type clientHandshakeState …
var testingOnlyForceClientHelloSignatureAlgorithms …
func (c *Conn) makeClientHello() (*clientHelloMsg, *keySharePrivateKeys, *echContext, error) { … }
type echContext …
func (c *Conn) clientHandshake(ctx context.Context) (err error) { … }
func (c *Conn) loadSession(hello *clientHelloMsg) (
session *SessionState, earlySecret, binderKey []byte, err error) { … }
func (c *Conn) pickTLSVersion(serverHello *serverHelloMsg) error { … }
func (hs *clientHandshakeState) handshake() error { … }
func (hs *clientHandshakeState) pickCipherSuite() error { … }
func (hs *clientHandshakeState) doFullHandshake() error { … }
func (hs *clientHandshakeState) establishKeys() error { … }
func (hs *clientHandshakeState) serverResumedSession() bool { … }
func (hs *clientHandshakeState) processServerHello() (bool, error) { … }
func checkALPN(clientProtos []string, serverProto string, quic bool) error { … }
func (hs *clientHandshakeState) readFinished(out []byte) error { … }
func (hs *clientHandshakeState) readSessionTicket() error { … }
func (hs *clientHandshakeState) saveSessionTicket() error { … }
func (hs *clientHandshakeState) sendFinished(out []byte) error { … }
const defaultMaxRSAKeySize …
var tlsmaxrsasize …
func checkKeySize(n int) (max int, ok bool) { … }
func (c *Conn) verifyServerCertificate(certificates [][]byte) error { … }
func certificateRequestInfoFromMsg(ctx context.Context, vers uint16, certReq *certificateRequestMsg) *CertificateRequestInfo { … }
func (c *Conn) getClientCertificate(cri *CertificateRequestInfo) (*Certificate, error) { … }
func (c *Conn) clientSessionCacheKey() string { … }
func hostnameInSNI(name string) string { … }
func computeAndUpdatePSK(m *clientHelloMsg, binderKey []byte, transcript hash.Hash, finishedHash func([]byte, hash.Hash) []byte) error { … }