Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 128 for tcps (0.04 sec)

  1. okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt

        )
    
        taskFaker.advanceUntil(520.ms)
        assertEvents(
          "plan 1 TCP connect failed",
        )
    
        taskFaker.advanceUntil(530.ms)
        assertEvents(
          "plan 2 TCP connect failed",
          "take plan 3",
          "plan 3 TCP connecting...",
        )
    
        taskFaker.advanceUntil(780.ms)
        assertEvents(
          "take plan 4",
          "plan 4 TCP connecting...",
        )
    
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 20.9K bytes
    - Viewed (0)
  2. docs/smb3-features/05-rdma-smb-direct-design.md

    }
    ```
    
    #### 4.5.2 Fallback TCP Provider
    ```java
    package jcifs.internal.smb2.rdma.tcp;
    
    public class TcpRdmaProvider implements RdmaProvider {
        @Override
        public boolean isAvailable() {
            return true;  // TCP is always available
        }
        
        @Override
        public Set<RdmaCapability> getSupportedCapabilities() {
            // TCP fallback only supports send/receive
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 35.9K bytes
    - Viewed (0)
  3. docs/en/docs/deployment/https.md

    After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**.
    
    And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection.
    
    /// tip
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  4. docs/pt/docs/deployment/https.md

    Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita.
    
    E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada).
    
    /// tip | Dica
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 14.8K bytes
    - Viewed (0)
  5. docs/de/docs/deployment/https.md

    /// tip | Tipp
    
    Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt.
    
    ///
    
    ### HTTPS-Request { #https-request }
    
    Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  6. docs/ru/docs/deployment/https.md

    * Шифрование соединения происходит на **уровне TCP**.
        * Это на один уровень **ниже HTTP**.
        * Поэтому **сертификаты и шифрование** обрабатываются **до HTTP**.
    * **TCP не знает о «доменах»**. Только об IP-адресах.
        * Информация о **конкретном домене** передаётся в **данных HTTP**.
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Sep 30 11:24:39 UTC 2025
    - 23K bytes
    - Viewed (0)
  7. docs/zh/docs/deployment/https.md

    然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。
    
    此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。
    
    这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。
    
    /// tip
    
    请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。
    
    ///
    
    ### HTTPS 请求
    
    现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 10.7K bytes
    - Viewed (0)
  8. docs/ja/docs/deployment/https.md

    次に証明書を使用して、クライアントとTLS Termination Proxy は、 **TCP通信**の残りを**どのように暗号化するかを決定**します。これで**TLSハンドシェイク**の部分が完了します。
    
    この後、クライアントとサーバーは**暗号化されたTCP接続**を持ちます。そして、その接続を使って実際の**HTTP通信**を開始することができます。
    
    これが**HTTPS**であり、純粋な(暗号化されていない)TCP接続ではなく、**セキュアなTLS接続**の中に**HTTP**があるだけです。
    
    /// tip
    
    通信の暗号化は、HTTPレベルではなく、**TCPレベル**で行われることに注意してください。
    
    ///
    
    ### HTTPS リクエスト
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun May 11 13:37:26 UTC 2025
    - 15.5K bytes
    - Viewed (0)
  9. src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java

        @Test
        public void testRdmaProviderSelectionAlwaysReturnsProvider() {
            // This should always return at least the TCP fallback provider
            RdmaProvider provider = RdmaProviderFactory.selectBestProvider();
            assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)");
            assertNotNull(provider.getProviderName(), "Provider name should not be null");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 23 05:11:12 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  10. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt

    import okhttp3.internal.platform.Platform
    import okhttp3.internal.tls.OkHostnameVerifier
    import okhttp3.internal.toHostHeader
    
    /**
     * A single attempt to connect to a remote server, including these steps:
     *
     *  * [TCP handshake][connectSocket]
     *  * Optional [CONNECT tunnels][connectTunnel]. When using an HTTP proxy to reach an HTTPS server
     *    we must send a `CONNECT` request, and handle authorization challenges from the proxy.
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Oct 08 03:50:05 UTC 2025
    - 19.3K bytes
    - Viewed (2)
Back to top