const crypto/tls.VersionTLS12

49 uses

	crypto/tls (current package)
		auth.go#L227: 	if len(peerAlgs) == 0 && vers == VersionTLS12 {
		cipher_suites.go#L44: 	supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
		cipher_suites.go#L45: 	supportedOnlyTLS12 = []uint16{VersionTLS12}
		common.go#L35: 	VersionTLS12 = 0x0303
		common.go#L54: 	case VersionTLS12:
		common.go#L1158: 	VersionTLS12,
		common.go#L1178: 		if (c == nil || c.MinVersion == 0) && v < VersionTLS12 {
		common.go#L1372: 			if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		common.go#L1434: 			if vers < VersionTLS12 || len(chi.SignatureSchemes) == 0 {
		common.go#L1462: 		if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		common.go#L1725: 	if version > VersionTLS12 {
		conn.go#L656: 		expectedVers = VersionTLS12
		conn.go#L1024: 			vers = VersionTLS12
		conn.go#L1150: 				hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1163: 			hasSignatureAlgorithm: c.vers >= VersionTLS12,
		defaults_fips140.go#L30: 		VersionTLS12,
		handshake_client.go#L89: 	if hello.vers > VersionTLS12 {
		handshake_client.go#L90: 		hello.vers = VersionTLS12
		handshake_client.go#L99: 	if maxVersion < VersionTLS12 {
		handshake_client.go#L122: 	if maxVersion >= VersionTLS12 {
		handshake_client.go#L201: 		if c.config.MaxVersion != 0 && c.config.MaxVersion <= VersionTLS12 {
		handshake_client.go#L349: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L350: 		maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
		handshake_client.go#L814: 		if c.vers >= VersionTLS12 {
		handshake_client_tls13.go#L178: 	if hs.serverHello.vers != VersionTLS12 {
		handshake_server.go#L186: 		clientVersions = supportedVersionsFromMax(VersionTLS12)
		handshake_server.go#L211: 	if c.config.MinVersion == 0 && c.vers < VersionTLS12 {
		handshake_server.go#L243: 	if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
		handshake_server.go#L244: 		if c.vers == VersionTLS12 {
		handshake_server.go#L447: 	if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		handshake_server.go#L655: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L770: 		if c.vers >= VersionTLS12 {
		handshake_server_tls13.go#L114: 	hs.hello.vers = VersionTLS12
		key_agreement.go#L141: 	if version >= VersionTLS12 {
		key_agreement.go#L212: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L248: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L254: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L335: 	if ka.version >= VersionTLS12 {
		prf.go#L94: 	case VersionTLS12:
		prf.go#L123: 	if version == VersionTLS12 {
		prf.go#L157: 	if version >= VersionTLS12 {
		prf.go#L190: 	if h.version < VersionTLS12 {
		prf.go#L203: 	if h.version >= VersionTLS12 {
		prf.go#L227: 	if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
		prf.go#L235: 	if h.version >= VersionTLS12 {

	golang.org/x/net/http2
		server.go#L483: 		if sc.tlsState.Version < tls.VersionTLS12 {

	google.golang.org/grpc/credentials
		tls.go#L241: 	if config.MinVersion == 0 && (config.MaxVersion == 0 || config.MaxVersion >= tls.VersionTLS12) {
		tls.go#L242: 		config.MinVersion = tls.VersionTLS12

	net/http
		h2_bundle.go#L4460: 		if sc.tlsState.Version < tls.VersionTLS12 {