crypto/tls.Conn.in (field)

57 uses

	crypto/tls (current package)
		conn.go#L104: 	in, out   halfConn
		conn.go#L613: 	if c.in.err != nil {
		conn.go#L614: 		return c.in.err
		conn.go#L620: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
		conn.go#L625: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
		conn.go#L637: 			c.in.setErrorLocked(err)
		conn.go#L650: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
		conn.go#L664: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
		conn.go#L672: 			return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
		conn.go#L678: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
		conn.go#L682: 			c.in.setErrorLocked(err)
		conn.go#L689: 	data, typ, err := c.in.decrypt(record)
		conn.go#L691: 		return c.in.setErrorLocked(c.sendAlert(err.(alert)))
		conn.go#L694: 		return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
		conn.go#L698: 	if c.in.cipher == nil && typ == recordTypeApplicationData {
		conn.go#L699: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L709: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L714: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L718: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L721: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L724: 			return c.in.setErrorLocked(io.EOF)
		conn.go#L727: 			return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
		conn.go#L734: 			return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
		conn.go#L736: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L741: 			return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
		conn.go#L745: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L756: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L758: 		if err := c.in.changeCipherSpec(); err != nil {
		conn.go#L759: 			return c.in.setErrorLocked(c.sendAlert(err.(alert)))
		conn.go#L764: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L778: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L792: 		return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
		conn.go#L1108: 		return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshakeSize))
		conn.go#L1167: 		return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L1176: 		return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L1311: 		return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
		conn.go#L1331: 		return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
		conn.go#L1336: 		return c.in.setErrorLocked(c.sendAlert(alertInternalError))
		conn.go#L1339: 	newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
		conn.go#L1340: 	c.in.setTrafficSecret(cipherSuite, QUICEncryptionLevelInitial, newSecret)
		conn.go#L1381: 	c.in.Lock()
		conn.go#L1382: 	defer c.in.Unlock()
		conn.go#L1565: 	c.in.Lock()
		conn.go#L1566: 	defer c.in.Unlock()
		conn.go#L1590: 			c.quicSetReadSecret(QUICEncryptionLevelApplication, c.cipherSuite, c.in.trafficSecret)
		handshake_client.go#L531: 	c.in.version = vers
		handshake_client.go#L848: 	c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_client_tls13.go#L529: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_client_tls13.go#L727: 	expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_client_tls13.go#L743: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_server.go#L169: 	c.in.version = c.vers
		handshake_server.go#L774: 	c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_server_tls13.go#L660: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_server_tls13.go#L851: 	hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_server_tls13.go#L1033: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
		quic.go#L259: 	if c.in.level != level {
		quic.go#L260: 		return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))