net/http.Server.TLSConfig (field)

28 uses

	net/http (current package)
		h2_bundle.go#L4317: 	if s.TLSConfig == nil {
		h2_bundle.go#L4318: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L4319: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		h2_bundle.go#L4324: 		for _, cs := range s.TLSConfig.CipherSuites {
		h2_bundle.go#L4345: 	s.TLSConfig.PreferServerCipherSuites = true
		h2_bundle.go#L4347: 	if !http2strSliceContains(s.TLSConfig.NextProtos, http2NextProtoTLS) {
		h2_bundle.go#L4348: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
		h2_bundle.go#L4350: 	if !http2strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		h2_bundle.go#L4351: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
		server.go#L2974: 	TLSConfig *tls.Config
		server.go#L3358: 	if s.TLSConfig == nil {
		server.go#L3377: 	return slices.Contains(s.TLSConfig.NextProtos, http2NextProtoTLS)
		server.go#L3479: 	config := cloneTLSConfig(s.TLSConfig)

	golang.org/x/net/http2
		server.go#L299: 	if s.TLSConfig == nil {
		server.go#L300: 		s.TLSConfig = new(tls.Config)
		server.go#L301: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		server.go#L306: 		for _, cs := range s.TLSConfig.CipherSuites {
		server.go#L327: 	s.TLSConfig.PreferServerCipherSuites = true
		server.go#L329: 	if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
		server.go#L330: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
		server.go#L332: 	if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		server.go#L333: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")