crypto/tls.clientHandshakeStateTLS13.suite (field)
37 uses
crypto/tls (current package)
handshake_client_tls13.go#L35: suite *cipherSuiteTLS13
handshake_client_tls13.go#L68: hs.transcript = hs.suite.hash.New()
handshake_client_tls13.go#L75: hs.echContext.innerTranscript = hs.suite.hash.New()
handshake_client_tls13.go#L92: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L96: acceptConfirmation := hs.suite.expandLabel(
handshake_client_tls13.go#L97: hs.suite.extract(hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L210: if hs.suite != nil && selectedSuite != hs.suite {
handshake_client_tls13.go#L218: hs.suite = selectedSuite
handshake_client_tls13.go#L219: c.cipherSuite = hs.suite.id
handshake_client_tls13.go#L268: confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
handshake_client_tls13.go#L273: acceptConfirmation := hs.suite.expandLabel(
handshake_client_tls13.go#L274: hs.suite.extract(hs.echContext.innerHello.random, nil),
handshake_client_tls13.go#L351: if pskSuite.hash == hs.suite.hash {
handshake_client_tls13.go#L356: transcript := hs.suite.hash.New()
handshake_client_tls13.go#L363: if err := computeAndUpdatePSK(hello, hs.binderKey, transcript, hs.suite.finishedHash); err != nil {
handshake_client_tls13.go#L466: if pskSuite.hash != hs.suite.hash {
handshake_client_tls13.go#L518: earlySecret = hs.suite.extract(nil, nil)
handshake_client_tls13.go#L521: handshakeSecret := hs.suite.extract(sharedKey,
handshake_client_tls13.go#L522: hs.suite.deriveSecret(earlySecret, "derived", nil))
handshake_client_tls13.go#L524: clientSecret := hs.suite.deriveSecret(handshakeSecret,
handshake_client_tls13.go#L526: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_client_tls13.go#L527: serverSecret := hs.suite.deriveSecret(handshakeSecret,
handshake_client_tls13.go#L529: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_client_tls13.go#L535: c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
handshake_client_tls13.go#L536: c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
handshake_client_tls13.go#L550: hs.masterSecret = hs.suite.extract(nil,
handshake_client_tls13.go#L551: hs.suite.deriveSecret(handshakeSecret, "derived", nil))
handshake_client_tls13.go#L727: expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_client_tls13.go#L739: hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_client_tls13.go#L741: serverSecret := hs.suite.deriveSecret(hs.masterSecret,
handshake_client_tls13.go#L743: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_client_tls13.go#L756: c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
handshake_client_tls13.go#L839: verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
handshake_client_tls13.go#L846: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
handshake_client_tls13.go#L849: c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_client_tls13.go#L857: c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, hs.trafficSecret)
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |