crypto/tls.Conn.config (field)

125 uses

	crypto/tls (current package)
		conn.go#L42: 	config         *Config // configuration passed to constructor
		conn.go#L867: 	if c.config.DynamicRecordSizingDisabled || typ != recordTypeApplicationData {
		conn.go#L983: 		outBuf, err = c.out.encrypt(outBuf, data[:m], c.config.rand())
		conn.go#L1183: 	switch c.config.Renegotiation {
		conn.go#L1495: 	if c.config.Renegotiation != RenegotiateNever {
		handshake_client.go#L38: 	config := c.config
		handshake_client.go#L146: 	if c.config == nil {
		handshake_client.go#L147: 		c.config = defaultConfig()
		handshake_client.go#L170: 				c.config.ClientSessionCache.Put(cacheKey, nil)
		handshake_client.go#L197: 	maxVers := c.config.maxSupportedVersion(roleClient)
		handshake_client.go#L237: 		c.config.ClientSessionCache.Put(cacheKey, hs.session)
		handshake_client.go#L245: 	if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
		handshake_client.go#L265: 	cacheKey = clientSessionCacheKey(c.conn.RemoteAddr(), c.config)
		handshake_client.go#L266: 	session, ok := c.config.ClientSessionCache.Get(cacheKey)
		handshake_client.go#L286: 	if !c.config.InsecureSkipVerify {
		handshake_client.go#L292: 		if c.config.time().After(serverCert.NotAfter) {
		handshake_client.go#L294: 			c.config.ClientSessionCache.Put(cacheKey, nil)
		handshake_client.go#L297: 		if err := serverCert.VerifyHostname(c.config.ServerName); err != nil {
		handshake_client.go#L314: 	if c.config.time().After(session.useBy) {
		handshake_client.go#L315: 		c.config.ClientSessionCache.Put(cacheKey, nil)
		handshake_client.go#L338: 	ticketAge := uint32(c.config.time().Sub(session.receivedAt) / time.Millisecond)
		handshake_client.go#L365: 	vers, ok := c.config.mutualVersion(roleClient, []uint16{peerVersion})
		handshake_client.go#L395: 	if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
		handshake_client.go#L418: 		if c.config.VerifyConnection != nil {
		handshake_client.go#L419: 			if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_client.go#L534: 		err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, c.peerCertificates[0], skx)
		handshake_client.go#L584: 	preMasterSecret, ckx, err := keyAgreement.generateClientKeyExchange(c.config, hs.hello, c.peerCertificates[0])
		handshake_client.go#L632: 		certVerify.signature, err = key.Sign(c.config.rand(), signed, signOpts)
		handshake_client.go#L645: 	if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.hello.random, hs.masterSecret); err != nil {
		handshake_client.go#L819: 		receivedAt:         c.config.time(),
		handshake_client.go#L857: 	if !c.config.InsecureSkipVerify {
		handshake_client.go#L859: 			Roots:         c.config.RootCAs,
		handshake_client.go#L860: 			CurrentTime:   c.config.time(),
		handshake_client.go#L861: 			DNSName:       c.config.ServerName,
		handshake_client.go#L885: 	if c.config.VerifyPeerCertificate != nil {
		handshake_client.go#L886: 		if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
		handshake_client.go#L892: 	if c.config.VerifyConnection != nil {
		handshake_client.go#L893: 		if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_client.go#L969: 	if c.config.GetClientCertificate != nil {
		handshake_client.go#L970: 		return c.config.GetClientCertificate(cri)
		handshake_client.go#L973: 	for _, chain := range c.config.Certificates {
		handshake_client_tls13.go#L229: 		params, err := generateECDHEParameters(c.config.rand(), curveID)
		handshake_client_tls13.go#L246: 			ticketAge := uint32(c.config.time().Sub(hs.session.receivedAt) / time.Millisecond)
		handshake_client_tls13.go#L367: 	err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.hello.random, clientSecret)
		handshake_client_tls13.go#L372: 	err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.hello.random, serverSecret)
		handshake_client_tls13.go#L417: 		if c.config.VerifyConnection != nil {
		handshake_client_tls13.go#L418: 			if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_client_tls13.go#L527: 	err = c.config.writeKeyLog(keyLogLabelClientTraffic, hs.hello.random, hs.trafficSecret)
		handshake_client_tls13.go#L532: 	err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.hello.random, serverSecret)
		handshake_client_tls13.go#L597: 	sig, err := cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
		handshake_client_tls13.go#L626: 	if !c.config.SessionTicketsDisabled && c.config.ClientSessionCache != nil {
		handshake_client_tls13.go#L640: 	if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
		handshake_client_tls13.go#L670: 		receivedAt:         c.config.time(),
		handshake_client_tls13.go#L672: 		useBy:              c.config.time().Add(lifetime),
		handshake_client_tls13.go#L678: 	cacheKey := clientSessionCacheKey(c.conn.RemoteAddr(), c.config)
		handshake_client_tls13.go#L679: 	c.config.ClientSessionCache.Put(cacheKey, session)
		handshake_server.go#L143: 	originalConfig := c.config
		handshake_server.go#L144: 	if c.config.GetConfigForClient != nil {
		handshake_server.go#L146: 		if configForClient, err = c.config.GetConfigForClient(chi); err != nil {
