代码搜索:Implementations
找到约 4,027 项符合「Implementations」的源代码
代码结果 4,027
www.eeworm.com/read/418779/10902688
txt 1325.txt
Rule:
--
Sid:
1325
--
Summary:
This event is generated when an attempt is made to exploit a known
vulnerability in implementations of Secure Shell (ssh) version 1.
NOTE: This rule is NOT enabled by
www.eeworm.com/read/418779/10908718
txt 1941.txt
Rule:
--
Sid:
1941
--
Summary:
This event is generated by an attempt to exploit a buffer overflow in TFTP file handling routines.
--
Impact:
Implementation Dependent. Several implementations of TF
www.eeworm.com/read/137277/13335535
doc cfe.doc
C Front End Notes
-----------------
1. There used to be two implementations: TREE and QUAD. The old quads
and leafs version used to represent expressions as quads, ie:
re
www.eeworm.com/read/137691/5820748
java pybuiltinfunctionset.java
// Copyright (c) Corporation for National Research Initiatives
package org.python.core;
/**
* A helper class for faster implementations of commonly called
* methods.
*
* Subclasses of PyBuilt
www.eeworm.com/read/108032/6187042
java forwwt.java
/*
* CVS identifier:
*
* $Id: ForwWT.java,v 1.8 2000/09/05 09:25:54 grosbois Exp $
*
* Class: ForwWT
*
* Description: The interface for implementations of a fo
www.eeworm.com/read/101196/6237669
java attribute.java
package org.kxml;
/** Attribute class, used by both kDom and the pullparser. The
instances of this class are immutable. This restriction allows
manipulation aware element implementations wi
www.eeworm.com/read/343491/11944508
copying
These C implementations of the JADE and SHIBBS algorithms are
copyrighted by Jean-Francois Cardoso and distributed under the GNU
General Public License.
This set of programs is free software; y
www.eeworm.com/read/152786/12082908
h testdes.h
/* DES test vectors, derived from "Validating the Correctness of Hardware
Implementations of the NBS Data Encryption Standard", NBS Special
Publication 500-20, 1980 */
/* The data structure
www.eeworm.com/read/130467/14191369
h testdes.h
/* DES test vectors, derived from "Validating the Correctness of Hardware
Implementations of the NBS Data Encryption Standard", NBS Special
Publication 500-20, 1980 */
/* The data structure
www.eeworm.com/read/221805/14720080
c radius_timer.c
/* radius_timer.c */
/* Implementations of RADIUS timer handlers, including checking pending */
/* request for retransmission, and checking incoming RADIUS packets. */
/* Copyright 1984 - 2000 Win