type crypto/tls.Config
72 uses
crypto/tls (current package)
common.go#L450: config *Config
common.go#L524: type Config struct {
common.go#L598: GetConfigForClient func(*ClientHelloInfo) (*Config, error)
common.go#L809: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
common.go#L827: func (c *Config) Clone() *Config {
common.go#L833: return &Config{
common.go#L873: func (c *Config) initLegacySessionTicketKeyRLocked() {
common.go#L910: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
common.go#L978: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
common.go#L993: func (c *Config) rand() io.Reader {
common.go#L1001: func (c *Config) time() time.Time {
common.go#L1009: func (c *Config) cipherSuites() []uint16 {
common.go#L1031: func (c *Config) supportedVersions(isClient bool) []uint16 {
common.go#L1052: func (c *Config) maxSupportedVersion(isClient bool) uint16 {
common.go#L1076: func (c *Config) curvePreferences() []CurveID {
common.go#L1086: func (c *Config) supportsCurve(curve CurveID) bool {
common.go#L1097: func (c *Config) mutualVersion(isClient bool, peerVersions []uint16) (uint16, bool) {
common.go#L1113: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
common.go#L1175: config = &Config{}
common.go#L1356: func (c *Config) BuildNameToCertificate() {
common.go#L1383: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
common.go#L1515: var emptyConfig Config
common.go#L1517: func defaultConfig() *Config {
conn.go#L43: config *Config // configuration passed to constructor
handshake_server.go#L145: var configForClient *Config
handshake_server.go#L316: func supportsECDHE(c *Config, supportedCurves []CurveID, supportedPoints []uint8) bool {
key_agreement.go#L27: generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
key_agreement.go#L28: processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
key_agreement.go#L34: processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
key_agreement.go#L35: generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
key_agreement.go#L45: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L49: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L77: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L81: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
key_agreement.go#L169: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L258: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L275: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L360: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
notboring.go#L15: func fipsMinVersion(c *Config) uint16 { panic("fipsMinVersion") }
notboring.go#L16: func fipsMaxVersion(c *Config) uint16 { panic("fipsMaxVersion") }
notboring.go#L17: func fipsCurvePreferences(c *Config) []CurveID { panic("fipsCurvePreferences") }
notboring.go#L18: func fipsCipherSuites(c *Config) []uint16 { panic("fipsCipherSuites") }
quic.go#L51: TLSConfig *Config
ticket.go#L310: func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) {
ticket.go#L319: func (c *Config) encryptTicket(state []byte, ticketKeys []ticketKey) ([]byte, error) {
ticket.go#L351: func (c *Config) DecryptTicket(identity []byte, cs ConnectionState) (*SessionState, error) {
ticket.go#L364: func (c *Config) decryptTicket(encrypted []byte, ticketKeys []ticketKey) []byte {
tls.go#L34: func Server(conn net.Conn, config *Config) *Conn {
tls.go#L47: func Client(conn net.Conn, config *Config) *Conn {
tls.go#L60: config *Config
tls.go#L77: func NewListener(inner net.Listener, config *Config) net.Listener {
tls.go#L88: func Listen(network, laddr string, config *Config) (net.Listener, error) {
tls.go#L116: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L120: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L170: func Dial(network, addr string, config *Config) (*Conn, error) {
tls.go#L186: Config *Config
net/http
h2_bundle.go#L3080: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
h2_bundle.go#L4078: s.TLSConfig = new(tls.Config)
h2_bundle.go#L7158: DialTLSContext func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
h2_bundle.go#L7168: DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
h2_bundle.go#L7172: TLSClientConfig *tls.Config
h2_bundle.go#L7328: t1.TLSClientConfig = new(tls.Config)
h2_bundle.go#L7757: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
h2_bundle.go#L7758: cfg := new(tls.Config)
h2_bundle.go#L7771: func (t *http2Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {
server.go#L2637: TLSConfig *tls.Config
transport.go#L174: TLSClientConfig *tls.Config
transport.go#L2898: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
transport.go#L2900: return &tls.Config{}
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |