- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 211 for tcps (0.02 sec)
-
docs/pt/docs/deployment/https.md
Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita. E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada). /// tip | Dica
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 14.8K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaConfigurationTest.java
props.setProperty("jcifs.smb.client.useRDMA", "true"); props.setProperty("jcifs.smb.client.rdmaProvider", "tcp"); PropertyConfiguration config = new PropertyConfiguration(props); assertTrue(config.isUseRDMA(), "RDMA should be enabled"); assertEquals("tcp", config.getRdmaProvider(), "Provider should be tcp"); } @Test public void testRdmaAutoProvider() throws CIFSException {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 5.1K bytes - Viewed (0) -
docs/de/docs/deployment/https.md
/// tip | Tipp Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt. /// ### HTTPS-Request { #https-request } Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 16.1K bytes - Viewed (0) -
docs/ru/docs/deployment/https.md
* Шифрование соединения происходит на **уровне TCP**. * Это на один уровень **ниже HTTP**. * Поэтому **сертификаты и шифрование** обрабатываются **до HTTP**. * **TCP не знает о «доменах»**. Только об IP-адресах. * Информация о **конкретном домене** передаётся в **данных HTTP**.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Sep 30 11:24:39 UTC 2025 - 23K bytes - Viewed (0) -
docs/zh/docs/deployment/https.md
然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。 此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。 这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。 /// tip 请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。 /// ### HTTPS 请求 现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 10.7K bytes - Viewed (0) -
cmd/metrics-v3-system-network.go
"Total number of failed internode calls") internodeDialedErrorsTotalMD = NewCounterMD(internodeDialErrorsTotal, "Total number of internode TCP dial timeouts and errors") internodeDialAvgTimeNanosMD = NewGaugeMD(internodeDialAvgTimeNanos, "Average dial time of internode TCP calls in nanoseconds") internodeSentBytesTotalMD = NewCounterMD(internodeSentBytesTotal, "Total number of bytes sent to other peer nodes")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Mar 10 09:15:15 UTC 2024 - 2.4K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/rdma/RdmaProvider.java
import java.util.EnumSet; import java.util.Set; /** * Interface for RDMA provider implementations. * * This interface abstracts different RDMA implementations such as * InfiniBand, iWARP, RoCE, or TCP fallback providers. */ public interface RdmaProvider { /** * Check if RDMA is available on this system * * @return true if RDMA can be used, false otherwise */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 3K bytes - Viewed (0) -
src/main/resources/fess_indices/fess/lv/stopwords.txt
būsim būsiet tikt tiku tiki tika tikām tikāt tieku tiec tiek tiekam tiekat tikšu tiks tiksim tiksiet tapt tapi tapāt topat tapšu tapsi taps tapsim tapsiet kļūt kļuvu kļuvi kļuva kļuvām kļuvāt kļūstu kļūsti kļūst kļūstam kļūstat kļūšu kļūsi kļūs kļūsim kļūsiet # verbs varēt varēju
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 19 06:31:02 UTC 2018 - 1.2K bytes - Viewed (0) -
docs/ja/docs/deployment/https.md
次に証明書を使用して、クライアントとTLS Termination Proxy は、 **TCP通信**の残りを**どのように暗号化するかを決定**します。これで**TLSハンドシェイク**の部分が完了します。 この後、クライアントとサーバーは**暗号化されたTCP接続**を持ちます。そして、その接続を使って実際の**HTTP通信**を開始することができます。 これが**HTTPS**であり、純粋な(暗号化されていない)TCP接続ではなく、**セキュアなTLS接続**の中に**HTTP**があるだけです。 /// tip 通信の暗号化は、HTTPレベルではなく、**TCPレベル**で行われることに注意してください。 /// ### HTTPS リクエスト
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun May 11 13:37:26 UTC 2025 - 15.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java
@Test public void testRdmaProviderSelectionAlwaysReturnsProvider() { // This should always return at least the TCP fallback provider RdmaProvider provider = RdmaProviderFactory.selectBestProvider(); assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)"); assertNotNull(provider.getProviderName(), "Provider name should not be null");Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 13.8K bytes - Viewed (0)