Home
last modified time | relevance | path

Searched refs:tlsState (Results 1 – 25 of 652) sorted by relevance

12345678910>>...27

/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/marten-seemann/qtls-go1-15/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/storj/storj-1.45.3/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/storj/storj-1.45.3/vendor/github.com/marten-seemann/qtls-go1-17/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/marten-seemann/qtls-go1-15/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/marten-seemann/qtls-go1-17/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/security/xray-core/Xray-core-1.5.0/vendor/github.com/marten-seemann/qtls-go1-17/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/security/xray-core/Xray-core-1.5.0/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/dns/nextdns/nextdns-1.32.2/vendor/github.com/marten-seemann/qtls-go1-15/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/dns/nextdns/nextdns-1.32.2/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/v2ray/v2ray-core-4.36.2/vendor/github.com/marten-seemann/qtls-go1-15/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/marten-seemann/qtls-go1-17/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/ooni-probe-cli/probe-cli-3.10.1/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net/ooni-mini/probe-engine-0.23.0/vendor/github.com/marten-seemann/qtls-go1-16/
H A Dunsafe_test.go101 tlsState := toConnectionState(state)
102 if tlsState.Version != 1234 {
105 if !tlsState.HandshakeComplete {
108 if !tlsState.DidResume {
111 if tlsState.CipherSuite != 4321 {
114 if tlsState.NegotiatedProtocol != "foobar" {
117 if tlsState.ServerName != "server" {
120 …if len(tlsState.PeerCertificates) != 1 || !bytes.Equal(tlsState.PeerCertificates[0].Raw, []byte("f…
123 if !bytes.Equal(tlsState.OCSPResponse, []byte("foo")) {
126 if !bytes.Equal(tlsState.TLSUnique, []byte("bar")) {
[all …]
/dports/net-im/coyim/coyim-0.3.11/xmpp/
H A Dtls.go60 func GetCipherSuiteName(tlsState tls.ConnectionState) string {
61 cipherSuite, ok := tlsCipherSuiteNames[tlsState.CipherSuite]
69 func GetTLSVersion(tlsState tls.ConnectionState) string {
70 version, ok := tlsVersionStrings[tlsState.Version]
78 func printTLSDetails(w io.Writer, tlsState tls.ConnectionState) {
79 fmt.Fprintf(w, " SSL/TLS version: %s\n", GetTLSVersion(tlsState))
80 fmt.Fprintf(w, " Cipher suite: %s\n", GetCipherSuiteName(tlsState))
132 tlsState := tlsConn.ConnectionState()
133 printTLSDetails(l, tlsState)
135 if err = d.verifier.Verify(tlsState, tlsConfig, c.OriginDomain()); err != nil {
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go20 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
21 if tlsState == nil {
28 for _, cert := range tlsState.PeerCertificates {
31 for _, chain := range tlsState.VerifiedChains {
46 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
47 if tlsState == nil {
50 if len(tlsState.PeerCertificates) == 0 {
53 if len(tlsState.VerifiedChains) == 0 {
57 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dauth.go27 func LogTLSState(ctx context.Context, tlsState *tls.ConnectionState) {
28 if tlsState == nil {
35 for _, cert := range tlsState.PeerCertificates {
38 for _, chain := range tlsState.VerifiedChains {
53 func getCertificateSubject(tlsState *tls.ConnectionState) (pkix.Name, error) {
54 if tlsState == nil {
57 if len(tlsState.PeerCertificates) == 0 {
60 if len(tlsState.VerifiedChains) == 0 {
64 return tlsState.VerifiedChains[0][0].Subject, nil

12345678910>>...27