const crypto/tls.VersionTLS12
43 uses
crypto/tls (current package)
auth.go#L161: {PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
auth.go#L162: {PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
auth.go#L163: {PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
auth.go#L164: {PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
auth.go#L236: if len(peerAlgs) == 0 && vers == VersionTLS12 {
cipher_suites.go#L39: supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
cipher_suites.go#L40: supportedOnlyTLS12 = []uint16{VersionTLS12}
common.go#L33: VersionTLS12 = 0x0303
common.go#L937: VersionTLS12,
common.go#L1120: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
common.go#L1178: if vers < VersionTLS12 || len(chi.SignatureSchemes) == 0 {
common.go#L1206: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
conn.go#L967: vers = VersionTLS12
conn.go#L1050: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1063: hasSignatureAlgorithm: c.vers >= VersionTLS12,
handshake_client.go#L62: if clientHelloVersion > VersionTLS12 {
handshake_client.go#L63: clientHelloVersion = VersionTLS12
handshake_client.go#L95: if hello.vers < VersionTLS12 && suite.flags&suiteTLS12 != 0 {
handshake_client.go#L115: if hello.vers >= VersionTLS12 {
handshake_client.go#L192: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L193: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L597: if c.vers >= VersionTLS12 {
handshake_client_tls13.go#L121: if hs.serverHello.vers != VersionTLS12 {
handshake_server.go#L191: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L192: if c.vers == VersionTLS12 {
handshake_server.go#L357: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L516: if c.vers >= VersionTLS12 {
handshake_server.go#L621: if c.vers >= VersionTLS12 {
handshake_server_tls13.go#L90: hs.hello.vers = VersionTLS12
key_agreement.go#L116: if version >= VersionTLS12 {
key_agreement.go#L184: if ka.version >= VersionTLS12 {
key_agreement.go#L216: if ka.version >= VersionTLS12 {
key_agreement.go#L222: if ka.version >= VersionTLS12 {
key_agreement.go#L291: if ka.version >= VersionTLS12 {
prf.go#L91: case VersionTLS12:
prf.go#L145: if version >= VersionTLS12 {
prf.go#L178: if h.version < VersionTLS12 {
prf.go#L191: if h.version >= VersionTLS12 {
prf.go#L219: if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
prf.go#L227: if h.version >= VersionTLS12 {
golang.org/x/net/http2
server.go#L436: if sc.tlsState.Version < tls.VersionTLS12 {
net/http
h2_bundle.go#L4002: if sc.tlsState.Version < tls.VersionTLS12 {
net/http/httptest
httptest.go#L83: Version: tls.VersionTLS12,
 |
The pages are generated with Golds v0.3.2-preview. (GOOS=darwin GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |