crypto/tls.clientHandshakeState.serverHello (field)

18 uses

	crypto/tls (current package)
		handshake_client.go#L29: 	serverHello  *serverHelloMsg
		handshake_client.go#L225: 		serverHello: serverHello,
		handshake_client.go#L400: 	hs.finishedHash.Write(hs.serverHello.marshal())
		handshake_client.go#L452: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L459: 	if hs.suite = mutualCipherSuite(hs.hello.cipherSuites, hs.serverHello.cipherSuite); hs.suite == nil {
		handshake_client.go#L492: 		if !hs.serverHello.ocspStapling {
		handshake_client.go#L534: 		err = keyAgreement.processServerKeyExchange(c.config, hs.hello, hs.serverHello, c.peerCertificates[0], skx)
		handshake_client.go#L644: 	hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.hello.random, hs.serverHello.random)
		handshake_client.go#L659: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.hello.random, hs.serverHello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
		handshake_client.go#L681: 		bytes.Equal(hs.serverHello.sessionId, hs.hello.sessionId)
		handshake_client.go#L691: 	if hs.serverHello.compressionMethod != compressionNone {
		handshake_client.go#L696: 	if c.handshakes == 0 && hs.serverHello.secureRenegotiationSupported {
		handshake_client.go#L698: 		if len(hs.serverHello.secureRenegotiation) != 0 {
		handshake_client.go#L708: 		if !bytes.Equal(hs.serverHello.secureRenegotiation, expectedSecureRenegotiation[:]) {
		handshake_client.go#L714: 	if err := checkALPN(hs.hello.alpnProtocols, hs.serverHello.alpnProtocol); err != nil {
		handshake_client.go#L718: 	c.clientProtocol = hs.serverHello.alpnProtocol
		handshake_client.go#L720: 	c.scts = hs.serverHello.scts
		handshake_client.go#L796: 	if !hs.serverHello.ticketSupported {