crypto/tls.clientHandshakeState.serverHello (field)
18 uses
crypto/tls (current package)
handshake_client.go#L29: serverHello *serverHelloMsg
handshake_client.go#L225: serverHello: serverHello,
handshake_client.go#L400: hs.finishedHash.Write(hs.serverHello.marshal())
handshake_client.go#L452: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L459: if hs.suite = mutualCipherSuite(hs.hello.cipherSuites, hs.serverHello.cipherSuite); hs.suite == nil {
handshake_client.go#L492: if !hs.serverHello.ocspStapling {
handshake_client.go#L534: err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, c.peerCertificates[0], skx)
handshake_client.go#L644: hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.hello.random, hs.serverHello.random)
handshake_client.go#L659: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
handshake_client.go#L681: bytes.Equal(hs.serverHello.sessionId, hs.hello.sessionId)
handshake_client.go#L691: if hs.serverHello.compressionMethod != compressionNone {
handshake_client.go#L696: if c.handshakes == 0 && hs.serverHello.secureRenegotiationSupported {
handshake_client.go#L698: if len(hs.serverHello.secureRenegotiation) != 0 {
handshake_client.go#L708: if !bytes.Equal(hs.serverHello.secureRenegotiation, expectedSecureRenegotiation[:]) {
handshake_client.go#L714: if err := checkALPN(hs.hello.alpnProtocols, hs.serverHello.alpnProtocol); err != nil {
handshake_client.go#L718: c.clientProtocol = hs.serverHello.alpnProtocol
handshake_client.go#L720: c.scts = hs.serverHello.scts
handshake_client.go#L796: if !hs.serverHello.ticketSupported {