type crypto/tls.Config

91 uses

	crypto/tls (current package)
		common.go#L444: 	config *Config
		common.go#L518: type Config struct {
		common.go#L588: 	GetConfigForClient func(*ClientHelloInfo) (*Config, error)
		common.go#L768: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
		common.go#L783: func (c *Config) Clone() *Config {
		common.go#L789: 	return &Config{
		common.go#L827: func (c *Config) initLegacySessionTicketKeyRLocked() {
		common.go#L864: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
		common.go#L932: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
		common.go#L947: func (c *Config) rand() io.Reader {
		common.go#L955: func (c *Config) time() time.Time {
		common.go#L963: func (c *Config) cipherSuites() []uint16 {
		common.go#L985: func (c *Config) supportedVersions(isClient bool) []uint16 {
		common.go#L1003: func (c *Config) maxSupportedVersion(isClient bool) uint16 {
		common.go#L1027: func (c *Config) curvePreferences() []CurveID {
		common.go#L1034: func (c *Config) supportsCurve(curve CurveID) bool {
		common.go#L1045: func (c *Config) mutualVersion(isClient bool, peerVersions []uint16) (uint16, bool) {
		common.go#L1061: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
		common.go#L1123: 		config = &Config{}
		common.go#L1304: func (c *Config) BuildNameToCertificate() {
		common.go#L1331: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
		common.go#L1463: var emptyConfig Config
		common.go#L1465: func defaultConfig() *Config {
		conn.go#L42: 	config         *Config // configuration passed to constructor
		handshake_client.go#L986: func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
		handshake_server.go#L142: 	var configForClient *Config
		handshake_server.go#L308: func supportsECDHE(c *Config, supportedCurves []CurveID, supportedPoints []uint8) bool {
		key_agreement.go#L26: 	generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
		key_agreement.go#L27: 	processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
		key_agreement.go#L33: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		key_agreement.go#L34: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		key_agreement.go#L44: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L48: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L76: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L80: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L168: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L257: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L270: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L351: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		tls.go#L34: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L47: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L60: 	config *Config
		tls.go#L77: func NewListener(inner net.Listener, config *Config) net.Listener {
		tls.go#L88: func Listen(network, laddr string, config *Config) (net.Listener, error) {
		tls.go#L116: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L120: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L170: func Dial(network, addr string, config *Config) (*Conn, error) {
		tls.go#L186: 	Config *Config

	github.com/aws/aws-sdk-go-v2/aws/transport/http
		client.go#L189: 		TLSClientConfig: &tls.Config{

	github.com/go-pg/pg/v10
		messages.go#L142: func (db *baseDB) enableSSL(c context.Context, cn *pool.Conn, tlsConf *tls.Config) error {
		options.go#L44: 	TLSConfig *tls.Config
		options.go#L222: 			options.TLSConfig = &tls.Config{}
		options.go#L224: 			options.TLSConfig = &tls.Config{InsecureSkipVerify: true} //nolint
		options.go#L231: 		options.TLSConfig = &tls.Config{InsecureSkipVerify: true} //nolint

	golang.org/x/net/http2
		go115.go#L17: func (t *Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
		server.go#L266: 		s.TLSConfig = new(tls.Config)
		transport.go#L74: 	DialTLSContext func(ctx context.Context, network, addr string, cfg *tls.Config) (net.Conn, error)
		transport.go#L84: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		transport.go#L88: 	TLSClientConfig *tls.Config
		transport.go#L244: 		t1.TLSClientConfig = new(tls.Config)
		transport.go#L668: func (t *Transport) newTLSConfig(host string) *tls.Config {
		transport.go#L669: 	cfg := new(tls.Config)
		transport.go#L682: func (t *Transport) dialTLS(ctx context.Context, network, addr string, tlsCfg *tls.Config) (net.Conn, error) {

	google.golang.org/grpc/credentials
		tls.go#L62: 	config *tls.Config
		tls.go#L142: func NewTLS(c *tls.Config) TransportCredentials {
		tls.go#L157: 	return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp})
		tls.go#L177: 	return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp}), nil
		tls.go#L182: 	return NewTLS(&tls.Config{Certificates: []tls.Certificate{*cert}})
		tls.go#L192: 	return NewTLS(&tls.Config{Certificates: []tls.Certificate{cert}}), nil

	google.golang.org/grpc/internal/credentials
		util.go#L46: func CloneTLSConfig(cfg *tls.Config) *tls.Config {
		util.go#L48: 		return &tls.Config{}

	net/http
		h2_bundle.go#L3001: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
		h2_bundle.go#L3953: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L6791: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		h2_bundle.go#L6795: 	TLSClientConfig *tls.Config
		h2_bundle.go#L6916: 		t1.TLSClientConfig = new(tls.Config)
		h2_bundle.go#L7315: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
		h2_bundle.go#L7316: 	cfg := new(tls.Config)
		h2_bundle.go#L7329: func (t *http2Transport) dialTLS(ctx context.Context) func(string, string, *tls.Config) (net.Conn, error) {
		h2_bundle.go#L7333: 	return func(network, addr string, cfg *tls.Config) (net.Conn, error) {
		server.go#L2581: 	TLSConfig *tls.Config
		transport.go#L169: 	TLSClientConfig *tls.Config
		transport.go#L2862: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
		transport.go#L2864: 		return &tls.Config{}

	net/http/httptest
		server.go#L38: 	TLS *tls.Config
		server.go#L156: 		s.TLS = new(tls.Config)
		server.go#L175: 		TLSClientConfig: &tls.Config{