crypto/tls.Conn.in (field)

57 uses

	crypto/tls (current package)
		conn.go#L100: 	in, out   halfConn
		conn.go#L609: 	if c.in.err != nil {
		conn.go#L610: 		return c.in.err
		conn.go#L616: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
		conn.go#L621: 		return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
		conn.go#L633: 			c.in.setErrorLocked(err)
		conn.go#L646: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
		conn.go#L660: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
		conn.go#L668: 			return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
		conn.go#L674: 		return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
		conn.go#L678: 			c.in.setErrorLocked(err)
		conn.go#L685: 	data, typ, err := c.in.decrypt(record)
		conn.go#L687: 		return c.in.setErrorLocked(c.sendAlert(err.(alert)))
		conn.go#L690: 		return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
		conn.go#L694: 	if c.in.cipher == nil && typ == recordTypeApplicationData {
		conn.go#L695: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L705: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L710: 		return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L714: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L717: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L720: 			return c.in.setErrorLocked(io.EOF)
		conn.go#L723: 			return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
		conn.go#L730: 			return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
		conn.go#L732: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L737: 			return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
		conn.go#L741: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L752: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L754: 		if err := c.in.changeCipherSpec(); err != nil {
		conn.go#L755: 			return c.in.setErrorLocked(c.sendAlert(err.(alert)))
		conn.go#L760: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L774: 			return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L788: 		return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
		conn.go#L1092: 		return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshake))
		conn.go#L1151: 		return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L1160: 		return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
		conn.go#L1295: 		return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
		conn.go#L1315: 		return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
		conn.go#L1320: 		return c.in.setErrorLocked(c.sendAlert(alertInternalError))
		conn.go#L1323: 	newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
		conn.go#L1324: 	c.in.setTrafficSecret(cipherSuite, QUICEncryptionLevelInitial, newSecret)
		conn.go#L1365: 	c.in.Lock()
		conn.go#L1366: 	defer c.in.Unlock()
		conn.go#L1549: 	c.in.Lock()
		conn.go#L1550: 	defer c.in.Unlock()
		conn.go#L1574: 			c.quicSetReadSecret(QUICEncryptionLevelApplication, c.cipherSuite, c.in.trafficSecret)
		handshake_client.go#L431: 	c.in.version = vers
		handshake_client.go#L736: 	c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_client_tls13.go#L399: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_client_tls13.go#L593: 	expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_client_tls13.go#L609: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_server.go#L168: 	c.in.version = c.vers
		handshake_server.go#L756: 	c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_server_tls13.go#L613: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_server_tls13.go#L804: 	hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_server_tls13.go#L988: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
		quic.go#L220: 	if c.in.level != level {
		quic.go#L221: 		return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))