const crypto/tls.VersionTLS12
44 uses
crypto/tls (current package)
auth.go#L161: {PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
auth.go#L162: {PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
auth.go#L163: {PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
auth.go#L164: {PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
auth.go#L237: if len(peerAlgs) == 0 && vers == VersionTLS12 {
cipher_suites.go#L41: supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
cipher_suites.go#L42: supportedOnlyTLS12 = []uint16{VersionTLS12}
common.go#L31: VersionTLS12 = 0x0303
common.go#L50: case VersionTLS12:
common.go#L1021: VersionTLS12,
common.go#L1038: isClient && v < VersionTLS12 {
common.go#L1219: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
common.go#L1277: if vers < VersionTLS12 || len(chi.SignatureSchemes) == 0 {
common.go#L1305: if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
conn.go#L654: expectedVers = VersionTLS12
conn.go#L1013: vers = VersionTLS12
conn.go#L1127: hasSignatureAlgorithm: c.vers >= VersionTLS12,
conn.go#L1140: hasSignatureAlgorithm: c.vers >= VersionTLS12,
handshake_client.go#L69: if clientHelloVersion > VersionTLS12 {
handshake_client.go#L70: clientHelloVersion = VersionTLS12
handshake_client.go#L106: if hello.vers < VersionTLS12 && suite.flags&suiteTLS12 != 0 {
handshake_client.go#L129: if hello.vers >= VersionTLS12 {
handshake_client.go#L244: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L245: maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
handshake_client.go#L678: if c.vers >= VersionTLS12 {
handshake_client_tls13.go#L132: if hs.serverHello.vers != VersionTLS12 {
handshake_server.go#L198: if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
handshake_server.go#L199: if c.vers == VersionTLS12 {
handshake_server.go#L398: if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
handshake_server.go#L593: if c.vers >= VersionTLS12 {
handshake_server.go#L704: if c.vers >= VersionTLS12 {
handshake_server_tls13.go#L97: hs.hello.vers = VersionTLS12
key_agreement.go#L140: if version >= VersionTLS12 {
key_agreement.go#L208: if ka.version >= VersionTLS12 {
key_agreement.go#L240: if ka.version >= VersionTLS12 {
key_agreement.go#L246: if ka.version >= VersionTLS12 {
key_agreement.go#L323: if ka.version >= VersionTLS12 {
prf.go#L92: case VersionTLS12:
prf.go#L154: if version >= VersionTLS12 {
prf.go#L187: if h.version < VersionTLS12 {
prf.go#L200: if h.version >= VersionTLS12 {
prf.go#L228: if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
prf.go#L236: if h.version >= VersionTLS12 {
net/http
h2_bundle.go#L4289: if sc.tlsState.Version < tls.VersionTLS12 {
|
The pages are generated with Golds v0.6.7. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @Go100and1 (reachable from the left QR code) to get the latest news of Golds. |