go/src/crypto/tls/tls_test.go

var rsaCertPEM

var rsaKeyPEM

var keyPEM

var ecdsaCertPEM

var ecdsaKeyPEM

var keyPairTests

func TestX509KeyPair(t *testing.T) {}

func TestX509KeyPairErrors(t *testing.T) {}

func TestX509MixedKeyPair(t *testing.T) {}

func newLocalListener(t testing.TB) net.Listener {}

func TestDialTimeout(t *testing.T) {}

func TestDeadlineOnWrite(t *testing.T) {}

type readerFunc

func (f readerFunc) Read(b []byte) (int, error) {}

// TestDialer tests that tls.Dialer.DialContext can abort in the middle of a handshake.
// (The other cases are all handled by the existing dial tests in this package, which
// all also flow through the same code shared code paths)
func TestDialer(t *testing.T) {}

func isTimeoutError(err error) bool {}

// tests that Conn.Read returns (non-zero, io.EOF) instead of
// (non-zero, nil) when a Close (alertCloseNotify) is sitting right
// behind the application data in the buffer.
func TestConnReadNonzeroAndEOF(t *testing.T) {}

func testConnReadNonzeroAndEOF(t *testing.T, delay time.Duration) error {}

func TestTLSUniqueMatches(t *testing.T) {}

func TestVerifyHostname(t *testing.T) {}

func TestConnCloseBreakingWrite(t *testing.T) {}

func TestConnCloseWrite(t *testing.T) {}

func TestWarningAlertFlood(t *testing.T) {}

func TestCloneFuncFields(t *testing.T) {}

func TestCloneNonFuncFields(t *testing.T) {}

func TestCloneNilConfig(t *testing.T) {}

type changeImplConn

func (w *changeImplConn) Write(p []byte) (n int, err error) {}

func (w *changeImplConn) Close() error {}

func throughput(b *testing.B, version uint16, totalBytes int64, dynamicRecordSizingDisabled bool) {}

func BenchmarkThroughput(b *testing.B) {}

type slowConn

func (c *slowConn) Write(p []byte) (int, error) {}

func latency(b *testing.B, version uint16, bps int, dynamicRecordSizingDisabled bool) {}

func BenchmarkLatency(b *testing.B) {}

func TestConnectionStateMarshal(t *testing.T) {}

func TestConnectionState(t *testing.T) {}

// Issue 28744: Ensure that we don't modify memory
// that Config doesn't own such as Certificates.
func TestBuildNameToCertificate_doesntModifyCertificates(t *testing.T) {}

func testingKey(s string) string {}

func TestClientHelloInfo_SupportsCertificate(t *testing.T) {}

func TestCipherSuites(t *testing.T) {}

func TestVersionName(t *testing.T) {}

// http2isBadCipher is copied from net/http.
// TODO: if it ends up exposed somewhere, use that instead.
func http2isBadCipher(cipher uint16) bool {}

type brokenSigner

func (s brokenSigner) Sign(rand io.Reader, digest []byte, opts crypto.SignerOpts) (signature []byte, err error) {}

// TestPKCS1OnlyCert uses a client certificate with a broken crypto.Signer that
// always makes PKCS #1 v1.5 signatures, so can't be used with RSA-PSS.
func TestPKCS1OnlyCert(t *testing.T) {}

func TestVerifyCertificates(t *testing.T) {}

func testVerifyCertificates(t *testing.T, version uint16) {}

func TestHandshakeKyber(t *testing.T) {}

func TestX509KeyPairPopulateCertificate(t *testing.T) {}

func TestEarlyLargeCertMsg(t *testing.T) {}

func TestLargeCertMsg(t *testing.T) {}