Search Options

Results per page
Sort
Preferred Languages
Advance

Results 981 - 990 of 2,200 for Provides (0.06 sec)

  1. src/test/java/jcifs/config/PropertyConfigurationTest.java

        }
    
        @Test
        @DisplayName("Should provide default values for missing properties")
        void testDefaultValues() throws CIFSException {
            // Given
            Properties minimalProps = new Properties();
    
            // When
            PropertyConfiguration testConfig = new PropertyConfiguration(minimalProps);
    
            // Then
            // Hostname may be null when not provided
            assertTrue(testConfig.getConnTimeout() > 0);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 11.3K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/ForwardingSortedSet.java

     *
     * @author Mike Bostock
     * @author Louis Wasserman
     * @since 2.0
     */
    @GwtCompatible
    /*
     * We provide and encourage use of ForwardingNavigableSet over this class, but we still provide this
     * one to preserve compatibility.
     */
    @SuppressWarnings("JdkObsolete")
    public abstract class ForwardingSortedSet<E extends @Nullable Object> extends ForwardingSet<E>
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 12 16:28:01 UTC 2025
    - 5.7K bytes
    - Viewed (0)
  3. okhttp/src/androidMain/kotlin/okhttp3/internal/platform/android/AndroidSocketAdapter.kt

    import okhttp3.internal.platform.Platform
    
    /**
     * Modern reflection based SocketAdapter for Conscrypt class SSLSockets.
     *
     * This is used directly for providers where class name is known e.g. the Google Play Provider
     * but we can't compile directly against it, or in fact reliably know if it is registered and
     * on classpath.
     */
    open class AndroidSocketAdapter(
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Mar 19 19:25:20 UTC 2025
    - 4.6K bytes
    - Viewed (0)
  4. docs/changelogs/changelog_3x.md

        interval of 30 seconds is reasonable for most use cases.
    
     *  **OkHttp now supports [Conscrypt][conscrypt].** Conscrypt is a Java Security
        Provider that integrates BoringSSL into the Java platform. Conscrypt
        supports more cipher suites than the JVM’s default provider and may also
        execute more efficiently.
    
        To use it, first register a [Conscrypt dependency][conscrypt_dependency] in
        your build system.
    
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Sun Feb 06 14:55:54 UTC 2022
    - 50.8K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/hash/MessageDigestHashFunctionTest.java

      private static final ImmutableSet<String> INPUTS = ImmutableSet.of("", "Z", "foobar");
    
      // From "How Provider Implementations Are Requested and Supplied" from
      // http://docs.oracle.com/javase/6/docs/technotes/guides/security/crypto/CryptoSpec.html
      //  - Some providers may choose to also include alias names.
      //  - For example, the "SHA-1" algorithm might be referred to as "SHA1".
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  6. internal/hash/reader.go

    	actualSize int64
    
    	checksum      etag.ETag
    	contentSHA256 []byte
    
    	// Client-provided content checksum
    	contentHash   Checksum
    	contentHasher hash.Hash
    	disableMD5    bool
    
    	// Server side computed checksum. In some cases, like CopyObject, a new checksum
    	// needs to be computed and saved on the destination object, but the client
    	// does not provide it. Not calculated if client-side contentHash is set.
    	ServerSideChecksumType   ChecksumType
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Jun 25 15:08:54 UTC 2025
    - 11.8K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/Ordering.java

       * parameter that isn't among the provided values.
       *
       * <p>The generated comparator is serializable if all the provided values are serializable.
       *
       * @param valuesInOrder the values that the returned comparator will be able to compare, in the
       *     order the comparator should induce
       * @return the comparator described above
       * @throws NullPointerException if any of the provided values is null
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 17:50:58 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  8. src/test/java/jcifs/smb/SmbTransportInternalTest.java

    import org.junit.jupiter.api.Test;
    import org.junit.jupiter.api.extension.ExtendWith;
    import org.junit.jupiter.params.ParameterizedTest;
    import org.junit.jupiter.params.provider.CsvSource;
    import org.junit.jupiter.params.provider.ValueSource;
    import org.mockito.ArgumentCaptor;
    import org.mockito.Mock;
    import org.mockito.Mockito;
    import org.mockito.junit.jupiter.MockitoExtension;
    
    import jcifs.SmbSession;
    
    /**
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  9. docs/kms/IAM.md

    # KMS IAM/Config Encryption
    
    MinIO supports encrypting config, IAM assets with KMS provided keys. If the KMS is not enabled, MinIO will store the config, IAM data as plain text erasure coded in its backend.
    
    ## MinIO KMS Quick Start
    
    MinIO supports two ways of encrypting IAM and configuration data.
    You can either use KES - together with an external KMS - or, much simpler,
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  10. SECURITY.md

    ### Model sharing
    
    If the multitenant design allows sharing models, make sure that tenants and
    users are aware of the security risks detailed here and that they are going to
    be practically running code provided by other users. Currently there are no good
    ways to detect malicious models/graphs/checkpoints, so the recommended way to
    mitigate the risk in this scenario is to sandbox the model execution.
    
    ### Hardware attacks
    
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
Back to top