crypto/tls.Conn.in (field)
57 uses
crypto/tls (current package)
conn.go#L100: in, out halfConn
conn.go#L609: if c.in.err != nil {
conn.go#L610: return c.in.err
conn.go#L616: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
conn.go#L621: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
conn.go#L633: c.in.setErrorLocked(err)
conn.go#L646: return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
conn.go#L660: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L668: return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
conn.go#L674: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L678: c.in.setErrorLocked(err)
conn.go#L685: data, typ, err := c.in.decrypt(record)
conn.go#L687: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L690: return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
conn.go#L694: if c.in.cipher == nil && typ == recordTypeApplicationData {
conn.go#L695: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L705: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L710: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L714: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L717: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L720: return c.in.setErrorLocked(io.EOF)
conn.go#L723: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L730: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L732: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L737: return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
conn.go#L741: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L752: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L754: if err := c.in.changeCipherSpec(); err != nil {
conn.go#L755: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L760: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L774: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L788: return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
conn.go#L1092: return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshake))
conn.go#L1151: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1160: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1295: return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
conn.go#L1315: return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
conn.go#L1320: return c.in.setErrorLocked(c.sendAlert(alertInternalError))
conn.go#L1323: newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
conn.go#L1324: c.in.setTrafficSecret(cipherSuite, QUICEncryptionLevelInitial, newSecret)
conn.go#L1365: c.in.Lock()
conn.go#L1366: defer c.in.Unlock()
conn.go#L1549: c.in.Lock()
conn.go#L1550: defer c.in.Unlock()
conn.go#L1574: c.quicSetReadSecret(QUICEncryptionLevelApplication, c.cipherSuite, c.in.trafficSecret)
handshake_client.go#L431: c.in.version = vers
handshake_client.go#L736: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client_tls13.go#L399: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_client_tls13.go#L593: expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_client_tls13.go#L609: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_server.go#L168: c.in.version = c.vers
handshake_server.go#L756: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server_tls13.go#L613: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_server_tls13.go#L804: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L988: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
quic.go#L220: if c.in.level != level {
quic.go#L221: return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |