- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for DidResume (0.14 sec)
-
src/crypto/tls/quic_test.go
srv.conn.SetTransportParameters(nil) if err := runTestQUICConnection(context.Background(), cli, srv, nil); err != nil { t.Fatalf("error during first connection handshake: %v", err) } if cli.conn.ConnectionState().DidResume { t.Errorf("first connection unexpectedly used session resumption") } cli2 := newTestQUICClient(t, clientConfig) cli2.conn.SetTransportParameters(nil) srv2 := newTestQUICServer(t, serverConfig)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 19.3K bytes - Viewed (0) -
src/crypto/tls/handshake_client_test.go
} testResumeState := func(test string, didResume bool) { t.Helper() _, hs, err := testHandshake(t, clientConfig, serverConfig) if err != nil { t.Fatalf("%s: handshake failed: %s", test, err) } if hs.DidResume != didResume { t.Fatalf("%s resumed: %v, expected: %v", test, hs.DidResume, didResume) } if didResume && (hs.PeerCertificates == nil || hs.VerifiedChains == nil) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 88.7K bytes - Viewed (0) -
src/crypto/tls/handshake_server_test.go
} if !state.DidResume { t.Fatalf("handshake did not resume at the same version") } // Test that the server will decline to resume at a lower version. clientConfig.MaxVersion = VersionTLS12 state, _, err = testHandshake(t, clientConfig, serverConfig) if err != nil { t.Fatalf("handshake failed: %s", err) } if state.DidResume { t.Fatalf("handshake resumed at a lower version")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 03 14:56:25 UTC 2024 - 64.7K bytes - Viewed (0) -
src/crypto/tls/tls_test.go
t.Errorf("Got HandshakeComplete %v (server) and %v (client), expected true", ss.HandshakeComplete, cs.HandshakeComplete) } if ss.DidResume || cs.DidResume { t.Errorf("Got DidResume %v (server) and %v (client), expected false", ss.DidResume, cs.DidResume) } if ss.CipherSuite == 0 || cs.CipherSuite == 0 {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 60.5K bytes - Viewed (0) -
src/crypto/tls/bogo_shim_test.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 17:25:39 UTC 2024 - 12.6K bytes - Viewed (0) -
src/crypto/tls/conn.go
var state ConnectionState state.HandshakeComplete = c.isHandshakeComplete.Load() state.Version = c.vers state.NegotiatedProtocol = c.clientProtocol state.DidResume = c.didResume state.testingOnlyDidHRR = c.didHRR // c.curveID is not set on TLS 1.0–1.2 resumptions. Fix that before exposing it. state.testingOnlyCurveID = c.curveID state.NegotiatedProtocolIsMutual = true
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 51.8K bytes - Viewed (0) -
src/crypto/tls/handshake_client.go
if c.config == nil { c.config = defaultConfig() } // This may be a renegotiation handshake, in which case some fields // need to be reset. c.didResume = false hello, keyShareKeys, ech, err := c.makeClientHello() if err != nil { return err } session, earlySecret, binderKey, err := c.loadSession(hello) if err != nil { return err }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 38.6K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
} if pskSuite.hash != hs.suite.hash { c.sendAlert(alertIllegalParameter) return errors.New("tls: server selected an invalid PSK and cipher suite pair") } hs.usingPSK = true c.didResume = true c.peerCertificates = hs.session.peerCertificates c.activeCertHandles = hs.session.activeCertHandles c.verifiedChains = hs.session.verifiedChains c.ocspResponse = hs.session.ocspResponse
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0) -
src/crypto/tls/handshake_server.go
c.scts = sessionState.scts c.verifiedChains = sessionState.verifiedChains c.extMasterSecret = sessionState.extMasterSecret hs.sessionState = sessionState hs.suite = suite c.didResume = true return nil } func (hs *serverHandshakeState) doResumeHandshake() error { c := hs.c hs.hello.cipherSuite = hs.suite.id c.cipherSuite = hs.suite.id
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:30:50 UTC 2024 - 27.6K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
return err } earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript) c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret) } c.didResume = true c.peerCertificates = sessionState.peerCertificates c.ocspResponse = sessionState.ocspResponse c.scts = sessionState.scts c.verifiedChains = sessionState.verifiedChains
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0)