crypto/tls.clientHandshakeStateTLS13.serverHello (field)

53 uses

	crypto/tls (current package)
		handshake_client.go#L371: 			serverHello:  serverHello,
		handshake_client_tls13.go#L26: 	serverHello  *serverHelloMsg
		handshake_client_tls13.go#L79: 	if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
		handshake_client_tls13.go#L90: 		confTranscript.Write(hs.serverHello.original[:30])
		handshake_client_tls13.go#L92: 		confTranscript.Write(hs.serverHello.original[38:])
		handshake_client_tls13.go#L99: 		if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.random[len(hs.serverHello.random)-8:]) == 1 {
		handshake_client_tls13.go#L105: 			if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L110: 			if hs.hello.serverName == "" && hs.serverHello.serverNameAck {
		handshake_client_tls13.go#L119: 	if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
		handshake_client_tls13.go#L167: 	if hs.serverHello.supportedVersion == 0 {
		handshake_client_tls13.go#L172: 	if hs.serverHello.supportedVersion != VersionTLS13 {
		handshake_client_tls13.go#L177: 	if hs.serverHello.vers != VersionTLS12 {
		handshake_client_tls13.go#L182: 	if hs.serverHello.ocspStapling ||
		handshake_client_tls13.go#L183: 		hs.serverHello.ticketSupported ||
		handshake_client_tls13.go#L184: 		hs.serverHello.extendedMasterSecret ||
		handshake_client_tls13.go#L185: 		hs.serverHello.secureRenegotiationSupported ||
		handshake_client_tls13.go#L186: 		len(hs.serverHello.secureRenegotiation) != 0 ||
		handshake_client_tls13.go#L187: 		len(hs.serverHello.alpnProtocol) != 0 ||
		handshake_client_tls13.go#L188: 		len(hs.serverHello.scts) != 0 {
		handshake_client_tls13.go#L193: 	if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
		handshake_client_tls13.go#L198: 	if hs.serverHello.compressionMethod != compressionNone {
		handshake_client_tls13.go#L203: 	selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
		handshake_client_tls13.go#L244: 	if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
		handshake_client_tls13.go#L256: 		if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L257: 			if len(hs.serverHello.encryptedClientHello) != 8 {
		handshake_client_tls13.go#L263: 			hrrHello := make([]byte, len(hs.serverHello.original))
		handshake_client_tls13.go#L264: 			copy(hrrHello, hs.serverHello.original)
		handshake_client_tls13.go#L265: 			hrrHello = bytes.Replace(hrrHello, hs.serverHello.encryptedClientHello, make([]byte, 8), 1)
		handshake_client_tls13.go#L273: 			if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.encryptedClientHello) == 1 {
		handshake_client_tls13.go#L281: 		if err := transcriptMsg(hs.serverHello, hs.echContext.innerTranscript); err != nil {
		handshake_client_tls13.go#L284: 	} else if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L293: 	if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
		handshake_client_tls13.go#L298: 	if hs.serverHello.cookie != nil {
		handshake_client_tls13.go#L299: 		hello.cookie = hs.serverHello.cookie
		handshake_client_tls13.go#L302: 	if hs.serverHello.serverShare.group != 0 {
		handshake_client_tls13.go#L310: 	if curveID := hs.serverHello.selectedGroup; curveID != 0 {
		handshake_client_tls13.go#L352: 			if err := transcriptMsg(hs.serverHello, transcript); err != nil {
		handshake_client_tls13.go#L404: 	hs.serverHello = serverHello
		handshake_client_tls13.go#L417: 	if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
		handshake_client_tls13.go#L422: 	if len(hs.serverHello.cookie) != 0 {
		handshake_client_tls13.go#L427: 	if hs.serverHello.selectedGroup != 0 {
		handshake_client_tls13.go#L432: 	if hs.serverHello.serverShare.group == 0 {
		handshake_client_tls13.go#L437: 		return ks.group == hs.serverHello.serverShare.group
		handshake_client_tls13.go#L443: 	if !hs.serverHello.selectedIdentityPresent {
		handshake_client_tls13.go#L447: 	if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
		handshake_client_tls13.go#L477: 	ecdhePeerData := hs.serverHello.serverShare.data
		handshake_client_tls13.go#L478: 	if hs.serverHello.serverShare.group == X25519MLKEM768 {
		handshake_client_tls13.go#L483: 		ecdhePeerData = hs.serverHello.serverShare.data[mlkem.CiphertextSize768:]
		handshake_client_tls13.go#L495: 	if hs.serverHello.serverShare.group == X25519MLKEM768 {
		handshake_client_tls13.go#L499: 		ciphertext := hs.serverHello.serverShare.data[:mlkem.CiphertextSize768]
		handshake_client_tls13.go#L507: 	c.curveID = hs.serverHello.serverShare.group