|
|
@@ -24,7 +24,7 @@ package inproxy
|
|
|
import (
|
|
|
"bytes"
|
|
|
"context"
|
|
|
- "crypto/tls"
|
|
|
+ std_tls "crypto/tls"
|
|
|
"encoding/base64"
|
|
|
"fmt"
|
|
|
"io"
|
|
|
@@ -39,6 +39,7 @@ import (
|
|
|
"testing"
|
|
|
"time"
|
|
|
|
|
|
+ tls "github.com/Psiphon-Labs/psiphon-tls"
|
|
|
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common"
|
|
|
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/errors"
|
|
|
"github.com/Psiphon-Labs/psiphon-tunnel-core/psiphon/common/prng"
|
|
|
@@ -511,7 +512,9 @@ func runTestInproxy() error {
|
|
|
dialCtx,
|
|
|
conn,
|
|
|
&net.UDPAddr{Port: 1}, // This address is ignored, but the zero value is not allowed
|
|
|
- "test", "QUICv1", nil, quicEchoServer.ObfuscationKey(), nil, nil, true)
|
|
|
+ "test", "QUICv1", nil, quicEchoServer.ObfuscationKey(), nil, nil, true,
|
|
|
+ false, false, common.WrapClientSessionCache(tls.NewLRUClientSessionCache(0), ""),
|
|
|
+ )
|
|
|
if err != nil {
|
|
|
return errors.Trace(err)
|
|
|
}
|
|
|
@@ -852,7 +855,7 @@ func newHTTPRoundTripper(endpointAddr string, path string) *httpRoundTripper {
|
|
|
MaxIdleConns: 2,
|
|
|
IdleConnTimeout: 1 * time.Minute,
|
|
|
TLSHandshakeTimeout: 10 * time.Second,
|
|
|
- TLSClientConfig: &tls.Config{
|
|
|
+ TLSClientConfig: &std_tls.Config{
|
|
|
InsecureSkipVerify: true,
|
|
|
},
|
|
|
},
|