const crypto/tls.VersionTLS13

47 uses

	crypto/tls (current package)
		auth.go#L155: 	{PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
		auth.go#L156: 	{PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
		auth.go#L157: 	{PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
		auth.go#L182: 		if version != VersionTLS13 {
		cipher_suites.go#L44: 	supportedOnlyTLS13 = []uint16{VersionTLS13}
		common.go#L35: 	VersionTLS13 = 0x0304
		common.go#L55: 	case VersionTLS13:
		common.go#L1075: 	VersionTLS13,
		common.go#L1099: 		if isClient && c.EncryptedClientHelloConfigList != nil && v < VersionTLS13 {
		common.go#L1149: 	if version < VersionTLS13 {
		common.go#L1280: 		if vers == VersionTLS13 {
		common.go#L1321: 	if vers == VersionTLS13 {
		conn.go#L218: 	if hc.nextCipher == nil || hc.version == VersionTLS13 {
		conn.go#L349: 	if hc.version == VersionTLS13 && typ == recordTypeChangeCipherSpec {
		conn.go#L373: 			if hc.version == VersionTLS13 {
		conn.go#L411: 		if hc.version == VersionTLS13 {
		conn.go#L521: 		if hc.version == VersionTLS13 {
		conn.go#L655: 	if expectedVers == VersionTLS13 {
		conn.go#L675: 	if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
		conn.go#L708: 	if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
		conn.go#L726: 		if c.vers == VersionTLS13 {
		conn.go#L752: 		if c.vers == VersionTLS13 {
		conn.go#L924: 	if c.vers == VersionTLS13 {
		conn.go#L1014: 		} else if vers == VersionTLS13 {
		conn.go#L1036: 	if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
		conn.go#L1127: 		if c.vers == VersionTLS13 {
		conn.go#L1133: 		if c.vers == VersionTLS13 {
		conn.go#L1139: 		if c.vers == VersionTLS13 {
		conn.go#L1254: 	if c.vers == VersionTLS13 {
		conn.go#L1300: 	if c.vers != VersionTLS13 {
		conn.go#L1636: 	if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
		conn.go#L1645: 	} else if c.vers != VersionTLS13 && !c.extMasterSecret {
		handshake_client.go#L139: 	if hello.supportedVersions[0] == VersionTLS13 {
		handshake_client.go#L199: 		if c.config.MinVersion != 0 && c.config.MinVersion < VersionTLS13 {
		handshake_client.go#L348: 	if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
		handshake_client.go#L354: 	if c.vers == VersionTLS13 {
		handshake_client.go#L391: 	if hello.supportedVersions[0] == VersionTLS13 {
		handshake_client.go#L445: 	if session.version != VersionTLS13 {
		handshake_client_tls13.go#L178: 	if hs.serverHello.supportedVersion != VersionTLS13 {
		handshake_server.go#L48: 	if c.vers == VersionTLS13 {
		handshake_server.go#L893: 		if c.vers == VersionTLS13 {
		handshake_server_tls13.go#L272: 			if v < VersionTLS13 {
		handshake_server_tls13.go#L347: 		if sessionState.version != VersionTLS13 {
		quic.go#L208: 	if q.conn.config.MinVersion < VersionTLS13 {
		ticket.go#L165: 		if s.version >= VersionTLS13 {
		ticket.go#L279: 	if ss.version < VersionTLS13 {

	net/http
		h2_bundle.go#L4131: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {