aboutsummaryrefslogtreecommitdiff
path: root/src/crypto/tls/testdata/Client-TLSv10-ClientCert-RSA-RSA
diff options
context:
space:
mode:
authorFilippo Valsorda <filippo@golang.org>2018-11-05 15:59:08 -0500
committerFilippo Valsorda <filippo@golang.org>2018-11-12 20:43:35 +0000
commit6435d0cfbf72f405f31430e60766add6d6762fe1 (patch)
tree2dbaba2dd1d2649131d484002defd80f7c82d3e2 /src/crypto/tls/testdata/Client-TLSv10-ClientCert-RSA-RSA
parentd669cc47ad8bfde5c0a525563803b3cc444fe897 (diff)
downloadgo-6435d0cfbf72f405f31430e60766add6d6762fe1.tar.xz
crypto/tls: implement TLS 1.3 PSK authentication (server side)
Added some assertions to testHandshake, but avoided checking the error of one of the Close() because the one that would lose the race would write the closeNotify to a connection closed on the other side which is broken on js/wasm (#28650). Moved that Close() after the chan sync to ensure it happens second. Accepting a ticket with client certificates when NoClientCert is configured is probably not a problem, and we could hide them to avoid confusing the application, but the current behavior is to skip the ticket, and I'd rather keep behavior changes to a minimum. Updates #9671 Change-Id: I93b56e44ddfe3d48c2bef52c83285ba2f46f297a Reviewed-on: https://go-review.googlesource.com/c/147445 Reviewed-by: Adam Langley <agl@golang.org>
Diffstat (limited to 'src/crypto/tls/testdata/Client-TLSv10-ClientCert-RSA-RSA')
0 files changed, 0 insertions, 0 deletions