crypto/tls.serverHandshakeState.clientHello (field)
33 uses
crypto/tls (current package)
handshake_server.go#L28: clientHello *clientHelloMsg
handshake_server.go#L60: clientHello: clientHello,
handshake_server.go#L126: c.ekm = ekmFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random)
handshake_server.go#L188: for _, compression := range hs.clientHello.compressionMethods {
handshake_server.go#L218: if len(hs.clientHello.secureRenegotiation) != 0 {
handshake_server.go#L223: hs.hello.extendedMasterSecret = hs.clientHello.extendedMasterSecret
handshake_server.go#L224: hs.hello.secureRenegotiationSupported = hs.clientHello.secureRenegotiationSupported
handshake_server.go#L226: if len(hs.clientHello.serverName) > 0 {
handshake_server.go#L227: c.serverName = hs.clientHello.serverName
handshake_server.go#L230: selectedProto, err := negotiateALPN(c.config.NextProtos, hs.clientHello.alpnProtocols, false)
handshake_server.go#L238: hs.cert, err = c.config.getCertificate(clientHelloInfo(hs.ctx, c, hs.clientHello))
handshake_server.go#L247: if hs.clientHello.scts {
handshake_server.go#L251: hs.ecdheOk = supportsECDHE(c.config, c.vers, hs.clientHello.supportedCurves, hs.clientHello.supportedPoints)
handshake_server.go#L253: if hs.ecdheOk && len(hs.clientHello.supportedPoints) > 0 {
handshake_server.go#L353: if !hasAESGCMHardwareSupport || !aesgcmPreferred(hs.clientHello.cipherSuites) {
handshake_server.go#L368: hs.suite = selectCipherSuite(preferenceList, hs.clientHello.cipherSuites, hs.cipherSuiteOk)
handshake_server.go#L384: for _, id := range hs.clientHello.cipherSuites {
handshake_server.go#L387: if hs.clientHello.vers < c.config.maxSupportedVersion(roleServer) {
handshake_server.go#L429: ss, err := c.config.UnwrapSession(hs.clientHello.sessionTicket, c.connectionStateLocked())
handshake_server.go#L438: plaintext := c.config.decryptTicket(hs.clientHello.sessionTicket, c.ticketKeys)
handshake_server.go#L464: for _, id := range hs.clientHello.cipherSuites {
handshake_server.go#L498: if !sessionState.extMasterSecret && hs.clientHello.extendedMasterSecret {
handshake_server.go#L501: if sessionState.extMasterSecret && !hs.clientHello.extendedMasterSecret {
handshake_server.go#L525: hs.hello.sessionId = hs.clientHello.sessionId
handshake_server.go#L532: if err := transcriptMsg(hs.clientHello, &hs.finishedHash); err != nil {
handshake_server.go#L554: if hs.clientHello.ocspStapling && len(hs.cert.OCSPStaple) > 0 {
handshake_server.go#L558: hs.hello.ticketSupported = hs.clientHello.ticketSupported && !c.config.SessionTicketsDisabled
handshake_server.go#L567: if err := transcriptMsg(hs.clientHello, &hs.finishedHash); err != nil {
handshake_server.go#L589: skx, err := keyAgreement.generateServerKeyExchange(c.config, hs.cert, hs.clientHello, hs.hello)
handshake_server.go#L693: hs.clientHello.random, hs.hello.random)
handshake_server.go#L695: if err := c.config.writeKeyLog(keyLogLabelTLS12, hs.clientHello.random, hs.masterSecret); err != nil {
handshake_server.go#L759: keysFromMasterSecret(c.vers, hs.suite, hs.masterSecret, hs.clientHello.random, hs.hello.random, hs.suite.macLen, hs.suite.keyLen, hs.suite.ivLen)
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |