Versions in this module Expand all Collapse all v4 v4.23.2 Apr 17, 2020 Changes in this version + const CurveP256 + const CurveP384 + const CurveP521 + const ECDSAWithP256AndSHA256 + const ECDSAWithP384AndSHA384 + const ECDSAWithP521AndSHA512 + const ECDSAWithSHA1 + const HybridSIDHp503Curve25519 + const NoClientCert + const P503PrvKeySz + const P503PubKeySz + const P503SharedSecretSz + const PKCS1WithSHA1 + const PKCS1WithSHA256 + const PKCS1WithSHA384 + const PKCS1WithSHA512 + const PSSWithSHA256 + const PSSWithSHA384 + const PSSWithSHA512 + const RenegotiateFreelyAsClient + const RenegotiateNever + const RenegotiateOnceAsClient + const RequestClientCert + const RequireAndVerifyClientCert + const RequireAnyClientCert + const SIDHp503Curve25519PrvKeySz + const SIDHp503Curve25519PubKeySz + const SIDHp503Curve25519SharedKeySz + const TLS_AES_128_GCM_SHA256 + const TLS_AES_256_GCM_SHA384 + const TLS_CHACHA20_POLY1305_SHA256 + const TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA + const TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 + const TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 + const TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA + const TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 + const TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305 + const TLS_ECDHE_ECDSA_WITH_RC4_128_SHA + const TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA + const TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA + const TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 + const TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 + const TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA + const TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 + const TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305 + const TLS_ECDHE_RSA_WITH_RC4_128_SHA + const TLS_FALLBACK_SCSV + const TLS_RSA_WITH_3DES_EDE_CBC_SHA + const TLS_RSA_WITH_AES_128_CBC_SHA + const TLS_RSA_WITH_AES_128_CBC_SHA256 + const TLS_RSA_WITH_AES_128_GCM_SHA256 + const TLS_RSA_WITH_AES_256_CBC_SHA + const TLS_RSA_WITH_AES_256_GCM_SHA384 + const TLS_RSA_WITH_RC4_128_SHA + const VerifyClientCertIfGiven + const VersionSSL30 + const VersionTLS10 + const VersionTLS11 + const VersionTLS12 + const VersionTLS13 + const X25519 + func AEADAESGCM13(key, fixedNonce []byte) cipher.AEAD + func HkdfExpandLabel(hash crypto.Hash, secret, hashValue []byte, label string, L int) []byte + func HkdfExtract(hash crypto.Hash, secret, salt []byte) []byte + func Listen(network, laddr string, config *Config) (net.Listener, error) + func NewListener(inner net.Listener, config *Config) net.Listener + type Certificate = tls.Certificate + func LoadX509KeyPair(certFile, keyFile string) (Certificate, error) + func X509KeyPair(certPEMBlock, keyPEMBlock []byte) (Certificate, error) + type CertificateRequestInfo = tls.CertificateRequestInfo + type CipherSuite struct + func (c *CipherSuite) AEAD(key, fixedNonce []byte) cipher.AEAD + func (c *CipherSuite) Hash() crypto.Hash + func (c *CipherSuite) IVLen() int + func (c *CipherSuite) KeyLen() int + type ClientAuthType = tls.ClientAuthType + type ClientHelloInfo struct + AcceptsDelegatedCredential bool + CipherSuites []uint16 + Conn net.Conn + Fingerprint []byte + Offered0RTTData bool + ServerName string + SignatureSchemes []SignatureScheme + SupportedCurves []CurveID + SupportedPoints []uint8 + SupportedProtos []string + SupportedVersions []uint16 + type ClientSessionCache interface + Get func(sessionKey string) (session *ClientSessionState, ok bool) + Put func(sessionKey string, cs *ClientSessionState) + func