net/http.Server.TLSConfig (field)

28 uses

	net/http (current package)
		h2_bundle.go#L3952: 	if s.TLSConfig == nil {
		h2_bundle.go#L3953: 		s.TLSConfig = new(tls.Config)
		h2_bundle.go#L3954: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		h2_bundle.go#L3959: 		for _, cs := range s.TLSConfig.CipherSuites {
		h2_bundle.go#L3980: 	s.TLSConfig.PreferServerCipherSuites = true
		h2_bundle.go#L3982: 	if !http2strSliceContains(s.TLSConfig.NextProtos, http2NextProtoTLS) {
		h2_bundle.go#L3983: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, http2NextProtoTLS)
		h2_bundle.go#L3985: 	if !http2strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		h2_bundle.go#L3986: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")
		server.go#L2581: 	TLSConfig *tls.Config
		server.go#L2976: 	if srv.TLSConfig == nil {
		server.go#L2992: 	return strSliceContains(srv.TLSConfig.NextProtos, http2NextProtoTLS)
		server.go#L3095: 	config := cloneTLSConfig(srv.TLSConfig)

	golang.org/x/net/http2
		server.go#L265: 	if s.TLSConfig == nil {
		server.go#L266: 		s.TLSConfig = new(tls.Config)
		server.go#L267: 	} else if s.TLSConfig.CipherSuites != nil && s.TLSConfig.MinVersion < tls.VersionTLS13 {
		server.go#L272: 		for _, cs := range s.TLSConfig.CipherSuites {
		server.go#L293: 	s.TLSConfig.PreferServerCipherSuites = true
		server.go#L295: 	if !strSliceContains(s.TLSConfig.NextProtos, NextProtoTLS) {
		server.go#L296: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, NextProtoTLS)
		server.go#L298: 	if !strSliceContains(s.TLSConfig.NextProtos, "http/1.1") {
		server.go#L299: 		s.TLSConfig.NextProtos = append(s.TLSConfig.NextProtos, "http/1.1")