crypto/tls.Conn.config (field)
139 uses
crypto/tls (current package)
conn.go#L43: config *Config // configuration passed to constructor
conn.go#L892: if c.config.DynamicRecordSizingDisabled || typ != recordTypeApplicationData {
conn.go#L1021: outBuf, err = c.out.encrypt(outBuf, data[:m], c.config.rand())
conn.go#L1257: switch c.config.Renegotiation {
conn.go#L1622: if c.config.Renegotiation != RenegotiateNever {
handshake_client.go#L43: config := c.config
handshake_client.go#L174: if c.config == nil {
handshake_client.go#L175: c.config = defaultConfig()
handshake_client.go#L202: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L241: maxVers := c.config.maxSupportedVersion(roleClient)
handshake_client.go#L283: if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
handshake_client.go#L307: cs, ok := c.config.ClientSessionCache.Get(cacheKey)
handshake_client.go#L328: if c.config.time().After(session.peerCertificates[0].NotAfter) {
handshake_client.go#L330: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L333: if !c.config.InsecureSkipVerify {
handshake_client.go#L338: if err := session.peerCertificates[0].VerifyHostname(c.config.ServerName); err != nil {
handshake_client.go#L355: if c.config.time().After(time.Unix(int64(session.useBy), 0)) {
handshake_client.go#L356: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L392: ticketAge := c.config.time().Sub(time.Unix(int64(session.createdAt), 0))
handshake_client.go#L423: vers, ok := c.config.mutualVersion(roleClient, []uint16{peerVersion})
handshake_client.go#L453: if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
handshake_client.go#L480: if c.config.VerifyConnection != nil {
handshake_client.go#L481: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client.go#L596: err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, c.peerCertificates[0], skx)
handshake_client.go#L643: preMasterSecret, ckx, err := keyAgreement.generateClientKeyExchange(c.config, hs.hello, c.peerCertificates[0])
handshake_client.go#L662: if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.hello.random, hs.masterSecret); err != nil {
handshake_client.go#L703: certVerify.signature, err = key.Sign(c.config.rand(), signed, signOpts)
handshake_client.go#L921: c.config.ClientSessionCache.Put(cacheKey, cs)
handshake_client.go#L981: if !c.config.InsecureSkipVerify {
handshake_client.go#L983: Roots: c.config.RootCAs,
handshake_client.go#L984: CurrentTime: c.config.time(),
handshake_client.go#L985: DNSName: c.config.ServerName,
handshake_client.go#L1011: if c.config.VerifyPeerCertificate != nil {
handshake_client.go#L1012: if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
handshake_client.go#L1018: if c.config.VerifyConnection != nil {
handshake_client.go#L1019: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client.go#L1095: if c.config.GetClientCertificate != nil {
handshake_client.go#L1096: return c.config.GetClientCertificate(cri)
handshake_client.go#L1099: for _, chain := range c.config.Certificates {
handshake_client.go#L1113: if len(c.config.ServerName) > 0 {
handshake_client.go#L1114: return c.config.ServerName
handshake_client_tls13.go#L243: key, err := generateECDHEKey(c.config.rand(), curveID)
handshake_client_tls13.go#L260: ticketAge := c.config.time().Sub(time.Unix(int64(hs.session.createdAt), 0))
handshake_client_tls13.go#L409: err = c.config.writeKeyLog(keyLogLabelClientHandshake, hs.hello.random, clientSecret)
handshake_client_tls13.go#L414: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.hello.random, serverSecret)
handshake_client_tls13.go#L494: if c.config.VerifyConnection != nil {
handshake_client_tls13.go#L495: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client_tls13.go#L611: err = c.config.writeKeyLog(keyLogLabelClientTraffic, hs.hello.random, hs.trafficSecret)
handshake_client_tls13.go#L616: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.hello.random, serverSecret)
handshake_client_tls13.go#L680: sig, err := cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
handshake_client_tls13.go#L707: if !c.config.SessionTicketsDisabled && c.config.ClientSessionCache != nil {
handshake_client_tls13.go#L728: if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
handshake_client_tls13.go#L762: session.useBy = uint64(c.config.time().Add(lifetime).Unix())
handshake_client_tls13.go#L768: c.config.ClientSessionCache.Put(cacheKey, cs)
handshake_server.go#L146: originalConfig := c.config
handshake_server.go#L147: if c.config.GetConfigForClient != nil {
handshake_server.go#L149: if configForClient, err = c.config.GetConfigForClient(chi); err != nil {
handshake_server.go#L153: c.config = configForClient
handshake_server.go#L162: c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
handshake_server.go#L197: maxVers := c.config.maxSupportedVersion(roleServer)
handshake_server.go#L206: _, err := io.ReadFull(c.config.rand(), serverRandom)
handshake_server.go#L224: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, false)
handshake_server.go#L232: hs.cert, err = c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server.go#L245: hs.ecdheOk = supportsECDHE(c.config, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
handshake_server.go#L351: configCipherSuites := c.config.cipherSuites()
handshake_server.go#L372: if hs.clientHello.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server.go#L408: if c.config.SessionTicketsDisabled {
