- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 517 for offsets (0.04 sec)
-
src/main/java/jcifs/smb1/smb1/SmbFileInputStream.java
import java.net.UnknownHostException; import jcifs.smb1.util.LogStream; import jcifs.smb1.util.transport.TransportException; /** * This InputStream can read bytes from a file on an SMB file server. Offsets are 64 bits. */ public class SmbFileInputStream extends InputStream { private long fp; private final int readSize; private int openFlags; private final int access;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 9.4K bytes - Viewed (0) -
src/main/java/jcifs/util/InputValidator.java
} if (srcOffset < 0 || dstOffset < 0 || length < 0) { throw new IllegalArgumentException("Offsets and length must be non-negative"); } if (srcOffset + length > src.length) { throw new IllegalArgumentException( "Source array bounds exceeded: offset=" + srcOffset + ", length=" + length + ", array.length=" + src.length); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 13.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/lock/Smb2OplockBreakNotificationTest.java
@DisplayName("Should handle buffer with offset correctly") void testReadWithBufferOffset() throws Exception { int offset = 10; byte[] buffer = new byte[64]; byte[] fileId = createTestData(16); byte oplockLevel = 0x02; // Fill some random data before offset Arrays.fill(buffer, 0, offset, (byte) 0xAB);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.6K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/trans/nt/NtTransNotifyChangeResponseTest.java
void testReadParametersWireFormatWithBufferOffset() throws Exception { int offset = 20; byte[] notificationData = createSingleNotificationBuffer("offset_test.txt", FileNotifyInformation.FILE_ACTION_MODIFIED); byte[] buffer = new byte[offset + notificationData.length]; System.arraycopy(notificationData, 0, buffer, offset, notificationData.length);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 14.7K bytes - Viewed (0) -
src/archive/tar/common.go
// // var spd sparseDatas = []sparseEntry{ // {Offset: 2, Length: 5}, // Data fragment for 2..6 // {Offset: 18, Length: 3}, // Data fragment for 18..20 // } // var sph sparseHoles = []sparseEntry{ // {Offset: 0, Length: 2}, // Hole fragment for 0..1 // {Offset: 7, Length: 11}, // Hole fragment for 7..17 // {Offset: 21, Length: 4}, // Hole fragment for 21..24 // } //
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Sep 13 21:03:27 UTC 2024 - 24.5K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/suggest/analysis/SuggestAnalyzerTest.java
Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Mon Sep 01 13:33:03 UTC 2025 - 15.7K bytes - Viewed (0) -
cmd/object-api-utils.go
} return &HTTPRangeSpec{Start: start, End: end} } // Returns the compressed offset which should be skipped. // If encrypted offsets are adjusted for encrypted block headers/trailers. // Since de-compression is after decryption encryption overhead is only added to compressedOffset.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jun 25 15:08:54 UTC 2025 - 37.3K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/ioctl/SrvCopyChunkCopyResponseTest.java
@DisplayName("Should decode at various offsets") @ValueSource(ints = { 0, 10, 50, 100, 200 }) void testDecodeAtVariousOffsets(int offset) throws SMBProtocolDecodingException { byte[] buffer = new byte[512]; byte[] responseData = createValidCopyChunkResponse(7, 8192, 57344); System.arraycopy(responseData, 0, buffer, offset, responseData.length);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 19.8K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/nego/Smb2NegotiateResponseInputValidationTest.java
/** * Test integer overflow protection in security buffer offset calculation. */ @Test public void testSecurityBufferIntegerOverflow() { byte[] buffer = createBasicNegotiateResponseBuffer(); // Set security buffer offset close to Integer.MAX_VALUE to test overflow protection SMBUtil.writeInt2(32767, buffer, 56); // Large offset (will be added to header start)
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 15.8K bytes - Viewed (0) -
src/test/java/jcifs/internal/dtyp/SecurityDescriptorTest.java
buffer[offset] = 0x01; // revision buffer[offset + 1] = 0x00; // padding SMBUtil.writeInt2(0x8004, buffer, offset + 2); // type SMBUtil.writeInt4(0, buffer, offset + 4); // owner offset SMBUtil.writeInt4(0, buffer, offset + 8); // group offset SMBUtil.writeInt4(0, buffer, offset + 12); // SACL offset SMBUtil.writeInt4(20, buffer, offset + 16); // DACL offset
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.6K bytes - Viewed (0)