crypto/tls.Conn.vers (field)

64 uses

	crypto/tls (current package)
		conn.go#L39: 	vers           uint16  // TLS version
		conn.go#L631: 	if c.haveVers && c.vers != VersionTLS13 && vers != c.vers {
		conn.go#L633: 		msg := fmt.Sprintf("received record with version %x when expecting version %x", vers, c.vers)
		conn.go#L645: 	if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
		conn.go#L678: 	if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
		conn.go#L693: 		if c.vers == VersionTLS13 {
		conn.go#L719: 		if c.vers == VersionTLS13 {
		conn.go#L887: 	if c.vers == VersionTLS13 {
		conn.go#L959: 		vers := c.vers
		conn.go#L986: 	if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
		conn.go#L1034: 		if c.vers == VersionTLS13 {
		conn.go#L1040: 		if c.vers == VersionTLS13 {
		conn.go#L1046: 		if c.vers == VersionTLS13 {
		conn.go#L1050: 				hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1063: 			hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1140: 	if len(b) > 1 && c.vers == VersionTLS10 {
		conn.go#L1156: 	if c.vers == VersionTLS13 {
		conn.go#L1202: 	if c.vers != VersionTLS13 {
		conn.go#L1417: 	state.Version = c.vers
		conn.go#L1427: 	if !c.didResume && c.vers != VersionTLS13 {
		handshake_client.go#L192: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L193: 		maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
		handshake_client.go#L198: 	if c.vers == VersionTLS13 {
		handshake_client.go#L361: 	c.vers = vers
		handshake_client.go#L379: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_client.go#L442: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L519: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_client.go#L543: 		cri := certificateRequestInfoFromMsg(c.vers, certReq)
		handshake_client.go#L597: 		if c.vers >= VersionTLS12 {
		handshake_client.go#L598: 			signatureAlgorithm, err := selectSignatureScheme(c.vers, chainToSend, certReq.supportedSignatureAlgorithms)
		handshake_client.go#L634: 	hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L649: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_client.go#L662: 	c.in.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_client.go#L663: 	c.out.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_client.go#L722: 	if hs.session.vers != c.vers {
		handshake_client.go#L793: 		vers:               c.vers,
		handshake_client_tls13.go#L557: 		Version:          c.vers,
		handshake_client_tls13.go#L582: 	certVerifyMsg.signatureAlgorithm, err = selectSignatureScheme(c.vers, cert, hs.certReq.supportedSignatureAlgorithms)
		handshake_client_tls13.go#L668: 		vers:               c.vers,
		handshake_server.go#L46: 	if c.vers == VersionTLS13 {
		handshake_server.go#L120: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L155: 	c.vers, ok = c.config.mutualVersion(clientVersions)
		handshake_server.go#L161: 	c.in.version = c.vers
		handshake_server.go#L162: 	c.out.version = c.vers
		handshake_server.go#L171: 	hs.hello.vers = c.vers
		handshake_server.go#L191: 	if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
		handshake_server.go#L192: 		if c.vers == VersionTLS12 {
		handshake_server.go#L357: 	if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		handshake_server.go#L387: 	if c.vers != hs.sessionState.vers {
		handshake_server.go#L431: 	hs.finishedHash = newFinishedHash(c.vers, hs.suite)
		handshake_server.go#L467: 	hs.finishedHash = newFinishedHash(hs.c.vers, hs.suite)
		handshake_server.go#L495: 	keyAgreement := hs.suite.ka(c.vers)
		handshake_server.go#L516: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L591: 	preMasterSecret, err := keyAgreement.processClientKeyExchange(c.config, hs.cert, ckx, c.vers)
		handshake_server.go#L596: 	hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L621: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L656: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_server.go#L671: 	c.in.prepareCipherSpec(c.vers, clientCipher, clientHash)
		handshake_server.go#L672: 	c.out.prepareCipherSpec(c.vers, serverCipher, serverHash)
		handshake_server.go#L729: 		vers:         c.vers,
		handshake_server_tls13.go#L91: 	hs.hello.supportedVersion = c.vers
		handshake_server_tls13.go#L111: 			if c.vers < c.config.maxSupportedVersion() {
		handshake_server_tls13.go#L386: 	hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)