crypto/tls.Conn.vers (field)
64 uses
crypto/tls (current package)
conn.go#L40: vers uint16 // TLS version
conn.go#L639: if c.haveVers && c.vers != VersionTLS13 && vers != c.vers {
conn.go#L641: msg := fmt.Sprintf("received record with version %x when expecting version %x", vers, c.vers)
conn.go#L653: if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
conn.go#L686: if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
conn.go#L701: if c.vers == VersionTLS13 {
conn.go#L727: if c.vers == VersionTLS13 {
conn.go#L895: if c.vers == VersionTLS13 {
conn.go#L967: vers := c.vers
conn.go#L994: if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
conn.go#L1042: if c.vers == VersionTLS13 {
conn.go#L1048: if c.vers == VersionTLS13 {
conn.go#L1054: if c.vers == VersionTLS13 {
conn.go#L1058: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1071: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1148: if len(b) > 1 && c.vers == VersionTLS10 {
conn.go#L1164: if c.vers == VersionTLS13 {
conn.go#L1210: if c.vers != VersionTLS13 {
conn.go#L1478: state.Version = c.vers
conn.go#L1488: if !c.didResume && c.vers != VersionTLS13 {
handshake_client.go#L200: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L201: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L206: if c.vers == VersionTLS13 {
handshake_client.go#L371: c.vers = vers
handshake_client.go#L389: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_client.go#L452: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L529: keyAgreement := hs.suite.ka(c.vers)
handshake_client.go#L553: cri := certificateRequestInfoFromMsg(hs.ctx, c.vers, certReq)
handshake_client.go#L607: if c.vers >= VersionTLS12 {
handshake_client.go#L608: signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
handshake_client.go#L644: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L659: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_client.go#L672: c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_client.go#L673: c.out.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_client.go#L726: if hs.session.vers != c.vers {
handshake_client.go#L814: vers: c.vers,
handshake_client_tls13.go#L553: Version: c.vers,
handshake_client_tls13.go#L579: certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
handshake_client_tls13.go#L665: vers: c.vers,
handshake_server.go#L48: if c.vers == VersionTLS13 {
handshake_server.go#L124: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L159: c.vers, ok = c.config.mutualVersion(roleServer, clientVersions)
handshake_server.go#L165: c.in.version = c.vers
handshake_server.go#L166: c.out.version = c.vers
handshake_server.go#L175: hs.hello.vers = c.vers
handshake_server.go#L195: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L196: if c.vers == VersionTLS12 {
handshake_server.go#L383: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L413: if c.vers != hs.sessionState.vers {
handshake_server.go#L457: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_server.go#L493: hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
handshake_server.go#L521: keyAgreement := hs.suite.ka(c.vers)
handshake_server.go#L542: if c.vers >= VersionTLS12 {
handshake_server.go#L617: preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
handshake_server.go#L622: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L647: if c.vers >= VersionTLS12 {
handshake_server.go#L682: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_server.go#L697: c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
handshake_server.go#L698: c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
handshake_server.go#L755: vers: c.vers,
handshake_server_tls13.go#L93: hs.hello.supportedVersion = c.vers
handshake_server_tls13.go#L113: if c.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server_tls13.go#L371: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)