• Home
  • Raw
  • Download

Lines Matching +full:open +full:- +full:pull +full:- +full:requests +full:- +full:limit

2 // Use of this source code is governed by a BSD-style license that can be
22 // https://vasilvv.github.io/tls-alps/draft-vvv-tls-alps.html and
23 // https://vasilvv.github.io/httpbis-alps/draft-vvv-httpbis-alps.html.
29 // When kCapReferrerToOriginOnCrossOrigin is enabled, HTTP referrers on cross-
30 // origin requests are restricted to contain at most the source origin.
64 // Any param is ignored if zero, and if one of min/max is non-zero with a zero
90 // If enabled allows the use of SHA-1 by the server for signatures
98 // https://datatracker.ietf.org/doc/html/draft-ietf-tls-esni-13
158 // `top_frame_site_` -> the schemeful site of the top level page.
159 // `frame_site_` -> absl::nullopt.
160 // `is_cross_site_` -> a boolean indicating whether the frame site is
161 // schemefully cross-site from the top-level site.
171 // non-compliant servers ossifying parts of the ClientHello and interfering with
175 // Enables Kyber-based post-quantum key-agreements in TLS 1.3 connections.
181 // When enabled, the time threshold for Lax-allow-unsafe cookies will be lowered
184 // threshold, will be sent with any top-level cross-site navigation regardless
191 // "Lax-allow-unsafe" behavior. Any cookies that do not specify a SameSite
193 // methods will not be allowed at all for top-level cross-site navigations.
221 // When enabled this feature will cause same-site calculations to take into
222 // account the scheme of the site-for-cookies and the request/response url.
225 // Enables a process-wide limit on "open" UDP sockets. See
226 // udp_socket_global_limits.h for details on what constitutes an "open" socket.
231 // Sets the maximum allowed open UDP sockets. Provisioning more sockets than
258 // When enabled this feature will allow a new Reporting-Endpoints header to
273 // When this feature is enabled, redirected requests will be considered
274 // cross-site for the purpose of SameSite cookies if any redirect hop was
275 // cross-site to the target URL, even if the original initiator of the
276 // redirected request was same-site with the target URL (and the
277 // site-for-cookies).
278 // See spec changes in https://github.com/httpwg/http-extensions/pull/1348
283 // saved for cookie-sets, but it has no associated semantics (when setting or
287 // When enabled, sites can opt-in to having their cookies partitioned by
288 // top-level site with the Partitioned attribute. Partitioned cookies will only
289 // be sent when the browser is on the same top-level site that it was on when
306 // When enabled, cookies with a non-ASCII domain attribute will be rejected.
309 // Blocks the 'Set-Cookie' request header on outbound fetch requests.
335 // Whether to probe for SHA-256 on some legacy platform keys, before assuming
336 // the key requires SHA-1. See SSLPlatformKeyWin for details.
344 // Prefetch to follow normal semantics instead of 5-minute rule