Browse Source

Fix comment in webtransport client auth handshake (#1793)

marco/flaky/TestReservationFailures/unsupported_protocol
Marco Munizaga 2 years ago
committed by GitHub
parent
commit
1d04a70704
No known key found for this signature in database GPG Key ID: 4AEE18F83AFDEB23
  1. 4
      p2p/transport/webtransport/transport.go

4
p2p/transport/webtransport/transport.go

@ -203,8 +203,8 @@ func (t *transport) upgrade(ctx context.Context, sess *webtransport.Session, p p
return nil, err
}
// Now run a Noise handshake (using early data) and send all the certificate hashes that we would have accepted.
// The server will verify that it advertised all of these certificate hashes.
// Now run a Noise handshake (using early data) and get all the certificate hashes from the server.
// We will verify that the certhashes we used to dial is a subset of the certhashes we received from the server.
var verified bool
n, err := t.noise.WithSessionOptions(noise.EarlyData(newEarlyDataReceiver(func(b *pb.NoiseExtensions) error {
decodedCertHashes, err := decodeCertHashesFromProtobuf(b.WebtransportCerthashes)

Loading…
Cancel
Save