crypto/tls.clientHandshakeState.suite (field)
23 uses
crypto/tls (current package)
handshake_client.go#L38: suite *cipherSuite
handshake_client.go#L560: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_client.go#L630: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L637: if hs.suite = mutualCipherSuite(hs.hello.cipherSuites, hs.serverHello.cipherSuite); hs.suite == nil {
handshake_client.go#L642: if hs.c.config.CipherSuites == nil && !fips140tls.Required() && rsaKexCiphers[hs.suite.id] {
handshake_client.go#L646: if hs.c.config.CipherSuites == nil && !fips140tls.Required() && tdesCiphers[hs.suite.id] {
handshake_client.go#L651: hs.c.cipherSuite = hs.suite.id
handshake_client.go#L714: keyAgreement := hs.suite.ka(c.vers)
handshake_client.go#L781: hs.masterSecret = extMasterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L784: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret,
handshake_client.go#L848: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_client.go#L851: if hs.suite.cipher != nil {
handshake_client.go#L852: clientCipher = hs.suite.cipher(clientKey, clientIV, false /* not for reading */)
handshake_client.go#L853: clientHash = hs.suite.mac(clientMAC)
handshake_client.go#L854: serverCipher = hs.suite.cipher(serverKey, serverIV, true /* for reading */)
handshake_client.go#L855: serverHash = hs.suite.mac(serverMAC)
handshake_client.go#L857: clientCipher = hs.suite.aead(clientKey, clientIV)
handshake_client.go#L858: serverCipher = hs.suite.aead(serverKey, serverIV)
handshake_client.go#L920: if hs.session.cipherSuite != hs.suite.id {