crypto/tls.Conn.config (field)
129 uses
crypto/tls (current package)
conn.go#L41: config *Config // configuration passed to constructor
conn.go#L859: if c.config.DynamicRecordSizingDisabled || typ != recordTypeApplicationData {
conn.go#L975: outBuf, err = c.out.encrypt(outBuf, data[:m], c.config.rand())
conn.go#L1175: switch c.config.Renegotiation {
conn.go#L1434: if c.config.Renegotiation != RenegotiateNever {
handshake_client.go#L36: config := c.config
handshake_client.go#L138: if c.config == nil {
handshake_client.go#L139: c.config = defaultConfig()
handshake_client.go#L162: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L189: maxVers := c.config.maxSupportedVersion()
handshake_client.go#L227: c.config.ClientSessionCache.Put(cacheKey, hs.session)
handshake_client.go#L235: if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
handshake_client.go#L255: cacheKey = clientSessionCacheKey(c.conn.RemoteAddr(), c.config)
handshake_client.go#L256: session, ok := c.config.ClientSessionCache.Get(cacheKey)
handshake_client.go#L276: if !c.config.InsecureSkipVerify {
handshake_client.go#L282: if c.config.time().After(serverCert.NotAfter) {
handshake_client.go#L284: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L287: if err := serverCert.VerifyHostname(c.config.ServerName); err != nil {
handshake_client.go#L304: if c.config.time().After(session.useBy) {
handshake_client.go#L305: c.config.ClientSessionCache.Put(cacheKey, nil)
handshake_client.go#L328: ticketAge := uint32(c.config.time().Sub(session.receivedAt) / time.Millisecond)
handshake_client.go#L355: vers, ok := c.config.mutualVersion([]uint16{peerVersion})
handshake_client.go#L385: if isResume || (len(c.config.Certificates) == 0 && c.config.GetClientCertificate == nil) {
handshake_client.go#L408: if c.config.VerifyConnection != nil {
handshake_client.go#L409: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client.go#L524: err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, c.peerCertificates[0], skx)
handshake_client.go#L574: preMasterSecret, ckx, err := keyAgreement.generateClientKeyExchange(c.config, hs.hello, c.peerCertificates[0])
handshake_client.go#L622: certVerify.signature, err = key.Sign(c.config.rand(), signed, signOpts)
handshake_client.go#L635: if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.hello.random, hs.masterSecret); err != nil {
handshake_client.go#L798: receivedAt: c.config.time(),
handshake_client.go#L836: if !c.config.InsecureSkipVerify {
handshake_client.go#L838: Roots: c.config.RootCAs,
handshake_client.go#L839: CurrentTime: c.config.time(),
handshake_client.go#L840: DNSName: c.config.ServerName,
handshake_client.go#L864: if c.config.VerifyPeerCertificate != nil {
handshake_client.go#L865: if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
handshake_client.go#L871: if c.config.VerifyConnection != nil {
handshake_client.go#L872: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client.go#L947: if c.config.GetClientCertificate != nil {
handshake_client.go#L948: return c.config.GetClientCertificate(cri)
handshake_client.go#L951: for _, chain := range c.config.Certificates {
handshake_client_tls13.go#L227: params, err := generateECDHEParameters(c.config.rand(), curveID)
handshake_client_tls13.go#L244: ticketAge := uint32(c.config.time().Sub(hs.session.receivedAt) / time.Millisecond)
handshake_client_tls13.go#L365: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.hello.random, clientSecret)
handshake_client_tls13.go#L370: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.hello.random, serverSecret)
handshake_client_tls13.go#L421: if c.config.VerifyConnection != nil {
handshake_client_tls13.go#L422: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_client_tls13.go#L531: err = c.config.writeKeyLog(keyLogLabelClientTraffic, hs.hello.random, hs.trafficSecret)
handshake_client_tls13.go#L536: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.hello.random, serverSecret)
handshake_client_tls13.go#L600: sig, err := cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
handshake_client_tls13.go#L629: if !c.config.SessionTicketsDisabled && c.config.ClientSessionCache != nil {
handshake_client_tls13.go#L643: if c.config.SessionTicketsDisabled || c.config.ClientSessionCache == nil {
handshake_client_tls13.go#L673: receivedAt: c.config.time(),
handshake_client_tls13.go#L675: useBy: c.config.time().Add(lifetime),
handshake_client_tls13.go#L681: cacheKey := clientSessionCacheKey(c.conn.RemoteAddr(), c.config)
handshake_client_tls13.go#L682: c.config.ClientSessionCache.Put(cacheKey, session)
handshake_server.go#L139: originalConfig := c.config
handshake_server.go#L140: if c.config.GetConfigForClient != nil {
handshake_server.go#L142: if configForClient, err = c.config.GetConfigForClient(chi); err != nil {
handshake_server.go#L146: c.config = configForClient
handshake_server.go#L155: c.vers, ok = c.config.mutualVersion(clientVersions)
handshake_server.go#L190: maxVers := c.config.maxSupportedVersion()
