type crypto/tls.Config

106 uses

	crypto/tls (current package)
		cipher_suites.go#L119: 	generateServerKeyExchange(*Config, *Certificate, *clientHelloMsg, *serverHelloMsg) (*serverKeyExchangeMsg, error)
		cipher_suites.go#L120: 	processClientKeyExchange(*Config, *Certificate, *clientKeyExchangeMsg, uint16) ([]byte, error)
		cipher_suites.go#L126: 	processServerKeyExchange(*Config, *clientHelloMsg, *serverHelloMsg, *x509.Certificate, *serverKeyExchangeMsg) error
		cipher_suites.go#L127: 	generateClientKeyExchange(*Config, *clientHelloMsg, *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error)
		common.go#L445: 	config *Config
		common.go#L499: type Config struct {
		common.go#L569: 	GetConfigForClient func(*ClientHelloInfo) (*Config, error)
		common.go#L732: func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) {
		common.go#L747: func (c *Config) Clone() *Config {
		common.go#L753: 	return &Config{
		common.go#L791: func (c *Config) initLegacySessionTicketKeyRLocked() {
		common.go#L828: func (c *Config) ticketKeys(configForClient *Config) []ticketKey {
		common.go#L896: func (c *Config) SetSessionTicketKeys(keys [][32]byte) {
		common.go#L911: func (c *Config) rand() io.Reader {
		common.go#L919: func (c *Config) time() time.Time {
		common.go#L927: func (c *Config) cipherSuites() []uint16 {
		common.go#L942: func (c *Config) supportedVersions() []uint16 {
		common.go#L956: func (c *Config) maxSupportedVersion() uint16 {
		common.go#L980: func (c *Config) curvePreferences() []CurveID {
		common.go#L987: func (c *Config) supportsCurve(curve CurveID) bool {
		common.go#L998: func (c *Config) mutualVersion(peerVersions []uint16) (uint16, bool) {
		common.go#L1014: func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, error) {
		common.go#L1076: 		config = &Config{}
		common.go#L1257: func (c *Config) BuildNameToCertificate() {
		common.go#L1284: func (c *Config) writeKeyLog(label string, clientRandom, secret []byte) error {
		common.go#L1416: var emptyConfig Config
		common.go#L1418: func defaultConfig() *Config {
		conn.go#L41: 	config         *Config // configuration passed to constructor
		handshake_client.go#L964: func clientSessionCacheKey(serverAddr net.Addr, config *Config) string {
		handshake_server.go#L138: 	var configForClient *Config
		handshake_server.go#L275: func supportsECDHE(c *Config, supportedCurves []CurveID, supportedPoints []uint8) bool {
		key_agreement.go#L25: func (ka rsaKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L29: func (ka rsaKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L57: func (ka rsaKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L61: func (ka rsaKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		key_agreement.go#L145: func (ka *ecdheKeyAgreement) generateServerKeyExchange(config *Config, cert *Certificate, clientHello *clientHelloMsg, hello *serverHelloMsg) (*serverKeyExchangeMsg, error) {
		key_agreement.go#L234: func (ka *ecdheKeyAgreement) processClientKeyExchange(config *Config, cert *Certificate, ckx *clientKeyExchangeMsg, version uint16) ([]byte, error) {
		key_agreement.go#L247: func (ka *ecdheKeyAgreement) processServerKeyExchange(config *Config, clientHello *clientHelloMsg, serverHello *serverHelloMsg, cert *x509.Certificate, skx *serverKeyExchangeMsg) error {
		key_agreement.go#L328: func (ka *ecdheKeyAgreement) generateClientKeyExchange(config *Config, clientHello *clientHelloMsg, cert *x509.Certificate) ([]byte, *clientKeyExchangeMsg, error) {
		tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L61: 	config *Config
		tls.go#L78: func NewListener(inner net.Listener, config *Config) net.Listener {
		tls.go#L89: func Listen(network, laddr string, config *Config) (net.Listener, error) {
		tls.go#L114: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L118: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L204: func Dial(network, addr string, config *Config) (*Conn, error) {
		tls.go#L220: 	Config *Config

	github.com/aws/aws-sdk-go/aws/session
		session.go#L555: 		t.TLSClientConfig = &tls.Config{}

