Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 17 for forRetry (0.05 seconds)

  1. src/main/java/jcifs/smb/SmbOperationException.java

         *
         * @param original the original exception
         * @param attemptNumber the current attempt number
         * @return new exception with updated attempt information
         */
        public static SmbOperationException forRetry(SmbOperationException original, int attemptNumber) {
            SmbOperationException retry = new SmbOperationException(original.errorCode, original.originalMessage, original.getCause(),
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 16.5K bytes
    - Click Count (0)
  2. src/test/java/jcifs/smb/SmbOperationExceptionTest.java

            original.withContext("attempt", 1);
    
            // When
            SmbOperationException retry = SmbOperationException.forRetry(original, 2);
    
            // Then
            assertEquals(original.getErrorCode(), retry.getErrorCode());
            assertEquals(original.getMessage(), retry.getMessage());
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 16.1K bytes
    - Click Count (0)
  3. android/guava/src/com/google/common/collect/HashBiMap.java

      }
    
      private final class KeySet extends View<K, V, K> {
        KeySet() {
          super(HashBiMap.this);
        }
    
        @Override
        @ParametricNullness
        K forEntry(int entry) {
          // The cast is safe because we call forEntry only for indexes that contain entries.
          return uncheckedCastNullableTToT(keys[entry]);
        }
    
        @Override
        public boolean contains(@Nullable Object o) {
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Mar 08 16:16:42 GMT 2026
    - 37K bytes
    - Click Count (0)
  4. docs/ru/docs/advanced/strict-content-type.md

    ## Риск CSRF { #csrf-risk }
    
    Такое поведение по умолчанию обеспечивает защиту от класса атак **Cross-Site Request Forgery (CSRF)** в очень специфическом сценарии.
    
    Эти атаки используют то, что браузеры позволяют скриптам отправлять запросы без выполнения CORS preflight, когда они:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 5.6K bytes
    - Click Count (0)
  5. docs/es/docs/advanced/strict-content-type.md

    ## Riesgo de CSRF { #csrf-risk }
    
    Este comportamiento por defecto provee protección contra una clase de ataques de **Cross-Site Request Forgery (CSRF)** en un escenario muy específico.
    
    Estos ataques aprovechan que los navegadores permiten que los scripts envíen requests sin hacer un preflight de CORS cuando:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:12:26 GMT 2026
    - 3.4K bytes
    - Click Count (0)
  6. docs/tr/docs/advanced/strict-content-type.md

    ## CSRF Riski { #csrf-risk }
    
    Bu varsayılan davranış, çok belirli bir senaryoda bir sınıf Cross-Site Request Forgery (CSRF) saldırılarına karşı koruma sağlar.
    
    Bu saldırılar, tarayıcıların aşağıdaki durumlarda herhangi bir CORS preflight kontrolü yapmadan script’lerin request göndermesine izin vermesinden faydalanır:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:51:35 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  7. docs/uk/docs/advanced/strict-content-type.md

    ## Ризик CSRF { #csrf-risk }
    
    Ця поведінка за замовчуванням забезпечує захист від класу атак **Cross-Site Request Forgery (CSRF)** у дуже конкретному сценарії.
    
    Ці атаки використовують той факт, що браузери дозволяють скриптам надсилати запити без виконання перевірки CORS preflight, коли вони:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:25:54 GMT 2026
    - 5.5K bytes
    - Click Count (0)
  8. docs/de/docs/advanced/strict-content-type.md

    ## CSRF-Risiko { #csrf-risk }
    
    Dieses Standardverhalten schützt vor einer Klasse von **Cross-Site Request Forgery (CSRF)**-Angriffen in einem sehr spezifischen Szenario.
    
    Diese Angriffe nutzen aus, dass Browser Skripte Requests senden lassen, ohne einen CORS-Preflight-Check durchzuführen, wenn sie:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:48:21 GMT 2026
    - 3.6K bytes
    - Click Count (0)
  9. docs/en/docs/advanced/strict-content-type.md

    ## CSRF Risk { #csrf-risk }
    
    This default behavior provides protection against a class of **Cross-Site Request Forgery (CSRF)** attacks in a very specific scenario.
    
    These attacks exploit the fact that browsers allow scripts to send requests without doing any CORS preflight check when they:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Mon Feb 23 17:45:20 GMT 2026
    - 3.2K bytes
    - Click Count (0)
  10. docs/pt/docs/advanced/strict-content-type.md

    ## Risco de CSRF { #csrf-risk }
    
    Esse comportamento padrão oferece proteção contra uma classe de ataques de **Cross-Site Request Forgery (CSRF)** em um cenário muito específico.
    
    Esses ataques exploram o fato de que navegadores permitem que scripts enviem requisições sem fazer qualquer verificação de preflight de CORS quando:
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:13 GMT 2026
    - 3.5K bytes
    - Click Count (0)
Back to Top