const crypto/tls.VersionTLS12

44 uses

	crypto/tls (current package)
		auth.go#L161: 	{PKCS1WithSHA256, 19 + crypto.SHA256.Size() + 11, VersionTLS12},
		auth.go#L162: 	{PKCS1WithSHA384, 19 + crypto.SHA384.Size() + 11, VersionTLS12},
		auth.go#L163: 	{PKCS1WithSHA512, 19 + crypto.SHA512.Size() + 11, VersionTLS12},
		auth.go#L164: 	{PKCS1WithSHA1, 15 + crypto.SHA1.Size() + 11, VersionTLS12},
		auth.go#L237: 	if len(peerAlgs) == 0 && vers == VersionTLS12 {
		cipher_suites.go#L41: 	supportedUpToTLS12 = []uint16{VersionTLS10, VersionTLS11, VersionTLS12}
		cipher_suites.go#L42: 	supportedOnlyTLS12 = []uint16{VersionTLS12}
		common.go#L31: 	VersionTLS12 = 0x0303
		common.go#L50: 	case VersionTLS12:
		common.go#L1021: 	VersionTLS12,
		common.go#L1038: 			isClient && v < VersionTLS12 {
		common.go#L1219: 			if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		common.go#L1277: 			if vers < VersionTLS12 || len(chi.SignatureSchemes) == 0 {
		common.go#L1305: 		if vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		conn.go#L654: 		expectedVers = VersionTLS12
		conn.go#L1013: 			vers = VersionTLS12
		conn.go#L1127: 				hasSignatureAlgorithm: c.vers >= VersionTLS12,
		conn.go#L1140: 			hasSignatureAlgorithm: c.vers >= VersionTLS12,
		handshake_client.go#L69: 	if clientHelloVersion > VersionTLS12 {
		handshake_client.go#L70: 		clientHelloVersion = VersionTLS12
		handshake_client.go#L106: 		if hello.vers < VersionTLS12 && suite.flags&suiteTLS12 != 0 {
		handshake_client.go#L129: 	if hello.vers >= VersionTLS12 {
		handshake_client.go#L244: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L245: 		maxVers == VersionTLS12 && c.vers <= VersionTLS11 && tls11Downgrade {
		handshake_client.go#L678: 		if c.vers >= VersionTLS12 {
		handshake_client_tls13.go#L132: 	if hs.serverHello.vers != VersionTLS12 {
		handshake_server.go#L198: 	if maxVers >= VersionTLS12 && c.vers < maxVers || testingOnlyForceDowngradeCanary {
		handshake_server.go#L199: 		if c.vers == VersionTLS12 {
		handshake_server.go#L398: 	if hs.c.vers < VersionTLS12 && c.flags&suiteTLS12 != 0 {
		handshake_server.go#L593: 		if c.vers >= VersionTLS12 {
		handshake_server.go#L704: 		if c.vers >= VersionTLS12 {
		handshake_server_tls13.go#L97: 	hs.hello.vers = VersionTLS12
		key_agreement.go#L140: 	if version >= VersionTLS12 {
		key_agreement.go#L208: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L240: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L246: 	if ka.version >= VersionTLS12 {
		key_agreement.go#L323: 	if ka.version >= VersionTLS12 {
		prf.go#L92: 	case VersionTLS12:
		prf.go#L154: 	if version >= VersionTLS12 {
		prf.go#L187: 	if h.version < VersionTLS12 {
		prf.go#L200: 	if h.version >= VersionTLS12 {
		prf.go#L228: 	if (h.version >= VersionTLS12 || sigType == signatureEd25519) && h.buffer == nil {
		prf.go#L236: 	if h.version >= VersionTLS12 {

	net/http
		h2_bundle.go#L4289: 		if sc.tlsState.Version < tls.VersionTLS12 {