Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 950 for Ticket (0.21 sec)

  1. src/crypto/tls/ticket.go

    	}
    	return cs.session.ticket, cs.session, nil
    }
    
    // NewResumptionState returns a state value that can be returned by
    // [ClientSessionCache.Get] to resume a previous session.
    //
    // state needs to be returned by [ParseSessionState], and the ticket and session
    // state must have been returned by [ClientSessionState.ResumptionState].
    func NewResumptionState(ticket []byte, state *SessionState) (*ClientSessionState, error) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 12.6K bytes
    - Viewed (0)
  2. src/runtime/sema.go

    	// The balanced tree is a treap using ticket as the random heap priority.
    	// That is, it is a binary tree ordered according to the elem addresses,
    	// but then among the space of possible binary trees respecting those
    	// addresses, it is kept balanced on average by maintaining a heap ordering
    	// on the ticket: s.ticket <= both s.prev.ticket and s.next.ticket.
    	// https://en.wikipedia.org/wiki/Treap
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 19K bytes
    - Viewed (0)
  3. src/crypto/tls/common.go

    const (
    	// ticketKeyLifetime is how long a ticket key remains valid and can be used to
    	// resume a client connection.
    	ticketKeyLifetime = 7 * 24 * time.Hour // 7 days
    
    	// ticketKeyRotation is how often the server should rotate the session ticket key
    	// that is used for new tickets.
    	ticketKeyRotation = 24 * time.Hour
    )
    
    // ticketKey is the internal representation of a session ticket key.
    type ticketKey struct {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  4. src/crypto/tls/handshake_client_test.go

    		}
    		return k
    	}
    
    	testResumeState("Handshake", false)
    	ticket := getTicket()
    	testResumeState("Resume", true)
    	if bytes.Equal(ticket, getTicket()) {
    		t.Fatal("ticket didn't change after resumption")
    	}
    
    	// An old session ticket is replaced with a ticket encrypted with a fresh key.
    	ticket = getTicket()
    	serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 88.7K bytes
    - Viewed (0)
  5. src/crypto/tls/handshake_client.go

    		return errors.New("tls: server sent unrequested session ticket")
    	}
    
    	msg, err := c.readHandshake(&hs.finishedHash)
    	if err != nil {
    		return err
    	}
    	sessionTicketMsg, ok := msg.(*newSessionTicketMsg)
    	if !ok {
    		c.sendAlert(alertUnexpectedMessage)
    		return unexpectedMessageError(sessionTicketMsg, msg)
    	}
    
    	hs.ticket = sessionTicketMsg.ticket
    	return nil
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  6. tensorflow/compiler/mlir/tensorflow/utils/export_utils.h

    // an instruction with a different operation name. As such, this routine checks
    // both forms of a LegacyCall instruction. We only need to check for
    // mlir::TF::LegacyCallOp when the ticket is resolved.
    bool IsLegacyCallInstruction(mlir::Operation* inst);
    }  // namespace tensorflow
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri Apr 26 09:37:10 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  7. src/crypto/tls/quic.go

    	// [QUICEvent.SessionState] is set.
    	//
    	// For client connections, this event occurs when the session ticket is selected.
    	// For server connections, this event occurs when receiving the client's session ticket.
    	//
    	// The application may set [QUICEvent.SessionState.EarlyData] to false before the
    	// next call to [QUICConn.NextEvent] to decline 0-RTT even if the session supports it.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 15.1K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_server.go

    		state.createdAt = hs.sessionState.createdAt
    	}
    	if c.config.WrapSession != nil {
    		var err error
    		m.ticket, err = c.config.WrapSession(c.connectionStateLocked(), state)
    		if err != nil {
    			return err
    		}
    	} else {
    		stateBytes, err := state.Bytes()
    		if err != nil {
    			return err
    		}
    		m.ticket, err = c.config.encryptTicket(stateBytes, c.ticketKeys)
    		if err != nil {
    			return err
    		}
    	}
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  9. src/crypto/tls/handshake_server_tls13.go

    		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
    			continue
    		}
    
    		// PSK connections don't re-establish client certificates, but carry
    		// them over in the session ticket. Ensure the presence of client certs
    		// in the ticket is consistent with the configured requirements.
    		sessionHasClientCerts := len(sessionState.peerCertificates) != 0
    		needClientCerts := requiresClientCert(c.config.ClientAuth)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
  10. src/crypto/tls/handshake_client_tls13.go

    	}
    
    	return nil
    }
    
    func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error {
    	if !c.isClient {
    		c.sendAlert(alertUnexpectedMessage)
    		return errors.New("tls: received new session ticket from a client")
    	}
    
    	if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
    		return nil
    	}
    
    	// See RFC 8446, Section 4.6.1.
    	if msg.lifetime == 0 {
    		return nil
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
Back to top