crypto/tls.Conn.vers (field)
74 uses
crypto/tls (current package)
conn.go#L42: vers uint16 // TLS version
conn.go#L652: expectedVers := c.vers
conn.go#L673: if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
conn.go#L706: if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
conn.go#L724: if c.vers == VersionTLS13 {
conn.go#L759: if c.vers == VersionTLS13 {
conn.go#L931: if c.vers == VersionTLS13 {
conn.go#L1016: vers := c.vers
conn.go#L1043: if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
conn.go#L1134: if c.vers == VersionTLS13 {
conn.go#L1140: if c.vers == VersionTLS13 {
conn.go#L1146: if c.vers == VersionTLS13 {
conn.go#L1150: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1163: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1245: if len(b) > 1 && c.vers == VersionTLS10 {
conn.go#L1261: if c.vers == VersionTLS13 {
conn.go#L1307: if c.vers != VersionTLS13 {
conn.go#L1630: state.Version = c.vers
conn.go#L1643: if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
conn.go#L1652: } else if c.vers != VersionTLS13 && !c.extMasterSecret {
handshake_client.go#L349: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L350: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L355: if c.vers == VersionTLS13 {
handshake_client.go#L535: c.vers = vers
handshake_client.go#L566: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_client.go#L636: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L720: keyAgreement := hs.suite.ka(c.vers)
handshake_client.go#L746: cri := certificateRequestInfoFromMsg(hs.ctx, c.vers, certReq)
handshake_client.go#L788: hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L795: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L814: if c.vers >= VersionTLS12 {
handshake_client.go#L815: signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
handshake_client.go#L863: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_client.go#L876: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client.go#L877: c.out.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_client.go#L943: if hs.session.version != c.vers {
handshake_client_tls13.go#L680: if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) ||
handshake_client_tls13.go#L681: !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, signatureSchemesForPublicKey(c.vers, c.peerCertificates[0].PublicKey)) {
handshake_client_tls13.go#L773: Version: c.vers,
handshake_client_tls13.go#L798: certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
handshake_server.go#L48: if c.vers == VersionTLS13 {
handshake_server.go#L127: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L190: c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
handshake_server.go#L196: c.in.version = c.vers
handshake_server.go#L197: c.out.version = c.vers
handshake_server.go#L206: if c.vers != VersionTLS13 && (ech != nil && !ech.inner) {
handshake_server.go#L211: if c.config.MinVersion == 0 && c.vers < VersionTLS12 {
handshake_server.go#L223: hs.hello.vers = c.vers
handshake_server.go#L243: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L244: if c.vers == VersionTLS12 {
handshake_server.go#L290: hs.ecdheOk, err = supportsECDHE(c.config, c.vers, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
handshake_server.go#L447: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L492: if c.vers != sessionState.version {
handshake_server.go#L569: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_server.go#L604: hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
handshake_server.go#L631: keyAgreement := hs.suite.ka(c.vers)
handshake_server.go#L655: if c.vers >= VersionTLS12 {
handshake_server.go#L657: certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms(c.vers)
handshake_server.go#L726: preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
handshake_server.go#L733: hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_server.go#L740: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_server.go#L770: if c.vers >= VersionTLS12 {
handshake_server.go#L812: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_server.go#L827: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server.go#L828: c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_server.go#L946: if c.vers == VersionTLS13 {
handshake_server_tls13.go#L115: hs.hello.supportedVersion = c.vers
handshake_server_tls13.go#L135: if c.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server_tls13.go#L209: preferredGroups := c.config.curvePreferences(c.vers)
handshake_server_tls13.go#L521: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
handshake_server_tls13.go#L851: certReq.supportedSignatureAlgorithms = supportedSignatureAlgorithms(c.vers)
handshake_server_tls13.go#L1105: if !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, supportedSignatureAlgorithms(c.vers)) ||
handshake_server_tls13.go#L1106: !isSupportedSignatureAlgorithm(certVerify.signatureAlgorithm, signatureSchemesForPublicKey(c.vers, c.peerCertificates[0].PublicKey)) {
ticket.go#L300: version: c.vers,