Fork of the Go standard TLS library, providing low-level access to the ClientHello for mimicry purposes.
Find a file
Ziheng Liu 5cb310fdd2 all: fix incorrect channel and API usage in some unit tests
This CL changes some unit test functions, making sure that these tests (and goroutines spawned during test) won't block.
Since they are just test functions, I use one CL to fix them all. I hope this won't cause trouble to reviewers and can save time for us.
There are three main categories of incorrect logic fixed by this CL:
1. Use testing.Fatal()/Fatalf() in spawned goroutines, which is forbidden by Go's document.
2. Channels are used in such a way that, when errors or timeout happen, the test will be blocked and never return.
3. Channels are used in such a way that, when errors or timeout happen, the test can return but some spawned goroutines will be leaked, occupying resource until all other tests return and the process is killed.

Change-Id: I3df931ec380794a0cf1404e632c1dd57c65d63e8
Reviewed-on: https://go-review.googlesource.com/c/go/+/219380
Run-TryBot: Ian Lance Taylor <iant@golang.org>
TryBot-Result: Gobot Gobot <gobot@golang.org>
Reviewed-by: Ian Lance Taylor <iant@golang.org>
2020-02-27 19:04:17 +00:00
testdata crypto/tls: take key size into account in signature algorithm selection 2019-11-12 01:09:40 +00:00
alert.go crypto/tls: select only compatible chains from Certificates 2019-11-12 01:08:57 +00:00
auth.go crypto/tls: use new ecdsa.VerifyASN1 API 2020-02-26 16:58:30 +00:00
auth_test.go crypto/tls: take key size into account in signature algorithm selection 2019-11-12 01:09:40 +00:00
cipher_suites.go crypto/tls: add CipherSuites, InsecureCipherSuites and CipherSuiteName 2019-11-12 01:09:31 +00:00
common.go crypto/tls: use new ecdsa.VerifyASN1 API 2020-02-26 16:58:30 +00:00
conn.go crypto/tls: fix a typo in TLS handshake comment 2019-12-06 23:53:46 +00:00
conn_test.go crypto/tls: select only compatible chains from Certificates 2019-11-12 01:08:57 +00:00
example_test.go crypto/tls: update ExampleDial with a valid root 2020-02-21 23:20:22 +00:00
generate_cert.go crypto/tls: consistently use %v for error formatting 2019-10-11 14:23:52 +00:00
handshake_client.go crypto/tls: clarify TLS 1.0/1.1 CertificateRequestInfo.SignatureSchemes 2020-02-21 23:18:43 +00:00
handshake_client_test.go all: fix incorrect channel and API usage in some unit tests 2020-02-27 19:04:17 +00:00
handshake_client_tls13.go crypto/tls: implement (*CertificateRequestInfo).SupportsCertificate 2019-11-12 01:08:46 +00:00
handshake_messages.go crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
handshake_messages_test.go crypto/tls: send ec_points_format extension in ServerHello 2019-10-31 15:14:45 +00:00
handshake_server.go all: fix a bunch of misspellings 2019-11-15 21:04:43 +00:00
handshake_server_test.go all: fix incorrect channel and API usage in some unit tests 2020-02-27 19:04:17 +00:00
handshake_server_tls13.go crypto/tls: select only compatible chains from Certificates 2019-11-12 01:08:57 +00:00
handshake_test.go crypto/tls: retry ETIMEDOUT flakes in localPipe on dragonfly 2019-11-12 17:55:14 +00:00
handshake_unix_test.go crypto/tls: retry net.Dial flakes on Dragonfly 2019-10-21 19:06:29 +00:00
key_agreement.go crypto/tls: refactor certificate and signature algorithm logic 2019-11-12 01:07:15 +00:00
key_schedule.go src/vendor,crypto/tls: update to latest x/crypto and use new X25519 API 2019-11-13 01:15:54 +00:00
key_schedule_test.go crypto/tls: implement TLS 1.3 cryptographic computations 2018-11-02 21:54:52 +00:00
prf.go crypto/tls: improve error messages for invalid certificates and signatures 2019-10-30 20:18:59 +00:00
prf_test.go crypto/tls: remove SSLv3 support 2019-08-27 22:24:05 +00:00
ticket.go all: move internal/x to vendor/golang.org/x and revendor using 'go mod vendor' 2019-03-11 20:28:54 +00:00
tls.go crypto/tls: stop a timeout timer 2020-01-15 20:29:46 +00:00
tls_test.go all: fix incorrect channel and API usage in some unit tests 2020-02-27 19:04:17 +00:00