net/http.conn.server (field)

28 uses

	net/http (current package)
		server.go#L257: 	server *Server
		server.go#L636: 		server: s,
		server.go#L1022: 	if d := c.server.readHeaderTimeout(); d > 0 {
		server.go#L1025: 	if d := c.server.ReadTimeout; d > 0 {
		server.go#L1029: 	if d := c.server.WriteTimeout; d > 0 {
		server.go#L1035: 	c.r.setReadLimit(c.server.initialReadLimitSize())
		server.go#L1188: 		w.conn.server.logf("http: response.WriteHeader on hijacked connection from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
		server.go#L1193: 		w.conn.server.logf("http: superfluous response.WriteHeader call from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
		server.go#L1231: 			w.conn.server.logf("http: invalid Content-Length of %q", cl)
		server.go#L1301: 	keepAlivesEnabled := w.conn.server.doKeepAlives()
		server.go#L1507: 		w.conn.server.logf("http: WriteHeader called with both Transfer-Encoding of %q and a Content-Length of %d",
		server.go#L1669: 			w.conn.server.logf("http: response.Write on hijacked connection from %s (%s:%d)", caller.Function, path.Base(caller.File), caller.Line)
		server.go#L1866: 	srv := c.server
		server.go#L1944: 			c.server.logf("http: panic serving %v: %v\n%s", c.remoteAddr, err, buf)
		server.go#L1961: 		tlsTO := c.server.tlsHandshakeTimeout()
		server.go#L1979: 			c.server.logf("http: TLS handshake error from %s: %v", c.rwc.RemoteAddr(), reason)
		server.go#L1990: 			if fn := c.server.TLSNextProto[proto]; fn != nil {
		server.go#L1991: 				h := initALPNRequest{ctx, tlsConn, serverHandler{c.server}}
		server.go#L1996: 				fn(c.server, tlsConn, h)
		server.go#L2020: 	protos := c.server.protocols()
		server.go#L2032: 		if c.r.remain != c.server.initialReadLimitSize() {
		server.go#L2036: 		if c.server.shuttingDown() {
		server.go#L2109: 		serverHandler{c.server}.ServeHTTP(w, w.req)
		server.go#L2127: 		if !w.conn.server.doKeepAlives() {
		server.go#L2135: 		if d := c.server.idleTimeout(); d > 0 {
		server.go#L2195: 	fn, ok := c.server.TLSNextProto[nextProtoUnencryptedHTTP2]
		server.go#L2212: 	h := unencryptedHTTP2Request{ctx, c.rwc, serverHandler{c.server}}
		server.go#L2213: 	fn(c.server, unencryptedTLSConn(c.rwc), h)