	github.com/go-redis/redis/v8
		cluster.go#L79: 	TLSConfig *tls.Config
		options.go#L108: 	TLSConfig *tls.Config
		options.go#L239: 		o.TLSConfig = &tls.Config{ServerName: h}
		ring.go#L89: 	TLSConfig *tls.Config
		sentinel.go#L63: 	TLSConfig *tls.Config
		universal.go#L45: 	TLSConfig *tls.Config

	github.com/jackc/pgconn
		config.go#L37: 	TLSConfig      *tls.Config // nil disables TLS
		config.go#L98: 	TLSConfig *tls.Config // nil disables TLS
		config.go#L293: 		var tlsConfigs []*tls.Config
		config.go#L543: func configTLS(settings map[string]string) ([]*tls.Config, error) {
		config.go#L555: 	tlsConfig := &tls.Config{}
		config.go#L559: 		return []*tls.Config{nil}, nil
		config.go#L646: 		return []*tls.Config{nil, tlsConfig}, nil
		config.go#L648: 		return []*tls.Config{tlsConfig, nil}, nil
		config.go#L650: 		return []*tls.Config{tlsConfig}, nil
		pgconn.go#L328: func (pgConn *PgConn) startTLS(tlsConfig *tls.Config) (err error) {

	github.com/lib/pq
		ssl.go#L17: 	tlsConf := tls.Config{}
		ssl.go#L85: func sslClientCertificates(tlsConf *tls.Config, o values) error {
		ssl.go#L133: func sslCertificateAuthority(tlsConf *tls.Config, o values) error {
		ssl.go#L156: func sslVerifyCertificateAuthority(client *tls.Conn, tlsConf *tls.Config) error {

	golang.org/x/net/http2
		server.go#L233: 		s.TLSConfig = new(tls.Config)
		transport.go#L68: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		transport.go#L72: 	TLSClientConfig *tls.Config
		transport.go#L182: 		t1.TLSClientConfig = new(tls.Config)
		transport.go#L579: func (t *Transport) newTLSConfig(host string) *tls.Config {
		transport.go#L580: 	cfg := new(tls.Config)
		transport.go#L593: func (t *Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
		transport.go#L600: func (t *Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {

	golang.org/x/pkgsite/internal/testing/testhelper
		testhelper.go#L65: 			TLSClientConfig: &tls.Config{

	google.golang.org/api/transport/http
		dial.go#L185: 		trans.TLSClientConfig = &tls.Config{

	google.golang.org/grpc/credentials
		tls.go#L62: 	config *tls.Config
		tls.go#L142: func NewTLS(c *tls.Config) TransportCredentials {
		tls.go#L157: 	return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp})
		tls.go#L177: 	return NewTLS(&tls.Config{ServerName: serverNameOverride, RootCAs: cp}), nil
		tls.go#L182: 	return NewTLS(&tls.Config{Certificates: []tls.Certificate{*cert}})
		tls.go#L192: 	return NewTLS(&tls.Config{Certificates: []tls.Certificate{cert}}), nil

	google.golang.org/grpc/internal/credentials
		util.go#L44: func CloneTLSConfig(cfg *tls.Config) *tls.Config {
		util.go#L46: 		return &tls.Config{}

	net/http
		h2_bundle.go#L3799: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L6570: 	DialTLS func(network, addr string, cfg *tls.Config) (net.Conn, error)
		h2_bundle.go#L6574: 	TLSClientConfig *tls.Config
		h2_bundle.go#L6684: 		t1.TLSClientConfig = new(tls.Config)
		h2_bundle.go#L7082: func (t *http2Transport) newTLSConfig(host string) *tls.Config {
		h2_bundle.go#L7083: 	cfg := new(tls.Config)
		h2_bundle.go#L7096: func (t *http2Transport) dialTLS() func(string, string, *tls.Config) (net.Conn, error) {
		h2_bundle.go#L7103: func (t *http2Transport) dialTLSDefault(network, addr string, cfg *tls.Config) (net.Conn, error) {
		server.go#L2567: 	TLSConfig *tls.Config
		transport.go#L168: 	TLSClientConfig *tls.Config
		transport.go#L2852: func cloneTLSConfig(cfg *tls.Config) *tls.Config {
		transport.go#L2854: 		return &tls.Config{}

	net/http/httptest
		server.go#L38: 	TLS *tls.Config
		server.go#L156: 		s.TLS = new(tls.Config)
		server.go#L175: 		TLSClientConfig: &tls.Config{