type crypto/tls.Conn

78 uses

	crypto/tls (current package)
		conn.go#L26: type Conn struct {
		conn.go#L124: func (c *Conn) LocalAddr() net.Addr {
		conn.go#L129: func (c *Conn) RemoteAddr() net.Addr {
		conn.go#L136: func (c *Conn) SetDeadline(t time.Time) error {
		conn.go#L142: func (c *Conn) SetReadDeadline(t time.Time) error {
		conn.go#L149: func (c *Conn) SetWriteDeadline(t time.Time) error {
		conn.go#L565: func (c *Conn) newRecordHeaderError(conn net.Conn, msg string) (err RecordHeaderError) {
		conn.go#L572: func (c *Conn) readRecord() error {
		conn.go#L576: func (c *Conn) readChangeCipherSpec() error {
		conn.go#L592: func (c *Conn) readRecordOrCCS(expectChangeCipherSpec bool) error {
		conn.go#L755: func (c *Conn) retryReadRecord(expectChangeCipherSpec bool) error {
		conn.go#L789: func (c *Conn) readFromUntil(r io.Reader, n int) error {
		conn.go#L803: func (c *Conn) sendAlertLocked(err alert) error {
		conn.go#L822: func (c *Conn) sendAlert(err alert) error {
		conn.go#L858: func (c *Conn) maxPayloadSizeForWrite(typ recordType) int {
		conn.go#L905: func (c *Conn) write(data []byte) (int, error) {
		conn.go#L916: func (c *Conn) flush() (int, error) {
		conn.go#L937: func (c *Conn) writeRecordLocked(typ recordType, data []byte) (int, error) {
		conn.go#L997: func (c *Conn) writeRecord(typ recordType, data []byte) (int, error) {
		conn.go#L1006: func (c *Conn) readHandshake() (interface{}, error) {
		conn.go#L1098: func (c *Conn) Write(b []byte) (int, error) {
		conn.go#L1155: func (c *Conn) handleRenegotiation() error {
		conn.go#L1201: func (c *Conn) handlePostHandshakeMessage() error {
		conn.go#L1228: func (c *Conn) handleKeyUpdate(keyUpdate *keyUpdateMsg) error {
		conn.go#L1262: func (c *Conn) Read(b []byte) (int, error) {
		conn.go#L1306: func (c *Conn) Close() error {
		conn.go#L1346: func (c *Conn) CloseWrite() error {
		conn.go#L1354: func (c *Conn) closeNotify() error {
		conn.go#L1377: func (c *Conn) Handshake() error {
		conn.go#L1408: func (c *Conn) ConnectionState() ConnectionState {
		conn.go#L1414: func (c *Conn) connectionStateLocked() ConnectionState {
		conn.go#L1444: func (c *Conn) OCSPResponse() []byte {
		conn.go#L1454: func (c *Conn) VerifyHostname(host string) error {
		conn.go#L1469: func (c *Conn) handshakeComplete() bool {
		handshake_client.go#L26: 	c            *Conn
		handshake_client.go#L35: func (c *Conn) makeClientHello() (*clientHelloMsg, ecdheParameters, error) {
		handshake_client.go#L137: func (c *Conn) clientHandshake() (err error) {
		handshake_client.go#L233: func (c *Conn) loadSession(hello *clientHelloMsg) (cacheKey string,
		handshake_client.go#L349: func (c *Conn) pickTLSVersion(serverHello *serverHelloMsg) error {
		handshake_client.go#L825: func (c *Conn) verifyServerCertificate(certificates [][]byte) error {
		handshake_client.go#L946: func (c *Conn) getClientCertificate(cri *CertificateRequestInfo) (*Certificate, error) {
		handshake_client_tls13.go#L19: 	c           *Conn
		handshake_client_tls13.go#L637: func (c *Conn) handleNewSessionTicket(msg *newSessionTicketMsgTLS13) error {
		handshake_server.go#L25: 	c            *Conn
		handshake_server.go#L40: func (c *Conn) serverHandshake() error {
		handshake_server.go#L127: func (c *Conn) readClientHello() (*clientHelloMsg, error) {
		handshake_server.go#L771: func (c *Conn) processCertsFromClient(certificate Certificate) error {
		handshake_server.go#L831: func clientHelloInfo(c *Conn, clientHello *clientHelloMsg) *ClientHelloInfo {
		handshake_server_tls13.go#L25: 	c               *Conn
		ticket.go#L119: func (c *Conn) encryptTicket(state []byte) ([]byte, error) {
		ticket.go#L147: func (c *Conn) decryptTicket(encrypted []byte) (plaintext []byte, usedOldKey bool) {
		tls.go#L35: func Server(conn net.Conn, config *Config) *Conn {
		tls.go#L36: 	c := &Conn{
		tls.go#L48: func Client(conn net.Conn, config *Config) *Conn {
		tls.go#L49: 	c := &Conn{
		tls.go#L114: func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L118: func dial(ctx context.Context, netDialer *net.Dialer, network, addr string, config *Config) (*Conn, error) {
		tls.go#L204: func Dial(network, addr string, config *Config) (*Conn, error) {

	github.com/lib/pq
		ssl.go#L156: func sslVerifyCertificateAuthority(client *tls.Conn, tlsConf *tls.Config) error {

	golang.org/x/net/http2
		client_conn_pool.go#L154: func (p *clientConnPool) addConnIfNeeded(key string, t *Transport, c *tls.Conn) (used bool, err error) {
		client_conn_pool.go#L190: func (c *addConnCall) run(t *Transport, key string, tc *tls.Conn) {
		server.go#L280: 		s.TLSNextProto = map[string]func(*http.Server, *tls.Conn, http.Handler){}
		server.go#L282: 	protoHandler := func(hs *http.Server, c *tls.Conn, h http.Handler) {
		transport.go#L190: 	upgradeFn := func(authority string, c *tls.Conn) http.RoundTripper {
		transport.go#L205: 		t1.TLSNextProto = map[string]func(string, *tls.Conn) http.RoundTripper{

	net/http
		h2_bundle.go#L830: func (p *http2clientConnPool) addConnIfNeeded(key string, t *http2Transport, c *tls.Conn) (used bool, err error) {
		h2_bundle.go#L866: func (c *http2addConnCall) run(t *http2Transport, key string, tc *tls.Conn) {
		h2_bundle.go#L3846: 		s.TLSNextProto = map[string]func(*Server, *tls.Conn, Handler){}
		h2_bundle.go#L3848: 	protoHandler := func(hs *Server, c *tls.Conn, h Handler) {
		h2_bundle.go#L6692: 	upgradeFn := func(authority string, c *tls.Conn) RoundTripper {
		h2_bundle.go#L6707: 		t1.TLSNextProto = map[string]func(string, *tls.Conn) RoundTripper{
		server.go#L1833: 	if tlsConn, ok := c.rwc.(*tls.Conn); ok {
		server.go#L2614: 	TLSNextProto map[string]func(*Server, *tls.Conn, Handler)
		server.go#L3438: 	c   *tls.Conn
		transport.go#L238: 	TLSNextProto map[string]func(authority string, c *tls.Conn) RoundTripper
		transport.go#L335: 		npm := map[string]func(authority string, c *tls.Conn) RoundTripper{}
		transport.go#L1580: 		if tc, ok := pconn.conn.(*tls.Conn); ok {
		transport.go#L1731: 			alt := next(cm.targetAddr, pconn.conn.(*tls.Conn))