|
|
e91d112 |
--- a/test/openssl/test_ssl.rb
|
|
|
e91d112 |
+++ b/test/openssl/test_ssl.rb
|
|
|
e91d112 |
@@ -67,6 +67,8 @@
|
|
|
e91d112 |
assert_equal @svr_cert.subject, ssl.peer_cert.subject
|
|
|
e91d112 |
assert_equal [@svr_cert.subject, @ca_cert.subject],
|
|
|
e91d112 |
ssl.peer_cert_chain.map(&:subject)
|
|
|
e91d112 |
+
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
end
|
|
|
e91d112 |
end
|
|
|
e91d112 |
@@ -892,7 +894,9 @@
|
|
|
e91d112 |
}
|
|
|
e91d112 |
start_server(ctx_proc: ctx_proc, ignore_listener_error: true) do |port|
|
|
|
e91d112 |
begin
|
|
|
e91d112 |
- server_connect(port) { }
|
|
|
e91d112 |
+ server_connect(port) { |ssl|
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
+ }
|
|
|
e91d112 |
rescue OpenSSL::SSL::SSLError, Errno::ECONNRESET
|
|
|
e91d112 |
else
|
|
|
e91d112 |
supported << ver
|
|
|
e91d112 |
@@ -950,6 +954,7 @@
|
|
|
e91d112 |
if ver == cver
|
|
|
e91d112 |
server_connect(port, ctx1) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[cver][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
else
|
|
|
e91d112 |
assert_handshake_error { server_connect(port, ctx1) { } }
|
|
|
e91d112 |
@@ -963,6 +968,7 @@
|
|
|
e91d112 |
if ver == cver
|
|
|
e91d112 |
server_connect(port, ctx2) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[cver][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
else
|
|
|
e91d112 |
assert_handshake_error { server_connect(port, ctx2) { } }
|
|
|
e91d112 |
@@ -975,6 +981,7 @@
|
|
|
e91d112 |
ctx3.min_version = ctx3.max_version = nil
|
|
|
e91d112 |
server_connect(port, ctx3) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[ver][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
}
|
|
|
e91d112 |
end
|
|
|
e91d112 |
@@ -993,6 +1000,7 @@
|
|
|
e91d112 |
ctx1.min_version = cver
|
|
|
e91d112 |
server_connect(port, ctx1) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[supported.last][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
|
|
|
e91d112 |
# Client sets max_version
|
|
|
e91d112 |
@@ -1001,6 +1009,7 @@
|
|
|
e91d112 |
if cver >= sver
|
|
|
e91d112 |
server_connect(port, ctx2) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[cver][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
else
|
|
|
e91d112 |
assert_handshake_error { server_connect(port, ctx2) { } }
|
|
|
e91d112 |
@@ -1019,6 +1028,7 @@
|
|
|
e91d112 |
if cver <= sver
|
|
|
e91d112 |
server_connect(port, ctx1) { |ssl|
|
|
|
e91d112 |
assert_equal vmap[sver][:name], ssl.ssl_version
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
else
|
|
|
e91d112 |
assert_handshake_error { server_connect(port, ctx1) { } }
|
|
|
e91d112 |
@@ -1033,6 +1043,7 @@
|
|
|
e91d112 |
else
|
|
|
e91d112 |
assert_equal vmap[cver][:name], ssl.ssl_version
|
|
|
e91d112 |
end
|
|
|
e91d112 |
+ ssl.puts "abc"; assert_equal "abc\n", ssl.gets
|
|
|
e91d112 |
}
|
|
|
e91d112 |
end
|
|
|
e91d112 |
}
|