crypto/tls.clientHandshakeState.suite (field)

23 uses

	crypto/tls (current package)
		handshake_client.go#L35: 	suite        *cipherSuite
		handshake_client.go#L547: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_client.go#L617: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L624: 	if hs.suite = mutualCipherSuite(hs.hello.cipherSuites, hs.serverHello.cipherSuite); hs.suite == nil {
		handshake_client.go#L629: 	if hs.c.config.CipherSuites == nil && !needFIPS() && rsaKexCiphers[hs.suite.id] {
		handshake_client.go#L633: 	if hs.c.config.CipherSuites == nil && !needFIPS() && tdesCiphers[hs.suite.id] {
		handshake_client.go#L638: 	hs.c.cipherSuite = hs.suite.id
		handshake_client.go#L701: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_client.go#L768: 		hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_client.go#L771: 		hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_client.go#L835: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_client.go#L838: 	if hs.suite.cipher != nil {
		handshake_client.go#L839: 		clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
		handshake_client.go#L840: 		clientHash = hs.suite.mac(clientMAC)
		handshake_client.go#L841: 		serverCipher = hs.suite.cipher(serverKey, serverIV, true /* for reading */)
		handshake_client.go#L842: 		serverHash = hs.suite.mac(serverMAC)
		handshake_client.go#L844: 		clientCipher = hs.suite.aead(clientKey, clientIV)
		handshake_client.go#L845: 		serverCipher = hs.suite.aead(serverKey, serverIV)
		handshake_client.go#L907: 	if hs.session.cipherSuite != hs.suite.id {