- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 46 for Caching (0.04 sec)
-
src/main/java/jcifs/internal/smb2/lease/LeaseManager.java
/** * Check if lease has read caching * * @return true if read caching is enabled */ public boolean hasReadCache() { return Smb2LeaseState.hasReadCaching(leaseState); } /** * Check if lease has write caching * * @return true if write caching is enabled */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 18.8K bytes - Viewed (0) -
src/main/java/jcifs/Configuration.java
*/ boolean isAllowCompound(String command); /** * Machine identifier * * ClientGuid, ... are derived from this value. * * Normally this should be randomly assigned for each client instance/configuration. * * @return machine identifier (32 byte) */ byte[] getMachineId(); /** * *
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 25.4K bytes - Viewed (0) -
src/main/java/jcifs/config/BaseConfiguration.java
protected String preferredCiphers = "AES_128_GCM,AES_128_CCM,AES_256_GCM,AES_256_CCM"; /** Whether AES-256 encryption is enabled */ protected boolean aes256Enabled = true; /** Whether to use SMB2/SMB3 leases for caching */ protected boolean useLease = true; /** Lease timeout in milliseconds */ protected int leaseTimeout = 30000; /** Maximum number of concurrent leases */ protected int maxLeases = 1000;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 36.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/AndXServerMessageBlock.java
/* * The SMB_COM_NT_CREATE_ANDX response wordCount is wrong. There's an * extra 16 bytes for some "Offline Files (CSC or Client Side Caching)" * junk. We need to bump up the wordCount here so that this method returns * the correct number of bytes for signing purposes. Otherwise we get a * signing verification failure.
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 15.8K bytes - Viewed (0) -
README.md
### Performance Optimizations - **Caching** - Bean descriptors and reflection metadata are cached for improved performance - **Lazy initialization** - Resources and expensive operations are initialized only when needed - **Memory efficient** - Specialized collections like `LruHashMap` and `ArrayMap` for memory-conscious applications - **Java 21 features** - Switch expressions and pattern matching for reduced overhead
Registered: Fri Sep 05 20:58:11 UTC 2025 - Last Modified: Sun Aug 31 02:56:02 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/en/docs/deployment/manually.md
## Server Machine and Server Program { #server-machine-and-server-program } There's a small detail about names to keep in mind. 💡 The word "**server**" is commonly used to refer to both the remote/cloud computer (the physical or virtual machine) and also the program that is running on that machine (e.g. Uvicorn).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 6.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Let's put that data in the Pydantic `UserInDB` model first. You should never save plaintext passwords, so, we'll use the (fake) password hashing system. If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw. Wir bauen auf dem vorherigen Kapitel auf. ## Über JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc. Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo. ## Acerca de JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0)