Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 981 - 990 of 2,200 for Provides (0.36 seconds)

  1. src/test/java/jcifs/config/PropertyConfigurationTest.java

        }
    
        @Test
        @DisplayName("Should provide default values for missing properties")
        void testDefaultValues() throws CIFSException {
            // Given
            Properties minimalProps = new Properties();
    
            // When
            PropertyConfiguration testConfig = new PropertyConfiguration(minimalProps);
    
            // Then
            // Hostname may be null when not provided
            assertTrue(testConfig.getConnTimeout() > 0);
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 11.3K bytes
    - Click Count (0)
  2. okhttp/src/androidMain/kotlin/okhttp3/internal/platform/android/AndroidSocketAdapter.kt

    import okhttp3.internal.platform.Platform
    
    /**
     * Modern reflection based SocketAdapter for Conscrypt class SSLSockets.
     *
     * This is used directly for providers where class name is known e.g. the Google Play Provider
     * but we can't compile directly against it, or in fact reliably know if it is registered and
     * on classpath.
     */
    open class AndroidSocketAdapter(
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Mar 19 19:25:20 GMT 2025
    - 4.6K bytes
    - Click Count (0)
  3. guava/src/com/google/common/collect/ForwardingSortedSet.java

     *
     * @author Mike Bostock
     * @author Louis Wasserman
     * @since 2.0
     */
    @GwtCompatible
    /*
     * We provide and encourage use of ForwardingNavigableSet over this class, but we still provide this
     * one to preserve compatibility.
     */
    @SuppressWarnings("JdkObsolete")
    public abstract class ForwardingSortedSet<E extends @Nullable Object> extends ForwardingSet<E>
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Wed Feb 12 16:28:01 GMT 2025
    - 5.7K bytes
    - Click Count (0)
  4. docs/changelogs/changelog_3x.md

        interval of 30 seconds is reasonable for most use cases.
    
     *  **OkHttp now supports [Conscrypt][conscrypt].** Conscrypt is a Java Security
        Provider that integrates BoringSSL into the Java platform. Conscrypt
        supports more cipher suites than the JVM’s default provider and may also
        execute more efficiently.
    
        To use it, first register a [Conscrypt dependency][conscrypt_dependency] in
        your build system.
    
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sun Feb 06 14:55:54 GMT 2022
    - 50.8K bytes
    - Click Count (0)
  5. android/guava-tests/test/com/google/common/hash/MessageDigestHashFunctionTest.java

      private static final ImmutableSet<String> INPUTS = ImmutableSet.of("", "Z", "foobar");
    
      // From "How Provider Implementations Are Requested and Supplied" from
      // http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
      //  - Some providers may choose to also include alias names.
      //  - For example, the "SHA-1" algorithm might be referred to as "SHA1".
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Thu Dec 19 18:03:30 GMT 2024
    - 4.2K bytes
    - Click Count (0)
  6. internal/hash/reader.go

    	actualSize int64
    
    	checksum      etag.ETag
    	contentSHA256 []byte
    
    	// Client-provided content checksum
    	contentHash   Checksum
    	contentHasher hash.Hash
    	disableMD5    bool
    
    	// Server side computed checksum. In some cases, like CopyObject, a new checksum
    	// needs to be computed and saved on the destination object, but the client
    	// does not provide it. Not calculated if client-side contentHash is set.
    	ServerSideChecksumType   ChecksumType
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Jun 25 15:08:54 GMT 2025
    - 11.8K bytes
    - Click Count (0)
  7. android/guava/src/com/google/common/collect/Ordering.java

       * parameter that isn't among the provided values.
       *
       * <p>The generated comparator is serializable if all the provided values are serializable.
       *
       * @param valuesInOrder the values that the returned comparator will be able to compare, in the
       *     order the comparator should induce
       * @return the comparator described above
       * @throws NullPointerException if any of the provided values is null
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Tue Sep 23 17:50:58 GMT 2025
    - 39.5K bytes
    - Click Count (0)
  8. src/test/java/jcifs/smb/SmbTransportInternalTest.java

    import org.junit.jupiter.api.Test;
    import org.junit.jupiter.api.extension.ExtendWith;
    import org.junit.jupiter.params.ParameterizedTest;
    import org.junit.jupiter.params.provider.CsvSource;
    import org.junit.jupiter.params.provider.ValueSource;
    import org.mockito.ArgumentCaptor;
    import org.mockito.Mock;
    import org.mockito.Mockito;
    import org.mockito.junit.jupiter.MockitoExtension;
    
    import jcifs.SmbSession;
    
    /**
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Thu Aug 14 07:14:38 GMT 2025
    - 12.1K bytes
    - Click Count (0)
  9. docs/kms/IAM.md

    # KMS IAM/Config Encryption
    
    MinIO supports encrypting config, IAM assets with KMS provided keys. If the KMS is not enabled, MinIO will store the config, IAM data as plain text erasure coded in its backend.
    
    ## MinIO KMS Quick Start
    
    MinIO supports two ways of encrypting IAM and configuration data.
    You can either use KES - together with an external KMS - or, much simpler,
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Click Count (0)
  10. SECURITY.md

    ### Model sharing
    
    If the multitenant design allows sharing models, make sure that tenants and
    users are aware of the security risks detailed here and that they are going to
    be practically running code provided by other users. Currently there are no good
    ways to detect malicious models/graphs/checkpoints, so the recommended way to
    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Created: Tue Dec 30 12:39:10 GMT 2025
    - Last Modified: Wed Oct 16 16:10:43 GMT 2024
    - 9.6K bytes
    - Click Count (0)
Back to Top