const resumptionBinderLabel …
const clientEarlyTrafficLabel …
const clientHandshakeTrafficLabel …
const serverHandshakeTrafficLabel …
const clientApplicationTrafficLabel …
const serverApplicationTrafficLabel …
const exporterLabel …
const resumptionLabel …
const trafficUpdateLabel …
func (c *cipherSuiteTLS13) expandLabel(secret []byte, label string, context []byte, length int) []byte { … }
func (c *cipherSuiteTLS13) deriveSecret(secret []byte, label string, transcript hash.Hash) []byte { … }
func (c *cipherSuiteTLS13) extract(newSecret, currentSecret []byte) []byte { … }
func (c *cipherSuiteTLS13) nextTrafficSecret(trafficSecret []byte) []byte { … }
func (c *cipherSuiteTLS13) trafficKey(trafficSecret []byte) (key, iv []byte) { … }
func (c *cipherSuiteTLS13) finishedHash(baseKey []byte, transcript hash.Hash) []byte { … }
func (c *cipherSuiteTLS13) exportKeyingMaterial(masterSecret []byte, transcript hash.Hash) func(string, []byte, int) ([]byte, error) { … }
type keySharePrivateKeys …
func kyberDecapsulate(dk *mlkem768.DecapsulationKey, c []byte) ([]byte, error) { … }
func kyberEncapsulate(ek []byte) (c, ss []byte, err error) { … }
func kyberSharedSecret(K, c []byte) []byte { … }
const x25519PublicKeySize …
func generateECDHEKey(rand io.Reader, curveID CurveID) (*ecdh.PrivateKey, error) { … }
func curveForCurveID(id CurveID) (ecdh.Curve, bool) { … }
func curveIDForCurve(curve ecdh.Curve) (CurveID, bool) { … }