David Benjamin
David Benjamin
The docs for `shutdown` say: ``` :return: True if the shutdown completed successfully (i.e. both sides have sent closure alerts), false otherwise (i.e. you have to wait for a ZeroReturnError...
**What version of protobuf and what language are you using?** Version: main Language: C++ **What operating system (Linux, Windows, ...) and version?** gLinux **What runtime / compiler are you using...
If testing against untrusted-root.badssl.com, it is natural to want the root. That's available now at https://badssl.com/certs/ca-untrusted-root.crt, but at a URL that is tedious to type on mobile. One also needs...
I mostly did this by mimicking the other SHA instructions, so I'm not sure if I did this right. Test cases constructed by running them through `as` and then `objdump...
From https://github.com/httpwg/http-extensions/issues/1927#issuecomment-1030299479, it sounds like the intent with the client certs draft is that the proxy does little to no certificate validation and punts all of it to the origin....
The introduction in the variants draft gives the following example: ~~~ HTTP/1.1 200 OK Content-Type: text/html Content-Language: en Vary: Accept-Language Variants: Accept-Language;de;en;jp Variant-Key: en Transfer-Encoding: chunked ~~~ But the syntax...
**Describe the bug** The [instructions](https://www.chromium.org/blink/launching-features) for "Web-developer-facing change to existing code (PSA)" say after "Step 0: Create a ChromeStatus entry, and choose your feature type", you are supposed to follow:...
## Request for position on an emerging web specification * WebKittens who can provide input: networking and TLS folks ### Information about the spec * Spec Title: TLS Encrypted Client...
This matches the formulation described in the documentation: https://www.openssl.org/docs/man3.0/man3/EVP_PKEY_CTX_set_dsa_paramgen_q_bits.html It is also, starting OpenSSL 3.0, more type-safe because the wrapper macros were finally converted to real functions. In OpenSSL 3.0,...
This fixes a pair of issues with EOF handling in TLSWrap. This originally came up because @codebytere noticed an incompatibility with Node and a recent BoringSSL change, but the root...