diff options
| author | cui fliter <imcusg@gmail.com> | 2023-10-12 18:08:04 +0800 |
|---|---|---|
| committer | Gopher Robot <gobot@golang.org> | 2023-10-13 17:09:47 +0000 |
| commit | a0da9c00aeb51261b9845a46fbc9878870884ab6 (patch) | |
| tree | 1d18f8a34a9dea37cb1e04dc425208f3b1376445 /src/crypto/tls | |
| parent | 14c347f5ce924b5a0f05ec5737984cfeb294d9ac (diff) | |
| download | go-a0da9c00aeb51261b9845a46fbc9878870884ab6.tar.xz | |
crypto: add available godoc link
Change-Id: Ifc669399dde7d6229c6ccdbe29611ed1f8698fb1
Reviewed-on: https://go-review.googlesource.com/c/go/+/534778
Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
Reviewed-by: Ian Lance Taylor <iant@google.com>
Run-TryBot: shuang cui <imcusg@gmail.com>
TryBot-Result: Gopher Robot <gobot@golang.org>
Auto-Submit: Ian Lance Taylor <iant@google.com>
Diffstat (limited to 'src/crypto/tls')
| -rw-r--r-- | src/crypto/tls/cipher_suites.go | 4 | ||||
| -rw-r--r-- | src/crypto/tls/common.go | 12 | ||||
| -rw-r--r-- | src/crypto/tls/conn.go | 32 | ||||
| -rw-r--r-- | src/crypto/tls/quic.go | 12 | ||||
| -rw-r--r-- | src/crypto/tls/ticket.go | 2 | ||||
| -rw-r--r-- | src/crypto/tls/tls.go | 12 |
6 files changed, 37 insertions, 37 deletions
diff --git a/src/crypto/tls/cipher_suites.go b/src/crypto/tls/cipher_suites.go index 589e8b6faf..3f976c9c58 100644 --- a/src/crypto/tls/cipher_suites.go +++ b/src/crypto/tls/cipher_suites.go @@ -45,7 +45,7 @@ var ( // CipherSuites returns a list of cipher suites currently implemented by this // package, excluding those with security issues, which are returned by -// InsecureCipherSuites. +// [InsecureCipherSuites]. // // The list is sorted by ID. Note that the default cipher suites selected by // this package might depend on logic that can't be captured by a static list, @@ -78,7 +78,7 @@ func CipherSuites() []*CipherSuite { // this package and which have security issues. // // Most applications should not use the cipher suites in this list, and should -// only use those returned by CipherSuites. +// only use those returned by [CipherSuites]. func InsecureCipherSuites() []*CipherSuite { // This list includes RC4, CBC_SHA256, and 3DES cipher suites. See // cipherSuitesPreferenceOrder for details. diff --git a/src/crypto/tls/common.go b/src/crypto/tls/common.go index e0885a0da9..656cb68650 100644 --- a/src/crypto/tls/common.go +++ b/src/crypto/tls/common.go @@ -822,7 +822,7 @@ func (c *Config) ticketKeyFromBytes(b [32]byte) (key ticketKey) { // ticket, and the lifetime we set for all tickets we send. const maxSessionTicketLifetime = 7 * 24 * time.Hour -// Clone returns a shallow clone of c or nil if c is nil. It is safe to clone a Config that is +// Clone returns a shallow clone of c or nil if c is nil. It is safe to clone a [Config] that is // being used concurrently by a TLS client or server. func (c *Config) Clone() *Config { if c == nil { @@ -1157,9 +1157,9 @@ func (c *Config) getCertificate(clientHello *ClientHelloInfo) (*Certificate, err // the client that sent the ClientHello. Otherwise, it returns an error // describing the reason for the incompatibility. // -// If this ClientHelloInfo was passed to a GetConfigForClient or GetCertificate -// callback, this method will take into account the associated Config. Note that -// if GetConfigForClient returns a different Config, the change can't be +// If this [ClientHelloInfo] was passed to a GetConfigForClient or GetCertificate +// callback, this method will take into account the associated [Config]. Note that +// if GetConfigForClient returns a different [Config], the change can't be // accounted for by this method. // // This function will call x509.ParseCertificate unless c.Leaf is set, which can @@ -1450,7 +1450,7 @@ type lruSessionCacheEntry struct { state *ClientSessionState } -// NewLRUClientSessionCache returns a ClientSessionCache with the given +// NewLRUClientSessionCache returns a [ClientSessionCache] with the given // capacity that uses an LRU strategy. If capacity is < 1, a default capacity // is used instead. func NewLRUClientSessionCache(capacity int) ClientSessionCache { @@ -1499,7 +1499,7 @@ func (c *lruSessionCache) Put(sessionKey string, cs *ClientSessionState) { c.m[sessionKey] = elem } -// Get returns the ClientSessionState value associated with a given key. It +// Get returns the [ClientSessionState] value associated with a given key. It // returns (nil, false) if no value is found. func (c *lruSessionCache) Get(sessionKey string) (*ClientSessionState, bool) { c.Lock() diff --git a/src/crypto/tls/conn.go b/src/crypto/tls/conn.go index c04bd48d6a..647e5b85b6 100644 --- a/src/crypto/tls/conn.go +++ b/src/crypto/tls/conn.go @@ -136,21 +136,21 @@ func (c *Conn) RemoteAddr() net.Addr { } // SetDeadline sets