crypto/tls.Conn.in (field)
57 uses
crypto/tls (current package)
conn.go#L102: in, out halfConn
conn.go#L611: if c.in.err != nil {
conn.go#L612: return c.in.err
conn.go#L618: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
conn.go#L623: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with QUIC transport"))
conn.go#L635: c.in.setErrorLocked(err)
conn.go#L648: return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
conn.go#L662: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L670: return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
conn.go#L676: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L680: c.in.setErrorLocked(err)
conn.go#L687: data, typ, err := c.in.decrypt(record)
conn.go#L689: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L692: return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
conn.go#L696: if c.in.cipher == nil && typ == recordTypeApplicationData {
conn.go#L697: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L707: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L712: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L716: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L719: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L722: return c.in.setErrorLocked(io.EOF)
conn.go#L734: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L741: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L743: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L748: return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
conn.go#L752: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L763: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L765: if err := c.in.changeCipherSpec(); err != nil {
conn.go#L766: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L771: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L785: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L799: return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
conn.go#L1115: return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshakeSize))
conn.go#L1174: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1183: return nil, c.in.setErrorLocked(c.sendAlert(alertDecodeError))
conn.go#L1318: return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
conn.go#L1338: return c.in.setErrorLocked(errors.New("tls: received unexpected key update message"))
conn.go#L1343: return c.in.setErrorLocked(c.sendAlert(alertInternalError))
conn.go#L1346: newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
conn.go#L1347: c.in.setTrafficSecret(cipherSuite, QUICEncryptionLevelInitial, newSecret)
conn.go#L1388: c.in.Lock()
conn.go#L1389: defer c.in.Unlock()
conn.go#L1572: c.in.Lock()
conn.go#L1573: defer c.in.Unlock()
conn.go#L1597: c.quicSetReadSecret(QUICEncryptionLevelApplication, c.cipherSuite, c.in.trafficSecret)
handshake_client.go#L537: c.in.version = vers
handshake_client.go#L876: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client_tls13.go#L520: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_client_tls13.go#L724: expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_client_tls13.go#L738: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_server.go#L196: c.in.version = c.vers
handshake_server.go#L827: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server_tls13.go#L770: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_server_tls13.go#L975: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L1159: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
quic.go#L259: if c.in.level != level {
quic.go#L260: return quicError(c.in.setErrorLocked(errors.New("tls: handshake data received at wrong level")))