Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 21 - 30 of 226 for tcps (0.1 seconds)

  1. docs/tr/docs/deployment/https.md

    Ardından client ve TLS Termination Proxy, sertifikayı kullanarak **TCP iletişiminin geri kalanını nasıl şifreleyeceklerine** karar verir. Böylece **TLS Handshake** kısmı tamamlanır.
    
    Bundan sonra client ve server arasında **şifreli bir TCP bağlantısı** vardır; TLS’in sağladığı şey budur. Sonra bu bağlantıyı kullanarak gerçek **HTTP iletişimini** başlatabilirler.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 14.8K bytes
    - Click Count (0)
  2. internal/rest/rpc-stats.go

    	tcpTimeForFirstByteTotalDur uint64
    }{}
    
    // RPCStats holds information about the DHCP/TCP metrics and errors
    type RPCStats struct {
    	Errs uint64
    
    	DialAvgDuration uint64
    	TTFBAvgDuration uint64
    	DialErrs        uint64
    }
    
    // GetRPCStats returns RPC stats, include calls errors and dhcp/tcp metrics
    func GetRPCStats() RPCStats {
    	s := RPCStats{
    		Errs:     atomic.LoadUint64(&globalStats.errs),
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 13 18:21:34 GMT 2024
    - 2.6K bytes
    - Click Count (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/FakeRoutePlanner.kt

          check(connectState == ConnectState.READY)
          events += "plan $id TCP connecting..."
    
          taskFaker.sleep(tcpConnectDelayNanos)
    
          if (yieldBeforeTcpConnectReturns) {
            taskFaker.yield()
          }
    
          return when {
            tcpConnectThrowable != null -> {
              events += "plan $id TCP connect failed"
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Jan 27 09:00:39 GMT 2026
    - 6.1K bytes
    - Click Count (0)
  4. docs/en/docs/deployment/https.md

    After this, the client and the server have an **encrypted TCP connection**, this is what TLS provides. And then they can use that connection to start the actual **HTTP communication**.
    
    And that's what **HTTPS** is, it's just plain **HTTP** inside a **secure TLS connection** instead of a pure (unencrypted) TCP connection.
    
    /// tip
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 14K bytes
    - Click Count (0)
  5. docs/de/docs/deployment/https.md

    /// tip | Tipp
    
    Beachten Sie, dass die Verschlüsselung der Kommunikation auf der **TCP-Ebene** und nicht auf der HTTP-Ebene erfolgt.
    
    ///
    
    ### HTTPS-Request { #https-request }
    
    Da Client und Server (sprich, der Browser und der TLS-Terminierungsproxy) nun über eine **verschlüsselte TCP-Verbindung** verfügen, können sie die **HTTP-Kommunikation** starten.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:58:09 GMT 2026
    - 15.8K bytes
    - Click Count (0)
  6. docs/pt/docs/deployment/https.md

    Após isso, o cliente e o servidor possuem uma conexão TCP encriptada, que é provida pelo TLS. E então eles podem usar essa conexão para começar a comunicação HTTP propriamente dita.
    
    E isso resume o que é HTTPS, apenas HTTP simples dentro de uma conexão TLS segura em vez de uma conexão TCP pura (não encriptada).
    
    /// tip | Dica
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 14.6K bytes
    - Click Count (0)
  7. PULL_REQUESTS_ETIQUETTE.md

    6. **Testing**:
       - Assume the submitter tested the code. If testing is unclear, ask for details (e.g., “How was this tested?”).
       - Reject untested PRs unless testing is infeasible, then assist with test setup.
    
    ## Tips for Success
    
    - **Small PRs**: Easier to review, faster to merge. Split large changes logically.
    - **Clear Commits**: Use `git rebase -i` to refine history before submitting.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun May 25 16:32:03 GMT 2025
    - 4.7K bytes
    - Click Count (0)
  8. docs/zh-hant/docs/deployment/https.md

    接著,用戶端與 TLS 終止代理會以該憑證為基礎,**協商後續如何加密**整段 **TCP 通訊**。至此完成 **TLS 握手**。
    
    之後,用戶端與伺服器之間就有一條**已加密的 TCP 連線**,這就是 TLS 所提供的能力。接著他們可以在這條連線上開始實際的 **HTTP** 通訊。
    
    這也就是 **HTTPS** 的本質:在**安全的 TLS 連線**內傳送一般的 **HTTP**,而非在純(未加密)的 TCP 連線上。
    
    /// tip
    
    請注意,加密發生在 **TCP 層**,不是在 HTTP 層。
    
    ///
    
    ### HTTPS 請求 { #https-request }
    
    現在用戶端與伺服器(更精確地說,是瀏覽器與 TLS 終止代理)之間已有**加密的 TCP 連線**,他們可以開始進行 **HTTP** 通訊。
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 17:05:38 GMT 2026
    - 11.8K bytes
    - Click Count (0)
  9. src/test/java/jcifs/internal/smb2/rdma/RdmaConfigurationTest.java

            props.setProperty("jcifs.smb.client.useRDMA", "true");
            props.setProperty("jcifs.smb.client.rdmaProvider", "tcp");
    
            PropertyConfiguration config = new PropertyConfiguration(props);
    
            assertTrue(config.isUseRDMA(), "RDMA should be enabled");
            assertEquals("tcp", config.getRdmaProvider(), "Provider should be tcp");
        }
    
        @Test
        public void testRdmaAutoProvider() throws CIFSException {
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 23 05:11:12 GMT 2025
    - 5.1K bytes
    - Click Count (0)
  10. docs/zh/docs/deployment/https.md

    然后,通过使用证书,客户端和 TLS 终止代理 **决定如何加密** **TCP 通信** 的其余部分。 这就完成了 **TLS 握手** 部分。
    
    此后,客户端和服务器就拥有了**加密的 TCP 连接**,这就是 TLS 提供的功能。 然后他们可以使用该连接来启动实际的 **HTTP 通信**。
    
    这就是 **HTTPS**,它只是 **安全 TLS 连接** 内的普通 **HTTP**,而不是纯粹的(未加密的)TCP 连接。
    
    /// tip | 提示
    
    请注意,通信加密发生在 **TCP 层**,而不是 HTTP 层。
    
    ///
    
    ### HTTPS 请求 { #https-request }
    
    现在客户端和服务器(特别是浏览器和 TLS 终止代理)具有 **加密的 TCP 连接**,它们可以开始 **HTTP 通信**。
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 17:06:37 GMT 2026
    - 12.5K bytes
    - Click Count (0)
Back to Top