crypto/tls.serverHandshakeStateTLS13.clientHello (field)
37 uses
crypto/tls (current package)
handshake_server.go#L52: clientHello: clientHello,
handshake_server_tls13.go#L28: clientHello *clientHelloMsg
handshake_server_tls13.go#L95: if len(hs.clientHello.supportedVersions) == 0 {
handshake_server_tls13.go#L109: for _, id := range hs.clientHello.cipherSuites {
handshake_server_tls13.go#L121: if len(hs.clientHello.compressionMethods) != 1 ||
handshake_server_tls13.go#L122: hs.clientHello.compressionMethods[0] != compressionNone {
handshake_server_tls13.go#L133: if len(hs.clientHello.secureRenegotiation) != 0 {
handshake_server_tls13.go#L138: if hs.clientHello.earlyData {
handshake_server_tls13.go#L149: hs.hello.sessionId = hs.clientHello.sessionId
handshake_server_tls13.go#L153: if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
handshake_server_tls13.go#L157: hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
handshake_server_tls13.go#L176: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L186: for _, group := range hs.clientHello.supportedCurves {
handshake_server_tls13.go#L201: clientKeyShare = &hs.clientHello.keyShares[0]
handshake_server_tls13.go#L220: c.serverName = hs.clientHello.serverName
handshake_server_tls13.go#L232: for _, mode := range hs.clientHello.pskModes {
handshake_server_tls13.go#L242: if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
handshake_server_tls13.go#L246: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L250: for i, identity := range hs.clientHello.pskIdentities {
handshake_server_tls13.go#L300: transcript.Write(hs.clientHello.marshalWithoutBinders())
handshake_server_tls13.go#L302: if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
handshake_server_tls13.go#L358: if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
handshake_server_tls13.go#L362: certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server_tls13.go#L371: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
handshake_server_tls13.go#L400: hs.transcript.Write(hs.clientHello.marshal())
handshake_server_tls13.go#L446: if illegalClientHelloChange(clientHello, hs.clientHello) {
handshake_server_tls13.go#L451: hs.clientHello = clientHello
handshake_server_tls13.go#L516: hs.transcript.Write(hs.clientHello.marshal())
handshake_server_tls13.go#L540: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L545: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L553: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols)
handshake_server_tls13.go#L600: certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
handshake_server_tls13.go#L601: certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
handshake_server_tls13.go#L666: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L671: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L697: for _, pskMode := range hs.clientHello.pskModes {