net/http.Server.TLSConfig (field)
28 uses
net/http (current package)
h2_bundle.go#L4317: if s.TLSConfig == nil {
h2_bundle.go#L4318: s.TLSConfig = new(tls.Config)
h2_bundle.go#L4319: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
h2_bundle.go#L4324: for _, cs := range s.TLSConfig.CipherSuites {
h2_bundle.go#L4345: s.TLSConfig.PreferServerCipherSuites = true
h2_bundle.go#L4347: if !http2strSliceContains(s.TLSConfig.NextProtos, http2NextProtoTLS) {
h2_bundle.go#L4348: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
h2_bundle.go#L4350: if !http2strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
h2_bundle.go#L4351: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
server.go#L2974: TLSConfig *tls.Config
server.go#L3358: if s.TLSConfig == nil {
server.go#L3377: return slices.Contains(s.TLSConfig.NextProtos, http2NextProtoTLS)
server.go#L3479: config := cloneTLSConfig(s.TLSConfig)
golang.org/x/net/http2
server.go#L299: if s.TLSConfig == nil {
server.go#L300: s.TLSConfig = new(tls.Config)
server.go#L301: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
server.go#L306: for _, cs := range s.TLSConfig.CipherSuites {
server.go#L327: s.TLSConfig.PreferServerCipherSuites = true
server.go#L329: if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
server.go#L330: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
server.go#L332: if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
server.go#L333: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")