const crypto/tls.VersionTLS13
53 uses
crypto/tls (current package)
auth.go#L156: {PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
auth.go#L157: {PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
auth.go#L158: {PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
auth.go#L183: if version != VersionTLS13 {
cipher_suites.go#L46: supportedOnlyTLS13 = []uint16{VersionTLS13}
common.go#L36: VersionTLS13 = 0x0304
common.go#L56: case VersionTLS13:
common.go#L1125: VersionTLS13,
common.go#L1149: if isClient && c.EncryptedClientHelloConfigList != nil && v < VersionTLS13 {
common.go#L1197: if version < VersionTLS13 {
common.go#L1326: if vers == VersionTLS13 {
common.go#L1367: if vers == VersionTLS13 {
conn.go#L218: if hc.nextCipher == nil || hc.version == VersionTLS13 {
conn.go#L349: if hc.version == VersionTLS13 && typ == recordTypeChangeCipherSpec {
conn.go#L373: if hc.version == VersionTLS13 {
conn.go#L411: if hc.version == VersionTLS13 {
conn.go#L521: if hc.version == VersionTLS13 {
conn.go#L655: if expectedVers == VersionTLS13 {
conn.go#L675: if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
conn.go#L708: if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
conn.go#L726: if c.vers == VersionTLS13 {
conn.go#L752: if c.vers == VersionTLS13 {
conn.go#L924: if c.vers == VersionTLS13 {
conn.go#L1014: } else if vers == VersionTLS13 {
conn.go#L1036: if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
conn.go#L1127: if c.vers == VersionTLS13 {
conn.go#L1133: if c.vers == VersionTLS13 {
conn.go#L1139: if c.vers == VersionTLS13 {
conn.go#L1254: if c.vers == VersionTLS13 {
conn.go#L1300: if c.vers != VersionTLS13 {
conn.go#L1636: if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
conn.go#L1645: } else if c.vers != VersionTLS13 && !c.extMasterSecret {
defaults.go#L101: VersionTLS13,
ech.go#L396: if v == VersionTLS13 {
ech.go#L398: } else if v < VersionTLS13 {
handshake_client.go#L142: if hello.supportedVersions[0] == VersionTLS13 {
handshake_client.go#L211: if c.config.MinVersion != 0 && c.config.MinVersion < VersionTLS13 {
handshake_client.go#L361: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L367: if c.vers == VersionTLS13 {
handshake_client.go#L404: if hello.supportedVersions[0] == VersionTLS13 {
handshake_client.go#L458: if session.version != VersionTLS13 {
handshake_client_tls13.go#L172: if hs.serverHello.supportedVersion != VersionTLS13 {
handshake_server.go#L49: if c.vers == VersionTLS13 {
handshake_server.go#L191: if c.vers != VersionTLS13 && (ech != nil && !ech.inner) {
handshake_server.go#L917: if c.vers == VersionTLS13 {
handshake_server_tls13.go#L307: if v < VersionTLS13 {
handshake_server_tls13.go#L382: if sessionState.version != VersionTLS13 {
quic.go#L208: if q.conn.config.MinVersion < VersionTLS13 {
ticket.go#L165: if s.version >= VersionTLS13 {
ticket.go#L279: if ss.version < VersionTLS13 {
golang.org/x/net/http2
server.go#L301: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
mellium.im/sasl
scram.go#L46: if tlsState.Version >= tls.VersionTLS13 {
net/http
h2_bundle.go#L4319: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {