crypto/tls.Conn.in (field)
57 uses
crypto/tls (current package)
conn.go#L104: in, out halfConn
conn.go#L613: if c.in.err != nil {
conn.go#L614: return c.in.err
conn.go#L620: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
conn.go#L625: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
conn.go#L637: c.in.setErrorLocked(err)
conn.go#L650: return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
conn.go#L664: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L672: return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
conn.go#L678: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L682: c.in.setErrorLocked(err)
conn.go#L689: data, typ, err := c.in.decrypt(record)
conn.go#L691: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L694: return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
conn.go#L698: if c.in.cipher == nil && typ == recordTypeApplicationData {
conn.go#L699: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L709: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L714: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L718: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L721: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L724: return c.in.setErrorLocked(io.EOF)
conn.go#L727: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L734: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L736: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L741: return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
conn.go#L745: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L756: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L758: if err := c.in.changeCipherSpec(); err != nil {
conn.go#L759: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L764: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L778: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L792: return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
conn.go#L1108: return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshakeSize))
conn.go#L1167: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1176: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1311: return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
conn.go#L1331: return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
conn.go#L1336: return c.in.setErrorLocked(c.sendAlert(alertInternalError))
conn.go#L1339: newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
conn.go#L1340: c.in.setTrafficSecret(cipherSuite, QUICEncryptionLevelInitial, newSecret)
conn.go#L1381: c.in.Lock()
conn.go#L1382: defer c.in.Unlock()
conn.go#L1565: c.in.Lock()
conn.go#L1566: defer c.in.Unlock()
conn.go#L1590: c.quicSetReadSecret(QUICEncryptionLevelApplication, c.cipherSuite, c.in.trafficSecret)
handshake_client.go#L531: c.in.version = vers
handshake_client.go#L848: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client_tls13.go#L529: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_client_tls13.go#L727: expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_client_tls13.go#L743: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_server.go#L169: c.in.version = c.vers
handshake_server.go#L774: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server_tls13.go#L660: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_server_tls13.go#L851: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L1033: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
quic.go#L259: if c.in.level != level {
quic.go#L260: return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |