type crypto/tls.Config

68 uses

	crypto/tls (current package)
		common.go#L457: 	config *Config
		common.go#L531: type Config struct {
		common.go#L605: 	GetConfigForClient func(*ClientHelloInfo) (*Config, error)
		common.go#L856: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
		common.go#L874: func (c *Config) Clone() *Config {
		common.go#L880: 	return &Config{
		common.go#L922: func (c *Config) initLegacySessionTicketKeyRLocked() {
		common.go#L959: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
		common.go#L1027: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
		common.go#L1042: func (c *Config) rand() io.Reader {
		common.go#L1050: func (c *Config) time() time.Time {
		common.go#L1058: func (c *Config) cipherSuites() []uint16 {
		common.go#L1088: func (c *Config) supportedVersions(isClient bool) []uint16 {
		common.go#L1113: func (c *Config) maxSupportedVersion(isClient bool) uint16 {
		common.go#L1135: func (c *Config) curvePreferences(version uint16) []CurveID {
		common.go#L1157: func (c *Config) supportsCurve(version uint16, curve CurveID) bool {
		common.go#L1168: func (c *Config) mutualVersion(isClient bool, peerVersions []uint16) (uint16, bool) {
		common.go#L1193: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
		common.go#L1255: 		config = &Config{}
		common.go#L1436: func (c *Config) BuildNameToCertificate() {
		common.go#L1463: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
		common.go#L1604: var emptyConfig Config
		common.go#L1606: func defaultConfig() *Config {
		conn.go#L44: 	config         *Config // configuration passed to constructor
		handshake_server.go#L146: 	var configForClient *Config
		handshake_server.go#L322: func supportsECDHE(c *Config, version uint16, supportedCurves []CurveID, supportedPoints []uint8) bool {
		key_agreement.go#L27: 	generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
		key_agreement.go#L28: 	processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
		key_agreement.go#L34: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		key_agreement.go#L35: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		key_agreement.go#L45: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L49: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L77: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L81: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L169: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L258: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L275: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L360: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		quic.go#L51: 	TLSConfig *Config
		ticket.go#L311: func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) {
		ticket.go#L320: func (c *Config) encryptTicket(state []byte, ticketKeys []ticketKey) ([]byte, error) {
		ticket.go#L352: func (c *Config) DecryptTicket(identity []byte, cs ConnectionState) (*SessionState, error) {
		ticket.go#L365: func (c *Config) decryptTicket(encrypted []byte, ticketKeys []ticketKey) []byte {
		tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L61: 	config *Config
		tls.go#L78: func NewListener(inner net.Listener, config *Config) net.Listener {
		tls.go#L89: func Listen(network, laddr string, config *Config) (net.Listener, error) {
		tls.go#L118: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L122: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L172: func Dial(network, addr string, config *Config) (*Conn, error) {
		tls.go#L188: 	Config *Config

	net/http
		h2_bundle.go#L4130: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L7211: 	DialTLSContext func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
		h2_bundle.go#L7221: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		h2_bundle.go#L7225: 	TLSClientConfig *tls.Config
		h2_bundle.go#L7427: 		t1.TLSClientConfig = new(tls.Config)
		h2_bundle.go#L7850: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
		h2_bundle.go#L7851: 	cfg := new(tls.Config)
		h2_bundle.go#L7864: func (t *http2Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {
		h2_bundle.go#L10467: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
		server.go#L2900: 	TLSConfig *tls.Config
		transport.go#L181: 	TLSClientConfig *tls.Config
		transport.go#L3011: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
		transport.go#L3013: 		return &tls.Config{}