Home | History | Annotate | Download | only in runner

Lines Matching refs:peer

256 	PeerCertificates           []*x509.Certificate   // certificate chain presented by remote peer
264 PeerSignatureAlgorithm signatureAlgorithm // algorithm used by the peer in the handshake
266 QUICTransportParams []byte // the QUIC transport params received from the peer
615 // SkipCertificateVerify, if true causes peer to skip sending a
720 // peer.
728 // expect the peer to False Start; the server Finished message
730 // from the peer.
736 // Start test to determine whether the peer processed the alert (and
801 // RequireExtendedMasterSecret, if true, requires that the peer support
856 // the peer must still send none.
919 // timeouts for before each handshake leg from the peer.
974 // and record body split across multiple packets. The peer should
982 // IgnorePeerCipherPreferences, if true, causes the peer's cipher
986 // IgnorePeerSignatureAlgorithmPreferences, if true, causes the peer's
990 // IgnorePeerCurvePreferences, if true, causes the peer's curve
1010 // is sent by the peer, this option has no effect.) This requires that
1066 // ExpectCloseNotify, if true, requires a close_notify from the peer on
1067 // shutdown. Records from the peer received after close_notify is sent
1486 // length accepted from the peer.
1519 // KeyUpdates from the peer to be rejected.