type crypto/tls.Config

63 uses

	crypto/tls (current package)
		cipher_suites.go#L119: 	generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
		cipher_suites.go#L120: 	processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
		cipher_suites.go#L126: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		cipher_suites.go#L127: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		common.go#L445: 	config *Config
		common.go#L499: type Config struct {
		common.go#L569: 	GetConfigForClient func(*ClientHelloInfo) (*Config, error)
		common.go#L732: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
		common.go#L747: func (c *Config) Clone() *Config {
		common.go#L753: 	return &Config{
		common.go#L791: func (c *Config) initLegacySessionTicketKeyRLocked() {
		common.go#L828: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
		common.go#L896: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
		common.go#L911: func (c *Config) rand() io.Reader {
		common.go#L919: func (c *Config) time() time.Time {
		common.go#L927: func (c *Config) cipherSuites() []uint16 {
		common.go#L942: func (c *Config) supportedVersions() []uint16 {
		common.go#L956: func (c *Config) maxSupportedVersion() uint16 {
		common.go#L980: func (c *Config) curvePreferences() []CurveID {
		common.go#L987: func (c *Config) supportsCurve(curve CurveID) bool {
		common.go#L998: func (c *Config) mutualVersion(peerVersions []uint16) (uint16, bool) {
		common.go#L1014: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
		common.go#L1076: 		config = &Config{}
		common.go#L1257: func (c *Config) BuildNameToCertificate() {
		common.go#L1284: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
		common.go#L1416: var emptyConfig Config
		common.go#L1418: func defaultConfig() *Config {
		conn.go#L41: 	config         *Config // configuration passed to constructor
		handshake_client.go#L964: func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
		handshake_server.go#L138: 	var configForClient *Config
		handshake_server.go#L275: func supportsECDHE(c *Config, supportedCurves []CurveID, supportedPoints []uint8) bool {
		key_agreement.go#L25: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L29: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L57: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L61: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L145: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L234: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L247: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L328: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L61: 	config *Config
		tls.go#L78: func NewListener(inner net.Listener, config *Config) net.Listener {
		tls.go#L89: func Listen(network, laddr string, config *Config) (net.Listener, error) {
		tls.go#L114: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L118: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L204: func Dial(network, addr string, config *Config) (*Conn, error) {
		tls.go#L220: 	Config *Config

	net/http
		h2_bundle.go#L3799: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L6570: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		h2_bundle.go#L6574: 	TLSClientConfig *tls.Config
		h2_bundle.go#L6684: 		t1.TLSClientConfig = new(tls.Config)
		h2_bundle.go#L7082: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
		h2_bundle.go#L7083: 	cfg := new(tls.Config)
		h2_bundle.go#L7096: func (t *http2Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
		h2_bundle.go#L7103: func (t *http2Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {
		server.go#L2567: 	TLSConfig *tls.Config
		transport.go#L168: 	TLSClientConfig *tls.Config
		transport.go#L2852: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
		transport.go#L2854: 		return &tls.Config{}