type crypto/tls.Config
90 uses
crypto/tls (current package)
common.go#L474: config *Config
common.go#L548: type Config struct {
common.go#L622: GetConfigForClient func(*ClientHelloInfo) (*Config, error)
common.go#L927: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
common.go#L945: func (c *Config) Clone() *Config {
common.go#L951: return &Config{
common.go#L995: func (c *Config) initLegacySessionTicketKeyRLocked() {
common.go#L1032: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
common.go#L1101: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
common.go#L1116: func (c *Config) rand() io.Reader {
common.go#L1124: func (c *Config) time() time.Time {
common.go#L1132: func (c *Config) cipherSuites(aesGCMPreferred bool) []uint16 {
common.go#L1152: func (c *Config) supportedCipherSuites() []uint16 {
common.go#L1172: func (c *Config) supportedVersions(isClient bool) []uint16 {
common.go#L1197: func (c *Config) maxSupportedVersion(isClient bool) uint16 {
common.go#L1219: func (c *Config) curvePreferences(version uint16) []CurveID {
common.go#L1237: func (c *Config) supportsCurve(version uint16, curve CurveID) bool {
common.go#L1243: func (c *Config) mutualVersion(isClient bool, peerVersions []uint16) (uint16, bool) {
common.go#L1266: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
common.go#L1328: config = &Config{}
common.go#L1513: func (c *Config) BuildNameToCertificate() {
common.go#L1540: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
common.go#L1681: var emptyConfig Config
common.go#L1683: func defaultConfig() *Config {
conn.go#L44: config *Config // configuration passed to constructor
handshake_server.go#L165: var configForClient *Config
handshake_server.go#L365: func supportsECDHE(c *Config, version uint16, supportedCurves []CurveID, supportedPoints []uint8) (bool, error) {
key_agreement.go#L28: generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
key_agreement.go#L29: processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
key_agreement.go#L35: processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
key_agreement.go#L36: generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
key_agreement.go#L46: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L50: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L78: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L82: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
key_agreement.go#L175: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L266: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L283: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L376: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
quic.go#L51: TLSConfig *Config
ticket.go#L316: func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) {
ticket.go#L325: func (c *Config) encryptTicket(state []byte, ticketKeys []ticketKey) ([]byte, error) {
ticket.go#L357: func (c *Config) DecryptTicket(identity []byte, cs ConnectionState) (*SessionState, error) {
ticket.go#L370: func (c *Config) decryptTicket(encrypted []byte, ticketKeys []ticketKey) []byte {
tls.go#L47: func Server(conn net.Conn, config *Config) *Conn {
tls.go#L60: func Client(conn net.Conn, config *Config) *Conn {
tls.go#L73: config *Config
tls.go#L90: func NewListener(inner net.Listener, config *Config) net.Listener {
tls.go#L101: func Listen(network, laddr string, config *Config) (net.Listener, error) {
tls.go#L130: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L134: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L184: func Dial(network, addr string, config *Config) (*Conn, error) {
tls.go#L200: Config *Config
golang.org/x/net/http2
server.go#L238: s.TLSConfig = new(tls.Config)
transport.go#L74: DialTLSContext func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
transport.go#L84: DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
transport.go#L88: TLSClientConfig *tls.Config
transport.go#L246: t1.TLSClientConfig = new(tls.Config)
transport.go#L724: func (t *Transport) newTLSConfig(host string) *tls.Config {
transport.go#L725: cfg := new(tls.Config)
transport.go#L738: func (t *Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {
transport.go#L3223: func (t *Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
google.golang.org/grpc/credentials
tls.go#L99: config *tls.Config
tls.go#L220: func NewTLS(c *tls.Config) TransportCredentials {
tls.go#L224: config.GetConfigForClient = func(hello *tls.ClientHelloInfo) (*tls.Config, error) {
tls.go#L235: func applyDefaults(c *tls.Config) *tls.Config {
tls.go#L268: return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp})
tls.go#L290: return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp}), nil
tls.go#L295: return NewTLS(&tls.Config{Certificates: []tls.Certificate{*cert}})
tls.go#L305: return NewTLS(&tls.Config{Certificates: []tls.Certificate{cert}}), nil
google.golang.org/grpc/internal/credentials
util.go#L46: func CloneTLSConfig(cfg *tls.Config) *tls.Config {
util.go#L48: return &tls.Config{}
net/http
h2_bundle.go#L4218: s.TLSConfig = new(tls.Config)
h2_bundle.go#L7353: DialTLSContext func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
h2_bundle.go#L7363: DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
h2_bundle.go#L7367: TLSClientConfig *tls.Config
h2_bundle.go#L7569: t1.TLSClientConfig = new(tls.Config)
h2_bundle.go#L8049: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
h2_bundle.go#L8050: cfg := new(tls.Config)
h2_bundle.go#L8063: func (t *http2Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {
h2_bundle.go#L10561: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
server.go#L3013: TLSConfig *tls.Config
transport.go#L181: TLSClientConfig *tls.Config
transport.go#L3098: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
transport.go#L3100: return &tls.Config{}