crypto/tls.serverHandshakeState.suite (field)
26 uses
crypto/tls (current package)
handshake_server.go#L30: suite *cipherSuite
handshake_server.go#L124: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L347: hs.suite = selectCipherSuite(preferenceList, hs.clientHello.cipherSuites, hs.cipherSuiteOk)
handshake_server.go#L348: if hs.suite == nil {
handshake_server.go#L352: c.cipherSuite = hs.suite.id
handshake_server.go#L430: hs.suite = selectCipherSuite([]uint16{hs.sessionState.cipherSuite},
handshake_server.go#L432: if hs.suite == nil {
handshake_server.go#L451: hs.hello.cipherSuite = hs.suite.id
handshake_server.go#L452: c.cipherSuite = hs.suite.id
handshake_server.go#L457: hs.finishedHash = newFinishedHash(c.vers, hs.suite)
handshake_server.go#L491: hs.hello.cipherSuite = hs.suite.id
handshake_server.go#L493: hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
handshake_server.go#L521: keyAgreement := hs.suite.ka(c.vers)
handshake_server.go#L622: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L682: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_server.go#L687: if hs.suite.aead == nil {
handshake_server.go#L688: clientCipher = hs.suite.cipher(clientKey, clientIV, true /* for reading */)
handshake_server.go#L689: clientHash = hs.suite.mac(clientMAC)
handshake_server.go#L690: serverCipher = hs.suite.cipher(serverKey, serverIV, false /* not for reading */)
handshake_server.go#L691: serverHash = hs.suite.mac(serverMAC)
handshake_server.go#L693: clientCipher = hs.suite.aead(clientKey, clientIV)
handshake_server.go#L694: serverCipher = hs.suite.aead(serverKey, serverIV)
handshake_server.go#L756: cipherSuite: hs.suite.id,