crypto/tls.serverHandshakeState.clientHello (field)

30 uses

	crypto/tls (current package)
		handshake_server.go#L26: 	clientHello  *clientHelloMsg
		handshake_server.go#L56: 		clientHello: clientHello,
		handshake_server.go#L120: 	c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L175: 	for _, compression := range hs.clientHello.compressionMethods {
		handshake_server.go#L205: 	if len(hs.clientHello.secureRenegotiation) != 0 {
		handshake_server.go#L210: 	hs.hello.secureRenegotiationSupported = hs.clientHello.secureRenegotiationSupported
		handshake_server.go#L212: 	if len(hs.clientHello.serverName) > 0 {
		handshake_server.go#L213: 		c.serverName = hs.clientHello.serverName
		handshake_server.go#L216: 	if len(hs.clientHello.alpnProtocols) > 0 {
		handshake_server.go#L217: 		if selectedProto := mutualProtocol(hs.clientHello.alpnProtocols, c.config.NextProtos); selectedProto != "" {
		handshake_server.go#L223: 	hs.cert, err = c.config.getCertificate(clientHelloInfo(c, hs.clientHello))
		handshake_server.go#L232: 	if hs.clientHello.scts {
		handshake_server.go#L236: 	hs.ecdheOk = supportsECDHE(c.config, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
		handshake_server.go#L301: 		supportedList = hs.clientHello.cipherSuites
		handshake_server.go#L307: 		if c.config.CipherSuites == nil && !aesgcmPreferred(hs.clientHello.cipherSuites) {
		handshake_server.go#L311: 		preferenceList = hs.clientHello.cipherSuites
		handshake_server.go#L328: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server.go#L331: 			if hs.clientHello.vers < c.config.maxSupportedVersion() {
		handshake_server.go#L371: 	plaintext, usedOldKey := c.decryptTicket(hs.clientHello.sessionTicket)
		handshake_server.go#L393: 	for _, id := range hs.clientHello.cipherSuites {
		handshake_server.go#L429: 	hs.hello.sessionId = hs.clientHello.sessionId
		handshake_server.go#L433: 	hs.finishedHash.Write(hs.clientHello.marshal())
		handshake_server.go#L460: 	if hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 {
		handshake_server.go#L464: 	hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
		handshake_server.go#L473: 	hs.finishedHash.Write(hs.clientHello.marshal())
		handshake_server.go#L496: 	skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
		handshake_server.go#L596: 	hs.masterSecret = masterFromPreMasterSecret(c.vers, hs.suite, preMasterSecret, hs.clientHello.random, hs.hello.random)
		handshake_server.go#L597: 	if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
		handshake_server.go#L656: 		keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)