handshake_server.go#L413: if c.config.UnwrapSession != nil {
handshake_server.go#L414: ss, err := c.config.UnwrapSession(hs.clientHello.sessionTicket, c.connectionStateLocked())
handshake_server.go#L423: plaintext := c.config.decryptTicket(hs.clientHello.sessionTicket, c.ticketKeys)
handshake_server.go#L438: if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
handshake_server.go#L461: c.config.cipherSuites(), hs.cipherSuiteOk)
handshake_server.go#L467: needClientCerts := requiresClientCert(c.config.ClientAuth)
handshake_server.go#L471: if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
handshake_server.go#L474: if sessionHasClientCerts && c.config.time().After(sessionState.peerCertificates[0].NotAfter) {
handshake_server.go#L477: if sessionHasClientCerts && c.config.ClientAuth >= VerifyClientCertIfGiven &&
handshake_server.go#L524: if c.config.VerifyConnection != nil {
handshake_server.go#L525: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server.go#L543: hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
handshake_server.go#L547: if c.config.ClientAuth == NoClientCert {
handshake_server.go#L574: skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
handshake_server.go#L586: if c.config.ClientAuth >= RequestClientCert {
handshake_server.go#L603: if c.config.ClientCAs != nil {
handshake_server.go#L604: certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
handshake_server.go#L629: if c.config.ClientAuth >= RequestClientCert {
handshake_server.go#L650: if c.config.VerifyConnection != nil {
handshake_server.go#L651: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server.go#L664: preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
handshake_server.go#L677: if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
handshake_server.go#L815: if c.config.WrapSession != nil {
handshake_server.go#L816: m.ticket, err = c.config.WrapSession(c.connectionStateLocked(), state)
handshake_server.go#L825: m.ticket, err = c.config.encryptTicket(stateBytes, c.ticketKeys)
handshake_server.go#L876: if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) {
handshake_server.go#L885: if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
handshake_server.go#L887: Roots: c.config.ClientCAs,
handshake_server.go#L888: CurrentTime: c.config.time(),
handshake_server.go#L926: if c.config.VerifyPeerCertificate != nil {
handshake_server.go#L927: if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
handshake_server.go#L951: config: c.config,
handshake_server_tls13.go#L118: if c.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server_tls13.go#L133: if _, err := io.ReadFull(c.config.rand(), hs.hello.random); err != nil {
handshake_server_tls13.go#L185: for _, preferredGroup := range c.config.curvePreferences() {
handshake_server_tls13.go#L218: key, err := generateECDHEKey(c.config.rand(), selectedGroup)
handshake_server_tls13.go#L235: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
handshake_server_tls13.go#L263: if c.config.SessionTicketsDisabled {
handshake_server_tls13.go#L292: if c.config.UnwrapSession != nil {
handshake_server_tls13.go#L294: sessionState, err = c.config.UnwrapSession(identity.label, c.connectionStateLocked())
handshake_server_tls13.go#L302: plaintext := c.config.decryptTicket(identity.label, c.ticketKeys)
handshake_server_tls13.go#L318: if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
handshake_server_tls13.go#L331: needClientCerts := requiresClientCert(c.config.ClientAuth)
handshake_server_tls13.go#L335: if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
handshake_server_tls13.go#L338: if sessionHasClientCerts && c.config.time().After(sessionState.peerCertificates[0].NotAfter) {
handshake_server_tls13.go#L341: if sessionHasClientCerts && c.config.ClientAuth >= VerifyClientCertIfGiven &&
handshake_server_tls13.go#L435: certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server_tls13.go#L626: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L631: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L657: return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
handshake_server_tls13.go#L674: if c.config.ClientCAs != nil {
handshake_server_tls13.go#L675: certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
handshake_server_tls13.go#L707: sig, err := hs.cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
handshake_server_tls13.go#L757: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L762: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L783: if hs.c.config.SessionTicketsDisabled {
handshake_server_tls13.go#L839: if c.config.WrapSession != nil {
handshake_server_tls13.go#L840: m.label, err = c.config.WrapSession(c.connectionStateLocked(), state)
handshake_server_tls13.go#L850: m.label, err = c.config.encryptTicket(stateBytes, c.ticketKeys)
handshake_server_tls13.go#L861: _, err = c.config.rand().Read(ageAdd)
handshake_server_tls13.go#L885: if c.config.VerifyConnection != nil {
handshake_server_tls13.go#L886: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server_tls13.go#L912: if c.config.VerifyConnection != nil {
handshake_server_tls13.go#L913: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
quic.go#L174: if q.conn.config.MinVersion < VersionTLS13 {
ticket.go#L296: createdAt: uint64(c.config.time().Unix()),
tls.go#L37: config: config,
tls.go#L50: config: config,
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |