const crypto/tls.VersionTLS13
47 uses
crypto/tls (current package)
auth.go#L155: {PSSWithSHA256, crypto.SHA256.Size()*2 + 2, VersionTLS13},
auth.go#L156: {PSSWithSHA384, crypto.SHA384.Size()*2 + 2, VersionTLS13},
auth.go#L157: {PSSWithSHA512, crypto.SHA512.Size()*2 + 2, VersionTLS13},
auth.go#L182: if version != VersionTLS13 {
cipher_suites.go#L44: supportedOnlyTLS13 = []uint16{VersionTLS13}
common.go#L35: VersionTLS13 = 0x0304
common.go#L55: case VersionTLS13:
common.go#L1075: VersionTLS13,
common.go#L1099: if isClient && c.EncryptedClientHelloConfigList != nil && v < VersionTLS13 {
common.go#L1149: if version < VersionTLS13 {
common.go#L1280: if vers == VersionTLS13 {
common.go#L1321: if vers == VersionTLS13 {
conn.go#L218: if hc.nextCipher == nil || hc.version == VersionTLS13 {
conn.go#L349: if hc.version == VersionTLS13 && typ == recordTypeChangeCipherSpec {
conn.go#L373: if hc.version == VersionTLS13 {
conn.go#L411: if hc.version == VersionTLS13 {
conn.go#L521: if hc.version == VersionTLS13 {
conn.go#L655: if expectedVers == VersionTLS13 {
conn.go#L675: if c.vers == VersionTLS13 && n > maxCiphertextTLS13 || n > maxCiphertext {
conn.go#L708: if c.vers == VersionTLS13 && typ != recordTypeHandshake && c.hand.Len() > 0 {
conn.go#L726: if c.vers == VersionTLS13 {
conn.go#L752: if c.vers == VersionTLS13 {
conn.go#L924: if c.vers == VersionTLS13 {
conn.go#L1014: } else if vers == VersionTLS13 {
conn.go#L1036: if typ == recordTypeChangeCipherSpec && c.vers != VersionTLS13 {
conn.go#L1127: if c.vers == VersionTLS13 {
conn.go#L1133: if c.vers == VersionTLS13 {
conn.go#L1139: if c.vers == VersionTLS13 {
conn.go#L1254: if c.vers == VersionTLS13 {
conn.go#L1300: if c.vers != VersionTLS13 {
conn.go#L1636: if (!c.didResume || c.extMasterSecret) && c.vers != VersionTLS13 {
conn.go#L1645: } else if c.vers != VersionTLS13 && !c.extMasterSecret {
handshake_client.go#L139: if hello.supportedVersions[0] == VersionTLS13 {
handshake_client.go#L199: if c.config.MinVersion != 0 && c.config.MinVersion < VersionTLS13 {
handshake_client.go#L348: if maxVers == VersionTLS13 && c.vers <= VersionTLS12 && (tls12Downgrade || tls11Downgrade) ||
handshake_client.go#L354: if c.vers == VersionTLS13 {
handshake_client.go#L391: if hello.supportedVersions[0] == VersionTLS13 {
handshake_client.go#L445: if session.version != VersionTLS13 {
handshake_client_tls13.go#L178: if hs.serverHello.supportedVersion != VersionTLS13 {
handshake_server.go#L48: if c.vers == VersionTLS13 {
handshake_server.go#L893: if c.vers == VersionTLS13 {
handshake_server_tls13.go#L272: if v < VersionTLS13 {
handshake_server_tls13.go#L347: if sessionState.version != VersionTLS13 {
quic.go#L208: if q.conn.config.MinVersion < VersionTLS13 {
ticket.go#L165: if s.version >= VersionTLS13 {
ticket.go#L279: if ss.version < VersionTLS13 {
net/http
h2_bundle.go#L4131: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
 |
The pages are generated with Golds v0.7.6. (GOOS=linux GOARCH=amd64)
Golds is a Go 101 project developed by Tapir Liu.
PR and bug reports are welcome and can be submitted to the issue list.
Please follow @zigo_101 (reachable from the left QR code) to get the latest news of Golds. |