crypto/tls.serverHandshakeStateTLS13.clientHello (field)
39 uses
crypto/tls (current package)
handshake_server.go#L49: clientHello: clientHello,
handshake_server_tls13.go#L26: clientHello *clientHelloMsg
handshake_server_tls13.go#L93: if len(hs.clientHello.supportedVersions) == 0 {
handshake_server_tls13.go#L107: for _, id := range hs.clientHello.cipherSuites {
handshake_server_tls13.go#L119: if len(hs.clientHello.compressionMethods) != 1 ||
handshake_server_tls13.go#L120: hs.clientHello.compressionMethods[0] != compressionNone {
handshake_server_tls13.go#L131: if len(hs.clientHello.secureRenegotiation) != 0 {
handshake_server_tls13.go#L136: if hs.clientHello.earlyData {
handshake_server_tls13.go#L147: hs.hello.sessionId = hs.clientHello.sessionId
handshake_server_tls13.go#L153: supportedList = hs.clientHello.cipherSuites
handshake_server_tls13.go#L158: if !aesgcmPreferred(hs.clientHello.cipherSuites) {
handshake_server_tls13.go#L162: preferenceList = hs.clientHello.cipherSuites
handshake_server_tls13.go#L191: for _, ks := range hs.clientHello.keyShares {
handshake_server_tls13.go#L201: for _, group := range hs.clientHello.supportedCurves {
handshake_server_tls13.go#L216: clientKeyShare = &hs.clientHello.keyShares[0]
handshake_server_tls13.go#L235: c.serverName = hs.clientHello.serverName
handshake_server_tls13.go#L247: for _, mode := range hs.clientHello.pskModes {
handshake_server_tls13.go#L257: if len(hs.clientHello.pskIdentities) != len(hs.clientHello.pskBinders) {
handshake_server_tls13.go#L261: if len(hs.clientHello.pskIdentities) == 0 {
handshake_server_tls13.go#L265: for i, identity := range hs.clientHello.pskIdentities {
handshake_server_tls13.go#L315: transcript.Write(hs.clientHello.marshalWithoutBinders())
handshake_server_tls13.go#L317: if !hmac.Equal(hs.clientHello.pskBinders[i], pskBinder) {
handshake_server_tls13.go#L373: if len(hs.clientHello.supportedSignatureAlgorithms) == 0 {
handshake_server_tls13.go#L377: certificate, err := c.config.getCertificate(clientHelloInfo(c, hs.clientHello))
handshake_server_tls13.go#L386: hs.sigAlg, err = selectSignatureScheme(c.vers, certificate, hs.clientHello.supportedSignatureAlgorithms)
handshake_server_tls13.go#L415: hs.transcript.Write(hs.clientHello.marshal())
handshake_server_tls13.go#L461: if illegalClientHelloChange(clientHello, hs.clientHello) {
handshake_server_tls13.go#L466: hs.clientHello = clientHello
handshake_server_tls13.go#L531: hs.transcript.Write(hs.clientHello.marshal())
handshake_server_tls13.go#L555: err := c.config.writeKeyLog(keyLogLabelClientHandshake, hs.clientHello.random, clientSecret)
handshake_server_tls13.go#L560: err = c.config.writeKeyLog(keyLogLabelServerHandshake, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L568: if len(hs.clientHello.alpnProtocols) > 0 {
handshake_server_tls13.go#L569: if selectedProto := mutualProtocol(hs.clientHello.alpnProtocols, c.config.NextProtos); selectedProto != "" {
handshake_server_tls13.go#L614: certMsg.scts = hs.clientHello.scts && len(hs.cert.SignedCertificateTimestamps) > 0
handshake_server_tls13.go#L615: certMsg.ocspStapling = hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0
handshake_server_tls13.go#L680: err := c.config.writeKeyLog(keyLogLabelClientTraffic, hs.clientHello.random, hs.trafficSecret)
handshake_server_tls13.go#L685: err = c.config.writeKeyLog(keyLogLabelServerTraffic, hs.clientHello.random, serverSecret)
handshake_server_tls13.go#L711: for _, pskMode := range hs.clientHello.pskModes {
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |