crypto/tls.serverHandshakeState.suite (field)

26 uses

	crypto/tls (current package)
		handshake_server.go#L30: 	suite        *cipherSuite
		handshake_server.go#L124: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L347: 	hs.suite = selectCipherSuite(preferenceList, hs.clientHello.cipherSuites, hs.cipherSuiteOk)
		handshake_server.go#L348: 	if hs.suite == nil {
		handshake_server.go#L352: 	c.cipherSuite = hs.suite.id
		handshake_server.go#L430: 	hs.suite = selectCipherSuite([]uint16{hs.sessionState.cipherSuite},
		handshake_server.go#L432: 	if hs.suite == nil {
		handshake_server.go#L451: 	hs.hello.cipherSuite = hs.suite.id
		handshake_server.go#L452: 	c.cipherSuite = hs.suite.id
		handshake_server.go#L457: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_server.go#L491: 	hs.hello.cipherSuite = hs.suite.id
		handshake_server.go#L493: 	hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
		handshake_server.go#L521: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_server.go#L622: 	hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L682: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_server.go#L687: 	if hs.suite.aead == nil {
		handshake_server.go#L688: 		clientCipher = hs.suite.cipher(clientKey, clientIV, true /* for reading */)
		handshake_server.go#L689: 		clientHash = hs.suite.mac(clientMAC)
		handshake_server.go#L690: 		serverCipher = hs.suite.cipher(serverKey, serverIV, false /* not for reading */)
		handshake_server.go#L691: 		serverHash = hs.suite.mac(serverMAC)
		handshake_server.go#L693: 		clientCipher = hs.suite.aead(clientKey, clientIV)
		handshake_server.go#L694: 		serverCipher = hs.suite.aead(serverKey, serverIV)
		handshake_server.go#L756: 		cipherSuite:  hs.suite.id,