handshake_server.go#L199: _, err := io.ReadFull(c.config.rand(), serverRandom)
handshake_server.go#L217: if selectedProto := mutualProtocol(hs.clientHello.alpnProtocols, c.config.NextProtos); selectedProto != "" {
handshake_server.go#L223: hs.cert, err = c.config.getCertificate(clientHelloInfo(c, hs.clientHello))
handshake_server.go#L236: hs.ecdheOk = supportsECDHE(c.config, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
handshake_server.go#L299: if c.config.PreferServerCipherSuites {
handshake_server.go#L300: preferenceList = c.config.cipherSuites()
handshake_server.go#L307: if c.config.CipherSuites == nil && !aesgcmPreferred(hs.clientHello.cipherSuites) {
handshake_server.go#L312: supportedList = c.config.cipherSuites()
handshake_server.go#L331: if hs.clientHello.vers < c.config.maxSupportedVersion() {
handshake_server.go#L367: if c.config.SessionTicketsDisabled {
handshake_server.go#L382: if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
handshake_server.go#L405: c.config.cipherSuites(), hs.cipherSuiteOk)
handshake_server.go#L411: needClientCerts := requiresClientCert(c.config.ClientAuth)
handshake_server.go#L415: if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
handshake_server.go#L445: if c.config.VerifyConnection != nil {
handshake_server.go#L446: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server.go#L464: hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
handshake_server.go#L468: if c.config.ClientAuth == NoClientCert {
handshake_server.go#L496: skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
handshake_server.go#L509: if c.config.ClientAuth >= RequestClientCert {
handshake_server.go#L526: if c.config.ClientCAs != nil {
handshake_server.go#L527: certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
handshake_server.go#L554: if c.config.ClientAuth >= RequestClientCert {
handshake_server.go#L576: if c.config.VerifyConnection != nil {
handshake_server.go#L577: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server.go#L591: preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
handshake_server.go#L597: if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
handshake_server.go#L717: createdAt := uint64(c.config.time().Unix())
handshake_server.go#L782: if len(certs) == 0 && requiresClientCert(c.config.ClientAuth) {
handshake_server.go#L787: if c.config.ClientAuth >= VerifyClientCertIfGiven && len(certs) > 0 {
handshake_server.go#L789: Roots: c.config.ClientCAs,
handshake_server.go#L790: CurrentTime: c.config.time(),
handshake_server.go#L821: if c.config.VerifyPeerCertificate != nil {
handshake_server.go#L822: if err := c.config.VerifyPeerCertificate(certificates, c.verifiedChains); err != nil {
handshake_server.go#L846: config: c.config,
handshake_server_tls13.go#L111: if c.vers < c.config.maxSupportedVersion() {
handshake_server_tls13.go#L126: if _, err := io.ReadFull(c.config.rand(), hs.hello.random); err != nil {
handshake_server_tls13.go#L151: if c.config.PreferServerCipherSuites {
handshake_server_tls13.go#L190: for _, preferredGroup := range c.config.curvePreferences() {
handshake_server_tls13.go#L223: params, err := generateECDHEParameters(c.config.rand(), selectedGroup)
handshake_server_tls13.go#L242: if c.config.SessionTicketsDisabled {
handshake_server_tls13.go#L280: if c.config.time().Sub(createdAt) > maxSessionTicketLifetime {
handshake_server_tls13.go#L297: needClientCerts := requiresClientCert(c.config.ClientAuth)
handshake_server_tls13.go#L301: if sessionHasClientCerts && c.config.ClientAuth == NoClientCert {
handshake_server_tls13.go#L377: certificate, err := c.config.getCertificate(clientHelloInfo(c, hs.clientHello))
handshake_server_tls13.go#L555: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L560: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L569: if selectedProto := mutualProtocol(hs.clientHello.alpnProtocols, c.config.NextProtos); selectedProto != "" {
handshake_server_tls13.go#L584: return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
handshake_server_tls13.go#L601: if c.config.ClientCAs != nil {
handshake_server_tls13.go#L602: certReq.certificateAuthorities = c.config.ClientCAs.Subjects()
handshake_server_tls13.go#L636: sig, err := hs.cert.PrivateKey.(crypto.Signer).Sign(c.config.rand(), signed, signOpts)
handshake_server_tls13.go#L680: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L685: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L706: if hs.c.config.SessionTicketsDisabled {
handshake_server_tls13.go#L743: createdAt: uint64(c.config.time().Unix()),
handshake_server_tls13.go#L771: if c.config.VerifyConnection != nil {
handshake_server_tls13.go#L772: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
handshake_server_tls13.go#L799: if c.config.VerifyConnection != nil {
handshake_server_tls13.go#L800: if err := c.config.VerifyConnection(c.connectionStateLocked()); err != nil {
ticket.go#L129: if _, err := io.ReadFull(c.config.rand(), iv); err != nil {
tls.go#L38: config: config,
tls.go#L51: config: config,