crypto/tls.serverHandshakeStateTLS13.clientHello (field)
49 uses
crypto/tls (current package)
handshake_server.go#L53: clientHello: clientHello,
handshake_server_tls13.go#L47: clientHello *clientHelloMsg
handshake_server_tls13.go#L116: if len(hs.clientHello.supportedVersions) == 0 {
handshake_server_tls13.go#L130: for _, id := range hs.clientHello.cipherSuites {
handshake_server_tls13.go#L142: if len(hs.clientHello.compressionMethods) != 1 ||
handshake_server_tls13.go#L143: hs.clientHello.compressionMethods[0] != compressionNone {
handshake_server_tls13.go#L154: if len(hs.clientHello.secureRenegotiation) != 0 {
handshake_server_tls13.go#L159: if hs.clientHello.earlyData && c.quic != nil {
handshake_server_tls13.go#L160: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L164: } else if hs.clientHello.earlyData {
handshake_server_tls13.go#L175: hs.hello.sessionId = hs.clientHello.sessionId
handshake_server_tls13.go#L179: if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
handshake_server_tls13.go#L186: hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
handshake_server_tls13.go#L209: return !slices.Contains(hs.clientHello.supportedCurves, group)
handshake_server_tls13.go#L216: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L232: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L297: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
handshake_server_tls13.go#L306: for _, v := range hs.clientHello.supportedVersions {
handshake_server_tls13.go#L313: if hs.clientHello.quicTransportParameters == nil {
handshake_server_tls13.go#L317: c.quicSetTransportParameters(hs.clientHello.quicTransportParameters)
handshake_server_tls13.go#L319: if hs.clientHello.quicTransportParameters != nil {
handshake_server_tls13.go#L325: c.serverName = hs.clientHello.serverName
handshake_server_tls13.go#L337: for _, mode := range hs.clientHello.pskModes {
handshake_server_tls13.go#L347: if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
handshake_server_tls13.go#L351: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L355: for i, identity := range hs.clientHello.pskIdentities {
handshake_server_tls13.go#L429: clientHelloBytes, err := hs.clientHello.marshalWithoutBinders()
handshake_server_tls13.go#L436: if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
handshake_server_tls13.go#L441: if c.quic != nil && hs.clientHello.earlyData && i == 0 &&
handshake_server_tls13.go#L447: if err := transcriptMsg(hs.clientHello, transcript); err != nil {
handshake_server_tls13.go#L506: if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
handshake_server_tls13.go#L510: certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server_tls13.go#L519: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
handshake_server_tls13.go#L550: if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
handshake_server_tls13.go#L576: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L659: if illegalClientHelloChange(clientHello, hs.clientHello) {
handshake_server_tls13.go#L665: hs.clientHello = clientHello
handshake_server_tls13.go#L733: echTranscript.Write(hs.clientHello.original)
handshake_server_tls13.go#L739: hkdf.Extract(hs.suite.hash.New, hs.clientHello.random, nil),
handshake_server_tls13.go#L747: if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
handshake_server_tls13.go#L778: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L783: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L803: if len(hs.c.config.EncryptedClientHelloKeys) > 0 && len(hs.clientHello.encryptedClientHello) > 0 && hs.echContext == nil {
handshake_server_tls13.go#L848: certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
handshake_server_tls13.go#L849: certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
handshake_server_tls13.go#L916: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L921: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L952: for _, pskMode := range hs.clientHello.pskModes {