const crypto/tls.VersionTLS13

53 uses

	crypto/tls (current package)
		auth.go#L156: 	{PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
		auth.go#L157: 	{PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
		auth.go#L158: 	{PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
		auth.go#L183: 		if version != VersionTLS13 {
		cipher_suites.go#L46: 	supportedOnlyTLS13 = []uint16{VersionTLS13}
		common.go#L36: 	VersionTLS13 = 0x0304
		common.go#L56: 	case VersionTLS13:
		common.go#L1125: 	VersionTLS13,
		common.go#L1149: 		if isClient && c.EncryptedClientHelloConfigList != nil && v < VersionTLS13 {
		common.go#L1197: 	if version < VersionTLS13 {
		common.go#L1326: 		if vers == VersionTLS13 {
		common.go#L1367: 	if vers == VersionTLS13 {
		conn.go#L218: 	if hc.nextCipher == nil || hc.version == VersionTLS13 {
		conn.go#L349: 	if hc.version == VersionTLS13 && typ == recordTypeChangeCipherSpec {
		conn.go#L373: 			if hc.version == VersionTLS13 {
		conn.go#L411: 		if hc.version == VersionTLS13 {
		conn.go#L521: 		if hc.version == VersionTLS13 {
		conn.go#L655: 	if expectedVers == VersionTLS13 {
		conn.go#L675: 	if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
		conn.go#L708: 	if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
		conn.go#L726: 		if c.vers == VersionTLS13 {
		conn.go#L752: 		if c.vers == VersionTLS13 {
		conn.go#L924: 	if c.vers == VersionTLS13 {
		conn.go#L1014: 		} else if vers == VersionTLS13 {
		conn.go#L1036: 	if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
		conn.go#L1127: 		if c.vers == VersionTLS13 {
		conn.go#L1133: 		if c.vers == VersionTLS13 {
		conn.go#L1139: 		if c.vers == VersionTLS13 {
		conn.go#L1254: 	if c.vers == VersionTLS13 {
		conn.go#L1300: 	if c.vers != VersionTLS13 {
		conn.go#L1636: 	if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
		conn.go#L1645: 	} else if c.vers != VersionTLS13 && !c.extMasterSecret {
		defaults.go#L101: 	VersionTLS13,
		ech.go#L396: 		if v == VersionTLS13 {
		ech.go#L398: 		} else if v < VersionTLS13 {
		handshake_client.go#L142: 	if hello.supportedVersions[0] == VersionTLS13 {
		handshake_client.go#L211: 		if c.config.MinVersion != 0 && c.config.MinVersion < VersionTLS13 {
		handshake_client.go#L361: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L367: 	if c.vers == VersionTLS13 {
		handshake_client.go#L404: 	if hello.supportedVersions[0] == VersionTLS13 {
		handshake_client.go#L458: 	if session.version != VersionTLS13 {
		handshake_client_tls13.go#L172: 	if hs.serverHello.supportedVersion != VersionTLS13 {
		handshake_server.go#L49: 	if c.vers == VersionTLS13 {
		handshake_server.go#L191: 	if c.vers != VersionTLS13 && (ech != nil && !ech.inner) {
		handshake_server.go#L917: 		if c.vers == VersionTLS13 {
		handshake_server_tls13.go#L307: 			if v < VersionTLS13 {
		handshake_server_tls13.go#L382: 		if sessionState.version != VersionTLS13 {
		quic.go#L208: 	if q.conn.config.MinVersion < VersionTLS13 {
		ticket.go#L165: 		if s.version >= VersionTLS13 {
		ticket.go#L279: 	if ss.version < VersionTLS13 {

	golang.org/x/net/http2
		server.go#L301: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {

	mellium.im/sasl
		scram.go#L46: 		if tlsState.Version >= tls.VersionTLS13 {

	net/http
		h2_bundle.go#L4319: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {