crypto/tls.serverHandshakeStateTLS13.suite (field)

36 uses

	crypto/tls (current package)
		handshake_server_tls13.go#L33: 	suite           *cipherSuiteTLS13
		handshake_server_tls13.go#L167: 		hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
		handshake_server_tls13.go#L168: 		if hs.suite != nil {
		handshake_server_tls13.go#L172: 	if hs.suite == nil {
		handshake_server_tls13.go#L176: 	c.cipherSuite = hs.suite.id
		handshake_server_tls13.go#L177: 	hs.hello.cipherSuite = hs.suite.id
		handshake_server_tls13.go#L178: 	hs.transcript = hs.suite.hash.New()
		handshake_server_tls13.go#L323: 		if pskSuite == nil || pskSuite.hash != hs.suite.hash {
		handshake_server_tls13.go#L346: 		hs.earlySecret = hs.suite.extract(sessionState.secret, nil)
		handshake_server_tls13.go#L347: 		binderKey := hs.suite.deriveSecret(hs.earlySecret, resumptionBinderLabel, nil)
		handshake_server_tls13.go#L349: 		transcript := cloneHash(hs.transcript, hs.suite.hash)
		handshake_server_tls13.go#L360: 		pskBinder := hs.suite.finishedHash(binderKey, transcript)
		handshake_server_tls13.go#L367: 			sessionState.EarlyData && sessionState.cipherSuite == hs.suite.id &&
		handshake_server_tls13.go#L371: 			transcript := hs.suite.hash.New()
		handshake_server_tls13.go#L375: 			earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript)
		handshake_server_tls13.go#L376: 			c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret)
		handshake_server_tls13.go#L606: 		earlySecret = hs.suite.extract(nil, nil)
		handshake_server_tls13.go#L608: 	hs.handshakeSecret = hs.suite.extract(hs.sharedKey,
		handshake_server_tls13.go#L609: 		hs.suite.deriveSecret(earlySecret, "derived", nil))
		handshake_server_tls13.go#L611: 	clientSecret := hs.suite.deriveSecret(hs.handshakeSecret,
		handshake_server_tls13.go#L613: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_server_tls13.go#L614: 	serverSecret := hs.suite.deriveSecret(hs.handshakeSecret,
		handshake_server_tls13.go#L616: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_server_tls13.go#L622: 		c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
		handshake_server_tls13.go#L623: 		c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
		handshake_server_tls13.go#L731: 		verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
		handshake_server_tls13.go#L740: 	hs.masterSecret = hs.suite.extract(nil,
		handshake_server_tls13.go#L741: 		hs.suite.deriveSecret(hs.handshakeSecret, "derived", nil))
		handshake_server_tls13.go#L743: 	hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L745: 	serverSecret := hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L747: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_server_tls13.go#L754: 		c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, serverSecret)
		handshake_server_tls13.go#L768: 	c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
		handshake_server_tls13.go#L804: 	hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_server_tls13.go#L812: 	c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
		handshake_server_tls13.go#L988: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)