crypto/tls.Conn.in (field)
51 uses
crypto/tls (current package)
conn.go#L94: in, out halfConn
conn.go#L593: if c.in.err != nil {
conn.go#L594: return c.in.err
conn.go#L600: return c.in.setErrorLocked(errors.New("tls: internal error: attempted to read record with pending application data"))
conn.go#L613: c.in.setErrorLocked(err)
conn.go#L626: return c.in.setErrorLocked(c.newRecordHeaderError(nil, "unsupported SSLv2 handshake received"))
conn.go#L634: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L642: return c.in.setErrorLocked(c.newRecordHeaderError(c.conn, "first record does not look like a TLS handshake"))
conn.go#L648: return c.in.setErrorLocked(c.newRecordHeaderError(nil, msg))
conn.go#L652: c.in.setErrorLocked(err)
conn.go#L659: data, typ, err := c.in.decrypt(record)
conn.go#L661: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L664: return c.in.setErrorLocked(c.sendAlert(alertRecordOverflow))
conn.go#L668: if c.in.cipher == nil && typ == recordTypeApplicationData {
conn.go#L669: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L679: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L684: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L688: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L691: return c.in.setErrorLocked(io.EOF)
conn.go#L694: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L701: return c.in.setErrorLocked(&net.OpError{Op: "remote error", Err: alert(data[1])})
conn.go#L703: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L708: return c.in.setErrorLocked(c.sendAlert(alertDecodeError))
conn.go#L712: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L723: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L725: if err := c.in.changeCipherSpec(); err != nil {
conn.go#L726: return c.in.setErrorLocked(c.sendAlert(err.(alert)))
conn.go#L731: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L745: return c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L759: return c.in.setErrorLocked(errors.New("tls: too many ignored records"))
conn.go#L1017: return nil, c.in.setErrorLocked(fmt.Errorf("tls: handshake message of length %d bytes exceeds maximum of %d bytes", n, maxHandshake))
conn.go#L1074: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1083: return nil, c.in.setErrorLocked(c.sendAlert(alertUnexpectedMessage))
conn.go#L1214: return c.in.setErrorLocked(errors.New("tls: too many non-advancing records"))
conn.go#L1231: return c.in.setErrorLocked(c.sendAlert(alertInternalError))
conn.go#L1234: newSecret := cipherSuite.nextTrafficSecret(c.in.trafficSecret)
conn.go#L1235: c.in.setTrafficSecret(cipherSuite, newSecret)
conn.go#L1272: c.in.Lock()
conn.go#L1273: defer c.in.Unlock()
conn.go#L1388: c.in.Lock()
conn.go#L1389: defer c.in.Unlock()
handshake_client.go#L363: c.in.version = vers
handshake_client.go#L662: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client_tls13.go#L363: c.in.setTrafficSecret(hs.suite, serverSecret)
handshake_client_tls13.go#L515: expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_client_tls13.go#L529: c.in.setTrafficSecret(hs.suite, serverSecret)
handshake_server.go#L161: c.in.version = c.vers
handshake_server.go#L671: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server_tls13.go#L550: c.in.setTrafficSecret(hs.suite, clientSecret)
handshake_server_tls13.go#L722: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L869: c.in.setTrafficSecret(hs.suite, hs.trafficSecret)
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |