- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 128 for tcps (0.02 sec)
-
okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt
) taskFaker.advanceUntil(520.ms) assertEvents( "plan 1 TCP connect failed", ) taskFaker.advanceUntil(530.ms) assertEvents( "plan 2 TCP connect failed", "take plan 3", "plan 3 TCP connecting...", ) taskFaker.advanceUntil(780.ms) assertEvents( "take plan 4", "plan 4 TCP connecting...", )Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 20.9K bytes - Viewed (0) -
docs/smb3-features/05-rdma-smb-direct-design.md
} ``` #### 4.5.2 Fallback TCP Provider ```java package jcifs.internal.smb2.rdma.tcp; public class TcpRdmaProvider implements RdmaProvider { @Override public boolean isAvailable() { return true; // TCP is always available } @Override public Set<RdmaCapability> getSupportedCapabilities() { // TCP fallback only supports send/receiveRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 02:53:50 UTC 2025 - 35.9K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**. And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection. /// tip
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
docs/pt/docs/deployment/https.md
Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita. E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada). /// tip | Dica
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 14.8K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
/// tip | Tipp Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt. /// ### HTTPS-Request { #https-request } Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 16.1K bytes - Viewed (0) -
docs/ru/docs/deployment/https.md
* Шифрование соединения происходит на **уровне TCP**. * Это на один уровень **ниже HTTP**. * Поэтому **сертификаты и шифрование** обрабатываются **до HTTP**. * **TCP не знает о «доменах»**. Только об IP-адресах. * Информация о **конкретном домене** передаётся в **данных HTTP**.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Sep 30 11:24:39 UTC 2025 - 23K bytes - Viewed (0) -
docs/zh/docs/deployment/https.md
然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。 此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。 这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。 /// tip 请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。 /// ### HTTPS 请求 现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 10.7K bytes - Viewed (0) -
docs/ja/docs/deployment/https.md
次に証明書を使用して、クライアントとTLS Termination Proxy は、 **TCP通信**の残りを**どのように暗号化するかを決定**します。これで**TLSハンドシェイク**の部分が完了します。 この後、クライアントとサーバーは**暗号化されたTCP接続**を持ちます。そして、その接続を使って実際の**HTTP通信**を開始することができます。 これが**HTTPS**であり、純粋な(暗号化されていない)TCP接続ではなく、**セキュアなTLS接続**の中に**HTTP**があるだけです。 /// tip 通信の暗号化は、HTTPレベルではなく、**TCPレベル**で行われることに注意してください。 /// ### HTTPS リクエスト
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 15.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java
@Test public void testRdmaProviderSelectionAlwaysReturnsProvider() { // This should always return at least the TCP fallback provider RdmaProvider provider = RdmaProviderFactory.selectBestProvider(); assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)"); assertNotNull(provider.getProviderName(), "Provider name should not be null");Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 13.8K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/ConnectPlan.kt
import okhttp3.internal.platform.Platform import okhttp3.internal.tls.OkHostnameVerifier import okhttp3.internal.toHostHeader /** * A single attempt to connect to a remote server, including these steps: * * * [TCP handshake][connectSocket] * * Optional [CONNECT tunnels][connectTunnel]. When using an HTTP proxy to reach an HTTPS server * we must send a `CONNECT` request, and handle authorization challenges from the proxy.
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Oct 08 03:50:05 UTC 2025 - 19.3K bytes - Viewed (2)