- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 41 for TCP (0.01 sec)
-
docs/de/docs/deployment/https.md
/// tip | Tipp Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt. /// ### HTTPS-Request Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 13.6K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt
) taskFaker.advanceUntil(520.ms) assertEvents( "plan 1 TCP connect failed", ) taskFaker.advanceUntil(530.ms) assertEvents( "plan 2 TCP connect failed", "take plan 3", "plan 3 TCP connecting...", ) taskFaker.advanceUntil(780.ms) assertEvents( "take plan 4", "plan 4 TCP connecting...", )
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 20.9K bytes - Viewed (0) -
docs/smb3-features/05-rdma-smb-direct-design.md
} ``` #### 4.5.2 Fallback TCP Provider ```java package jcifs.internal.smb2.rdma.tcp; public class TcpRdmaProvider implements RdmaProvider { @Override public boolean isAvailable() { return true; // TCP is always available } @Override public Set<RdmaCapability> getSupportedCapabilities() { // TCP fallback only supports send/receive
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 02:53:50 UTC 2025 - 35.9K bytes - Viewed (0) -
docs/ru/docs/deployment/https.md
* Шифрование соединения происходит **на уровне протокола TCP**. * Протокол TCP находится на один уровень **ниже протокола HTTP**. * Поэтому **проверка сертификатов и шифрование** происходит **до HTTP**. * **TCP не знает о "доменах"**, но знает об IP-адресах. * Информация о **запрашиваемом домене** извлекается из запроса **на уровне HTTP**.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 20.7K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**. And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection. /// tip
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
docs/pt/docs/deployment/https.md
Após isso, o cliente e o servidor possuem uma **conexão TCP encriptada**, que é provida pelo TLS. E então eles podem usar essa conexão para começar a **comunicação HTTP** propriamente dita. E isso resume o que é **HTTPS**, apenas **HTTP** simples dentro de uma **conexão TLS segura** em vez de uma conexão TCP pura (não encriptada). /// tip | Dica
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 12.8K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt
import okhttp3.internal.platform.Platform import okhttp3.internal.tls.OkHostnameVerifier import okhttp3.internal.toHostHeader /** * A single attempt to connect to a remote server, including these steps: * * * [TCP handshake][connectSocket] * * Optional [CONNECT tunnels][connectTunnel]. When using an HTTP proxy to reach an HTTPS server * we must send a `CONNECT` request, and handle authorization challenges from the proxy.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Thu Jul 31 04:18:40 UTC 2025 - 18.6K bytes - Viewed (0) -
docs/ja/docs/deployment/https.md
次に証明書を使用して、クライアントとTLS Termination Proxy は、 **TCP通信**の残りを**どのように暗号化するかを決定**します。これで**TLSハンドシェイク**の部分が完了します。 この後、クライアントとサーバーは**暗号化されたTCP接続**を持ちます。そして、その接続を使って実際の**HTTP通信**を開始することができます。 これが**HTTPS**であり、純粋な(暗号化されていない)TCP接続ではなく、**セキュアなTLS接続**の中に**HTTP**があるだけです。 /// tip 通信の暗号化は、HTTPレベルではなく、**TCPレベル**で行われることに注意してください。 /// ### HTTPS リクエスト
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 15.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java
@Test public void testRdmaProviderSelectionAlwaysReturnsProvider() { // This should always return at least the TCP fallback provider RdmaProvider provider = RdmaProviderFactory.selectBestProvider(); assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)"); assertNotNull(provider.getProviderName(), "Provider name should not be null");
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 13.8K bytes - Viewed (0) -
docs/es/docs/deployment/https.md
Después de esto, el cliente y el servidor tienen una **conexión TCP encriptada**, esto es lo que proporciona TLS. Y luego pueden usar esa conexión para iniciar la comunicación **HTTP real**. Y eso es lo que es **HTTPS**, es simplemente HTTP simple **dentro de una conexión TLS segura** en lugar de una conexión TCP pura (sin encriptar). /// tip | Consejo
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 13K bytes - Viewed (0)