These were harmless, but added unnecessary verbosity to the code.
This can happen as a result of refactors: for example,
the method sessionState used to return errors in some cases.
Change-Id: I4e6dacc01ae6a49b528c672979f95cbb86795a85
Reviewed-on: https://go-review.googlesource.com/c/go/+/528995
Reviewed-by: Leo Isla <islaleo93@gmail.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Than McIntosh <thanm@google.com>
Reviewed-by: Olivier Mengué <olivier.mengue@gmail.com>
Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
Reviewed-by: qiulaidongfeng <2645477756@qq.com>
Reviewed-by: Quim Muntal <quimmuntal@gmail.com>
return nil
}
- session, err := c.sessionState()
- if err != nil {
- return err
- }
+ session := c.sessionState()
session.secret = hs.masterSecret
cs := &ClientSessionState{ticket: hs.ticket, session: session}
psk := cipherSuite.expandLabel(c.resumptionSecret, "resumption",
msg.nonce, cipherSuite.hash.Size())
- session, err := c.sessionState()
- if err != nil {
- c.sendAlert(alertInternalError)
- return err
- }
+ session := c.sessionState()
session.secret = psk
session.useBy = uint64(c.config.time().Add(lifetime).Unix())
session.ageAdd = msg.ageAdd
c := hs.c
m := new(newSessionTicketMsg)
- state, err := c.sessionState()
- if err != nil {
- return err
- }
+ state := c.sessionState()
state.secret = hs.masterSecret
if hs.sessionState != nil {
// If this is re-wrapping an old key, then keep
state.createdAt = hs.sessionState.createdAt
}
if c.config.WrapSession != nil {
+ var err error
m.ticket, err = c.config.WrapSession(c.connectionStateLocked(), state)
if err != nil {
return err
m := new(newSessionTicketMsgTLS13)
- state, err := c.sessionState()
- if err != nil {
- return err
- }
+ state := c.sessionState()
state.secret = psk
state.EarlyData = earlyData
if c.config.WrapSession != nil {
+ var err error
m.label, err = c.config.WrapSession(c.connectionStateLocked(), state)
if err != nil {
return err
// The value is not stored anywhere; we never need to check the ticket age
// because 0-RTT is not supported.
ageAdd := make([]byte, 4)
- _, err = c.config.rand().Read(ageAdd)
- if err != nil {
+ if _, err := c.config.rand().Read(ageAdd); err != nil {
return err
}
m.ageAdd = binary.LittleEndian.Uint32(ageAdd)
// sessionState returns a partially filled-out [SessionState] with information
// from the current connection.
-func (c *Conn) sessionState() (*SessionState, error) {
+func (c *Conn) sessionState() *SessionState {
return &SessionState{
version: c.vers,
cipherSuite: c.cipherSuite,
isClient: c.isClient,
extMasterSecret: c.extMasterSecret,
verifiedChains: c.verifiedChains,
- }, nil
+ }
}
// EncryptTicket encrypts a ticket with the [Config]'s configured (or default)
p.op(opLeftParen).Cap = p.numCap
t = t[1:]
case '|':
- if err = p.parseVerticalBar(); err != nil {
- return nil, err
- }
+ p.parseVerticalBar()
t = t[1:]
case ')':
if err = p.parseRightParen(); err != nil {
}
// parseVerticalBar handles a | in the input.
-func (p *parser) parseVerticalBar() error {
+func (p *parser) parseVerticalBar() {
p.concat()
// The concatenation we just parsed is on top of the stack.
if !p.swapVerticalBar() {
p.op(opVerticalBar)
}
-
- return nil
}
// mergeCharClass makes dst = dst|src.