Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 41 for TCP (0.01 sec)

  1. docs/de/docs/deployment/https.md

    /// tip | Tipp
    
    Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt.
    
    ///
    
    ### HTTPS-Request
    
    Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 13.6K bytes
    - Viewed (0)
  2. okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt

        )
    
        taskFaker.advanceUntil(520.ms)
        assertEvents(
          "plan 1 TCP connect failed",
        )
    
        taskFaker.advanceUntil(530.ms)
        assertEvents(
          "plan 2 TCP connect failed",
          "take plan 3",
          "plan 3 TCP connecting...",
        )
    
        taskFaker.advanceUntil(780.ms)
        assertEvents(
          "take plan 4",
          "plan 4 TCP connecting...",
        )
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 20.9K bytes
    - Viewed (0)
  3. docs/smb3-features/05-rdma-smb-direct-design.md

    }
    ```
    
    #### 4.5.2 Fallback TCP Provider
    ```java
    package jcifs.internal.smb2.rdma.tcp;
    
    public class TcpRdmaProvider implements RdmaProvider {
        @Override
        public boolean isAvailable() {
            return true;  // TCP is always available
        }
        
        @Override
        public Set<RdmaCapability> getSupportedCapabilities() {
            // TCP fallback only supports send/receive
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  4. docs/ru/docs/deployment/https.md

    * Шифрование соединения происходит **на уровне протокола TCP**.
        * Протокол TCP находится на один уровень **ниже протокола HTTP**.
        * Поэтому **проверка сертификатов и шифрование** происходит **до HTTP**.
    * **TCP не знает о "доменах"**, но знает об IP-адресах.
        * Информация о **запрашиваемом домене** извлекается из запроса **на уровне HTTP**.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 20.7K bytes
    - Viewed (0)
  5. docs/en/docs/deployment/https.md

    After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**.
    
    And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection.
    
    /// tip
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  6. docs/pt/docs/deployment/https.md

    Após isso, o cliente e o servidor possuem uma **conexão TCP encriptada**, que é provida pelo TLS. E então eles podem usar essa conexão para começar a **comunicação HTTP** propriamente dita.
    
    E isso resume o que é **HTTPS**, apenas **HTTP** simples dentro de uma **conexão TLS segura** em vez de uma conexão TCP pura (não encriptada).
    
    /// tip | Dica
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  7. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt

    import okhttp3.internal.platform.Platform
    import okhttp3.internal.tls.OkHostnameVerifier
    import okhttp3.internal.toHostHeader
    
    /**
     * A single attempt to connect to a remote server, including these steps:
     *
     *  * [TCP handshake][connectSocket]
     *  * Optional [CONNECT tunnels][connectTunnel]. When using an HTTP proxy to reach an HTTPS server
     *    we must send a `CONNECT` request, and handle authorization challenges from the proxy.
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Thu Jul 31 04:18:40 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  8. docs/ja/docs/deployment/https.md

    次に証明書を使用して、クライアントとTLS Termination Proxy は、 **TCP通信**の残りを**どのように暗号化するかを決定**します。これで**TLSハンドシェイク**の部分が完了します。
    
    この後、クライアントとサーバーは**暗号化されたTCP接続**を持ちます。そして、その接続を使って実際の**HTTP通信**を開始することができます。
    
    これが**HTTPS**であり、純粋な(暗号化されていない)TCP接続ではなく、**セキュアなTLS接続**の中に**HTTP**があるだけです。
    
    /// tip
    
    通信の暗号化は、HTTPレベルではなく、**TCPレベル**で行われることに注意してください。
    
    ///
    
    ### HTTPS リクエスト
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 15.5K bytes
    - Viewed (0)
  9. src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java

        @Test
        public void testRdmaProviderSelectionAlwaysReturnsProvider() {
            // This should always return at least the TCP fallback provider
            RdmaProvider provider = RdmaProviderFactory.selectBestProvider();
            assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)");
            assertNotNull(provider.getProviderName(), "Provider name should not be null");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 23 05:11:12 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  10. docs/es/docs/deployment/https.md

    Después de esto, el cliente y el servidor tienen una **conexión TCP encriptada**, esto es lo que proporciona TLS. Y luego pueden usar esa conexión para iniciar la comunicación **HTTP real**.
    
    Y eso es lo que es **HTTPS**, es simplemente HTTP simple **dentro de una conexión TLS segura** en lugar de una conexión TCP pura (sin encriptar).
    
    /// tip | Consejo
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 13K bytes
    - Viewed (0)
Back to top