crypto/tls.serverHandshakeStateTLS13.suite (field)
36 uses
crypto/tls (current package)
handshake_server_tls13.go#L35: suite *cipherSuiteTLS13
handshake_server_tls13.go#L169: hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
handshake_server_tls13.go#L170: if hs.suite != nil {
handshake_server_tls13.go#L174: if hs.suite == nil {
handshake_server_tls13.go#L178: c.cipherSuite = hs.suite.id
handshake_server_tls13.go#L179: hs.hello.cipherSuite = hs.suite.id
handshake_server_tls13.go#L180: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L357: if pskSuite == nil || pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L386: hs.earlySecret = hs.suite.extract(sessionState.secret, nil)
handshake_server_tls13.go#L387: binderKey := hs.suite.deriveSecret(hs.earlySecret, resumptionBinderLabel, nil)
handshake_server_tls13.go#L389: transcript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L400: pskBinder := hs.suite.finishedHash(binderKey, transcript)
handshake_server_tls13.go#L407: sessionState.EarlyData && sessionState.cipherSuite == hs.suite.id &&
handshake_server_tls13.go#L411: transcript := hs.suite.hash.New()
handshake_server_tls13.go#L415: earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript)
handshake_server_tls13.go#L416: c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret)
handshake_server_tls13.go#L653: earlySecret = hs.suite.extract(nil, nil)
handshake_server_tls13.go#L655: hs.handshakeSecret = hs.suite.extract(hs.sharedKey,
handshake_server_tls13.go#L656: hs.suite.deriveSecret(earlySecret, "derived", nil))
handshake_server_tls13.go#L658: clientSecret := hs.suite.deriveSecret(hs.handshakeSecret,
handshake_server_tls13.go#L660: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_server_tls13.go#L661: serverSecret := hs.suite.deriveSecret(hs.handshakeSecret,
handshake_server_tls13.go#L663: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_server_tls13.go#L669: c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
handshake_server_tls13.go#L670: c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
handshake_server_tls13.go#L778: verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
handshake_server_tls13.go#L787: hs.masterSecret = hs.suite.extract(nil,
handshake_server_tls13.go#L788: hs.suite.deriveSecret(hs.handshakeSecret, "derived", nil))
handshake_server_tls13.go#L790: hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L792: serverSecret := hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L794: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_server_tls13.go#L801: c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, serverSecret)
handshake_server_tls13.go#L815: c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
handshake_server_tls13.go#L851: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L859: c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L1033: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |