新注册的用户请输入邮箱并保存,随后登录邮箱激活账号。后续可直接使用邮箱登录!

You can move around the graph by using the arrow keys.
Created with Raphaël 2.2.013Feb3Jan13Julfeat: Update the chainmaket common to v3 --story=1012289v1.2.0 developv1.2.0 developfeat: Add the sm signature algorithm --story=1012641v1.1.0 masterv1.1.0 masteruse a prefix for client session cache keysadd callbacks to store and restore app data along a session statedon't use TLS 1.3 compatibility mode when using alternative record layerdelete the session ticket after attempting 0-RTTreject 0-RTT when a different ALPN is chosenencode the ALPN into the session ticketadd a field to the ConnectionState to tell if 0-RTT was usedadd a callback to tell the client about rejection of 0-RTTdon't offer 0-RTT after a HelloRetryRequestadd Accept0RTT to Config callback to decide if 0-RTT should be acceptedadd the option to encode application data into the session ticketexport the 0-RTT write keyabuse the nonce field of ClientSessionState to save max_early_data_sizeexport the 0-RTT read keyclose connection if client attempts 0-RTT, but ticket didn't allow itencode the max early data size into the session ticketimplement parsing of the early_data extension in the EncryptedExtensionsadd a tls.Config.MaxEarlyData option to enable 0-RTTaccept TLS 1.3 cipher suites in Config.CipherSuitesintroduce a function on the connection to generate a session ticketadd a config option to enforce selection of an application protocolexport Conn.HandlePostHandshakeMessagereject Configs that set MaxVersion < 1.3 when using a record layerenforce TLS 1.3 when using an alternative record layeradd alternative record layer config option, used by QUICexport a constructor for the TLS 1.3 AES-GCM AEADimplement sending and receiving extensions in the Encrypted Extensionsimplement sending and receiving extensions in the Client Hellointroduce an extra config struct to get and receive extensionsexport Alertimplement additional extensions for the ClientHello messageimplement additional extensions for the Encrypted Extensions messageuse a tls.Config and a tls.ClientHelloInfouse tls.CertificateRequestInfo instead of redefining ituse a tls.ClientSessionCache and tls.ClientSessionStateuse a tls.ConnectionState instead of redefining ituse tls.Certificate instead of redefining ituse tls.RenegotiationSupport instead of redefining it