crypto/tls.serverHandshakeStateTLS13.c (field)

25 uses

	crypto/tls (current package)
		handshake_server.go#L50: 			c:           c,
		handshake_server_tls13.go#L28: 	c               *Conn
		handshake_server_tls13.go#L48: 	c := hs.c
		handshake_server_tls13.go#L93: 	c := hs.c
		handshake_server_tls13.go#L295: 	c := hs.c
		handshake_server_tls13.go#L463: 	c := hs.c
		handshake_server_tls13.go#L499: 	if hs.c.quic != nil {
		handshake_server_tls13.go#L507: 	return hs.c.writeChangeCipherRecord()
		handshake_server_tls13.go#L511: 	c := hs.c
		handshake_server_tls13.go#L533: 	if _, err := hs.c.writeHandshakeRecord(helloRetryRequest, hs.transcript); err != nil {
		handshake_server_tls13.go#L638: 	c := hs.c
		handshake_server_tls13.go#L643: 	if _, err := hs.c.writeHandshakeRecord(hs.hello, hs.transcript); err != nil {
		handshake_server_tls13.go#L696: 	if _, err := hs.c.writeHandshakeRecord(encryptedExtensions, hs.transcript); err != nil {
		handshake_server_tls13.go#L704: 	return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
		handshake_server_tls13.go#L708: 	c := hs.c
		handshake_server_tls13.go#L725: 		if _, err := hs.c.writeHandshakeRecord(certReq, hs.transcript); err != nil {
		handshake_server_tls13.go#L736: 	if _, err := hs.c.writeHandshakeRecord(certMsg, hs.transcript); err != nil {
		handshake_server_tls13.go#L767: 	if _, err := hs.c.writeHandshakeRecord(certVerifyMsg, hs.transcript); err != nil {
		handshake_server_tls13.go#L775: 	c := hs.c
		handshake_server_tls13.go#L781: 	if _, err := hs.c.writeHandshakeRecord(finished, hs.transcript); err != nil {
		handshake_server_tls13.go#L830: 	if hs.c.config.SessionTicketsDisabled {
		handshake_server_tls13.go#L835: 	if hs.c.quic != nil {
		handshake_server_tls13.go#L849: 	c := hs.c
		handshake_server_tls13.go#L925: 	c := hs.c
		handshake_server_tls13.go#L1014: 	c := hs.c