crypto/tls.Conn.vers (field)
63 uses
crypto/tls (current package)
conn.go#L41: vers uint16 // TLS version
conn.go#L650: expectedVers := c.vers
conn.go#L671: if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
conn.go#L704: if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
conn.go#L722: if c.vers == VersionTLS13 {
conn.go#L748: if c.vers == VersionTLS13 {
conn.go#L920: if c.vers == VersionTLS13 {
conn.go#L1005: vers := c.vers
conn.go#L1032: if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
conn.go#L1111: if c.vers == VersionTLS13 {
conn.go#L1117: if c.vers == VersionTLS13 {
conn.go#L1123: if c.vers == VersionTLS13 {
conn.go#L1127: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1140: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1222: if len(b) > 1 && c.vers == VersionTLS10 {
conn.go#L1238: if c.vers == VersionTLS13 {
conn.go#L1284: if c.vers != VersionTLS13 {
conn.go#L1605: state.Version = c.vers
conn.go#L1615: if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
handshake_client.go#L244: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L245: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L250: if c.vers == VersionTLS13 {
handshake_client.go#L429: c.vers = vers
handshake_client.go#L447: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_client.go#L517: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L592: keyAgreement := hs.suite.ka(c.vers)
handshake_client.go#L614: cri := certificateRequestInfoFromMsg(hs.ctx, c.vers, certReq)
handshake_client.go#L656: hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L659: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L678: if c.vers >= VersionTLS12 {
handshake_client.go#L679: signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
handshake_client.go#L723: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_client.go#L736: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client.go#L737: c.out.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_client.go#L790: if hs.session.version != c.vers {
handshake_client_tls13.go#L637: Version: c.vers,
handshake_client_tls13.go#L662: certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
handshake_server.go#L47: if c.vers == VersionTLS13 {
handshake_server.go#L125: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L162: c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
handshake_server.go#L168: c.in.version = c.vers
handshake_server.go#L169: c.out.version = c.vers
handshake_server.go#L178: hs.hello.vers = c.vers
handshake_server.go#L198: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L199: if c.vers == VersionTLS12 {
handshake_server.go#L398: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L443: if c.vers != sessionState.version {
handshake_server.go#L515: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_server.go#L546: hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
handshake_server.go#L573: keyAgreement := hs.suite.ka(c.vers)
handshake_server.go#L593: if c.vers >= VersionTLS12 {
handshake_server.go#L664: preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
handshake_server.go#L671: hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_server.go#L674: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_server.go#L704: if c.vers >= VersionTLS12 {
handshake_server.go#L741: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_server.go#L756: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server.go#L757: c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_server.go#L877: if c.vers == VersionTLS13 {
handshake_server_tls13.go#L98: hs.hello.supportedVersion = c.vers
handshake_server_tls13.go#L118: if c.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server_tls13.go#L444: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
ticket.go#L294: version: c.vers,
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |