Home | History | Annotate | Download | only in tls

Lines Matching full:nil

49 	if err != nil {
56 if err := hs.doResumeHandshake(); err != nil {
59 if err := hs.establishKeys(); err != nil {
66 if err := hs.sendSessionTicket(); err != nil {
70 if err := hs.sendFinished(c.firstFinished[:]); err != nil {
73 if err := hs.readFinished(nil); err != nil {
80 if err := hs.doFullHandshake(); err != nil {
83 if err := hs.establishKeys(); err != nil {
86 if err := hs.readFinished(c.firstFinished[:]); err != nil {
89 if err := hs.sendSessionTicket(); err != nil {
92 if err := hs.sendFinished(nil); err != nil {
98 return nil
108 if err != nil {
164 if err != nil {
195 }); err != nil {
225 return true, nil
243 if hs.suite == nil {
260 return false, nil
328 if _, err := hs.processCertsFromClient(hs.sessionState.certificates); err != nil {
335 return nil
374 if err != nil {
378 if skx != nil {
400 if config.ClientCAs != nil {
414 if err != nil {
438 if err != nil {
443 if err != nil {
457 if err != nil {
471 if err != nil {
506 if _, err = asn1.Unmarshal(certVerify.signature, ecdsaSig); err != nil {
514 if digest, _, err = hs.finishedHash.hashForClientCertificate(signatureAndHash, hs.masterSecret); err != nil {
527 if digest, hashFunc, err = hs.finishedHash.hashForClientCertificate(signatureAndHash, hs.masterSecret); err != nil {
532 if err != nil {
542 return nil
554 if hs.suite.aead == nil {
567 return nil
574 if err := c.in.error(); err != nil {
580 if err != nil {
593 if err != nil {
611 return nil
616 return nil
630 if err != nil {
637 return nil
653 return nil
666 if certs[i], err = x509.ParseCertificate(asn1Data); err != nil {
668 return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
685 if err != nil {
687 return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
700 return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)
703 return pub, nil
706 return nil, nil
723 if candidate == nil {