type crypto/tls.Conn

106 uses

	crypto/tls (current package)
		conn.go#L28: type Conn struct {
		conn.go#L131: func (c *Conn) LocalAddr() net.Addr {
		conn.go#L136: func (c *Conn) RemoteAddr() net.Addr {
		conn.go#L143: func (c *Conn) SetDeadline(t time.Time) error {
		conn.go#L149: func (c *Conn) SetReadDeadline(t time.Time) error {
		conn.go#L156: func (c *Conn) SetWriteDeadline(t time.Time) error {
		conn.go#L163: func (c *Conn) NetConn() net.Conn {
		conn.go#L581: func (c *Conn) newRecordHeaderError(conn net.Conn, msg string) (err RecordHeaderError) {
		conn.go#L588: func (c *Conn) readRecord() error {
		conn.go#L592: func (c *Conn) readChangeCipherSpec() error {
		conn.go#L610: func (c *Conn) readRecordOrCCS(expectChangeCipherSpec bool) error {
		conn.go#L795: func (c *Conn) retryReadRecord(expectChangeCipherSpec bool) error {
		conn.go#L829: func (c *Conn) readFromUntil(r io.Reader, n int) error {
		conn.go#L843: func (c *Conn) sendAlertLocked(err alert) error {
		conn.go#L866: func (c *Conn) sendAlert(err alert) error {
		conn.go#L902: func (c *Conn) maxPayloadSizeForWrite(typ recordType) int {
		conn.go#L949: func (c *Conn) write(data []byte) (int, error) {
		conn.go#L960: func (c *Conn) flush() (int, error) {
		conn.go#L981: func (c *Conn) writeRecordLocked(typ recordType, data []byte) (int, error) {
		conn.go#L1055: func (c *Conn) writeHandshakeRecord(msg handshakeMessage, transcript transcriptHash) (int, error) {
		conn.go#L1072: func (c *Conn) writeChangeCipherRecord() error {
		conn.go#L1080: func (c *Conn) readHandshakeBytes(n int) error {
		conn.go#L1095: func (c *Conn) readHandshake(transcript transcriptHash) (any, error) {
		conn.go#L1124: func (c *Conn) unmarshalHandshakeMessage(data []byte, transcript transcriptHash) (handshakeMessage, error) {
		conn.go#L1203: func (c *Conn) Write(b []byte) (int, error) {
		conn.go#L1260: func (c *Conn) handleRenegotiation() error {
		conn.go#L1306: func (c *Conn) handlePostHandshakeMessage() error {
		conn.go#L1335: func (c *Conn) handleKeyUpdate(keyUpdate *keyUpdateMsg) error {
		conn.go#L1378: func (c *Conn) Read(b []byte) (int, error) {
		conn.go#L1422: func (c *Conn) Close() error {
		conn.go#L1462: func (c *Conn) CloseWrite() error {
		conn.go#L1470: func (c *Conn) closeNotify() error {
		conn.go#L1498: func (c *Conn) Handshake() error {
		conn.go#L1512: func (c *Conn) HandshakeContext(ctx context.Context) error {
		conn.go#L1518: func (c *Conn) handshakeContext(ctx context.Context) (ret error) {
		conn.go#L1619: func (c *Conn) ConnectionState() ConnectionState {
		conn.go#L1627: func (c *Conn) connectionStateLocked() ConnectionState {
		conn.go#L1669: func (c *Conn) OCSPResponse() []byte {
		conn.go#L1679: func (c *Conn) VerifyHostname(host string) error {
		ech.go#L581: func (c *Conn) processECHClientHello(outer *clientHelloMsg, echKeys []EncryptedClientHelloKey) (*clientHelloMsg, *echServerContext, error) {
		handshake_client.go#L33: 	c            *Conn
		handshake_client.go#L44: func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echClientContext, error) {
		handshake_client.go#L253: func (c *Conn) clientHandshake(ctx context.Context) (err error) {
		handshake_client.go#L380: func (c *Conn) loadSession(hello *clientHelloMsg) (
		handshake_client.go#L523: func (c *Conn) pickTLSVersion(serverHello *serverHelloMsg) error {
		handshake_client.go#L1112: func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
		handshake_client.go#L1277: func (c *Conn) getClientCertificate(cri *CertificateRequestInfo) (*Certificate, error) {
		handshake_client.go#L1295: func (c *Conn) clientSessionCacheKey() string {
		handshake_client_tls13.go#L24: 	c            *Conn
		handshake_client_tls13.go#L857: func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error {
		handshake_server.go#L26: 	c            *Conn
		handshake_server.go#L42: func (c *Conn) serverHandshake(ctx context.Context) error {
		handshake_server.go#L134: func (c *Conn) readClientHello(ctx context.Context) (*clientHelloMsg, *echServerContext, error) {
		handshake_server.go#L927: func (c *Conn) processCertsFromClient(certificate Certificate) error {
		handshake_server.go#L1009: func clientHelloInfo(ctx context.Context, c *Conn, clientHello *clientHelloMsg) *ClientHelloInfo {
		handshake_server_tls13.go#L46: 	c               *Conn
		handshake_server_tls13.go#L991: func (c *Conn) sendSessionTicket(earlyData bool, extra [][]byte) error {
		quic.go#L44: 	conn *Conn
		quic.go#L187: func newQUICConn(conn *Conn, config *QUICConfig) *QUICConn {
		quic.go#L375: func (c *Conn) quicReadHandshakeBytes(n int) error {
		quic.go#L384: func (c *Conn) quicSetReadSecret(level QUICEncryptionLevel, suite uint16, secret []byte) {
		quic.go#L393: func (c *Conn) quicSetWriteSecret(level QUICEncryptionLevel, suite uint16, secret []byte) {
		quic.go#L402: func (c *Conn) quicWriteCryptoData(level QUICEncryptionLevel, data []byte) {
		quic.go#L417: func (c *Conn) quicResumeSession(session *SessionState) error {
		quic.go#L431: func (c *Conn) quicStoreSession(session *SessionState) {
		quic.go#L438: func (c *Conn) quicSetTransportParameters(params []byte) {
		quic.go#L445: func (c *Conn) quicGetTransportParameters() ([]byte, error) {
		quic.go#L459: func (c *Conn) quicHandshakeComplete() {
		quic.go#L465: func (c *Conn) quicRejectedEarlyData() {
		quic.go#L476: func (c *Conn) quicWaitForSignal() error {
		ticket.go#L298: func (c *Conn) sessionState() *SessionState {
		tls.go#L47: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L48: 	c := &Conn{
		tls.go#L60: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L61: 	c := &Conn{
		tls.go#L130: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L134: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L184: func Dial(network, addr string, config *Config) (*Conn, error) {

