diff options
| author | Filippo Valsorda <filippo@golang.org> | 2018-11-05 15:59:08 -0500 |
|---|---|---|
| committer | Filippo Valsorda <filippo@golang.org> | 2018-11-12 20:43:35 +0000 |
| commit | 6435d0cfbf72f405f31430e60766add6d6762fe1 (patch) | |
| tree | 2dbaba2dd1d2649131d484002defd80f7c82d3e2 /src/crypto/tls/testdata/Client-TLSv10-ClientCert-RSA-RSA | |
| parent | d669cc47ad8bfde5c0a525563803b3cc444fe897 (diff) | |
| download | go-6435d0cfbf72f405f31430e60766add6d6762fe1.tar.xz | |
crypto/tls: implement TLS 1.3 PSK authentication (server side)
Added some assertions to testHandshake, but avoided checking the error
of one of the Close() because the one that would lose the race would
write the closeNotify to a connection closed on the other side which is
broken on js/wasm (#28650). Moved that Close() after the chan sync to
ensure it happens second.
Accepting a ticket with client certificates when NoClientCert is
configured is probably not a problem, and we could hide them to avoid
confusing the application, but the current behavior is to skip the
ticket, and I'd rather keep behavior changes to a minimum.
Updates #9671
Change-Id: I93b56e44ddfe3d48c2bef52c83285ba2f46f297a
Reviewed-on: https://go-review.googlesource.com/c/147445
Reviewed-by: Adam Langley <agl@golang.org>
Diffstat (limited to 'src/crypto/tls/testdata/Client-TLSv10-ClientCert-RSA-RSA')
0 files changed, 0 insertions, 0 deletions
