代码搜索:Implementations

找到约 4,027 项符合「Implementations」的源代码

代码结果 4,027
www.eeworm.com/read/418779/10902688

txt 1325.txt

Rule: -- Sid: 1325 -- Summary: This event is generated when an attempt is made to exploit a known vulnerability in implementations of Secure Shell (ssh) version 1. NOTE: This rule is NOT enabled by
www.eeworm.com/read/418779/10908718

txt 1941.txt

Rule: -- Sid: 1941 -- Summary: This event is generated by an attempt to exploit a buffer overflow in TFTP file handling routines. -- Impact: Implementation Dependent. Several implementations of TF
www.eeworm.com/read/137277/13335535

doc cfe.doc

C Front End Notes ----------------- 1. There used to be two implementations: TREE and QUAD. The old quads and leafs version used to represent expressions as quads, ie: re
www.eeworm.com/read/137691/5820748

java pybuiltinfunctionset.java

// Copyright (c) Corporation for National Research Initiatives package org.python.core; /** * A helper class for faster implementations of commonly called * methods. * * Subclasses of PyBuilt
www.eeworm.com/read/108032/6187042

java forwwt.java

/* * CVS identifier: * * $Id: ForwWT.java,v 1.8 2000/09/05 09:25:54 grosbois Exp $ * * Class: ForwWT * * Description: The interface for implementations of a fo
www.eeworm.com/read/101196/6237669

java attribute.java

package org.kxml; /** Attribute class, used by both kDom and the pullparser. The instances of this class are immutable. This restriction allows manipulation aware element implementations wi
www.eeworm.com/read/343491/11944508

copying

These C implementations of the JADE and SHIBBS algorithms are copyrighted by Jean-Francois Cardoso and distributed under the GNU General Public License. This set of programs is free software; y
www.eeworm.com/read/152786/12082908

h testdes.h

/* DES test vectors, derived from "Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard", NBS Special Publication 500-20, 1980 */ /* The data structure
www.eeworm.com/read/130467/14191369

h testdes.h

/* DES test vectors, derived from "Validating the Correctness of Hardware Implementations of the NBS Data Encryption Standard", NBS Special Publication 500-20, 1980 */ /* The data structure
www.eeworm.com/read/221805/14720080

c radius_timer.c

/* radius_timer.c */ /* Implementations of RADIUS timer handlers, including checking pending */ /* request for retransmission, and checking incoming RADIUS packets. */ /* Copyright 1984 - 2000 Win