- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 950 for Ticket (0.21 sec)
-
src/crypto/tls/ticket.go
} return cs.session.ticket, cs.session, nil } // NewResumptionState returns a state value that can be returned by // [ClientSessionCache.Get] to resume a previous session. // // state needs to be returned by [ParseSessionState], and the ticket and session // state must have been returned by [ClientSessionState.ResumptionState]. func NewResumptionState(ticket []byte, state *SessionState) (*ClientSessionState, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 12.6K bytes - Viewed (0) -
src/runtime/sema.go
// The balanced tree is a treap using ticket as the random heap priority. // That is, it is a binary tree ordered according to the elem addresses, // but then among the space of possible binary trees respecting those // addresses, it is kept balanced on average by maintaining a heap ordering // on the ticket: s.ticket <= both s.prev.ticket and s.next.ticket. // https://en.wikipedia.org/wiki/Treap
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 19K bytes - Viewed (0) -
src/crypto/tls/common.go
const ( // ticketKeyLifetime is how long a ticket key remains valid and can be used to // resume a client connection. ticketKeyLifetime = 7 * 24 * time.Hour // 7 days // ticketKeyRotation is how often the server should rotate the session ticket key // that is used for new tickets. ticketKeyRotation = 24 * time.Hour ) // ticketKey is the internal representation of a session ticket key. type ticketKey struct {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 59.1K bytes - Viewed (0) -
src/crypto/tls/handshake_client_test.go
} return k } testResumeState("Handshake", false) ticket := getTicket() testResumeState("Resume", true) if bytes.Equal(ticket, getTicket()) { t.Fatal("ticket didn't change after resumption") } // An old session ticket is replaced with a ticket encrypted with a fresh key. ticket = getTicket() serverConfig.Time = func() time.Time { return time.Now().Add(24*time.Hour + time.Minute) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 88.7K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
return errors.New("tls: server sent unrequested session ticket") } msg, err := c.readHandshake(&hs.finishedHash) if err != nil { return err } sessionTicketMsg, ok := msg.(*newSessionTicketMsg) if !ok { c.sendAlert(alertUnexpectedMessage) return unexpectedMessageError(sessionTicketMsg, msg) } hs.ticket = sessionTicketMsg.ticket return nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
tensorflow/compiler/mlir/tensorflow/utils/export_utils.h
// an instruction with a different operation name. As such, this routine checks // both forms of a LegacyCall instruction. We only need to check for // mlir::TF::LegacyCallOp when the ticket is resolved. bool IsLegacyCallInstruction(mlir::Operation* inst); } // namespace tensorflow
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Fri Apr 26 09:37:10 UTC 2024 - 3.9K bytes - Viewed (0) -
src/crypto/tls/quic.go
// [QUICEvent.SessionState] is set. // // For client connections, this event occurs when the session ticket is selected. // For server connections, this event occurs when receiving the client's session ticket. // // The application may set [QUICEvent.SessionState.EarlyData] to false before the // next call to [QUICConn.NextEvent] to decline 0-RTT even if the session supports it.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 15.1K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
state.createdAt = hs.sessionState.createdAt } if c.config.WrapSession != nil { var err error m.ticket, err = c.config.WrapSession(c.connectionStateLocked(), state) if err != nil { return err } } else { stateBytes, err := state.Bytes() if err != nil { return err } m.ticket, err = c.config.encryptTicket(stateBytes, c.ticketKeys) if err != nil { return err } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
if pskSuite == nil || pskSuite.hash != hs.suite.hash { continue } // PSK connections don't re-establish client certificates, but carry // them over in the session ticket. Ensure the presence of client certs // in the ticket is consistent with the configured requirements. sessionHasClientCerts := len(sessionState.peerCertificates) != 0 needClientCerts := requiresClientCert(c.config.ClientAuth)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
} return nil } func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error { if !c.isClient { c.sendAlert(alertUnexpectedMessage) return errors.New("tls: received new session ticket from a client") } if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil { return nil } // See RFC 8446, Section 4.6.1. if msg.lifetime == 0 { return nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0)