crypto/tls.serverHandshakeStateTLS13.clientHello (field)

52 uses

	crypto/tls (current package)
		handshake_server.go#L52: 			clientHello: clientHello,
		handshake_server_tls13.go#L48: 	clientHello     *clientHelloMsg
		handshake_server_tls13.go#L117: 	if len(hs.clientHello.supportedVersions) == 0 {
		handshake_server_tls13.go#L131: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server_tls13.go#L143: 	if len(hs.clientHello.compressionMethods) != 1 ||
		handshake_server_tls13.go#L144: 		hs.clientHello.compressionMethods[0] != compressionNone {
		handshake_server_tls13.go#L155: 	if len(hs.clientHello.secureRenegotiation) != 0 {
		handshake_server_tls13.go#L160: 	if hs.clientHello.earlyData && c.quic != nil {
		handshake_server_tls13.go#L161: 		if len(hs.clientHello.pskIdentities) == 0 {
		handshake_server_tls13.go#L165: 	} else if hs.clientHello.earlyData {
		handshake_server_tls13.go#L176: 	hs.hello.sessionId = hs.clientHello.sessionId
		handshake_server_tls13.go#L180: 	if !hasAESGCMHardwareSupport || !isAESGCMPreferred(hs.clientHello.cipherSuites) {
		handshake_server_tls13.go#L187: 		hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
		handshake_server_tls13.go#L195: 			hs.clientHello.cipherSuites)
		handshake_server_tls13.go#L211: 		return !slices.Contains(hs.clientHello.supportedCurves, group)
		handshake_server_tls13.go#L218: 		for _, ks := range hs.clientHello.keyShares {
		handshake_server_tls13.go#L234: 	for _, ks := range hs.clientHello.keyShares {
		handshake_server_tls13.go#L299: 	selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
		handshake_server_tls13.go#L308: 		for _, v := range hs.clientHello.supportedVersions {
		handshake_server_tls13.go#L315: 		if hs.clientHello.quicTransportParameters == nil {
		handshake_server_tls13.go#L319: 		c.quicSetTransportParameters(hs.clientHello.quicTransportParameters)
		handshake_server_tls13.go#L321: 		if hs.clientHello.quicTransportParameters != nil {
		handshake_server_tls13.go#L327: 	c.serverName = hs.clientHello.serverName
		handshake_server_tls13.go#L339: 	for _, mode := range hs.clientHello.pskModes {
		handshake_server_tls13.go#L349: 	if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
		handshake_server_tls13.go#L353: 	if len(hs.clientHello.pskIdentities) == 0 {
		handshake_server_tls13.go#L357: 	for i, identity := range hs.clientHello.pskIdentities {
		handshake_server_tls13.go#L431: 		clientHelloBytes, err := hs.clientHello.marshalWithoutBinders()
		handshake_server_tls13.go#L438: 		if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
		handshake_server_tls13.go#L443: 		if c.quic != nil && hs.clientHello.earlyData && i == 0 &&
		handshake_server_tls13.go#L449: 			if err := transcriptMsg(hs.clientHello, transcript); err != nil {
		handshake_server_tls13.go#L508: 	if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
		handshake_server_tls13.go#L512: 	certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server_tls13.go#L521: 	hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
		handshake_server_tls13.go#L552: 	if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
		handshake_server_tls13.go#L578: 		prf, err := hkdf.Extract(h, hs.clientHello.random, nil)
		handshake_server_tls13.go#L662: 	if illegalClientHelloChange(clientHello, hs.clientHello) {
		handshake_server_tls13.go#L668: 	hs.clientHello = clientHello
		handshake_server_tls13.go#L736: 		echTranscript.Write(hs.clientHello.original)
		handshake_server_tls13.go#L742: 		prk, err := hkdf.Extract(h, hs.clientHello.random, nil)
		handshake_server_tls13.go#L751: 	if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
		handshake_server_tls13.go#L782: 	err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
		handshake_server_tls13.go#L787: 	err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L805: 	if !hs.c.didResume && hs.clientHello.serverName != "" {
		handshake_server_tls13.go#L813: 		echKeys, err = hs.c.config.GetEncryptedClientHelloKeys(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server_tls13.go#L819: 	if len(echKeys) > 0 && len(hs.clientHello.encryptedClientHello) > 0 && hs.echContext == nil {
		handshake_server_tls13.go#L865: 	certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
		handshake_server_tls13.go#L866: 	certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
		handshake_server_tls13.go#L933: 	err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
		handshake_server_tls13.go#L938: 	err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L969: 	return slices.Contains(hs.clientHello.pskModes, pskModeDHE)