the read and write deadlines associated with the connection. -// A zero value for t means Read and Write will not time out. +// A zero value for t means [Conn.Read] and [Conn.Write] will not time out. // After a Write has timed out, the TLS state is corrupt and all future writes will return the same error. func (c *Conn) SetDeadline(t time.Time) error { return c.conn.SetDeadline(t) } // SetReadDeadline sets the read deadline on the underlying connection. -// A zero value for t means Read will not time out. +// A zero value for t means [Conn.Read] will not time out. func (c *Conn) SetReadDeadline(t time.Time) error { return c.conn.SetReadDeadline(t) } // SetWriteDeadline sets the write deadline on the underlying connection. -// A zero value for t means Write will not time out. -// After a Write has timed out, the TLS state is corrupt and all future writes will return the same error. +// A zero value for t means [Conn.Write] will not time out. +// After a [Conn.Write] has timed out, the TLS state is corrupt and all future writes will return the same error. func (c *Conn) SetWriteDeadline(t time.Time) error { return c.conn.SetWriteDeadline(t) } @@ -1173,10 +1173,10 @@ var ( // Write writes data to the connection. // -// As Write calls Handshake, in order to prevent indefinite blocking a deadline -// must be set for both Read and Write before Write is called when the handshake -// has not yet completed. See SetDeadline, SetReadDeadline, and -// SetWriteDeadline. +// As Write calls [Conn.Handshake], in order to prevent indefinite blocking a deadline +// must be set for both [Conn.Read] and Write before Write is called when the handshake +// has not yet completed. See [Conn.SetDeadline], [Conn.SetReadDeadline], and +// [Conn.SetWriteDeadline]. func (c *Conn) Write(b []byte) (int, error) { // interlock with Close below for { @@ -1348,10 +1348,10 @@ func (c *Conn) handleKeyUpdate(keyUpdate *keyUpdateMsg) error { // Read reads data from the connection. // -// As Read calls Handshake, in order to prevent indefinite blocking a deadline -// must be set for both Read and Write before Read is called when the handshake -// has not yet completed. See SetDeadline, SetReadDeadline, and -// SetWriteDeadline. +// As Read calls [Conn.Handshake], in order to prevent indefinite blocking a deadline +// must be set for both Read and [Conn.Write] before Read is called when the handshake +// has not yet completed. See [Conn.SetDeadline], [Conn.SetReadDeadline], and +// [Conn.SetWriteDeadline]. func (c *Conn) Read(b []byte) (int, error) { if err := c.Handshake(); err != nil { return 0, err @@ -1435,7 +1435,7 @@ var errEarlyCloseWrite = errors.New("tls: CloseWrite called before handshake com // CloseWrite shuts down the writing side of the connection. It should only be // called once the handshake has completed and does not call CloseWrite on the -// underlying connection. Most callers should just use Close. +// underlying connection. Most callers should just use [Conn.Close]. func (c *Conn) CloseWrite() error { if !c.isHandshakeComplete.Load() { return errEarlyCloseWrite @@ -1463,10 +1463,10 @@ func (c *Conn) closeNotify() error { // protocol if it has not yet been run. // // Most uses of this package need not call Handshake explicitly: the -// first Read or Write will call it automatically. +// first [Conn.Read] or [Conn.Write] will call it automatically. // // For control over canceling or setting a timeout on a handshake, use -// HandshakeContext or the Dialer's DialContext method instead. +// [Conn.HandshakeContext] or the [Dialer]'s DialContext method instead. // // In order to avoid denial of service attacks, the maximum RSA key size allowed // in certificates sent by either the TLS server or client is limited to 8192 @@ -1485,7 +1485,7 @@ func (c *Conn) Handshake() error { // connection. // // Most uses of this package need not call HandshakeContext explicitly: the -// first Read or Write will call it automatically. +// first [Conn.Read] or [Conn.Write] will call it automatically. func (c *Conn) HandshakeContext(ctx context.Context) error { // Delegate to unexported method for named return // without confusing documented signature. diff --git a/src/crypto/tls/quic.go b/src/crypto/tls/quic.go index ba5c2af0fb..3518169bf7 100644 --- a/src/crypto/tls/quic.go +++ b/src/crypto/tls/quic.go @@ -46,7 +46,7 @@ type QUICConn struct { sessionTicketSent bool } -// A QUICConfig configures a QUICConn. +// A QUICConfig configures a [QUICConn]. type QUICConfig struct { TLSConfig *Config } @@ -163,7 +163,7 @@ func newQUICConn(conn *Conn) *QUICConn { } // Start starts the client or server handshake protocol. -// It may produce connection events, which may be read with NextEvent. +// It may produce connection events, which may be read with [QUICConn.NextEvent]. // // Start must be called at most once. func (q *QUICConn) Start(ctx context.Context) error { @@ -182,7 +182,7 @@ func (q *QUICConn) Start(ctx context.Context) error { } // NextEvent returns the next event occurring on the connection. -// It returns an event with a Kind of QUICNoEvent when no events are available. +// It returns an event with a Kind of [QUICNoEvent] when no events are available. func (q *QUICConn) NextEvent() QUICEvent { qs := q.conn.quic if last := qs.nextEvent - 1; last >= 0 && len(qs.events[last].Data) > 0 { @@ -214,7 +214,7 @@ func (q *QUICConn) Close() error { } // HandleData handles handshake bytes received from the peer. -// It may produce connection events, which may be read with NextEvent. +// It may produce connection events, which may be read with [QUICConn.NextEvent]. func (q *QUICConn) HandleData(level QUICEncryptionLevel, data []byte) error { c := q.conn if c.in.level != level { @@ -258,7 +258,7 @@ type QUICSessionTicketOptions struct { } // SendSessionTicket sends a session ticket to the client. -// It produces connection events, which may be read with NextEvent. +// It produces connection events, which may be read with [QUICConn.NextEvent]. // Currently, it can only be called once. func (q *QUICConn) SendSessionTicket(opts QUICSessionTicketOptions) error { c := q.conn @@ -283,7 +283,7 @@ func (q *QUICConn) ConnectionState() ConnectionState { // SetTransportParameters sets the transport parameters to send to the peer. // // Server connections may delay setting the transport parameters until after -// receiving the client's transport parameters. See QUICTransportParametersRequired. +// receiving the client's transport parameters. See [QUICTransportParametersRequired]. func (q *QUICConn) SetTransportParameters(params []byte) { if params == nil { params = []byte{} diff --git a/src/crypto/tls/ticket.go b/src/crypto/tls/ticket.go index b5ae35b67e..b71e3afdb2 100644 --- a/src/crypto/tls/ticket.go +++ b/src/crypto/tls/ticket.go @@ -305,7 +305,7 @@ func (c *Conn) sessionState() (*SessionState, error) { }, nil } -// EncryptTicket encrypts a ticket with the Config's configured (or default) +// EncryptTicket encrypts a ticket with the [Config]'s configured (or default) // session ticket keys. It can be used as a [Config.WrapSession] implementation. func (c *Config) EncryptTicket(cs ConnectionState, ss *SessionState) ([]byte, error) { ticketKeys := c.ticketKeys(nil) diff --git a/src/crypto/tls/tls.go b/src/crypto/tls/tls.go index b529c70523..8509b7dc0d 100644 --- a/src/crypto/tls/tls.go +++ b/src/crypto/tls/tls.go @@ -71,7 +71,7 @@ func (l *listener) Accept() (net.Conn, error) { } // NewListener creates a Listener which accepts connections from an inner -// Listener and wraps each connection with Server. +// Listener and wraps each connection with [Server]. // The configuration config must be non-nil and must include // at least one certificate or else set GetCertificate. func NewListener(inner net.Listener, config *Config) net.Listener { @@ -109,10 +109,10 @@ func (timeoutError) Temporary() bool { return true } // handshake as a whole. // // DialWithDialer interprets a nil configuration as equivalent to the zero -// configuration; see the documentation of Config for the defaults. +// configuration; see the documentation of [Config] for the defaults. // // DialWithDialer uses context.Background internally; to specify the context, -// use Dialer.DialContext with NetDialer set to the desired dialer. +// use [Dialer.DialContext] with NetDialer set to the desired dialer. func DialWithDialer(dialer *net.Dialer, network, addr string, config *Config) (*Conn, error) { return dial(context.Background(), dialer, network, addr, config) } @@ -189,10 +189,10 @@ type Dialer struct { // Dial connects to the given network address and initiates a TLS // handshake, returning the resulting TLS connection. // -// The returned Conn, if any, will always be of type *Conn. +// The returned [Conn], if any, will always be of type *[Conn]. // // Dial uses context.Background internally; to specify the context, -// use DialContext. +// use [Dialer.DialContext]. func (d *Dialer) Dial(network, addr string) (net.Conn, error) { return d.DialContext(context.Background(), network, addr) } @@ -212,7 +212,7 @@ func (d *Dialer) netDialer() *net.Dialer { // connected, any expiration of the context will not affect the // connection. // -// The returned Conn, if any, will always be of type *Conn. +// The returned [Conn], if any, will always be of type *[Conn]. func (d *Dialer) DialContext(ctx context.Context, network, addr string) (net.Conn, error) { c, err := dial(ctx, d.netDialer(), network, addr, d.Config) if err != nil { |
