Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for DidResume (0.14 sec)

  1. src/crypto/tls/quic_test.go

    	srv.conn.SetTransportParameters(nil)
    	if err := runTestQUICConnection(context.Background(), cli, srv, nil); err != nil {
    		t.Fatalf("error during first connection handshake: %v", err)
    	}
    	if cli.conn.ConnectionState().DidResume {
    		t.Errorf("first connection unexpectedly used session resumption")
    	}
    
    	cli2 := newTestQUICClient(t, clientConfig)
    	cli2.conn.SetTransportParameters(nil)
    	srv2 := newTestQUICServer(t, serverConfig)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 19.3K bytes
    - Viewed (0)
  2. src/crypto/tls/handshake_client_test.go

    	}
    
    	testResumeState := func(test string, didResume bool) {
    		t.Helper()
    		_, hs, err := testHandshake(t, clientConfig, serverConfig)
    		if err != nil {
    			t.Fatalf("%s: handshake failed: %s", test, err)
    		}
    		if hs.DidResume != didResume {
    			t.Fatalf("%s resumed: %v, expected: %v", test, hs.DidResume, didResume)
    		}
    		if didResume && (hs.PeerCertificates == nil || hs.VerifiedChains == nil) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 88.7K bytes
    - Viewed (0)
  3. src/crypto/tls/handshake_server_test.go

    	}
    	if !state.DidResume {
    		t.Fatalf("handshake did not resume at the same version")
    	}
    
    	// Test that the server will decline to resume at a lower version.
    	clientConfig.MaxVersion = VersionTLS12
    	state, _, err = testHandshake(t, clientConfig, serverConfig)
    	if err != nil {
    		t.Fatalf("handshake failed: %s", err)
    	}
    	if state.DidResume {
    		t.Fatalf("handshake resumed at a lower version")
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  4. src/crypto/tls/tls_test.go

    				t.Errorf("Got HandshakeComplete %v (server) and %v (client), expected true", ss.HandshakeComplete, cs.HandshakeComplete)
    			}
    
    			if ss.DidResume || cs.DidResume {
    				t.Errorf("Got DidResume %v (server) and %v (client), expected false", ss.DidResume, cs.DidResume)
    			}
    
    			if ss.CipherSuite == 0 || cs.CipherSuite == 0 {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 60.5K bytes
    - Viewed (0)
  5. src/crypto/tls/bogo_shim_test.go

    				log.Fatal("did not expect ECH, but it was accepted")
    			}
    
    			if *expectHRR && !cs.testingOnlyDidHRR {
    				log.Fatal("expected HRR but did not do it")
    			}
    
    			if *expectSessionMiss && cs.DidResume {
    				log.Fatal("unexpected session resumption")
    			}
    
    			if *expectedServerName != "" && cs.ServerName != *expectedServerName {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 11 17:25:39 UTC 2024
    - 12.6K bytes
    - Viewed (0)
  6. src/crypto/tls/conn.go

    	var state ConnectionState
    	state.HandshakeComplete = c.isHandshakeComplete.Load()
    	state.Version = c.vers
    	state.NegotiatedProtocol = c.clientProtocol
    	state.DidResume = c.didResume
    	state.testingOnlyDidHRR = c.didHRR
    	// c.curveID is not set on TLS 1.0–1.2 resumptions. Fix that before exposing it.
    	state.testingOnlyCurveID = c.curveID
    	state.NegotiatedProtocolIsMutual = true
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
  7. src/crypto/tls/handshake_client.go

    	if c.config == nil {
    		c.config = defaultConfig()
    	}
    
    	// This may be a renegotiation handshake, in which case some fields
    	// need to be reset.
    	c.didResume = false
    
    	hello, keyShareKeys, ech, err := c.makeClientHello()
    	if err != nil {
    		return err
    	}
    
    	session, earlySecret, binderKey, err := c.loadSession(hello)
    	if err != nil {
    		return err
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 38.6K bytes
    - Viewed (0)
  8. src/crypto/tls/handshake_client_tls13.go

    	}
    	if pskSuite.hash != hs.suite.hash {
    		c.sendAlert(alertIllegalParameter)
    		return errors.New("tls: server selected an invalid PSK and cipher suite pair")
    	}
    
    	hs.usingPSK = true
    	c.didResume = true
    	c.peerCertificates = hs.session.peerCertificates
    	c.activeCertHandles = hs.session.activeCertHandles
    	c.verifiedChains = hs.session.verifiedChains
    	c.ocspResponse = hs.session.ocspResponse
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 27.9K bytes
    - Viewed (0)
  9. src/crypto/tls/handshake_server.go

    	c.scts = sessionState.scts
    	c.verifiedChains = sessionState.verifiedChains
    	c.extMasterSecret = sessionState.extMasterSecret
    	hs.sessionState = sessionState
    	hs.suite = suite
    	c.didResume = true
    	return nil
    }
    
    func (hs *serverHandshakeState) doResumeHandshake() error {
    	c := hs.c
    
    	hs.hello.cipherSuite = hs.suite.id
    	c.cipherSuite = hs.suite.id
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 21:30:50 UTC 2024
    - 27.6K bytes
    - Viewed (0)
  10. src/crypto/tls/handshake_server_tls13.go

    				return err
    			}
    			earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript)
    			c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret)
    		}
    
    		c.didResume = true
    		c.peerCertificates = sessionState.peerCertificates
    		c.ocspResponse = sessionState.ocspResponse
    		c.scts = sessionState.scts
    		c.verifiedChains = sessionState.verifiedChains
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 17:23:54 UTC 2024
    - 30.5K bytes
    - Viewed (0)
Back to top