crypto/tls.clientHandshakeStateTLS13.suite (field)

37 uses

	crypto/tls (current package)
		handshake_client_tls13.go#L35: 	suite         *cipherSuiteTLS13
		handshake_client_tls13.go#L68: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L75: 		hs.echContext.innerTranscript = hs.suite.hash.New()
		handshake_client_tls13.go#L92: 		confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L96: 		acceptConfirmation := hs.suite.expandLabel(
		handshake_client_tls13.go#L97: 			hs.suite.extract(hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L210: 	if hs.suite != nil && selectedSuite != hs.suite {
		handshake_client_tls13.go#L218: 	hs.suite = selectedSuite
		handshake_client_tls13.go#L219: 	c.cipherSuite = hs.suite.id
		handshake_client_tls13.go#L268: 			confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L273: 			acceptConfirmation := hs.suite.expandLabel(
		handshake_client_tls13.go#L274: 				hs.suite.extract(hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L351: 		if pskSuite.hash == hs.suite.hash {
		handshake_client_tls13.go#L356: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L363: 			if err := computeAndUpdatePSK(hello, hs.binderKey, transcript, hs.suite.finishedHash); err != nil {
		handshake_client_tls13.go#L466: 	if pskSuite.hash != hs.suite.hash {
		handshake_client_tls13.go#L518: 		earlySecret = hs.suite.extract(nil, nil)
		handshake_client_tls13.go#L521: 	handshakeSecret := hs.suite.extract(sharedKey,
		handshake_client_tls13.go#L522: 		hs.suite.deriveSecret(earlySecret, "derived", nil))
		handshake_client_tls13.go#L524: 	clientSecret := hs.suite.deriveSecret(handshakeSecret,
		handshake_client_tls13.go#L526: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_client_tls13.go#L527: 	serverSecret := hs.suite.deriveSecret(handshakeSecret,
		handshake_client_tls13.go#L529: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_client_tls13.go#L535: 		c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
		handshake_client_tls13.go#L536: 		c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
		handshake_client_tls13.go#L550: 	hs.masterSecret = hs.suite.extract(nil,
		handshake_client_tls13.go#L551: 		hs.suite.deriveSecret(handshakeSecret, "derived", nil))
		handshake_client_tls13.go#L727: 	expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_client_tls13.go#L739: 	hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_client_tls13.go#L741: 	serverSecret := hs.suite.deriveSecret(hs.masterSecret,
		handshake_client_tls13.go#L743: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_client_tls13.go#L756: 	c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
		handshake_client_tls13.go#L839: 		verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
		handshake_client_tls13.go#L846: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
		handshake_client_tls13.go#L849: 		c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_client_tls13.go#L857: 		c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, hs.trafficSecret)