Home | History | Annotate | Download | only in tls

Lines Matching defs:tls

5 package tls
38 // serverHandshake performs a TLS handshake as a server.
53 // For an overview of TLS handshaking, see https://tools.ietf.org/html/rfc5246#section-7.3
140 return false, fmt.Errorf("tls: client offered an unsupported, maximum protocol version of %x", hs.clientHello.vers)
178 return false, errors.New("tls: client does not support uncompressed connections")
191 return false, errors.New("tls: initial handshake had non-empty renegotiation extension")
233 return false, fmt.Errorf("tls: unsupported signing key type (%T)", priv.Public())
242 return false, fmt.Errorf("tls: unsupported decryption key type (%T)", priv.Public())
267 return false, errors.New("tls: no cipher suite supported by both client and server")
276 return false, errors.New("tls: client using inappropriate protocol fallback")
299 // Never resume a session for a different TLS version.
470 return errors.New("tls: client didn't provide a certificate")
527 return errors.New("tls: unsupported hash function for client certificate")
531 // Before TLS 1.2 the signature algorithm was implicit
546 err = errors.New("tls: bad signature type for client's ECDSA certificate")
554 err = errors.New("tls: ECDSA signature contained zero or negative values")
562 tls: ECDSA verification failure")
566 err = errors.New("tls: bad signature type for client's RSA certificate")
578 return errors.New("tls: could not validate signature of connection nonces: " + err.Error())
650 return errors.New("tls: client's Finished message is incorrect")
718 return nil, errors.New("tls: failed to parse client certificate: " + err.Error())
737 return nil, errors.New("tls: failed to verify client's certificate: " + err.Error())
760 return nil, fmt.Errorf("tls: client's certificate contains an unsupported public key of type %T", certs[0].PublicKey)