crypto/tls.clientHandshakeStateTLS13.serverHello (field)
53 uses
crypto/tls (current package)
handshake_client.go#L371: serverHello: serverHello,
handshake_client_tls13.go#L26: serverHello *serverHelloMsg
handshake_client_tls13.go#L79: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L90: confTranscript.Write(hs.serverHello.original[:30])
handshake_client_tls13.go#L92: confTranscript.Write(hs.serverHello.original[38:])
handshake_client_tls13.go#L99: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.random[len(hs.serverHello.random)-8:]) == 1 {
handshake_client_tls13.go#L105: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L110: if hs.hello.serverName == "" && hs.serverHello.serverNameAck {
handshake_client_tls13.go#L119: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L167: if hs.serverHello.supportedVersion == 0 {
handshake_client_tls13.go#L172: if hs.serverHello.supportedVersion != VersionTLS13 {
handshake_client_tls13.go#L177: if hs.serverHello.vers != VersionTLS12 {
handshake_client_tls13.go#L182: if hs.serverHello.ocspStapling ||
handshake_client_tls13.go#L183: hs.serverHello.ticketSupported ||
handshake_client_tls13.go#L184: hs.serverHello.extendedMasterSecret ||
handshake_client_tls13.go#L185: hs.serverHello.secureRenegotiationSupported ||
handshake_client_tls13.go#L186: len(hs.serverHello.secureRenegotiation) != 0 ||
handshake_client_tls13.go#L187: len(hs.serverHello.alpnProtocol) != 0 ||
handshake_client_tls13.go#L188: len(hs.serverHello.scts) != 0 {
handshake_client_tls13.go#L193: if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
handshake_client_tls13.go#L198: if hs.serverHello.compressionMethod != compressionNone {
handshake_client_tls13.go#L203: selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
handshake_client_tls13.go#L244: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L256: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L257: if len(hs.serverHello.encryptedClientHello) != 8 {
handshake_client_tls13.go#L263: hrrHello := make([]byte, len(hs.serverHello.original))
handshake_client_tls13.go#L264: copy(hrrHello, hs.serverHello.original)
handshake_client_tls13.go#L265: hrrHello = bytes.Replace(hrrHello, hs.serverHello.encryptedClientHello, make([]byte, 8), 1)
handshake_client_tls13.go#L273: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.encryptedClientHello) == 1 {
handshake_client_tls13.go#L281: if err := transcriptMsg(hs.serverHello, hs.echContext.innerTranscript); err != nil {
handshake_client_tls13.go#L284: } else if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L293: if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
handshake_client_tls13.go#L298: if hs.serverHello.cookie != nil {
handshake_client_tls13.go#L299: hello.cookie = hs.serverHello.cookie
handshake_client_tls13.go#L302: if hs.serverHello.serverShare.group != 0 {
handshake_client_tls13.go#L310: if curveID := hs.serverHello.selectedGroup; curveID != 0 {
handshake_client_tls13.go#L352: if err := transcriptMsg(hs.serverHello, transcript); err != nil {
handshake_client_tls13.go#L404: hs.serverHello = serverHello
handshake_client_tls13.go#L417: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L422: if len(hs.serverHello.cookie) != 0 {
handshake_client_tls13.go#L427: if hs.serverHello.selectedGroup != 0 {
handshake_client_tls13.go#L432: if hs.serverHello.serverShare.group == 0 {
handshake_client_tls13.go#L437: return ks.group == hs.serverHello.serverShare.group
handshake_client_tls13.go#L443: if !hs.serverHello.selectedIdentityPresent {
handshake_client_tls13.go#L447: if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
handshake_client_tls13.go#L477: ecdhePeerData := hs.serverHello.serverShare.data
handshake_client_tls13.go#L478: if hs.serverHello.serverShare.group == X25519MLKEM768 {
handshake_client_tls13.go#L483: ecdhePeerData = hs.serverHello.serverShare.data[mlkem.CiphertextSize768:]
handshake_client_tls13.go#L495: if hs.serverHello.serverShare.group == X25519MLKEM768 {
handshake_client_tls13.go#L499: ciphertext := hs.serverHello.serverShare.data[:mlkem.CiphertextSize768]
handshake_client_tls13.go#L507: c.curveID = hs.serverHello.serverShare.group