代码搜索:proxy
找到约 9,859 项符合「proxy」的源代码
代码结果 9,859
www.eeworm.com/read/392773/2491272
cpp bcompos_test.cpp
#include
#include "unary.h"
#include "cppunit/cppunit_proxy.h"
#if defined(_STLP_USE_NAMESPACES)
using namespace std;
#endif
//
// TestCase class
//
class BcomposTest : public CPPUNIT_N
www.eeworm.com/read/392773/2491327
cpp generator_test.cpp
#include
#include
#include "fadapter.h"
#include "fib.h"
#include "cppunit/cppunit_proxy.h"
#if !defined (STLPORT) || defined(_STLP_USE_NAMESPACES)
using namespace std;
#endif
www.eeworm.com/read/387285/2563127
txt namecache.txt
namecache: DNS caching proxy with P2P pseudo-subdomains
This program represents a proof-of-concept of a KadC application: the implementation of a non-hierarchical "parallel DNS" where top-level pse
www.eeworm.com/read/366277/2891667
java proxyfactory.java
/*
* Created on 2007-3-7
* Last modified on 2007-3-7
* Powered by YeQiangWei.com
*/
package com.yeqiangwei.club.service.proxy;
public class ProxyFactory {
public static ProxyInt
www.eeworm.com/read/358128/3000046
pm basic.pm
package LWP::Authen::Basic;
use strict;
require MIME::Base64;
sub authenticate
{
my($class, $ua, $proxy, $auth_param, $response,
$request, $arg, $size) = @_;
my($user, $pass) = $ua->
www.eeworm.com/read/358128/3000048
pm digest.pm
package LWP::Authen::Digest;
use strict;
require Digest::MD5;
sub authenticate
{
my($class, $ua, $proxy, $auth_param, $response,
$request, $arg, $size) = @_;
my($user, $pass) = $ua->
www.eeworm.com/read/351777/3098969
c getpwnam_auth.c
/*
* getpwnam_auth.c
*
* AUTHOR: Erik Hofman
* Robin Elfrink
*
* Example authentication program for Squid, based on the
* original proxy_auth code from
www.eeworm.com/read/351777/3099028
c usersfile.c
/*
* usersfile.c
* (C) 2000 Antonino Iannella, Stellar-X Pty Ltd
* Released under GPL, see COPYING-2.0 for details.
*
* These routines are to allow users attempting to use the proxy which
* ha
www.eeworm.com/read/351777/3099031
c allowusers.c
/*
* allowusers.c
* (C) 2000 Antonino Iannella, Stellar-X Pty Ltd
* Released under GPL, see COPYING-2.0 for details.
*
* These routines are to allow users attempting to use the proxy which
* h