- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 103 for Eskens (0.09 sec)
-
internal/bucket/bandwidth/reader.go
tokens = need + hdr } else { // part of header can be accommodated r.opts.HeaderSize -= b - 1 need = 1 // to ensure we read at least one byte for every Read tokens = b } } else { // all tokens go towards payload need = int(math.Min(float64(b), float64(need))) tokens = need } // reduce tokens requested according to availability
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 14:57:31 UTC 2024 - 3.2K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw. Wir bauen auf dem vorherigen Kapitel auf. ## Über JWT
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 15K bytes - Viewed (0) -
cni/pkg/nodeagent/net_test.go
nlDeps := fixture.nlDeps pod := buildConvincingPod(false) // this is usually called after add. so manually add the pod uid for now fakens := newFakeNs(123) closed := fakens.closed workload := WorkloadInfo{ Workload: podToWorkload(pod), Netns: fakens, } fixture.podNsMap.UpsertPodCacheWithNetns(string(pod.UID), workload) err := netServer.RemovePodFromMesh(ctx, pod, false) assert.NoError(t, err)
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Thu Jul 25 16:13:38 UTC 2024 - 10.7K bytes - Viewed (0) -
cmd/ftp-server.go
tlsPublicCert string ) var err error for _, arg := range args { tokens := strings.SplitN(arg, "=", 2) if len(tokens) != 2 { logger.Fatal(fmt.Errorf("invalid arguments passed to --ftp=%s", arg), "unable to start FTP server") } switch tokens[0] { case "address": host, portStr, err := net.SplitHostPort(tokens[1]) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Mar 09 03:07:08 UTC 2024 - 4.8K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/helper/AccessTokenHelperTest.java
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Thu Feb 22 01:37:57 UTC 2024 - 3.1K bytes - Viewed (0) -
src/cmd/asm/internal/lex/input.go
return } actuals := in.argsFor(macro) var tokens []Token for _, tok := range macro.tokens { if tok.ScanToken != scanner.Ident { tokens = append(tokens, tok) continue } substitution := actuals[tok.text] if substitution == nil { tokens = append(tokens, tok) continue } tokens = append(tokens, substitution...) } in.Push(NewSlice(in.Base(), in.Line(), tokens))
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Sep 06 13:17:27 UTC 2024 - 12.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
# OAuth2 with Password (and hashing), Bearer with JWT tokens Now that we have all the security flow, let's make the application actually secure, using <abbr title="JSON Web Tokens">JWT</abbr> tokens and secure password hashing. This code is something you can actually use in your application, save the password hashes in your database, etc. We are going to start from where we left in the previous chapter and increment it. ## About JWT
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/suggest/index/contents/DefaultContentsParser.java
if (langs == null || langs.length == 0) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, "", null); return tokens == null || tokens.size() == 0; } for (final String lang : langs) { final List<AnalyzeToken> tokens = analyzer.analyze(searchWord, field, lang); if (tokens != null && tokens.size() > 0) { return false; } }
Registered: Fri Nov 08 09:08:12 UTC 2024 - Last Modified: Thu Feb 22 01:36:54 UTC 2024 - 13.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
/// tip In the next chapter, you will see a real secure implementation, with password hashing and <abbr title="JSON Web Tokens">JWT</abbr> tokens. But for now, let's focus on the specific details we need. /// //// tab | Python 3.10+ ```Python hl_lines="87" {!> ../../docs_src/security/tutorial003_an_py310.py!} ``` //// //// tab | Python 3.9+ ```Python hl_lines="87"
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.3K bytes - Viewed (0) -
cmd/sftp-server.go
allowMACs := supportedMACs var err error for _, arg := range args { tokens := strings.SplitN(arg, "=", 2) if len(tokens) != 2 { logger.Fatal(fmt.Errorf("invalid arguments passed to --sftp=%s", arg), "unable to start SFTP server") } switch tokens[0] { case "address": host, portStr, err := net.SplitHostPort(tokens[1]) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0)