type crypto/tls.Config
106 uses
crypto/tls (current package)
cipher_suites.go#L119: generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
cipher_suites.go#L120: processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
cipher_suites.go#L126: processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
cipher_suites.go#L127: generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
common.go#L445: config *Config
common.go#L499: type Config struct {
common.go#L569: GetConfigForClient func(*ClientHelloInfo) (*Config, error)
common.go#L732: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
common.go#L747: func (c *Config) Clone() *Config {
common.go#L753: return &Config{
common.go#L791: func (c *Config) initLegacySessionTicketKeyRLocked() {
common.go#L828: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
common.go#L896: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
common.go#L911: func (c *Config) rand() io.Reader {
common.go#L919: func (c *Config) time() time.Time {
common.go#L927: func (c *Config) cipherSuites() []uint16 {
common.go#L942: func (c *Config) supportedVersions() []uint16 {
common.go#L956: func (c *Config) maxSupportedVersion() uint16 {
common.go#L980: func (c *Config) curvePreferences() []CurveID {
common.go#L987: func (c *Config) supportsCurve(curve CurveID) bool {
common.go#L998: func (c *Config) mutualVersion(peerVersions []uint16) (uint16, bool) {
common.go#L1014: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
common.go#L1076: config = &Config{}
common.go#L1257: func (c *Config) BuildNameToCertificate() {
common.go#L1284: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
common.go#L1416: var emptyConfig Config
common.go#L1418: func defaultConfig() *Config {
conn.go#L41: config *Config // configuration passed to constructor
handshake_client.go#L964: func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
handshake_server.go#L138: var configForClient *Config
handshake_server.go#L275: func supportsECDHE(c *Config, supportedCurves []CurveID, supportedPoints []uint8) bool {
key_agreement.go#L25: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L29: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L57: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L61: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
key_agreement.go#L145: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
key_agreement.go#L234: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
key_agreement.go#L247: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
key_agreement.go#L328: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
tls.go#L61: config *Config
tls.go#L78: func NewListener(inner net.Listener, config *Config) net.Listener {
tls.go#L89: func Listen(network, laddr string, config *Config) (net.Listener, error) {
tls.go#L114: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L118: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
tls.go#L204: func Dial(network, addr string, config *Config) (*Conn, error) {
tls.go#L220: Config *Config
github.com/aws/aws-sdk-go/aws/session
session.go#L555: t.TLSClientConfig = &tls.Config{}
github.com/go-redis/redis/v8
cluster.go#L79: TLSConfig *tls.Config
options.go#L108: TLSConfig *tls.Config
options.go#L239: o.TLSConfig = &tls.Config{ServerName: h}
ring.go#L89: TLSConfig *tls.Config
sentinel.go#L63: TLSConfig *tls.Config
universal.go#L45: TLSConfig *tls.Config
github.com/jackc/pgconn
config.go#L37: TLSConfig *tls.Config // nil disables TLS
config.go#L98: TLSConfig *tls.Config // nil disables TLS
config.go#L293: var tlsConfigs []*tls.Config
config.go#L543: func configTLS(settings map[string]string) ([]*tls.Config, error) {
config.go#L555: tlsConfig := &tls.Config{}
config.go#L559: return []*tls.Config{nil}, nil
config.go#L646: return []*tls.Config{nil, tlsConfig}, nil
config.go#L648: return []*tls.Config{tlsConfig, nil}, nil
config.go#L650: return []*tls.Config{tlsConfig}, nil
pgconn.go#L328: func (pgConn *PgConn) startTLS(tlsConfig *tls.Config) (err error) {
github.com/lib/pq
ssl.go#L17: tlsConf := tls.Config{}
ssl.go#L85: func sslClientCertificates(tlsConf *tls.Config, o values) error {
ssl.go#L133: func sslCertificateAuthority(tlsConf *tls.Config, o values) error {
ssl.go#L156: func sslVerifyCertificateAuthority(client *tls.Conn, tlsConf *tls.Config) error {
golang.org/x/net/http2
server.go#L233: s.TLSConfig = new(tls.Config)
transport.go#L68: DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
transport.go#L72: TLSClientConfig *tls.Config
transport.go#L182: t1.TLSClientConfig = new(tls.Config)
transport.go#L579: func (t *Transport) newTLSConfig(host string) *tls.Config {
transport.go#L580: cfg := new(tls.Config)
transport.go#L593: func (t *Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
transport.go#L600: func (t *Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {
golang.org/x/pkgsite/internal/testing/testhelper
testhelper.go#L65: TLSClientConfig: &tls.Config{
google.golang.org/api/transport/http
dial.go#L185: trans.TLSClientConfig = &tls.Config{
google.golang.org/grpc/credentials
tls.go#L62: config *tls.Config
tls.go#L142: func NewTLS(c *tls.Config) TransportCredentials {
tls.go#L157: return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp})
tls.go#L177: return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp}), nil
tls.go#L182: return NewTLS(&tls.Config{Certificates: []tls.Certificate{*cert}})
tls.go#L192: return NewTLS(&tls.Config{Certificates: []tls.Certificate{cert}}), nil
google.golang.org/grpc/internal/credentials
util.go#L44: func CloneTLSConfig(cfg *tls.Config) *tls.Config {
util.go#L46: return &tls.Config{}
net/http
h2_bundle.go#L3799: s.TLSConfig = new(tls.Config)
h2_bundle.go#L6570: DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
h2_bundle.go#L6574: TLSClientConfig *tls.Config
h2_bundle.go#L6684: t1.TLSClientConfig = new(tls.Config)
h2_bundle.go#L7082: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
h2_bundle.go#L7083: cfg := new(tls.Config)
h2_bundle.go#L7096: func (t *http2Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
h2_bundle.go#L7103: func (t *http2Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {
server.go#L2567: TLSConfig *tls.Config
transport.go#L168: TLSClientConfig *tls.Config
transport.go#L2852: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
transport.go#L2854: return &tls.Config{}
net/http/httptest
server.go#L38: TLS *tls.Config
server.go#L156: s.TLS = new(tls.Config)
server.go#L175: TLSClientConfig: &tls.Config{
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |