type crypto/tls.Conn
93 uses
crypto/tls (current package)
conn.go#L28: type Conn struct {
conn.go#L133: func (c *Conn) LocalAddr() net.Addr {
conn.go#L138: func (c *Conn) RemoteAddr() net.Addr {
conn.go#L145: func (c *Conn) SetDeadline(t time.Time) error {
conn.go#L151: func (c *Conn) SetReadDeadline(t time.Time) error {
conn.go#L158: func (c *Conn) SetWriteDeadline(t time.Time) error {
conn.go#L165: func (c *Conn) NetConn() net.Conn {
conn.go#L583: func (c *Conn) newRecordHeaderError(conn net.Conn, msg string) (err RecordHeaderError) {
conn.go#L590: func (c *Conn) readRecord() error {
conn.go#L594: func (c *Conn) readChangeCipherSpec() error {
conn.go#L612: func (c *Conn) readRecordOrCCS(expectChangeCipherSpec bool) error {
conn.go#L788: func (c *Conn) retryReadRecord(expectChangeCipherSpec bool) error {
conn.go#L822: func (c *Conn) readFromUntil(r io.Reader, n int) error {
conn.go#L836: func (c *Conn) sendAlertLocked(err alert) error {
conn.go#L859: func (c *Conn) sendAlert(err alert) error {
conn.go#L895: func (c *Conn) maxPayloadSizeForWrite(typ recordType) int {
conn.go#L942: func (c *Conn) write(data []byte) (int, error) {
conn.go#L953: func (c *Conn) flush() (int, error) {
conn.go#L974: func (c *Conn) writeRecordLocked(typ recordType, data []byte) (int, error) {
conn.go#L1048: func (c *Conn) writeHandshakeRecord(msg handshakeMessage, transcript transcriptHash) (int, error) {
conn.go#L1065: func (c *Conn) writeChangeCipherRecord() error {
conn.go#L1073: func (c *Conn) readHandshakeBytes(n int) error {
conn.go#L1088: func (c *Conn) readHandshake(transcript transcriptHash) (any, error) {
conn.go#L1117: func (c *Conn) unmarshalHandshakeMessage(data []byte, transcript transcriptHash) (handshakeMessage, error) {
conn.go#L1196: func (c *Conn) Write(b []byte) (int, error) {
conn.go#L1253: func (c *Conn) handleRenegotiation() error {
conn.go#L1299: func (c *Conn) handlePostHandshakeMessage() error {
conn.go#L1328: func (c *Conn) handleKeyUpdate(keyUpdate *keyUpdateMsg) error {
conn.go#L1371: func (c *Conn) Read(b []byte) (int, error) {
conn.go#L1415: func (c *Conn) Close() error {
conn.go#L1455: func (c *Conn) CloseWrite() error {
conn.go#L1463: func (c *Conn) closeNotify() error {
conn.go#L1491: func (c *Conn) Handshake() error {
conn.go#L1505: func (c *Conn) HandshakeContext(ctx context.Context) error {
conn.go#L1511: func (c *Conn) handshakeContext(ctx context.Context) (ret error) {
conn.go#L1612: func (c *Conn) ConnectionState() ConnectionState {
conn.go#L1620: func (c *Conn) connectionStateLocked() ConnectionState {
conn.go#L1662: func (c *Conn) OCSPResponse() []byte {
conn.go#L1672: func (c *Conn) VerifyHostname(host string) error {
handshake_client.go#L31: c *Conn
handshake_client.go#L44: func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echContext, error) {
handshake_client.go#L253: func (c *Conn) clientHandshake(ctx context.Context) (err error) {
handshake_client.go#L379: func (c *Conn) loadSession(hello *clientHelloMsg) (
handshake_client.go#L517: func (c *Conn) pickTLSVersion(serverHello *serverHelloMsg) error {
handshake_client.go#L1071: func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
handshake_client.go#L1229: func (c *Conn) getClientCertificate(cri *CertificateRequestInfo) (*Certificate, error) {
handshake_client.go#L1247: func (c *Conn) clientSessionCacheKey() string {
handshake_client_tls13.go#L22: c *Conn
handshake_client_tls13.go#L863: func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error {
handshake_server.go#L26: c *Conn
handshake_server.go#L42: func (c *Conn) serverHandshake(ctx context.Context) error {
handshake_server.go#L133: func (c *Conn) readClientHello(ctx context.Context) (*clientHelloMsg, error) {
handshake_server.go#L874: func (c *Conn) processCertsFromClient(certificate Certificate) error {
handshake_server.go#L952: func clientHelloInfo(ctx context.Context, c *Conn, clientHello *clientHelloMsg) *ClientHelloInfo {
handshake_server_tls13.go#L28: c *Conn
handshake_server_tls13.go#L868: func (c *Conn) sendSessionTicket(earlyData bool, extra [][]byte) error {
quic.go#L44: conn *Conn
quic.go#L187: func newQUICConn(conn *Conn, config *QUICConfig) *QUICConn {
quic.go#L375: func (c *Conn) quicReadHandshakeBytes(n int) error {
quic.go#L384: func (c *Conn) quicSetReadSecret(level QUICEncryptionLevel, suite uint16, secret []byte) {
quic.go#L393: func (c *Conn) quicSetWriteSecret(level QUICEncryptionLevel, suite uint16, secret []byte) {
quic.go#L402: func (c *Conn) quicWriteCryptoData(level QUICEncryptionLevel, data []byte) {
quic.go#L417: func (c *Conn) quicResumeSession(session *SessionState) error {
quic.go#L431: func (c *Conn) quicStoreSession(session *SessionState) {
quic.go#L438: func (c *Conn) quicSetTransportParameters(params []byte) {
quic.go#L445: func (c *Conn) quicGetTransportParameters() ([]byte, error) {
quic.go#L459: func (c *Conn) quicHandshakeComplete() {
quic.go#L465: func (c *Conn) quicRejectedEarlyData() {
quic.go#L476: func (c *Conn) quicWaitForSignal() error {
ticket.go#L293: func (c *Conn) sessionState() *SessionState {
tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
tls.go#L36: c := &Conn{
tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
tls.go#L49: c := &Conn{
tls.go#L118: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L122: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L172: func Dial(network, addr string, config *Config) (*Conn, error) {
net/http
h2_bundle.go#L886: func (p *http2clientConnPool) addConnIfNeeded(key string, t *http2Transport, c *tls.Conn) (used bool, err error) {
h2_bundle.go#L922: func (c *http2addConnCall) run(t *http2Transport, key string, tc *tls.Conn) {
h2_bundle.go#L4167: s.TLSNextProto = map[string]func(*Server, *tls.Conn, Handler){}
h2_bundle.go#L4169: protoHandler := func(hs *Server, c *tls.Conn, h Handler) {
h2_bundle.go#L7435: upgradeFn := func(authority string, c *tls.Conn) RoundTripper {
h2_bundle.go#L7450: t1.TLSNextProto = map[string]func(string, *tls.Conn) RoundTripper{
h2_bundle.go#L8215: tc, ok := cc.tconn.(*tls.Conn)
h2_bundle.go#L10467: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
h2_bundle.go#L10475: tlsCn := cn.(*tls.Conn) // DialContext comment promises this will always succeed
server.go#L1964: if tlsConn, ok := c.rwc.(*tls.Conn); ok {
server.go#L2949: TLSNextProto map[string]func(*Server, *tls.Conn, Handler)
server.go#L3798: c *tls.Conn
transport.go#L251: TLSNextProto map[string]func(authority string, c *tls.Conn) RoundTripper
transport.go#L342: npm := map[string]func(authority string, c *tls.Conn) RoundTripper{}
transport.go#L1708: if tc, ok := pconn.conn.(*tls.Conn); ok {
transport.go#L1862: alt := next(cm.targetAddr, pconn.conn.(*tls.Conn))
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |