const crypto/tls.recordHeaderLen

17 uses

	crypto/tls (current package)
		common.go#L66: 	recordHeaderLen            = 5            // record header length
		conn.go#L345: 	payload := record[recordHeaderLen:]
		conn.go#L374: 				additionalData = record[:recordHeaderLen]
		conn.go#L445: 		localMAC := tls10MAC(hc.mac, hc.scratchBuf[:0], hc.seq[:], record[:recordHeaderLen], payload[:n], payload[n+macSize:])
		conn.go#L511: 		mac := tls10MAC(hc.mac, hc.scratchBuf[:0], hc.seq[:], record[:recordHeaderLen], payload, nil)
		conn.go#L532: 			record = c.Seal(record[:recordHeaderLen],
		conn.go#L533: 				nonce, record[recordHeaderLen:], record[:recordHeaderLen])
		conn.go#L536: 			additionalData = append(additionalData, record[:recordHeaderLen]...)
		conn.go#L540: 		mac := tls10MAC(hc.mac, hc.scratchBuf[:0], hc.seq[:], record[:recordHeaderLen], payload, nil)
		conn.go#L559: 	n := len(record) - recordHeaderLen
		conn.go#L629: 	if err := c.readFromUntil(c.conn, recordHeaderLen); err != nil {
		conn.go#L641: 	hdr := c.rawInput.Bytes()[:recordHeaderLen]
		conn.go#L680: 	if err := c.readFromUntil(c.conn, recordHeaderLen+n); err != nil {
		conn.go#L688: 	record := c.rawInput.Next(recordHeaderLen + n)
		conn.go#L905: 	payloadBytes := tcpMSSEstimate - recordHeaderLen - c.out.explicitNonceLen()
		conn.go#L1007: 		_, outBuf = sliceForAppend(outBuf[:0], recordHeaderLen)