- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 227 for tcap (0.03 sec)
-
src/test/java/jcifs/smb/SmbFileInputStreamTest.java
// Verify the request offset equals the skip value (2) ArgumentCaptor<Smb2ReadRequest> cap = ArgumentCaptor.forClass(Smb2ReadRequest.class); verify(mockTree).send(cap.capture(), any(RequestParam.class)); Smb2ReadRequest req = cap.getValue(); // Reflectively inspect the private 'offset' field to assert it used the advanced fp
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 12.8K bytes - Viewed (0) -
src/arena/arena_test.go
defer a.Free() tt := arena.New[T1](a) tt.n = 1 ts := arena.MakeSlice[T1](a, 99, 100) if len(ts) != 99 { t.Errorf("Slice() len = %d, want 99", len(ts)) } if cap(ts) != 100 { t.Errorf("Slice() cap = %d, want 100", cap(ts)) } ts[1].n = 42 } func TestSmokeLarge(t *testing.T) { a := arena.NewArena() defer a.Free() for i := 0; i < 10*64; i++ { _ = arena.New[T2](a) }
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Oct 12 20:23:36 UTC 2022 - 742 bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/connection/FastFallbackExchangeFinderTest.kt
) taskFaker.advanceUntil(520.ms) assertEvents( "plan 1 TCP connect failed", ) taskFaker.advanceUntil(530.ms) assertEvents( "plan 2 TCP connect failed", "take plan 3", "plan 3 TCP connecting...", ) taskFaker.advanceUntil(780.ms) assertEvents( "take plan 4", "plan 4 TCP connecting...", )
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 20.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/rdma/RdmaProviderFactory.java
import java.util.List; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import jcifs.Configuration; import jcifs.internal.smb2.rdma.disni.DisniRdmaProvider; import jcifs.internal.smb2.rdma.tcp.TcpRdmaProvider; /** * Factory for creating RDMA provider instances. * * This factory attempts to select the best available RDMA provider * based on system capabilities and configuration preferences. */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 24 00:12:28 UTC 2025 - 4.2K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**. And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection. /// tip
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/rdma/tcp/TcpRdmaConnection.java
throw new IOException("TCP RDMA receive failed", e); } } @Override public void rdmaRead(RdmaMemoryRegion localRegion, long remoteAddress, int remoteKey, int length) throws IOException { // TCP fallback doesn't support real RDMA read throw new UnsupportedOperationException("RDMA read not supported by TCP fallback"); } @Override
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 8.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/rdma/tcp/TcpRdmaProvider.java
import jcifs.internal.smb2.rdma.RdmaProvider; /** * TCP fallback RDMA provider. * * This provider uses regular TCP connections but maintains the RDMA * interface for compatibility. It only supports send/receive operations * and does not provide true RDMA read/write capabilities. */ public class TcpRdmaProvider implements RdmaProvider { /** * Creates a new TCP RDMA provider instance */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 24 00:12:28 UTC 2025 - 2.9K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/FakeRoutePlanner.kt
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 6.1K bytes - Viewed (0) -
docs/pt/docs/deployment/https.md
Após isso, o cliente e o servidor possuem uma **conexão TCP encriptada**, que é provida pelo TLS. E então eles podem usar essa conexão para começar a **comunicação HTTP** propriamente dita. E isso resume o que é **HTTPS**, apenas **HTTP** simples dentro de uma **conexão TLS segura** em vez de uma conexão TCP pura (não encriptada). /// tip | Dica
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 12.8K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
/// tip | Tipp Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt. /// ### HTTPS-Request Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 13.6K bytes - Viewed (0)