		handshake_server.go#L150: 			c.config = configForClient
		handshake_server.go#L159: 	c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
		handshake_server.go#L194: 	maxVers := c.config.maxSupportedVersion(roleServer)
		handshake_server.go#L203: 	_, err := io.ReadFull(c.config.rand(), serverRandom)
		handshake_server.go#L220: 	selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
		handshake_server.go#L228: 	hs.cert, err = c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server.go#L241: 	hs.ecdheOk = supportsECDHE(c.config, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
		handshake_server.go#L336: 	configCipherSuites := c.config.cipherSuites()
		handshake_server.go#L357: 			if hs.clientHello.vers < c.config.maxSupportedVersion(roleServer) {
		handshake_server.go#L393: 	if c.config.SessionTicketsDisabled {
		handshake_server.go#L408: 	if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
		handshake_server.go#L431: 		c.config.cipherSuites(), hs.cipherSuiteOk)
		handshake_server.go#L437: 	needClientCerts := requiresClientCert(c.config.ClientAuth)
		handshake_server.go#L441: 	if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
		handshake_server.go#L471: 	if c.config.VerifyConnection != nil {
		handshake_server.go#L472: 		if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_server.go#L490: 	hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
		handshake_server.go#L494: 	if c.config.ClientAuth == NoClientCert {
		handshake_server.go#L522: 	skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
		handshake_server.go#L535: 	if c.config.ClientAuth >= RequestClientCert {
		handshake_server.go#L552: 		if c.config.ClientCAs != nil {
		handshake_server.go#L553: 			certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
		handshake_server.go#L580: 	if c.config.ClientAuth >= RequestClientCert {
		handshake_server.go#L602: 	if c.config.VerifyConnection != nil {
		handshake_server.go#L603: 		if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_server.go#L617: 	preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
		handshake_server.go#L623: 	if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
		handshake_server.go#L743: 	createdAt := uint64(c.config.time().Unix())
		handshake_server.go#L808: 	if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) {
		handshake_server.go#L813: 	if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
		handshake_server.go#L815: 			Roots:         c.config.ClientCAs,
		handshake_server.go#L816: 			CurrentTime:   c.config.time(),
		handshake_server.go#L847: 	if c.config.VerifyPeerCertificate != nil {
		handshake_server.go#L848: 		if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
		handshake_server.go#L872: 		config:            c.config,
		handshake_server_tls13.go#L113: 			if c.vers < c.config.maxSupportedVersion(roleServer) {
		handshake_server_tls13.go#L128: 	if _, err := io.ReadFull(c.config.rand(), hs.hello.random); err != nil {
		handshake_server_tls13.go#L175: 	for _, preferredGroup := range c.config.curvePreferences() {
		handshake_server_tls13.go#L208: 	params, err := generateECDHEParameters(c.config.rand(), selectedGroup)
		handshake_server_tls13.go#L227: 	if c.config.SessionTicketsDisabled {
		handshake_server_tls13.go#L265: 		if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
		handshake_server_tls13.go#L282: 		needClientCerts := requiresClientCert(c.config.ClientAuth)
		handshake_server_tls13.go#L286: 		if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
		handshake_server_tls13.go#L362: 	certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server_tls13.go#L540: 	err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
		handshake_server_tls13.go#L545: 	err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L553: 	selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
		handshake_server_tls13.go#L570: 	return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
		handshake_server_tls13.go#L587: 		if c.config.ClientCAs != nil {
		handshake_server_tls13.go#L588: 			certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
		handshake_server_tls13.go#L622: 	sig, err := hs.cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
		handshake_server_tls13.go#L666: 	err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
		handshake_server_tls13.go#L671: 	err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L692: 	if hs.c.config.SessionTicketsDisabled {
		handshake_server_tls13.go#L729: 		createdAt:        uint64(c.config.time().Unix()),
		handshake_server_tls13.go#L757: 		if c.config.VerifyConnection != nil {
		handshake_server_tls13.go#L758: 			if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		handshake_server_tls13.go#L785: 	if c.config.VerifyConnection != nil {
		handshake_server_tls13.go#L786: 		if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
		ticket.go#L129: 	if _, err := io.ReadFull(c.config.rand(), iv); err != nil {
		tls.go#L37: 		config: config,
		tls.go#L50: 		config:   config,