crypto/tls.clientHandshakeStateTLS13.serverHello (field)

54 uses

	crypto/tls (current package)
		handshake_client.go#L358: 			serverHello:  serverHello,
		handshake_client_tls13.go#L24: 	serverHello  *serverHelloMsg
		handshake_client_tls13.go#L81: 	if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
		handshake_client_tls13.go#L93: 		confTranscript.Write(hs.serverHello.original[:30])
		handshake_client_tls13.go#L95: 		confTranscript.Write(hs.serverHello.original[38:])
		handshake_client_tls13.go#L102: 		if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.random[len(hs.serverHello.random)-8:]) == 1 {
		handshake_client_tls13.go#L108: 			if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L113: 			if hs.hello.serverName == "" && hs.serverHello.serverNameAck {
		handshake_client_tls13.go#L121: 			echRetryConfigList = hs.serverHello.encryptedClientHello
		handshake_client_tls13.go#L125: 	if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
		handshake_client_tls13.go#L173: 	if hs.serverHello.supportedVersion == 0 {
		handshake_client_tls13.go#L178: 	if hs.serverHello.supportedVersion != VersionTLS13 {
		handshake_client_tls13.go#L183: 	if hs.serverHello.vers != VersionTLS12 {
		handshake_client_tls13.go#L188: 	if hs.serverHello.ocspStapling ||
		handshake_client_tls13.go#L189: 		hs.serverHello.ticketSupported ||
		handshake_client_tls13.go#L190: 		hs.serverHello.extendedMasterSecret ||
		handshake_client_tls13.go#L191: 		hs.serverHello.secureRenegotiationSupported ||
		handshake_client_tls13.go#L192: 		len(hs.serverHello.secureRenegotiation) != 0 ||
		handshake_client_tls13.go#L193: 		len(hs.serverHello.alpnProtocol) != 0 ||
		handshake_client_tls13.go#L194: 		len(hs.serverHello.scts) != 0 {
		handshake_client_tls13.go#L199: 	if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
		handshake_client_tls13.go#L204: 	if hs.serverHello.compressionMethod != compressionNone {
		handshake_client_tls13.go#L209: 	selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
		handshake_client_tls13.go#L250: 	if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
		handshake_client_tls13.go#L262: 		if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L263: 			if len(hs.serverHello.encryptedClientHello) != 8 {
		handshake_client_tls13.go#L269: 			hrrHello := make([]byte, len(hs.serverHello.original))
		handshake_client_tls13.go#L270: 			copy(hrrHello, hs.serverHello.original)
		handshake_client_tls13.go#L271: 			hrrHello = bytes.Replace(hrrHello, hs.serverHello.encryptedClientHello, make([]byte, 8), 1)
		handshake_client_tls13.go#L279: 			if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.encryptedClientHello) == 1 {
		handshake_client_tls13.go#L287: 		if err := transcriptMsg(hs.serverHello, hs.echContext.innerTranscript); err != nil {
		handshake_client_tls13.go#L290: 	} else if hs.serverHello.encryptedClientHello != nil {
		handshake_client_tls13.go#L299: 	if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
		handshake_client_tls13.go#L304: 	if hs.serverHello.cookie != nil {
		handshake_client_tls13.go#L305: 		hello.cookie = hs.serverHello.cookie
		handshake_client_tls13.go#L308: 	if hs.serverHello.serverShare.group != 0 {
		handshake_client_tls13.go#L316: 	if curveID := hs.serverHello.selectedGroup; curveID != 0 {
		handshake_client_tls13.go#L359: 			if err := transcriptMsg(hs.serverHello, transcript); err != nil {
		handshake_client_tls13.go#L411: 	hs.serverHello = serverHello
		handshake_client_tls13.go#L424: 	if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
		handshake_client_tls13.go#L429: 	if len(hs.serverHello.cookie) != 0 {
		handshake_client_tls13.go#L434: 	if hs.serverHello.selectedGroup != 0 {
		handshake_client_tls13.go#L439: 	if hs.serverHello.serverShare.group == 0 {
		handshake_client_tls13.go#L444: 		return ks.group == hs.serverHello.serverShare.group
		handshake_client_tls13.go#L450: 	if !hs.serverHello.selectedIdentityPresent {
		handshake_client_tls13.go#L454: 	if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
		handshake_client_tls13.go#L484: 	ecdhePeerData := hs.serverHello.serverShare.data
		handshake_client_tls13.go#L485: 	if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
		handshake_client_tls13.go#L490: 		ecdhePeerData = hs.serverHello.serverShare.data[:x25519PublicKeySize]
		handshake_client_tls13.go#L502: 	if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
		handshake_client_tls13.go#L506: 		ciphertext := hs.serverHello.serverShare.data[x25519PublicKeySize:]
		handshake_client_tls13.go#L514: 	c.curveID = hs.serverHello.serverShare.group