Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 192 for tcap (0.03 sec)

  1. okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt

        )
    
        taskFaker.advanceUntil(520.ms)
        assertEvents(
          "plan 1 TCP connect failed",
        )
    
        taskFaker.advanceUntil(530.ms)
        assertEvents(
          "plan 2 TCP connect failed",
          "take plan 3",
          "plan 3 TCP connecting...",
        )
    
        taskFaker.advanceUntil(780.ms)
        assertEvents(
          "take plan 4",
          "plan 4 TCP connecting...",
        )
    
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 20.9K bytes
    - Viewed (0)
  2. docs/smb3-features/05-rdma-smb-direct-design.md

    }
    ```
    
    #### 4.5.2 Fallback TCP Provider
    ```java
    package jcifs.internal.smb2.rdma.tcp;
    
    public class TcpRdmaProvider implements RdmaProvider {
        @Override
        public boolean isAvailable() {
            return true;  // TCP is always available
        }
        
        @Override
        public Set<RdmaCapability> getSupportedCapabilities() {
            // TCP fallback only supports send/receive
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  3. src/test/java/jcifs/smb/SmbFileInputStreamTest.java

                // Verify the request offset equals the skip value (2)
                ArgumentCaptor<Smb2ReadRequest> cap = ArgumentCaptor.forClass(Smb2ReadRequest.class);
                verify(mockTree).send(cap.capture(), any(RequestParam.class));
                Smb2ReadRequest req = cap.getValue();
    
                // Reflectively inspect the private 'offset' field to assert it used the advanced fp
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 12.8K bytes
    - Viewed (0)
  4. docs/en/docs/deployment/https.md

    After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**.
    
    And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection.
    
    /// tip
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  5. docs/ru/docs/deployment/https.md

    * Шифрование соединения происходит на **уровне TCP**.
        * Это на один уровень **ниже HTTP**.
        * Поэтому **сертификаты и шифрование** обрабатываются **до HTTP**.
    * **TCP не знает о «доменах»**. Только об IP-адресах.
        * Информация о **конкретном домене** передаётся в **данных HTTP**.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Sep 30 11:24:39 UTC 2025
    - 23K bytes
    - Viewed (0)
  6. docs/pt/docs/deployment/https.md

    Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita.
    
    E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada).
    
    /// tip | Dica
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 14.8K bytes
    - Viewed (0)
  7. docs/de/docs/deployment/https.md

    /// tip | Tipp
    
    Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt.
    
    ///
    
    ### HTTPS-Request { #https-request }
    
    Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  8. docs/zh/docs/deployment/https.md

    然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。
    
    此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。
    
    这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。
    
    /// tip
    
    请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。
    
    ///
    
    ### HTTPS 请求
    
    现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 10.7K bytes
    - Viewed (0)
  9. src/test/java/jcifs/smb/SmbTransportInternalTest.java

        @ValueSource(ints = { -1, 0, 1, 1024 })
        void hasCapability_variousCaps(int cap) throws SmbException {
            when(transport.hasCapability(anyInt())).thenAnswer(inv -> ((int) inv.getArgument(0)) >= 0);
    
            boolean result = transport.hasCapability(cap);
    
            assertEquals(cap >= 0, result);
            verify(transport, times(1)).hasCapability(cap);
        }
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  10. src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java

        @Test
        public void testRdmaProviderSelectionAlwaysReturnsProvider() {
            // This should always return at least the TCP fallback provider
            RdmaProvider provider = RdmaProviderFactory.selectBestProvider();
            assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)");
            assertNotNull(provider.getProviderName(), "Provider name should not be null");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 23 05:11:12 UTC 2025
    - 13.8K bytes
    - Viewed (0)
Back to top