Lines Matching defs:Conn
29 type Conn struct { struct
31 conn net.Conn
32 isDTLS bool
33 isClient bool
36 handshakeMutex sync.Mutex // handshakeMutex < in.Mutex, out.Mutex, errMutex
37 handshakeErr error // error resulting from handshake
38 wireVersion uint16 // TLS wire version
39 vers uint16 // TLS version
40 haveVers bool // version has been negotiated
41 config *Config // configuration passed to constructor
42 handshakeComplete bool
43 … bool // On a server, indicates that the client is sending early data that must be skipped over.
44 didResume bool // whether this connection was a session resumption
45 extendedMasterSecret bool // whether this session used an extended master secret
46 cipherSuite *cipherSuite
47 earlyCipherSuite *cipherSuite
48 ocspResponse []byte // stapled OCSP response
49 sctList []byte // signed certificate timestamp list
50 peerCertificates []*x509.Certificate
53 verifiedChains [][]*x509.Certificate
55 serverName string
58 firstFinished [12]byte
61 peerSignatureAlgorithm signatureAlgorithm
64 curveID CurveID
67 quicTransportParams []byte
69 clientRandom, serverRandom [32]byte
70 earlyExporterSecret []byte
71 exporterSecret []byte
72 resumptionSecret []byte
74 clientProtocol string
75 clientProtocolFallback bool
76 usedALPN bool
79 clientVerify []byte
80 serverVerify []byte
82 channelID *ecdsa.PublicKey
84 tokenBindingNegotiated bool
85 tokenBindingParam uint8
87 srtpProtectionProfile uint16
89 clientVersion uint16
92 in, out halfConn // in.Mutex < out.Mutex
93 rawInput *block // raw input, right off the wire
94 input *block // application record waiting to be read
95 hand bytes.Buffer // handshake record waiting to be read
99 pendingFlight bytes.Buffer
102 sendHandshakeSeq uint16
103 recvHandshakeSeq uint16
104 handMsg []byte // pending assembled handshake message
105 handMsgLen int // handshake message length, not including the header
106 pendingFragments [][]byte // pending outgoing handshake fragments.
107 pendingPacket []byte // pending outgoing packet.
109 keyUpdateSeen bool
110 keyUpdateRequested bool
111 seenOneByteRecord bool
113 expectTLS13ChangeCipherSpec bool
118 seenHandshakePackEnd bool
120 tmp [16]byte
123 func (c *Conn) init() {
137 func (c *Conn) LocalAddr() net.Addr {
142 func (c *Conn) RemoteAddr() net.Addr {
149 func (c *Conn) SetDeadline(t time.Time) error {
155 func (c *Conn) SetReadDeadline(t time.Time) error {
162 func (c *Conn) SetWriteDeadline(t time.Time) error {
756 func (c *Conn) useInTrafficSecret(version uint16, suite *cipherSuite, secret []byte) error {
769 func (c *Conn) useOutTrafficSecret(version uint16, suite *cipherSuite, secret []byte) {
777 func (c *Conn) doReadRecord(want recordType) (recordType, *block, error) {
902 func (c *Conn) readTLS13ChangeCipherSpec() error {
946 func (c *Conn) readRecord(want recordType) error {
1067 func (c *Conn) sendAlertLocked(level byte, err alert) error {
1088 func (c *Conn) sendAlert(err alert) error {
1096 func (c *Conn) SendAlert(level byte, err alert) error {
1103 func (c *Conn) writeV2Record(data []byte) (n int, err error) {
1114 func (c *Conn) writeRecord(typ recordType, data []byte) (n int, err error) {
1178 func (c *Conn) doWriteRecord(typ recordType, data []byte) (n int, err error) {
1281 func (c *Conn) flushHandshake() error {
1298 func (c *Conn) doReadHandshake() ([]byte, error) {
1331 func (c *Conn) readHandshake() (interface{}, error) {
1426 func (c *Conn) skipPacket(packet []byte) error {
1465 func (c *Conn) simulatePacketLoss(resendFunc func()) error {
1493 func (c *Conn) SendHalfHelloRequest() error {
1508 func (c *Conn) Write(b []byte) (int, error) {
1564 …ocessTLS13NewSessionTicket(newSessionTicket *newSessionTicketMsg, cipherSuite *cipherSuite) error {
1607 func (c *Conn) handlePostHandshakeMessage() error {
1656 func (c *Conn) ReadKeyUpdateACK() error {
1678 func (c *Conn) Renegotiate() error {
1694 func (c *Conn) Read(b []byte) (n int, err error) {
1757 func (c *Conn) Close() error {
1797 func (c *Conn) Handshake() error {
1831 func (c *Conn) ConnectionState() ConnectionState {
1863 func (c *Conn) OCSPResponse() []byte {
1873 func (c *Conn) VerifyHostname(host string) error {
1885 func (c *Conn) exportKeyingMaterialTLS13(length int, secret, label, context []byte) []byte {
1901 …c *Conn) ExportKeyingMaterial(length int, label, context []byte, useContext bool) ([]byte, error) {
1928 func (c *Conn) ExportEarlyKeyingMaterial(length int, label, context []byte) ([]byte, error) {
1942 func (c *Conn) noRenegotiationInfo() bool {
1955 func (c *Conn) SendNewSessionTicket(nonce []byte) error {
2013 func (c *Conn) SendKeyUpdate(keyUpdateRequest byte) error {
2019 func (c *Conn) sendKeyUpdateLocked(keyUpdateRequest byte) error {
2037 func (c *Conn) sendFakeEarlyData(len int) error {