mirror of
https://github.com/refraction-networking/utls.git
synced 2025-04-06 05:27:36 +03:00
Fork of the Go standard TLS library, providing low-level access to the ClientHello for mimicry purposes.
anticensorshipcipher-suitesclienthellocryptogolanghandshakelow-level-tlsobfuscationparrottlstls-extension
* The exec count must be set to 0 before calling workerServer.fuzz. This was causing fuzz to run indefinitely after the first benchmark iteration, since it wouldn't hit the termination condition of being equal to fuzzArgs.Limit. * Added an assertion that the count must be lower than fuzzArgs.Limit at the beginning of workerServer.fuzz. * Also closed and deleted shared memory at the end of each benchmark run. Change-Id: Iab465f8a4997ebd652aec04d0ff9bb60b802829e Reviewed-on: https://go-review.googlesource.com/c/go/+/334129 Trust: Jay Conrod <jayconrod@google.com> Trust: Katie Hockman <katie@golang.org> Run-TryBot: Jay Conrod <jayconrod@google.com> TryBot-Result: Go Bot <gobot@golang.org> Reviewed-by: Katie Hockman <katie@golang.org> |
||
---|---|---|
abi | ||
buildcfg | ||
bytealg | ||
cfg | ||
cpu | ||
execabs | ||
fmtsort | ||
fuzz | ||
goexperiment | ||
goroot | ||
goversion | ||
itoa | ||
lazyregexp | ||
lazytemplate | ||
nettrace | ||
obscuretestdata | ||
oserror | ||
poll | ||
profile | ||
race | ||
reflectlite | ||
singleflight | ||
syscall | ||
sysinfo | ||
testenv | ||
testlog | ||
trace | ||
unsafeheader | ||
xcoff |