const crypto/tls.VersionTLS12
51 uses
crypto/tls (current package)
auth.go#L162: {PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
auth.go#L163: {PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
auth.go#L164: {PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
auth.go#L165: {PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
auth.go#L238: if len(peerAlgs) == 0 && vers == VersionTLS12 {
cipher_suites.go#L44: supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
cipher_suites.go#L45: supportedOnlyTLS12 = []uint16{VersionTLS12}
common.go#L35: VersionTLS12 = 0x0303
common.go#L54: case VersionTLS12:
common.go#L1126: VersionTLS12,
common.go#L1144: if (c == nil || c.MinVersion == 0) && v < VersionTLS12 {
common.go#L1345: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
common.go#L1403: if vers < VersionTLS12 || len(chi.SignatureSchemes) == 0 {
common.go#L1431: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
conn.go#L658: expectedVers = VersionTLS12
conn.go#L1017: vers = VersionTLS12
conn.go#L1143: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1156: hasSignatureAlgorithm: c.vers >= VersionTLS12,
defaults.go#L100: VersionTLS12,
handshake_client.go#L89: if hello.vers > VersionTLS12 {
handshake_client.go#L90: hello.vers = VersionTLS12
handshake_client.go#L111: if maxVersion < VersionTLS12 && suite.flags&suiteTLS12 != 0 {
handshake_client.go#L134: if maxVersion >= VersionTLS12 {
handshake_client.go#L214: if c.config.MaxVersion != 0 && c.config.MaxVersion <= VersionTLS12 {
handshake_client.go#L361: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L362: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L803: if c.vers >= VersionTLS12 {
handshake_client_tls13.go#L177: if hs.serverHello.vers != VersionTLS12 {
handshake_server.go#L196: if c.config.MinVersion == 0 && c.vers < VersionTLS12 {
handshake_server.go#L228: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L229: if c.vers == VersionTLS12 {
handshake_server.go#L437: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L635: if c.vers >= VersionTLS12 {
handshake_server.go#L746: if c.vers >= VersionTLS12 {
handshake_server_tls13.go#L113: hs.hello.vers = VersionTLS12
key_agreement.go#L140: if version >= VersionTLS12 {
key_agreement.go#L208: if ka.version >= VersionTLS12 {
key_agreement.go#L240: if ka.version >= VersionTLS12 {
key_agreement.go#L246: if ka.version >= VersionTLS12 {
key_agreement.go#L323: if ka.version >= VersionTLS12 {
prf.go#L94: case VersionTLS12:
prf.go#L123: if version == VersionTLS12 {
prf.go#L157: if version >= VersionTLS12 {
prf.go#L190: if h.version < VersionTLS12 {
prf.go#L203: if h.version >= VersionTLS12 {
prf.go#L227: if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
prf.go#L235: if h.version >= VersionTLS12 {
github.com/aws/aws-sdk-go-v2/aws/transport/http
client.go#L25: DefaultHTTPTransportTLSMinVersion uint16 = tls.VersionTLS12
golang.org/x/net/http2
server.go#L518: if sc.tlsState.Version < tls.VersionTLS12 {
net/http
h2_bundle.go#L4560: if sc.tlsState.Version < tls.VersionTLS12 {
net/http/httptest
httptest.go#L90: Version: tls.VersionTLS12,