crypto/tls.Conn.vers (field)

68 uses

	crypto/tls (current package)
		conn.go#L42: 	vers           uint16  // TLS version
		conn.go#L654: 	expectedVers := c.vers
		conn.go#L675: 	if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
		conn.go#L708: 	if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
		conn.go#L726: 		if c.vers == VersionTLS13 {
		conn.go#L752: 		if c.vers == VersionTLS13 {
		conn.go#L924: 	if c.vers == VersionTLS13 {
		conn.go#L1009: 		vers := c.vers
		conn.go#L1036: 	if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
		conn.go#L1127: 		if c.vers == VersionTLS13 {
		conn.go#L1133: 		if c.vers == VersionTLS13 {
		conn.go#L1139: 		if c.vers == VersionTLS13 {
		conn.go#L1143: 				hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1156: 			hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1238: 	if len(b) > 1 && c.vers == VersionTLS10 {
		conn.go#L1254: 	if c.vers == VersionTLS13 {
		conn.go#L1300: 	if c.vers != VersionTLS13 {
		conn.go#L1623: 	state.Version = c.vers
		conn.go#L1636: 	if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
		conn.go#L1645: 	} else if c.vers != VersionTLS13 && !c.extMasterSecret {
		handshake_client.go#L361: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L362: 		maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
		handshake_client.go#L367: 	if c.vers == VersionTLS13 {
		handshake_client.go#L542: 	c.vers = vers
		handshake_client.go#L560: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_client.go#L630: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L714: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_client.go#L739: 		cri := certificateRequestInfoFromMsg(hs.ctx, c.vers, certReq)
		handshake_client.go#L781: 		hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_client.go#L784: 		hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_client.go#L803: 		if c.vers >= VersionTLS12 {
		handshake_client.go#L804: 			signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
		handshake_client.go#L848: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_client.go#L861: 	c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_client.go#L862: 	c.out.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_client.go#L915: 	if hs.session.version != c.vers {
		handshake_client_tls13.go#L769: 		Version:          c.vers,
		handshake_client_tls13.go#L794: 	certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
		handshake_server.go#L49: 	if c.vers == VersionTLS13 {
		handshake_server.go#L128: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L175: 	c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
		handshake_server.go#L181: 	c.in.version = c.vers
		handshake_server.go#L182: 	c.out.version = c.vers
		handshake_server.go#L191: 	if c.vers != VersionTLS13 && (ech != nil && !ech.inner) {
		handshake_server.go#L196: 	if c.config.MinVersion == 0 && c.vers < VersionTLS12 {
		handshake_server.go#L208: 	hs.hello.vers = c.vers
		handshake_server.go#L228: 	if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
		handshake_server.go#L229: 		if c.vers == VersionTLS12 {
		handshake_server.go#L275: 	hs.ecdheOk = supportsECDHE(c.config, c.vers, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
		handshake_server.go#L437: 	if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		handshake_server.go#L482: 	if c.vers != sessionState.version {
		handshake_server.go#L554: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_server.go#L585: 	hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
		handshake_server.go#L612: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_server.go#L635: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L706: 	preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
		handshake_server.go#L713: 		hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_server.go#L716: 		hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
		handshake_server.go#L746: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L783: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_server.go#L798: 	c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_server.go#L799: 	c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_server.go#L917: 		if c.vers == VersionTLS13 {
		handshake_server_tls13.go#L114: 	hs.hello.supportedVersion = c.vers
		handshake_server_tls13.go#L134: 			if c.vers < c.config.maxSupportedVersion(roleServer) {
		handshake_server_tls13.go#L207: 	preferredGroups := c.config.curvePreferences(c.vers)
		handshake_server_tls13.go#L519: 	hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
		ticket.go#L295: 		version:           c.vers,