diff options
author | Jesse Wilson <jessewilson@google.com> | 2012-05-11 18:13:36 -0400 |
---|---|---|
committer | Jesse Wilson <jessewilson@google.com> | 2012-05-15 14:37:40 -0400 |
commit | 679ac55c3c037887edfc6ce6f42a23cd7c11cd12 (patch) | |
tree | 1c665f17fd08bf661056b7f1118c12f7e9fa7b16 /annotations/generate_annotated_java_files.py | |
parent | d71c8470c187ac3bcd1bcba055bc0389da4eec98 (diff) |
Only use SSL CUTTHROUGH (False Start) if the server supports NPN.
We enable cutthrough on the client if the server supports NPN.
We never enable cutthrough on the server because most relevant
protocols (ie. HTTP) are client-speaks-first and those don't
benefit from cutthrough on the server.
I verified this by enabling NPN on both client and server and
checking that the client's Application Data was sent before the
server's Change Cipher Spec. To increase the likelihood of this
otherwise racy situation I put the server in SSL debug mode
after it receiving next_protos_advertised_callback. OpenSSL's
debug mode adds a 1-second sleep before each read and write.
Bug: http://b/6331035
Change-Id: I879b5fb26dc237392a36fe0585c8a6519c0e5220
Diffstat (limited to 'annotations/generate_annotated_java_files.py')
0 files changed, 0 insertions, 0 deletions