net/http.Server.TLSConfig (field)

28 uses

	net/http (current package)
		h2_bundle.go#L4217: 	if s.TLSConfig == nil {
		h2_bundle.go#L4218: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L4219: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		h2_bundle.go#L4224: 		for _, cs := range s.TLSConfig.CipherSuites {
		h2_bundle.go#L4245: 	s.TLSConfig.PreferServerCipherSuites = true
		h2_bundle.go#L4247: 	if !http2strSliceContains(s.TLSConfig.NextProtos, http2NextProtoTLS) {
		h2_bundle.go#L4248: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
		h2_bundle.go#L4250: 	if !http2strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		h2_bundle.go#L4251: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
		server.go#L3013: 	TLSConfig *tls.Config
		server.go#L3397: 	if s.TLSConfig == nil {
		server.go#L3416: 	return slices.Contains(s.TLSConfig.NextProtos, http2NextProtoTLS)
		server.go#L3518: 	config := cloneTLSConfig(s.TLSConfig)

	golang.org/x/net/http2
		server.go#L237: 	if s.TLSConfig == nil {
		server.go#L238: 		s.TLSConfig = new(tls.Config)
		server.go#L239: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		server.go#L244: 		for _, cs := range s.TLSConfig.CipherSuites {
		server.go#L265: 	s.TLSConfig.PreferServerCipherSuites = true
		server.go#L267: 	if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
		server.go#L268: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
		server.go#L270: 	if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		server.go#L271: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")