crypto/tls.serverHandshakeStateTLS13.c (field)
27 uses
crypto/tls (current package)
handshake_server.go#L51: c: c,
handshake_server_tls13.go#L45: c *Conn
handshake_server_tls13.go#L66: c := hs.c
handshake_server_tls13.go#L107: c := hs.c
handshake_server_tls13.go#L330: c := hs.c
handshake_server_tls13.go#L498: c := hs.c
handshake_server_tls13.go#L534: if hs.c.quic != nil {
handshake_server_tls13.go#L542: return hs.c.writeChangeCipherRecord()
handshake_server_tls13.go#L546: c := hs.c
handshake_server_tls13.go#L584: if _, err := hs.c.writeHandshakeRecord(helloRetryRequest, hs.transcript); err != nil {
handshake_server_tls13.go#L728: c := hs.c
handshake_server_tls13.go#L751: if _, err := hs.c.writeHandshakeRecord(hs.hello, hs.transcript); err != nil {
handshake_server_tls13.go#L803: if len(hs.c.config.EncryptedClientHelloKeys) > 0 && len(hs.clientHello.encryptedClientHello) > 0 && hs.echContext == nil {
handshake_server_tls13.go#L804: encryptedExtensions.echRetryConfigs, err = buildRetryConfigList(hs.c.config.EncryptedClientHelloKeys)
handshake_server_tls13.go#L811: if _, err := hs.c.writeHandshakeRecord(encryptedExtensions, hs.transcript); err != nil {
handshake_server_tls13.go#L819: return hs.c.config.ClientAuth >= RequestClientCert && !hs.usingPSK
handshake_server_tls13.go#L823: c := hs.c
handshake_server_tls13.go#L840: if _, err := hs.c.writeHandshakeRecord(certReq, hs.transcript); err != nil {
handshake_server_tls13.go#L851: if _, err := hs.c.writeHandshakeRecord(certMsg, hs.transcript); err != nil {
handshake_server_tls13.go#L882: if _, err := hs.c.writeHandshakeRecord(certVerifyMsg, hs.transcript); err != nil {
handshake_server_tls13.go#L890: c := hs.c
handshake_server_tls13.go#L896: if _, err := hs.c.writeHandshakeRecord(finished, hs.transcript); err != nil {
handshake_server_tls13.go#L942: if hs.c.config.SessionTicketsDisabled {
handshake_server_tls13.go#L947: if hs.c.quic != nil {
handshake_server_tls13.go#L961: c := hs.c
handshake_server_tls13.go#L1036: c := hs.c
handshake_server_tls13.go#L1125: c := hs.c