	golang.org/x/net/http2
		server.go#L275: 		s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){}
		server.go#L300: 	s.TLSNextProto[NextProtoTLS] = func(hs *http.Server, c *tls.Conn, h http.Handler) {
		server.go#L306: 	s.TLSNextProto[nextProtoUnencryptedHTTP2] = func(hs *http.Server, c *tls.Conn, h http.Handler) {
		transport.go#L272: 		t1.TLSNextProto = make(map[string]func(string, *tls.Conn) http.RoundTripper)
		transport.go#L274: 	t1.TLSNextProto[NextProtoTLS] = func(authority string, c *tls.Conn) http.RoundTripper {
		transport.go#L278: 	t1.TLSNextProto[nextProtoUnencryptedHTTP2] = func(authority string, c *tls.Conn) http.RoundTripper {
		transport.go#L1096: 	tc, ok := cc.tconn.(*tls.Conn)
		transport.go#L3223: func (t *Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
		transport.go#L3231: 	tlsCn := cn.(*tls.Conn) // DialContext comment promises this will always succeed
		unencrypted.go#L24: func unencryptedNetConnFromTLSConn(tc *tls.Conn) (net.Conn, error) {

	net/http
		h2_bundle.go#L4255: 		s.TLSNextProto = map[string]func(*Server, *tls.Conn, Handler){}
		h2_bundle.go#L4280: 	s.TLSNextProto[http2NextProtoTLS] = func(hs *Server, c *tls.Conn, h Handler) {
		h2_bundle.go#L4286: 	s.TLSNextProto[http2nextProtoUnencryptedHTTP2] = func(hs *Server, c *tls.Conn, h Handler) {
		h2_bundle.go#L7595: 		t1.TLSNextProto = make(map[string]func(string, *tls.Conn) RoundTripper)
		h2_bundle.go#L7597: 	t1.TLSNextProto[http2NextProtoTLS] = func(authority string, c *tls.Conn) RoundTripper {
		h2_bundle.go#L7601: 	t1.TLSNextProto[http2nextProtoUnencryptedHTTP2] = func(authority string, c *tls.Conn) RoundTripper {
		h2_bundle.go#L8425: 	tc, ok := cc.tconn.(*tls.Conn)
		h2_bundle.go#L10561: func (t *http2Transport) dialTLSWithContext(ctx context.Context, network, addr string, cfg *tls.Config) (*tls.Conn, error) {
		h2_bundle.go#L10569: 	tlsCn := cn.(*tls.Conn) // DialContext comment promises this will always succeed
		h2_bundle.go#L10584: func http2unencryptedNetConnFromTLSConn(tc *tls.Conn) (net.Conn, error) {
		server.go#L1960: 	if tlsConn, ok := c.rwc.(*tls.Conn); ok {
		server.go#L2186: func unencryptedTLSConn(c net.Conn) *tls.Conn {
		server.go#L3062: 	TLSNextProto map[string]func(*Server, *tls.Conn, Handler)
		server.go#L3992: 	c   *tls.Conn
		transport.go#L251: 	TLSNextProto map[string]func(authority string, c *tls.Conn) RoundTripper
		transport.go#L368: 			npm = make(map[string]func(authority string, c *tls.Conn) RoundTripper)
		transport.go#L1763: 		if tc, ok := pconn.conn.(*tls.Conn); ok {
		transport.go#L1935: 			alt := next(cm.targetAddr, pconn.conn.(*tls.Conn))