- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 226 for tcps (0.1 seconds)
-
docs/tr/docs/deployment/https.md
Ardından client ve TLS Termination Proxy, sertifikayı kullanarak **TCP iletişiminin geri kalanını nasıl şifreleyeceklerine** karar verir. Böylece **TLS Handshake** kısmı tamamlanır. Bundan sonra client ve server arasında **şifreli bir TCP bağlantısı** vardır; TLS’in sağladığı şey budur. Sonra bu bağlantıyı kullanarak gerçek **HTTP iletişimini** başlatabilirler.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 14.8K bytes - Click Count (0) -
internal/rest/rpc-stats.go
tcpTimeForFirstByteTotalDur uint64 }{} // RPCStats holds information about the DHCP/TCP metrics and errors type RPCStats struct { Errs uint64 DialAvgDuration uint64 TTFBAvgDuration uint64 DialErrs uint64 } // GetRPCStats returns RPC stats, include calls errors and dhcp/tcp metrics func GetRPCStats() RPCStats { s := RPCStats{ Errs: atomic.LoadUint64(&globalStats.errs),Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 13 18:21:34 GMT 2024 - 2.6K bytes - Click Count (0) -
okhttp/src/jvmTest/kotlin/okhttp3/FakeRoutePlanner.kt
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 6.1K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**. And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection. /// tip
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 14K bytes - Click Count (0) -
docs/de/docs/deployment/https.md
/// tip | Tipp Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt. /// ### HTTPS-Request { #https-request } Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 15.8K bytes - Click Count (0) -
docs/pt/docs/deployment/https.md
Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita. E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada). /// tip | Dica
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 14.6K bytes - Click Count (0) -
PULL_REQUESTS_ETIQUETTE.md
6. **Testing**: - Assume the submitter tested the code. If testing is unclear, ask for details (e.g., “How was this tested?”). - Reject untested PRs unless testing is infeasible, then assist with test setup. ## Tips for Success - **Small PRs**: Easier to review, faster to merge. Split large changes logically. - **Clear Commits**: Use `git rebase -i` to refine history before submitting.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun May 25 16:32:03 GMT 2025 - 4.7K bytes - Click Count (0) -
docs/zh-hant/docs/deployment/https.md
接著,用戶端與 TLS 終止代理會以該憑證為基礎,**協商後續如何加密**整段 **TCP 通訊**。至此完成 **TLS 握手**。 之後,用戶端與伺服器之間就有一條**已加密的 TCP 連線**,這就是 TLS 所提供的能力。接著他們可以在這條連線上開始實際的 **HTTP** 通訊。 這也就是 **HTTPS** 的本質:在**安全的 TLS 連線**內傳送一般的 **HTTP**,而非在純(未加密)的 TCP 連線上。 /// tip 請注意,加密發生在 **TCP 層**,不是在 HTTP 層。 /// ### HTTPS 請求 { #https-request } 現在用戶端與伺服器(更精確地說,是瀏覽器與 TLS 終止代理)之間已有**加密的 TCP 連線**,他們可以開始進行 **HTTP** 通訊。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 11.8K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaConfigurationTest.java
props.setProperty("jcifs.smb.client.useRDMA", "true"); props.setProperty("jcifs.smb.client.rdmaProvider", "tcp"); PropertyConfiguration config = new PropertyConfiguration(props); assertTrue(config.isUseRDMA(), "RDMA should be enabled"); assertEquals("tcp", config.getRdmaProvider(), "Provider should be tcp"); } @Test public void testRdmaAutoProvider() throws CIFSException {
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 23 05:11:12 GMT 2025 - 5.1K bytes - Click Count (0) -
docs/zh/docs/deployment/https.md
然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。 此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。 这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。 /// tip | 提示 请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。 /// ### HTTPS 请求 { #https-request } 现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 12.5K bytes - Click Count (0)