crypto/tls.clientHandshakeStateTLS13.serverHello (field)
53 uses
crypto/tls (current package)
handshake_client.go#L359: serverHello: serverHello,
handshake_client_tls13.go#L26: serverHello *serverHelloMsg
handshake_client_tls13.go#L79: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L90: confTranscript.Write(hs.serverHello.original[:30])
handshake_client_tls13.go#L92: confTranscript.Write(hs.serverHello.original[38:])
handshake_client_tls13.go#L100: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.random[len(hs.serverHello.random)-8:]) == 1 {
handshake_client_tls13.go#L106: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L111: if hs.hello.serverName == "" && hs.serverHello.serverNameAck {
handshake_client_tls13.go#L120: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L168: if hs.serverHello.supportedVersion == 0 {
handshake_client_tls13.go#L173: if hs.serverHello.supportedVersion != VersionTLS13 {
handshake_client_tls13.go#L178: if hs.serverHello.vers != VersionTLS12 {
handshake_client_tls13.go#L183: if hs.serverHello.ocspStapling ||
handshake_client_tls13.go#L184: hs.serverHello.ticketSupported ||
handshake_client_tls13.go#L185: hs.serverHello.extendedMasterSecret ||
handshake_client_tls13.go#L186: hs.serverHello.secureRenegotiationSupported ||
handshake_client_tls13.go#L187: len(hs.serverHello.secureRenegotiation) != 0 ||
handshake_client_tls13.go#L188: len(hs.serverHello.alpnProtocol) != 0 ||
handshake_client_tls13.go#L189: len(hs.serverHello.scts) != 0 {
handshake_client_tls13.go#L194: if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
handshake_client_tls13.go#L199: if hs.serverHello.compressionMethod != compressionNone {
handshake_client_tls13.go#L204: selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
handshake_client_tls13.go#L245: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L257: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L258: if len(hs.serverHello.encryptedClientHello) != 8 {
handshake_client_tls13.go#L264: hrrHello := make([]byte, len(hs.serverHello.original))
handshake_client_tls13.go#L265: copy(hrrHello, hs.serverHello.original)
handshake_client_tls13.go#L266: hrrHello = bytes.Replace(hrrHello, hs.serverHello.encryptedClientHello, make([]byte, 8), 1)
handshake_client_tls13.go#L275: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.encryptedClientHello) == 1 {
handshake_client_tls13.go#L283: if err := transcriptMsg(hs.serverHello, hs.echContext.innerTranscript); err != nil {
handshake_client_tls13.go#L286: } else if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L295: if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
handshake_client_tls13.go#L300: if hs.serverHello.cookie != nil {
handshake_client_tls13.go#L301: hello.cookie = hs.serverHello.cookie
handshake_client_tls13.go#L304: if hs.serverHello.serverShare.group != 0 {
handshake_client_tls13.go#L312: if curveID := hs.serverHello.selectedGroup; curveID != 0 {
handshake_client_tls13.go#L354: if err := transcriptMsg(hs.serverHello, transcript); err != nil {
handshake_client_tls13.go#L406: hs.serverHello = serverHello
handshake_client_tls13.go#L419: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L424: if len(hs.serverHello.cookie) != 0 {
handshake_client_tls13.go#L429: if hs.serverHello.selectedGroup != 0 {
handshake_client_tls13.go#L434: if hs.serverHello.serverShare.group == 0 {
handshake_client_tls13.go#L439: return ks.group == hs.serverHello.serverShare.group
handshake_client_tls13.go#L445: if !hs.serverHello.selectedIdentityPresent {
handshake_client_tls13.go#L449: if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
handshake_client_tls13.go#L478: ecdhePeerData := hs.serverHello.serverShare.data
handshake_client_tls13.go#L479: if hs.serverHello.serverShare.group == X25519MLKEM768 {
handshake_client_tls13.go#L484: ecdhePeerData = hs.serverHello.serverShare.data[mlkem.CiphertextSize768:]
handshake_client_tls13.go#L496: if hs.serverHello.serverShare.group == X25519MLKEM768 {
handshake_client_tls13.go#L500: ciphertext := hs.serverHello.serverShare.data[:mlkem.CiphertextSize768]
handshake_client_tls13.go#L508: c.curveID = hs.serverHello.serverShare.group