Home | History | Annotate | Download | only in http2

Lines Matching refs:That

3 // license that can be found in the LICENSE file.
22 // add it there too. For now, this package says that returning from
92 // concurrent streams that each client may have open at a
132 // so that we don't embed a Mutex in this struct, which will make the
238 return fmt.Errorf("http2: TLSConfig.CipherSuites index %d contains an HTTP/2-approved cipher suite (%#04x), but it comes after unapproved cipher suites. With this configuration, clients that don't support previous, approved cipher suites may be given an unapproved one and reject the connection.", i, cs)
316 // ServeConn starts speaking HTTP/2 assuming that c has not had any
374 // configured value for inflow, that will be updated when we send a
395 // immediately terminate an HTTP/2 connection that
405 // Client must use SNI, but we don't enforce that anymore,
411 // But that precludes proxy situations, perhaps.
421 // We choose that. In my opinion, the spec is weak
568 // streams in the "idle" state that might have been initiated by
569 // that peer with a lower-valued stream identifier. For example, if
586 // Note that the net/http package does StateNew and StateClosed for us.
627 // case below. That might involve modifying the standard library
636 // Windows-specific stuff. Fix that and move this, once we
692 // readFrames is the loop that reads incoming frames.
793 // Now that we've got the preface, get us out of the
968 // that the ch send will happen before the stream.cw
1007 // the http.Handlers that block, waiting for their previous frames to
1019 // a closed stream." Our server never sends PRIORITY, so that exception
1027 // ignore the frame. The handler will notice that the stream is closed when
1065 // goroutine since that might block on the network), and updates the
1080 // in this state. (We never send PRIORITY from the server, so that is not checked.)
1145 // Section 8.1: a server MAY request that the client abort
1177 // to send is selected, preferring first things that aren't
1405 // "WINDOW_UPDATE can be sent by a peer that has sent a
1406 // frame bearing the END_STREAM flag. This means that a
1521 // Unknown setting: "An endpoint that receives a SETTINGS
1523 // ignore that setting."
1539 // adjust the size of all stream flow control windows that it
1549 // SETTINGS_INITIAL_WINDOW_SIZE that causes any flow
1580 // in stateHalfClosedLocal (which currently means that
1613 // DATA frame payload lengths that form the body.
1708 // identifiers. [...] An endpoint that receives an unexpected
1728 // numerically greater than all streams that the initiating
1729 // endpoint has opened or reserved. [...] An endpoint that
1743 // endpoint that receives a HEADERS frame that causes their
1798 // (in Go 1.8), though. That's a more sane option anyway.
1841 // Section 5.3.3 says that a stream can depend on one of its dependencies,
1842 // so it's only self-dependencies that are forbidden.
1914 // Malformed requests or responses that are detected
2075 // .. "A server that receives a larger header block than it is
2124 // A bodyReadMsg tells the server loop that the http.Handler read n
2132 // Notes that the handler for the given stream ID read n bytes of its body
2287 // response header is written. It notes that a header will need to be
2404 // that, if present, signals that the map entry is actually for
2409 // This mechanism is intended only for trailers that are not known
2426 // Trailers, we pick out the fields of Headers that were declared as
2427 // trailers. That worked for a while, until we found the first major
2432 // "Trailer:", the suffix of that key is a Trailer. Because ':' is an
2508 // For now we only enforce that it's three digits.
2728 // PUSH_PROMISE frames MUST only be sent on a peer-initiated stream that
2731 // responseWriter.Push checks that the stream is peer-initiaed.
2760 // A server that is unable to establish a new stream identifier can send a GOAWAY
2761 // frame so that the client is forced to open a new connection for new streams.