net/http.Server.TLSConfig (field)
28 uses
net/http (current package)
h2_bundle.go#L3952: if s.TLSConfig == nil {
h2_bundle.go#L3953: s.TLSConfig = new(tls.Config)
h2_bundle.go#L3954: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
h2_bundle.go#L3959: for _, cs := range s.TLSConfig.CipherSuites {
h2_bundle.go#L3980: s.TLSConfig.PreferServerCipherSuites = true
h2_bundle.go#L3982: if !http2strSliceContains(s.TLSConfig.NextProtos, http2NextProtoTLS) {
h2_bundle.go#L3983: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
h2_bundle.go#L3985: if !http2strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
h2_bundle.go#L3986: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
server.go#L2581: TLSConfig *tls.Config
server.go#L2976: if srv.TLSConfig == nil {
server.go#L2992: return strSliceContains(srv.TLSConfig.NextProtos, http2NextProtoTLS)
server.go#L3095: config := cloneTLSConfig(srv.TLSConfig)
golang.org/x/net/http2
server.go#L265: if s.TLSConfig == nil {
server.go#L266: s.TLSConfig = new(tls.Config)
server.go#L267: } else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
server.go#L272: for _, cs := range s.TLSConfig.CipherSuites {
server.go#L293: s.TLSConfig.PreferServerCipherSuites = true
server.go#L295: if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
server.go#L296: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
server.go#L298: if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
server.go#L299: s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")