- Sort Score
- Result 10 results
- Languages All
Results 161 - 170 of 1,256 for Providers (0.05 sec)
-
src/main/java/jcifs/util/Crypto.java
} /** * Default provider is BouncyCastleProvider. * For registering custom provider * @see jcifs.util.Crypto#initProvider(Provider) * @return Provider */ public static Provider getProvider() { if (provider != null) { return provider; } provider = new BouncyCastleProvider(); return provider; } /**Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.7K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/tcp/TcpRdmaProviderTest.java
/** * Unit tests for TCP RDMA provider */ public class TcpRdmaProviderTest { private TcpRdmaProvider provider; @BeforeEach public void setUp() { provider = new TcpRdmaProvider(); } @Test public void testIsAvailable() { assertTrue(provider.isAvailable(), "TCP provider should always be available"); } @TestRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 4.2K bytes - Viewed (0) -
apache-maven/src/assembly/maven/conf/toolchains.xml
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Thu Aug 22 14:47:43 UTC 2024 - 3.6K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/SocketChannelTest.kt
} @Test fun testHttps( provider: Provider = Provider.JSSE, protocol: Protocol = burstValues(HTTP_1_1, HTTP_2), tlsVersion: TlsVersion = burstValues(TLS_1_3, TLS_1_2), socketMode: SocketMode = burstValues(Channel, Standard), tlsExtensionMode: TlsExtensionMode = TlsExtensionMode.STANDARD, ) { testConnection(TlsInstance(provider, protocol, tlsVersion, socketMode, tlsExtensionMode)) }
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sat Nov 01 12:18:11 UTC 2025 - 7.9K bytes - Viewed (0) -
okhttp/src/jvmMain/kotlin/okhttp3/internal/platform/BouncyCastlePlatform.kt
* * Requires org.bouncycastle:bctls-jdk15on on the classpath. */ class BouncyCastlePlatform private constructor() : Platform() { private val provider: Provider = BouncyCastleJsseProvider() override fun newSSLContext(): SSLContext = SSLContext.getInstance("TLS", provider) override fun platformTrustManager(): X509TrustManager { val factory = TrustManagerFactory.getInstance( "PKIX",
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Dec 27 13:39:56 UTC 2024 - 3.3K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java
// This should always return at least the TCP fallback provider RdmaProvider provider = RdmaProviderFactory.selectBestProvider(); assertNotNull(provider, "Should always select an RDMA provider (at minimum TCP fallback)"); assertNotNull(provider.getProviderName(), "Provider name should not be null"); assertNotNull(provider.getSupportedCapabilities(), "Supported capabilities should not be null");Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 13.8K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
if err != nil { t.Fatal(err) } provider := providerCfg{} provider.JWKS.URL = u1 cfg := Config{ Enabled: true, pubKeys: pubKeys, arnProviderCfgsMap: map[arn.ARN]*providerCfg{ DummyRoleARN: &provider, }, ProviderCfgs: map[string]*providerCfg{ "1": &provider, }, } u, err := url.Parse("http://127.0.0.1:8443/?Token=invalid")Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8.2K bytes - Viewed (0) -
okhttp/src/jvmMain/kotlin/okhttp3/internal/platform/OpenJSSEPlatform.kt
import java.security.KeyStore import java.security.Provider import javax.net.ssl.SSLContext import javax.net.ssl.SSLSocket import javax.net.ssl.SSLSocketFactory import javax.net.ssl.TrustManagerFactory import javax.net.ssl.X509TrustManager import okhttp3.Protocol /** * Platform using OpenJSSE (https://github.com/openjsse/openjsse) if installed as the first * Security Provider. *
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 3.6K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
## Security - HTTPS { #security-https } In the [previous chapter about HTTPS](https.md){.internal-link target=_blank} we learned about how HTTPS provides encryption for your API. We also saw that HTTPS is normally provided by a component **external** to your application server, a **TLS Termination Proxy**.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (1) -
docs/sts/wso2.md
**We recommend setting `policy` as a custom claim for the JWT service provider follow [here](https://docs.wso2.com/display/IS550/Configuring+Claims+for+a+Service+Provider) and [here](https://docs.wso2.com/display/IS550/Handling+Custom+Claims+with+the+JWT+Bearer+Grant+Type) for relevant docs on how to configure claims for a service provider.** ### 5. Setup MinIO with OpenID configuration URL
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.7K bytes - Viewed (0)