crypto/tls.serverHandshakeStateTLS13.suite (field)
36 uses
crypto/tls (current package)
handshake_server_tls13.go#L33: suite *cipherSuiteTLS13
handshake_server_tls13.go#L167: hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
handshake_server_tls13.go#L168: if hs.suite != nil {
handshake_server_tls13.go#L172: if hs.suite == nil {
handshake_server_tls13.go#L176: c.cipherSuite = hs.suite.id
handshake_server_tls13.go#L177: hs.hello.cipherSuite = hs.suite.id
handshake_server_tls13.go#L178: hs.transcript = hs.suite.hash.New()
handshake_server_tls13.go#L323: if pskSuite == nil || pskSuite.hash != hs.suite.hash {
handshake_server_tls13.go#L346: hs.earlySecret = hs.suite.extract(sessionState.secret, nil)
handshake_server_tls13.go#L347: binderKey := hs.suite.deriveSecret(hs.earlySecret, resumptionBinderLabel, nil)
handshake_server_tls13.go#L349: transcript := cloneHash(hs.transcript, hs.suite.hash)
handshake_server_tls13.go#L360: pskBinder := hs.suite.finishedHash(binderKey, transcript)
handshake_server_tls13.go#L367: sessionState.EarlyData && sessionState.cipherSuite == hs.suite.id &&
handshake_server_tls13.go#L371: transcript := hs.suite.hash.New()
handshake_server_tls13.go#L375: earlyTrafficSecret := hs.suite.deriveSecret(hs.earlySecret, clientEarlyTrafficLabel, transcript)
handshake_server_tls13.go#L376: c.quicSetReadSecret(QUICEncryptionLevelEarly, hs.suite.id, earlyTrafficSecret)
handshake_server_tls13.go#L606: earlySecret = hs.suite.extract(nil, nil)
handshake_server_tls13.go#L608: hs.handshakeSecret = hs.suite.extract(hs.sharedKey,
handshake_server_tls13.go#L609: hs.suite.deriveSecret(earlySecret, "derived", nil))
handshake_server_tls13.go#L611: clientSecret := hs.suite.deriveSecret(hs.handshakeSecret,
handshake_server_tls13.go#L613: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
handshake_server_tls13.go#L614: serverSecret := hs.suite.deriveSecret(hs.handshakeSecret,
handshake_server_tls13.go#L616: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
handshake_server_tls13.go#L622: c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
handshake_server_tls13.go#L623: c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
handshake_server_tls13.go#L731: verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
handshake_server_tls13.go#L740: hs.masterSecret = hs.suite.extract(nil,
handshake_server_tls13.go#L741: hs.suite.deriveSecret(hs.handshakeSecret, "derived", nil))
handshake_server_tls13.go#L743: hs.trafficSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L745: serverSecret := hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L747: c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
handshake_server_tls13.go#L754: c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, serverSecret)
handshake_server_tls13.go#L768: c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
handshake_server_tls13.go#L804: hs.clientFinished = hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
handshake_server_tls13.go#L812: c.resumptionSecret = hs.suite.deriveSecret(hs.masterSecret,
handshake_server_tls13.go#L988: c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |