crypto/tls.serverHandshakeStateTLS13.clientHello (field)

37 uses

	crypto/tls (current package)
		handshake_server.go#L52: 			clientHello: clientHello,
		handshake_server_tls13.go#L28: 	clientHello     *clientHelloMsg
		handshake_server_tls13.go#L95: 	if len(hs.clientHello.supportedVersions) == 0 {
		handshake_server_tls13.go#L109: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server_tls13.go#L121: 	if len(hs.clientHello.compressionMethods) != 1 ||
		handshake_server_tls13.go#L122: 		hs.clientHello.compressionMethods[0] != compressionNone {
		handshake_server_tls13.go#L133: 	if len(hs.clientHello.secureRenegotiation) != 0 {
		handshake_server_tls13.go#L138: 	if hs.clientHello.earlyData {
		handshake_server_tls13.go#L149: 	hs.hello.sessionId = hs.clientHello.sessionId
		handshake_server_tls13.go#L153: 	if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
		handshake_server_tls13.go#L157: 		hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
		handshake_server_tls13.go#L176: 		for _, ks := range hs.clientHello.keyShares {
		handshake_server_tls13.go#L186: 		for _, group := range hs.clientHello.supportedCurves {
		handshake_server_tls13.go#L201: 		clientKeyShare = &hs.clientHello.keyShares[0]
		handshake_server_tls13.go#L220: 	c.serverName = hs.clientHello.serverName
		handshake_server_tls13.go#L232: 	for _, mode := range hs.clientHello.pskModes {
		handshake_server_tls13.go#L242: 	if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
		handshake_server_tls13.go#L246: 	if len(hs.clientHello.pskIdentities) == 0 {
		handshake_server_tls13.go#L250: 	for i, identity := range hs.clientHello.pskIdentities {
		handshake_server_tls13.go#L300: 		transcript.Write(hs.clientHello.marshalWithoutBinders())
		handshake_server_tls13.go#L302: 		if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
		handshake_server_tls13.go#L358: 	if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
		handshake_server_tls13.go#L362: 	certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server_tls13.go#L371: 	hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
		handshake_server_tls13.go#L400: 	hs.transcript.Write(hs.clientHello.marshal())
		handshake_server_tls13.go#L446: 	if illegalClientHelloChange(clientHello, hs.clientHello) {
		handshake_server_tls13.go#L451: 	hs.clientHello = clientHello
		handshake_server_tls13.go#L516: 	hs.transcript.Write(hs.clientHello.marshal())
		handshake_server_tls13.go#L540: 	err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
		handshake_server_tls13.go#L545: 	err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L553: 	selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
		handshake_server_tls13.go#L600: 	certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
		handshake_server_tls13.go#L601: 	certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
		handshake_server_tls13.go#L666: 	err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
		handshake_server_tls13.go#L671: 	err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
		handshake_server_tls13.go#L697: 	for _, pskMode := range hs.clientHello.pskModes {