crypto/tls.serverHandshakeStateTLS13.suite (field)

36 uses

	crypto/tls (current package)
		handshake_server_tls13.go#L35: 	suite           *cipherSuiteTLS13
		handshake_server_tls13.go#L169: 		hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
		handshake_server_tls13.go#L170: 		if hs.suite != nil {
		handshake_server_tls13.go#L174: 	if hs.suite == nil {
		handshake_server_tls13.go#L178: 	c.cipherSuite = hs.suite.id
		handshake_server_tls13.go#L179: 	hs.hello.cipherSuite = hs.suite.id
		handshake_server_tls13.go#L180: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L357: 		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L386: 		hs.earlySecret = hs.suite.extract(sessionState.secret, nil)
		handshake_server_tls13.go#L387: 		binderKey := hs.suite.deriveSecret(hs.earlySecret, resumptionBinderLabel, nil)
		handshake_server_tls13.go#L389: 		transcript := cloneHash(hs.transcript, hs.suite.hash)
		handshake_server_tls13.go#L400: 		pskBinder := hs.suite.finishedHash(binderKey, transcript)
		handshake_server_tls13.go#L407: 			sessionState.EarlyData && sessionState.cipherSuite == hs.suite.id &&
		handshake_server_tls13.go#L411: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L415: 			earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript)
		handshake_server_tls13.go#L416: 			c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret)
		handshake_server_tls13.go#L653: 		earlySecret = hs.suite.extract(nil, nil)
		handshake_server_tls13.go#L655: 	hs.handshakeSecret = hs.suite.extract(hs.sharedKey,
		handshake_server_tls13.go#L656: 		hs.suite.deriveSecret(earlySecret, "derived", nil))
		handshake_server_tls13.go#L658: 	clientSecret := hs.suite.deriveSecret(hs.handshakeSecret,
		handshake_server_tls13.go#L660: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_server_tls13.go#L661: 	serverSecret := hs.suite.deriveSecret(hs.handshakeSecret,
		handshake_server_tls13.go#L663: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_server_tls13.go#L669: 		c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
		handshake_server_tls13.go#L670: 		c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
		handshake_server_tls13.go#L778: 		verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
		handshake_server_tls13.go#L787: 	hs.masterSecret = hs.suite.extract(nil,
		handshake_server_tls13.go#L788: 		hs.suite.deriveSecret(hs.handshakeSecret, "derived", nil))
		handshake_server_tls13.go#L790: 	hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L792: 	serverSecret := hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L794: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_server_tls13.go#L801: 		c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, serverSecret)
		handshake_server_tls13.go#L815: 	c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
		handshake_server_tls13.go#L851: 	hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_server_tls13.go#L859: 	c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L1033: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)