You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 26, 2022. It is now read-only.
goroutine to monitor the context if a deadline is set, and close the connection if it fires.
get rid of readMsgInsecure and writeMsgInsecure abstractions so we can control the buffers.
on read, if there are no queued bytes, and the user-provided buffer is large enough, read and decrypt in place. (requires peeking the length of the incoming payload).
handshake messages can probably reuse buffers -- their lengths should be predictable.
The text was updated successfully, but these errors were encountered:
See follow-up comments on #58. Some highlights:
readMsgInsecure
andwriteMsgInsecure
abstractions so we can control the buffers.The text was updated successfully, but these errors were encountered: