Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 67 for hand (0.01 sec)

  1. android/guava/src/com/google/common/util/concurrent/TimeLimiter.java

       * is also performed for calls to {@link Object#equals}, {@link Object#hashCode}, and {@link
       * Object#toString}.
       *
       * <p>If the target method call finishes before the limit is reached, the return value or
       * exception is propagated to the caller exactly as-is. If, on the other hand, the time limit is
       * reached, the proxy will attempt to abort the call to the target, and will throw an {@link
       * UncheckedTimeoutException} to the caller.
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Jan 18 02:54:30 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  2. lib/fips140/Makefile

    # Rules for building and testing new FIPS snapshots.
    # For example:
    #
    #	make v1.2.3.zip
    #	make v1.2.3.test
    #
    # and then if changes are needed, check them into master
    # and run 'make v1.2.3.rm' and repeat.
    #
    # Note that once published a snapshot zip file should never
    # be modified. We record the sha256 hashes of the zip files
    # in fips140.sum, and the cmd/go/internal/fips140 test checks
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 1.4K bytes
    - Viewed (0)
  3. guava/src/com/google/common/hash/HashingOutputStream.java

      private final Hasher hasher;
    
      /**
       * Creates an output stream that hashes using the given {@link HashFunction}, and forwards all
       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/hash/HashingOutputStream.java

      private final Hasher hasher;
    
      /**
       * Creates an output stream that hashes using the given {@link HashFunction}, and forwards all
       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/HashingInputStream.java

      private final Hasher hasher;
    
      /**
       * Creates an input stream that hashes using the given {@link HashFunction} and delegates all data
       * read from it to the underlying {@link InputStream}.
       *
       * <p>The {@link InputStream} should not be read from before or after the hand-off.
       */
      public HashingInputStream(HashFunction hashFunction, InputStream in) {
        super(checkNotNull(in));
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  6. compat/maven-compat/src/main/java/org/apache/maven/artifact/ArtifactStatus.java

        /**
         * Moderate trust - it was deployed directly by a user.
         */
        public static final ArtifactStatus DEPLOYED = new ArtifactStatus("deployed", 4);
    
        /**
         * Trusted, as it has had its data verified by hand.
         */
        public static final ArtifactStatus VERIFIED = new ArtifactStatus("verified", 5);
    
        private final int rank;
    
        private final String key;
    
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 3K bytes
    - Viewed (0)
  7. src/cmd/asm/internal/asm/testdata/386.s

    // This input was created by taking the instruction productions in
    // the old assembler's (8a's) grammar and hand-writing complete
    // instructions for each rule, to guarantee we cover the same space.
    
    #include "../../../../../runtime/textflag.h"
    
    TEXT foo(SB), DUPOK|NOSPLIT, $0
    
    // LTYPE1 nonrem	{ outcode(int($1), &$2); }
    	SETCC	AX
    	SETCC	foo+4(SB)
    
    // LTYPE2 rimnon	{ outcode(int($1), &$2); }
    	DIVB	AX
    	DIVB	foo+4(SB)
    	PUSHL	$foo+4(SB)
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Apr 09 18:57:21 UTC 2019
    - 2K bytes
    - Viewed (0)
  8. docs/en/docs/advanced/security/http-basic-auth.md

    In HTTP Basic Auth, the application expects a header that contains a username and a password.
    
    If it doesn't receive it, it returns an HTTP 401 "Unauthorized" error.
    
    And returns a header `WWW-Authenticate` with a value of `Basic`, and an optional `realm` parameter.
    
    That tells the browser to show the integrated prompt for a username and password.
    
    Then, when you type that username and password, the browser sends them in the header automatically.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  9. src/cmd/asm/internal/asm/testdata/amd64.s

    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    // This input was created by taking the instruction productions in
    // the old assembler's (6a's) grammar and hand-writing complete
    // instructions for each rule, to guarantee we cover the same space.
    
    #include "../../../../../runtime/textflag.h"
    
    TEXT	foo(SB), DUPOK|NOSPLIT, $0
    
    // LTYPE1 nonrem	{ outcode($1, &$2); }
    	NEGQ	R11
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Apr 09 18:57:21 UTC 2019
    - 3.3K bytes
    - Viewed (0)
  10. docs/de/docs/advanced/security/http-basic-auth.md

    Und dann können sie es noch einmal versuchen, wohl wissend, dass es wahrscheinlich eher etwas mit `stanleyjobsox` als mit `johndoe` zu tun hat.
    
    #### Ein „professioneller“ Angriff
    
    Natürlich würden die Angreifer das alles nicht von Hand versuchen, sondern ein Programm dafür schreiben, möglicherweise mit Tausenden oder Millionen Tests pro Sekunde. Und würden jeweils nur einen zusätzlichen richtigen Buchstaben erhalten.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Oct 27 15:25:54 UTC 2024
    - 5.8K bytes
    - Viewed (0)
Back to top