crypto/tls.clientHandshakeStateTLS13.serverHello (field)
54 uses
crypto/tls (current package)
handshake_client.go#L358: serverHello: serverHello,
handshake_client_tls13.go#L24: serverHello *serverHelloMsg
handshake_client_tls13.go#L81: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L93: confTranscript.Write(hs.serverHello.original[:30])
handshake_client_tls13.go#L95: confTranscript.Write(hs.serverHello.original[38:])
handshake_client_tls13.go#L102: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.random[len(hs.serverHello.random)-8:]) == 1 {
handshake_client_tls13.go#L108: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L113: if hs.hello.serverName == "" && hs.serverHello.serverNameAck {
handshake_client_tls13.go#L121: echRetryConfigList = hs.serverHello.encryptedClientHello
handshake_client_tls13.go#L125: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L173: if hs.serverHello.supportedVersion == 0 {
handshake_client_tls13.go#L178: if hs.serverHello.supportedVersion != VersionTLS13 {
handshake_client_tls13.go#L183: if hs.serverHello.vers != VersionTLS12 {
handshake_client_tls13.go#L188: if hs.serverHello.ocspStapling ||
handshake_client_tls13.go#L189: hs.serverHello.ticketSupported ||
handshake_client_tls13.go#L190: hs.serverHello.extendedMasterSecret ||
handshake_client_tls13.go#L191: hs.serverHello.secureRenegotiationSupported ||
handshake_client_tls13.go#L192: len(hs.serverHello.secureRenegotiation) != 0 ||
handshake_client_tls13.go#L193: len(hs.serverHello.alpnProtocol) != 0 ||
handshake_client_tls13.go#L194: len(hs.serverHello.scts) != 0 {
handshake_client_tls13.go#L199: if !bytes.Equal(hs.hello.sessionId, hs.serverHello.sessionId) {
handshake_client_tls13.go#L204: if hs.serverHello.compressionMethod != compressionNone {
handshake_client_tls13.go#L209: selectedSuite := mutualCipherSuiteTLS13(hs.hello.cipherSuites, hs.serverHello.cipherSuite)
handshake_client_tls13.go#L250: if err := transcriptMsg(hs.serverHello, hs.transcript); err != nil {
handshake_client_tls13.go#L262: if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L263: if len(hs.serverHello.encryptedClientHello) != 8 {
handshake_client_tls13.go#L269: hrrHello := make([]byte, len(hs.serverHello.original))
handshake_client_tls13.go#L270: copy(hrrHello, hs.serverHello.original)
handshake_client_tls13.go#L271: hrrHello = bytes.Replace(hrrHello, hs.serverHello.encryptedClientHello, make([]byte, 8), 1)
handshake_client_tls13.go#L279: if subtle.ConstantTimeCompare(acceptConfirmation, hs.serverHello.encryptedClientHello) == 1 {
handshake_client_tls13.go#L287: if err := transcriptMsg(hs.serverHello, hs.echContext.innerTranscript); err != nil {
handshake_client_tls13.go#L290: } else if hs.serverHello.encryptedClientHello != nil {
handshake_client_tls13.go#L299: if hs.serverHello.selectedGroup == 0 && hs.serverHello.cookie == nil {
handshake_client_tls13.go#L304: if hs.serverHello.cookie != nil {
handshake_client_tls13.go#L305: hello.cookie = hs.serverHello.cookie
handshake_client_tls13.go#L308: if hs.serverHello.serverShare.group != 0 {
handshake_client_tls13.go#L316: if curveID := hs.serverHello.selectedGroup; curveID != 0 {
handshake_client_tls13.go#L359: if err := transcriptMsg(hs.serverHello, transcript); err != nil {
handshake_client_tls13.go#L411: hs.serverHello = serverHello
handshake_client_tls13.go#L424: if bytes.Equal(hs.serverHello.random, helloRetryRequestRandom) {
handshake_client_tls13.go#L429: if len(hs.serverHello.cookie) != 0 {
handshake_client_tls13.go#L434: if hs.serverHello.selectedGroup != 0 {
handshake_client_tls13.go#L439: if hs.serverHello.serverShare.group == 0 {
handshake_client_tls13.go#L444: return ks.group == hs.serverHello.serverShare.group
handshake_client_tls13.go#L450: if !hs.serverHello.selectedIdentityPresent {
handshake_client_tls13.go#L454: if int(hs.serverHello.selectedIdentity) >= len(hs.hello.pskIdentities) {
handshake_client_tls13.go#L484: ecdhePeerData := hs.serverHello.serverShare.data
handshake_client_tls13.go#L485: if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
handshake_client_tls13.go#L490: ecdhePeerData = hs.serverHello.serverShare.data[:x25519PublicKeySize]
handshake_client_tls13.go#L502: if hs.serverHello.serverShare.group == x25519Kyber768Draft00 {
handshake_client_tls13.go#L506: ciphertext := hs.serverHello.serverShare.data[x25519PublicKeySize:]
handshake_client_tls13.go#L514: c.curveID = hs.serverHello.serverShare.group
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |