crypto/tls.serverHandshakeState.clientHello (field)

35 uses

	crypto/tls (current package)
		handshake_server.go#L28: 	clientHello  *clientHelloMsg
		handshake_server.go#L61: 		clientHello: clientHello,
		handshake_server.go#L127: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L227: 	for _, compression := range hs.clientHello.compressionMethods {
		handshake_server.go#L257: 	if len(hs.clientHello.secureRenegotiation) != 0 {
		handshake_server.go#L262: 	hs.hello.extendedMasterSecret = hs.clientHello.extendedMasterSecret
		handshake_server.go#L263: 	hs.hello.secureRenegotiationSupported = hs.clientHello.secureRenegotiationSupported
		handshake_server.go#L265: 	if len(hs.clientHello.serverName) > 0 {
		handshake_server.go#L266: 		c.serverName = hs.clientHello.serverName
		handshake_server.go#L269: 	selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, false)
		handshake_server.go#L277: 	hs.cert, err = c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
		handshake_server.go#L286: 	if hs.clientHello.scts {
		handshake_server.go#L290: 	hs.ecdheOk, err = supportsECDHE(c.config, c.vers, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
		handshake_server.go#L296: 	if hs.ecdheOk && len(hs.clientHello.supportedPoints) > 0 {
		handshake_server.go#L399: 	preferenceList := c.config.cipherSuites(isAESGCMPreferred(hs.clientHello.cipherSuites))
		handshake_server.go#L401: 	hs.suite = selectCipherSuite(preferenceList, hs.clientHello.cipherSuites, hs.cipherSuiteOk)
		handshake_server.go#L405: 			hs.clientHello.cipherSuites)
		handshake_server.go#L418: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server.go#L421: 			if hs.clientHello.vers < c.config.maxSupportedVersion(roleServer) {
		handshake_server.go#L463: 		ss, err := c.config.UnwrapSession(hs.clientHello.sessionTicket, c.connectionStateLocked())
		handshake_server.go#L472: 		plaintext := c.config.decryptTicket(hs.clientHello.sessionTicket, c.ticketKeys)
		handshake_server.go#L498: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server.go#L532: 	if !sessionState.extMasterSecret && hs.clientHello.extendedMasterSecret {
		handshake_server.go#L535: 	if sessionState.extMasterSecret && !hs.clientHello.extendedMasterSecret {
		handshake_server.go#L564: 	hs.hello.sessionId = hs.clientHello.sessionId
		handshake_server.go#L571: 	if err := transcriptMsg(hs.clientHello, &hs.finishedHash); err != nil {
		handshake_server.go#L593: 	if hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 {
		handshake_server.go#L597: 	if hs.clientHello.serverName != "" {
		handshake_server.go#L601: 	hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
		handshake_server.go#L610: 	if err := transcriptMsg(hs.clientHello, &hs.finishedHash); err != nil {
		handshake_server.go#L632: 	skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
		handshake_server.go#L741: 			hs.clientHello.random, hs.hello.random)
		handshake_server.go#L743: 	if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
		handshake_server.go#L812: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)