Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for DialTLS (0.18 sec)

  1. src/net/http/transport_internal_test.go

    						return &Response{
    							Body:       NoBody,
    							StatusCode: 200,
    						}, nil
    					}
    					roundTripped = true
    					return nil, http2noCachedConnError{}
    				})
    			},
    		},
    		DialTLS: func(_, _ string) (net.Conn, error) {
    			tc, err := tls.Dial("tcp", addr, &tls.Config{
    				InsecureSkipVerify: true,
    				NextProtos:         []string{"foo"},
    			})
    			if err != nil {
    				return nil, err
    			}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 16 15:57:17 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  2. src/net/http/transport.go

    	// DialTLS specifies an optional dial function for creating
    	// TLS connections for non-proxied HTTPS requests.
    	//
    	// Deprecated: Use DialTLSContext instead, which allows the transport
    	// to cancel dials as soon as they are no longer needed.
    	// If both are set, DialTLSContext takes priority.
    	DialTLS func(network, addr string) (net.Conn, error)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Jun 06 21:59:21 UTC 2024
    - 91K bytes
    - Viewed (0)
  3. pkg/test/echo/server/forwarder/http.go

    func newHTTP2TransportGetter(cfg *Config) (httpTransportGetter, func()) {
    	newConn := func() *http2.Transport {
    		if cfg.scheme == scheme.HTTPS {
    			return &http2.Transport{
    				TLSClientConfig: cfg.tlsConfig,
    				DialTLS: func(network, addr string, tlsConfig *tls.Config) (net.Conn, error) {
    					return hbone.TLSDialWithDialer(newDialer(cfg), network, addr, tlsConfig)
    				},
    			}
    		}
    
    		return &http2.Transport{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Tue Apr 30 13:56:46 UTC 2024
    - 7.9K bytes
    - Viewed (0)
  4. src/net/http/transport_test.go

    // (to make the test reasonable) and then making a request which is
    // canceled by the DialTLS hook, which then also waits to return the
    // real connection until after the RoundTrip saw the error.  Then we
    // know the successful tls.Dial from DialTLS will need to go into the
    // idle pool. Then we give it a of time to explode.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Jun 06 21:59:21 UTC 2024
    - 192.6K bytes
    - Viewed (0)
  5. src/net/http/h2_bundle.go

    		cfg.ServerName = host
    	}
    	return cfg
    }
    
    func (t *http2Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {
    	if t.DialTLSContext != nil {
    		return t.DialTLSContext(ctx, network, addr, tlsCfg)
    	} else if t.DialTLS != nil {
    		return t.DialTLS(network, addr, tlsCfg)
    	}
    
    	tlsCn, err := t.dialTLSWithContext(ctx, network, addr, tlsCfg)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 364.1K bytes
    - Viewed (0)
  6. src/net/http/clientserver_test.go

    	}))
    	defer cst.close()
    
    	var numOpen, numClose int32 // atomic
    
    	tlsConfig := &tls.Config{InsecureSkipVerify: true}
    	tr := &Transport{
    		TLSClientConfig: tlsConfig,
    		DialTLS: func(_, addr string) (net.Conn, error) {
    			time.Sleep(10 * time.Millisecond)
    			rc, err := net.Dial("tcp", addr)
    			if err != nil {
    				return nil, err
    			}
    			atomic.AddInt32(&numOpen, 1)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 46.6K bytes
    - Viewed (0)
Back to top