crypto/tls.clientHandshakeStateTLS13.suite (field)

28 uses

	crypto/tls (current package)
		handshake_client_tls13.go#L37: 	suite         *cipherSuiteTLS13
		handshake_client_tls13.go#L66: 	hs.transcript = hs.suite.hash.New()
		handshake_client_tls13.go#L73: 		hs.echContext.innerTranscript = hs.suite.hash.New()
		handshake_client_tls13.go#L89: 		confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L93: 		acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L94: 			hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L204: 	if hs.suite != nil && selectedSuite != hs.suite {
		handshake_client_tls13.go#L212: 	hs.suite = selectedSuite
		handshake_client_tls13.go#L213: 	c.cipherSuite = hs.suite.id
		handshake_client_tls13.go#L262: 			confTranscript := cloneHash(hs.echContext.innerTranscript, hs.suite.hash)
		handshake_client_tls13.go#L267: 			acceptConfirmation := tls13.ExpandLabel(hs.suite.hash.New,
		handshake_client_tls13.go#L268: 				hkdf.Extract(hs.suite.hash.New, hs.echContext.innerHello.random, nil),
		handshake_client_tls13.go#L344: 		if pskSuite.hash == hs.suite.hash {
		handshake_client_tls13.go#L349: 			transcript := hs.suite.hash.New()
		handshake_client_tls13.go#L356: 			if err := computeAndUpdatePSK(hello, hs.binderKey, transcript, hs.suite.finishedHash); err != nil {
		handshake_client_tls13.go#L459: 	if pskSuite.hash != hs.suite.hash {
		handshake_client_tls13.go#L511: 		earlySecret = tls13.NewEarlySecret(hs.suite.hash.New, nil)
		handshake_client_tls13.go#L517: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, clientSecret)
		handshake_client_tls13.go#L519: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelHandshake, serverSecret)
		handshake_client_tls13.go#L525: 		c.quicSetWriteSecret(QUICEncryptionLevelHandshake, hs.suite.id, clientSecret)
		handshake_client_tls13.go#L526: 		c.quicSetReadSecret(QUICEncryptionLevelHandshake, hs.suite.id, serverSecret)
		handshake_client_tls13.go#L720: 	expectedMAC := hs.suite.finishedHash(c.in.trafficSecret, hs.transcript)
		handshake_client_tls13.go#L734: 	c.in.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, serverSecret)
		handshake_client_tls13.go#L747: 	c.ekm = hs.suite.exportKeyingMaterial(hs.masterSecret, hs.transcript)
		handshake_client_tls13.go#L830: 		verifyData: hs.suite.finishedHash(c.out.trafficSecret, hs.transcript),
		handshake_client_tls13.go#L837: 	c.out.setTrafficSecret(hs.suite, QUICEncryptionLevelApplication, hs.trafficSecret)
		handshake_client_tls13.go#L847: 		c.quicSetWriteSecret(QUICEncryptionLevelApplication, hs.suite.id, hs.trafficSecret)