crypto/tls.serverHandshakeStateTLS13.clientHello (field)
52 uses
crypto/tls (current package)
handshake_server.go#L52: clientHello: clientHello,
handshake_server_tls13.go#L48: clientHello *clientHelloMsg
handshake_server_tls13.go#L117: if len(hs.clientHello.supportedVersions) == 0 {
handshake_server_tls13.go#L131: for _, id := range hs.clientHello.cipherSuites {
handshake_server_tls13.go#L143: if len(hs.clientHello.compressionMethods) != 1 ||
handshake_server_tls13.go#L144: hs.clientHello.compressionMethods[0] != compressionNone {
handshake_server_tls13.go#L155: if len(hs.clientHello.secureRenegotiation) != 0 {
handshake_server_tls13.go#L160: if hs.clientHello.earlyData && c.quic != nil {
handshake_server_tls13.go#L161: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L165: } else if hs.clientHello.earlyData {
handshake_server_tls13.go#L176: hs.hello.sessionId = hs.clientHello.sessionId
handshake_server_tls13.go#L180: if !hasAESGCMHardwareSupport || !isAESGCMPreferred(hs.clientHello.cipherSuites) {
handshake_server_tls13.go#L187: hs.suite = mutualCipherSuiteTLS13(hs.clientHello.cipherSuites, suiteID)
handshake_server_tls13.go#L195: hs.clientHello.cipherSuites)
handshake_server_tls13.go#L211: return !slices.Contains(hs.clientHello.supportedCurves, group)
handshake_server_tls13.go#L218: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L234: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L299: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, c.quic != nil)
handshake_server_tls13.go#L308: for _, v := range hs.clientHello.supportedVersions {
handshake_server_tls13.go#L315: if hs.clientHello.quicTransportParameters == nil {
handshake_server_tls13.go#L319: c.quicSetTransportParameters(hs.clientHello.quicTransportParameters)
handshake_server_tls13.go#L321: if hs.clientHello.quicTransportParameters != nil {
handshake_server_tls13.go#L327: c.serverName = hs.clientHello.serverName
handshake_server_tls13.go#L339: for _, mode := range hs.clientHello.pskModes {
handshake_server_tls13.go#L349: if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
handshake_server_tls13.go#L353: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L357: for i, identity := range hs.clientHello.pskIdentities {
handshake_server_tls13.go#L431: clientHelloBytes, err := hs.clientHello.marshalWithoutBinders()
handshake_server_tls13.go#L438: if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
handshake_server_tls13.go#L443: if c.quic != nil && hs.clientHello.earlyData && i == 0 &&
handshake_server_tls13.go#L449: if err := transcriptMsg(hs.clientHello, transcript); err != nil {
handshake_server_tls13.go#L508: if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
handshake_server_tls13.go#L512: certificate, err := c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server_tls13.go#L521: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
handshake_server_tls13.go#L552: if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
handshake_server_tls13.go#L578: prf, err := hkdf.Extract(h, hs.clientHello.random, nil)
handshake_server_tls13.go#L662: if illegalClientHelloChange(clientHello, hs.clientHello) {
handshake_server_tls13.go#L668: hs.clientHello = clientHello
handshake_server_tls13.go#L736: echTranscript.Write(hs.clientHello.original)
handshake_server_tls13.go#L742: prk, err := hkdf.Extract(h, hs.clientHello.random, nil)
handshake_server_tls13.go#L751: if err := transcriptMsg(hs.clientHello, hs.transcript); err != nil {
handshake_server_tls13.go#L782: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L787: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L805: if !hs.c.didResume && hs.clientHello.serverName != "" {
handshake_server_tls13.go#L813: echKeys, err = hs.c.config.GetEncryptedClientHelloKeys(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server_tls13.go#L819: if len(echKeys) > 0 && len(hs.clientHello.encryptedClientHello) > 0 && hs.echContext == nil {
handshake_server_tls13.go#L865: certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
handshake_server_tls13.go#L866: certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
handshake_server_tls13.go#L933: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L938: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L969: return slices.Contains(hs.clientHello.pskModes, pskModeDHE)