hello_sni_extension_correctly, + decode_single_hello_sni_extension_correctly, select_proper_tls_1_2_rsa_default_hashsign]. %%-------------------------------------------------------------------- @@ -98,6 +99,13 @@ encode_single_hello_sni_extension_correctly(_Config) -> Encoded = ssl_handshake:encode_hello_extensions(Exts), HelloExt = Encoded. +decode_single_hello_sni_extension_correctly(_Config) -> + Exts = #hello_extensions{sni = #sni{hostname = "test.com"}}, + SNI = <<16#00, 16#00, 16#00, 16#0d, 16#00, 16#0b, 16#00, 16#00, 16#08, + $t, $e, $s, $t, $., $c, $o, $m>>, + Decoded = ssl_handshake:decode_hello_extensions(SNI), + Exts = Decoded. + select_proper_tls_1_2_rsa_default_hashsign(_Config) -> % RFC 5246 section 7.4.1.4.1 tells to use {sha1,rsa} as default signature_algorithm for RSA key exchanges {sha, rsa} = ssl_handshake:select_hashsign_algs(undefined, ?rsaEncryption, {3,3}), |