net/http.conn.server (field)
23 uses
net/http (current package)
server.go#L251: server *Server
server.go#L615: server: srv,
server.go#L969: if d := c.server.readHeaderTimeout(); d > 0 {
server.go#L972: if d := c.server.ReadTimeout; d > 0 {
server.go#L976: if d := c.server.WriteTimeout; d > 0 {
server.go#L982: c.r.setReadLimit(c.server.initialReadLimitSize())
server.go#L1137: w.conn.server.logf("http: response.WriteHeader on hijacked connection from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
server.go#L1142: w.conn.server.logf("http: superfluous response.WriteHeader call from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
server.go#L1158: w.conn.server.logf("http: invalid Content-Length of %q", cl)
server.go#L1228: keepAlivesEnabled := w.conn.server.doKeepAlives()
server.go#L1423: w.conn.server.logf("http: WriteHeader called with both Transfer-Encoding of %q and a Content-Length of %d",
server.go#L1585: w.conn.server.logf("http: response.Write on hijacked connection from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
server.go#L1754: srv := c.server
server.go#L1826: c.server.logf("http: panic serving %v: %v\n%s", c.remoteAddr, err, buf)
server.go#L1842: tlsTO := c.server.tlsHandshakeTimeout()
server.go#L1857: c.server.logf("http: TLS handshake error from %s: %v", c.rwc.RemoteAddr(), err)
server.go#L1868: if fn := c.server.TLSNextProto[proto]; fn != nil {
server.go#L1869: h := initALPNRequest{ctx, tlsConn, serverHandler{c.server}}
server.go#L1874: fn(c.server, tlsConn, h)
server.go#L1892: if c.r.remain != c.server.initialReadLimitSize() {
server.go#L1966: serverHandler{c.server}.ServeHTTP(w, w.req)
server.go#L1982: if !w.conn.server.doKeepAlives() {
server.go#L1990: if d := c.server.idleTimeout(); d != 0 {