Lines Matching defs:Conn

29 type Conn struct {  struct
31 conn net.Conn
32 isDTLS bool
33 isClient bool
36 handshakeMutex sync.Mutex // handshakeMutex < in.Mutex, out.Mutex, errMutex
37 handshakeErr error // error resulting from handshake
38 vers uint16 // TLS version
39 haveVers bool // version has been negotiated
40 config *Config // configuration passed to constructor
41 handshakeComplete bool
42 … bool // On a server, indicates that the client is sending early data that must be skipped over.
43 didResume bool // whether this connection was a session resumption
44 extendedMasterSecret bool // whether this session used an extended master secret
45 cipherSuite *cipherSuite
46 ocspResponse []byte // stapled OCSP response
47 sctList []byte // signed certificate timestamp list
48 peerCertificates []*x509.Certificate
51 verifiedChains [][]*x509.Certificate
53 serverName string
56 firstFinished [12]byte
59 peerSignatureAlgorithm signatureAlgorithm
62 curveID CurveID
64 clientRandom, serverRandom [32]byte
65 exporterSecret []byte
66 resumptionSecret []byte
68 clientProtocol string
69 clientProtocolFallback bool
70 usedALPN bool
73 clientVerify []byte
74 serverVerify []byte
76 channelID *ecdsa.PublicKey
78 srtpProtectionProfile uint16
80 clientVersion uint16
83 in, out halfConn // in.Mutex < out.Mutex
84 rawInput *block // raw input, right off the wire
85 input *block // application record waiting to be read
86 hand bytes.Buffer // handshake record waiting to be read
90 pendingFlight bytes.Buffer
93 sendHandshakeSeq uint16
94 recvHandshakeSeq uint16
95 handMsg []byte // pending assembled handshake message
96 handMsgLen int // handshake message length, not including the header
97 pendingFragments [][]byte // pending outgoing handshake fragments.
99 keyUpdateRequested bool
101 tmp [16]byte
104 func (c *Conn) init() {
118 func (c *Conn) LocalAddr() net.Addr {
123 func (c *Conn) RemoteAddr() net.Addr {
130 func (c *Conn) SetDeadline(t time.Time) error {
136 func (c *Conn) SetReadDeadline(t time.Time) error {
143 func (c *Conn) SetWriteDeadline(t time.Time) error {
726 func (c *Conn) doReadRecord(want recordType) (recordType, *block, error) {
847 func (c *Conn) readRecord(want recordType) error {
956 func (c *Conn) sendAlertLocked(level byte, err alert) error {
977 func (c *Conn) sendAlert(err alert) error {
985 func (c *Conn) SendAlert(level byte, err alert) error {
992 func (c *Conn) writeV2Record(data []byte) (n int, err error) {
1003 func (c *Conn) writeRecord(typ recordType, data []byte) (n int, err error) {
1051 func (c *Conn) doWriteRecord(typ recordType, data []byte) (n int, err error) {
1155 func (c *Conn) flushHandshake() error {
1172 func (c *Conn) doReadHandshake() ([]byte, error) {
1205 func (c *Conn) readHandshake() (interface{}, error) {
1286 func (c *Conn) skipPacket(packet []byte) error {
1325 func (c *Conn) simulatePacketLoss(resendFunc func()) error {
1353 func (c *Conn) SendHalfHelloRequest() error {
1368 func (c *Conn) Write(b []byte) (int, error) {
1428 …ocessTLS13NewSessionTicket(newSessionTicket *newSessionTicketMsg, cipherSuite *cipherSuite) error {
1465 func (c *Conn) handlePostHandshakeMessage() error {
1506 func (c *Conn) Renegotiate() error {
1522 func (c *Conn) Read(b []byte) (n int, err error) {
1586 func (c *Conn) Close() error {
1626 func (c *Conn) Handshake() error {
1660 func (c *Conn) ConnectionState() ConnectionState {
1689 func (c *Conn) OCSPResponse() []byte {
1699 func (c *Conn) VerifyHostname(host string) error {
1713 …c *Conn) ExportKeyingMaterial(length int, label, context []byte, useContext bool) ([]byte, error) {
1744 func (c *Conn) noRenegotiationInfo() bool {
1757 func (c *Conn) SendNewSessionTicket() error {
1813 func (c *Conn) SendKeyUpdate(keyUpdateRequest byte) error {
1819 func (c *Conn) sendKeyUpdateLocked(keyUpdateRequest byte) error {
1837 func (c *Conn) sendFakeEarlyData(len int) error {