- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for strlens (0.1 sec)
-
ci/official/containers/linux_arm64/builder.devtoolset/stringop_trunc.patch
- ? (__string2_1bptr_p (src) && strlen (src) + 1 <= 8 \ - ? __builtin_strcpy (dest, src) + strlen (src) \ - : ((char *) (__mempcpy) (dest, src, strlen (src) + 1) \ - - 1)) \ - : __stpcpy (dest, src))) -# else -# define __stpcpy(dest, src) \ - (__extension__ (__builtin_constant_p (src) \ - ? (__string2_1bptr_p (src) && strlen (src) + 1 <= 8 \
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Mon Sep 18 14:52:45 UTC 2023 - 42.9K bytes - Viewed (0) -
src/main/java/jcifs/util/Encdec.java
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 11K bytes - Viewed (0) -
javadoc-stylesheet.css
width:25%; vertical-align:middle; } /* Content styles */ .description pre { margin-top:0; } .deprecatedContent { margin:0; padding:10px 0; } .docSummary { padding:0; } /* Formatting effect styles */ .sourceLineNo { color:green; padding:0 30px 0 0; } h1.hidden { visibility:hidden;
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Jul 17 21:01:06 UTC 2013 - 11.2K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/Encdec.java
} } public static int enc_utf8( String str, byte[] dst, int di, int dlim ) throws IOException { int start = di, ch; int strlen = str.length(); for( int i = 0; di < dlim && i < strlen; i++ ) { ch = str.charAt( i ); if ((ch >= 0x0001) && (ch <= 0x007F)) { dst[di++] = (byte)ch; } else if (ch > 0x07FF) {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 10.9K bytes - Viewed (0) -
src/main/java/org/codelibs/core/convert/DateConversionUtil.java
} @Override public boolean hasNext() { return index < STYLES.length; } @Override public DateFormat next() { if (!hasNext()) { throw new NoSuchElementException(); } final int style = STYLES[index++]; return DateFormat.getDateInstance(style, locale); } @Override
Registered: Fri Nov 01 20:58:10 UTC 2024 - Last Modified: Thu Mar 07 01:59:08 UTC 2024 - 21.5K bytes - Viewed (0) -
src/main/webapp/js/admin/popper.min.js
w='bottom'==c?-1:1,y='right'==g?-1:1;m[c]=d*w,m[g]=s*y,m.willChange=c+', '+g}var E={"x-placement":e.placement};return e.attributes=le({},E,e.attributes),e.styles=le({},m,e.styles),e.arrowStyles=le({},e.offsets.arrow,e.arrowStyles),e},gpuAcceleration:!0,x:'bottom',y:'right'},applyStyle:{order:900,enabled:!0,fn:function(e){return V(e.instance.popper,e.styles),j(e.instance.popper,e.attributes),e.arrowElement&&Object.keys(e.arrowStyles).length&&V(e.arrowElement,e.arrowStyles),e},onLoad:function(e,t,o,n,i){var...
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 20.7K bytes - Viewed (0) -
cni/pkg/nodeagent/server.go
if err != nil { log.Warnf("unable to list IPSet: %v", err) return err } actual := sets.New(actualIPSetContents...) stales := actual.DifferenceInPlace(expected) for staleIP := range stales { if err := hostsideProbeSet.ClearEntriesWithIP(staleIP); err != nil { return err } log.Debugf("removed stale ip %s from host ipset %s", staleIP, hostsideProbeSet.Prefix)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Wed Sep 25 20:54:34 UTC 2024 - 13.4K bytes - Viewed (0) -
fastapi/openapi/docs.py
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Thu May 23 22:59:02 UTC 2024 - 10.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ##### Why use password hashing If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.3K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous).
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0)