- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 17 for VerifiedChains (0.32 sec)
-
src/crypto/tls/ticket.go
c, err := globalCertCache.newCert(cert) if err != nil { return nil, err } ss.activeCertHandles = append(ss.activeCertHandles, c) chain = append(chain, c.cert) } ss.verifiedChains = append(ss.verifiedChains, chain) } if ss.EarlyData { var alpn []byte if !readUint8LengthPrefixed(&s, &alpn) { return nil, errors.New("tls: invalid session encoding") } ss.alpnProtocol = string(alpn)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 12.6K bytes - Viewed (0) -
tests/fuzz/security_fuzzer.go
ctx := context.Background() certChain, err := fuzzedCertChain(f) if err != nil { return 0 } tlsInfo := credentials.TLSInfo{ State: tls.ConnectionState{VerifiedChains: certChain}, } mockIPAddr := &net.IPAddr{IP: net.IPv4(192, 168, 1, 1)} p := &peer.Peer{Addr: mockIPAddr, AuthInfo: tlsInfo} ctx = peer.NewContext(ctx, p)
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Wed Feb 28 16:41:38 UTC 2024 - 3.2K bytes - Viewed (0) -
src/crypto/tls/handshake_messages_test.go
} } if len(s.peerCertificates) > 0 { for i := 0; i < rand.Intn(3); i++ { if rand.Intn(10) > 5 { s.verifiedChains = append(s.verifiedChains, s.peerCertificates) } else { s.verifiedChains = append(s.verifiedChains, s.peerCertificates[:1]) } } } if rand.Intn(10) > 5 && s.EarlyData { s.alpnProtocol = string(randomBytes(rand.Intn(10), rand)) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 15.7K bytes - Viewed (0) -
src/crypto/tls/tls_test.go
} if len(ss.VerifiedChains) != 1 || len(cs.VerifiedChains) != 1 { t.Errorf("Got %d (server) and %d (client) verified chains, expected %d", len(ss.VerifiedChains), len(cs.VerifiedChains), 1) } else if len(ss.VerifiedChains[0]) != 2 || len(cs.VerifiedChains[0]) != 2 { t.Errorf("Got %d (server) and %d (client) long verified chain, expected %d", len(ss.VerifiedChains[0]), len(cs.VerifiedChains[0]), 2) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 60.5K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
hs.masterSecret = hs.session.secret c.extMasterSecret = hs.session.extMasterSecret c.peerCertificates = hs.session.peerCertificates c.activeCertHandles = hs.c.activeCertHandles c.verifiedChains = hs.session.verifiedChains c.ocspResponse = hs.session.ocspResponse // Let the ServerHello SCTs override the session SCTs from the original // connection, if any are provided if len(c.scts) == 0 && len(hs.session.scts) != 0 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/handshake_client_test.go
t.Fatalf("%s resumed: %v, expected: %v", test, hs.DidResume, didResume) } if didResume && (hs.PeerCertificates == nil || hs.VerifiedChains == nil) { t.Fatalf("expected non-nil certificates after resumption. Got peerCertificates: %#v, verifiedCertificates: %#v", hs.PeerCertificates, hs.VerifiedChains) } if got, want := hs.ServerName, clientConfig.ServerName; got != want { t.Errorf("%s: server name %s, want %s", test, got, want)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 88.7K bytes - Viewed (0) -
security/pkg/server/ca/authenticate/cert_authenticator_test.go
}, } auth := &ClientCertAuthenticator{} for id, tc := range testCases { ctx := context.Background() if tc.certChain != nil { tlsInfo := credentials.TLSInfo{ State: tls.ConnectionState{VerifiedChains: tc.certChain}, } p := &peer.Peer{AuthInfo: tlsInfo} ctx = peer.NewContext(ctx, p) } if tc.fakeAuthInfo != nil { ctx = peer.NewContext(ctx, &peer.Peer{AuthInfo: tc.fakeAuthInfo}) }
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Fri Jan 05 01:20:59 UTC 2024 - 3.2K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
} c.peerCertificates = sessionState.peerCertificates c.ocspResponse = sessionState.ocspResponse c.scts = sessionState.scts c.verifiedChains = sessionState.verifiedChains c.extMasterSecret = sessionState.extMasterSecret hs.sessionState = sessionState hs.suite = suite c.didResume = true return nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0) -
src/crypto/tls/example_test.go
} _, err := cs.PeerCertificates[0].Verify(opts) return err }, } // Note that when certificates are not handled by the default verifier // ConnectionState.VerifiedChains will be nil.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 27 18:23:49 UTC 2024 - 7.8K bytes - Viewed (0) -
src/crypto/tls/conn.go
// activeCertHandles contains the cache handles to certificates in // peerCertificates that are used to track active references. activeCertHandles []*activeCert // verifiedChains contains the certificate chains that we built, as // opposed to the ones presented by the server. verifiedChains [][]*x509.Certificate // serverName contains the server name indicated by the client, if any. serverName string
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 51.8K bytes - Viewed (0)