NewLRUClientSessionCache(capacity int) ClientSessionCache + type ClientSessionState struct + type Config struct + Accept0RTTData bool + AcceptDelegatedCredential bool + AlternativeRecordLayer RecordLayer + Certificates []Certificate + CipherSuites []uint16 + ClientAuth ClientAuthType + ClientCAs *x509.CertPool + ClientSessionCache ClientSessionCache + CurvePreferences []CurveID + DynamicRecordSizingDisabled bool + GetCertificate func(*ClientHelloInfo) (*Certificate, error) + GetClientCertificate func(*CertificateRequestInfo) (*Certificate, error) + GetConfigForClient func(*ClientHelloInfo) (*Config, error) + GetDelegatedCredential func(*ClientHelloInfo, uint16) ([]byte, crypto.PrivateKey, error) + GetExtensions func(handshakeMessageType uint8) []Extension + InsecureSkipVerify bool + KeyLogWriter io.Writer + Max0RTTDataSize uint32 + MaxVersion uint16 + MinVersion uint16 + NameToCertificate map[string]*Certificate + NextProtos []string + PreferServerCipherSuites bool + Rand io.Reader + ReceivedExtensions func(handshakeMessageType uint8, exts []Extension) error + Renegotiation RenegotiationSupport + RootCAs *x509.CertPool + ServerName string + SessionTicketKey [32]byte + SessionTicketSealer SessionTicketSealer + SessionTicketsDisabled bool + Time func() time.Time + UseExtendedMasterSecret bool + VerifyPeerCertificate func(rawCerts [][]byte, verifiedChains [][]*x509.Certificate) error + func (c *Config) BuildNameToCertificate() + func (c *Config) Clone() *Config + func (c *Config) SetSessionTicketKeys(keys [][32]byte) + type Conn struct + func Client(conn net.Conn, config *Config) *Conn + func Dial(network, addr string, config *Config) (*Conn, error) + func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) + func Server(conn net.Conn, config *Config) *Conn + func (c *Conn) Close() error + func (c *Conn) CloseWrite() error + func (c *Conn) ConfirmHandshake() error + func (c *Conn) ConnectionState() ConnectionState + func (c *Conn) Handshake() error + func (c *Conn) LocalAddr() net.Addr + func (c *Conn) OCSPResponse() []byte + func (c *Conn) Read(b []byte) (n int, err error) + func (c *Conn) RemoteAddr() net.Addr + func (c *Conn) SetDeadline(t time.Time) error + func (c *Conn) SetReadDeadline(t time.Time) error + func (c *Conn) SetWriteDeadline(t time.Time) error + func (c *Conn) VerifyHostname(host string) error + func (c *Conn) Write(b []byte) (int, error) + type ConnectionState struct + CipherSuite uint16 + ClientHello []byte + ConnectionID []byte + DelegatedCredential []byte + DidResume bool + HandshakeComplete bool + HandshakeConfirmed bool + NegotiatedProtocol string + NegotiatedProtocolIsMutual bool + OCSPResponse []byte + PeerCertificates []*x509.Certificate + ServerName string + SignedCertificateTimestamps [][]byte + TLSUnique []byte + Unique0RTTToken []byte + VerifiedChains [][]*x509.Certificate + Version uint16 + type CurveID = tls.CurveID + type Extension struct + Data []byte + Type uint16 + type RecordHeaderError struct + Msg string + RecordHeader [5]byte + func (e RecordHeaderError) Error() string + type RecordLayer interface + ReadHandshakeMessage func() ([]byte, error) + SetReadKey func(suite *CipherSuite, trafficSecret []byte) + SetWriteKey func(suite *CipherSuite, trafficSecret []byte) + WriteRecord func([]byte) (int, error) + type RenegotiationSupport = tls.RenegotiationSupport + type SessionTicketSealer interface + Seal func(cs *ConnectionState, content []byte) (ticket []byte, err error) + Unseal func(chi *ClientHelloInfo, ticket []byte) (content []byte, success bool) + type SignatureScheme = tls.SignatureScheme