Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 98 for dashes (0.04 sec)

  1. android/guava/src/com/google/common/net/InternetDomainName.java

       *
       * <ul>
       *   <li>Any part containing non-ASCII characters is considered valid.
       *   <li>Underscores ('_') are permitted wherever dashes ('-') are permitted.
       *   <li>Parts other than the final part may start with a digit, as mandated by <a
       *       href="https://tools.ietf.org/html/rfc1123#section-2">RFC 1123</a>.
       * </ul>
       *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 27.9K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/helper/QueryHelperTest.java

            assertTrue(id1.length() > 0);
            assertFalse(id1.contains("-"));
        }
    
        public void test_generateId_format() {
            String id = queryHelper.generateId();
            // UUID without dashes should be 32 characters
            assertEquals(32, id.length());
            assertTrue(id.matches("[a-f0-9]{32}"));
        }
    
        public void test_addDefaultSort_singleField() {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 52.6K bytes
    - Viewed (0)
  3. docs/pt/docs/tutorial/security/oauth2-jwt.md

    Se o seu banco de dados for roubado, o invasor não terá as senhas em texto puro dos seus usuários, apenas os hashes.
    
    Então, o invasor não poderá tentar usar essas senhas em outro sistema (como muitos usuários utilizam a mesma senha em vários lugares, isso seria perigoso).
    
    ## Instalar o `passlib`
    
    O PassLib é uma excelente biblioteca Python para lidar com hashes de senhas.
    
    Ele suporta muitos algoritmos de hashing seguros e utilitários para trabalhar com eles.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 11K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb/NtlmPasswordAuthentication.java

                     * hashes and the other does then they will not be considered equal even
                     * though they may be.
                     */
                }
                return true;
            }
            return false;
        }
    
        /**
         * Check whether the password hashes are externally supplied.
         *
         * @return whether the hashes are externally supplied
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/Hashing.java

                function.bits(),
                function);
          }
        }
    
        @Override
        HashCode makeHash(Hasher[] hashers) {
          byte[] bytes = new byte[bits() / 8];
          int i = 0;
          for (Hasher hasher : hashers) {
            HashCode newHash = hasher.hash();
            i += newHash.writeBytesTo(bytes, i, newHash.bits() / 8);
          }
          return HashCode.fromBytesNoCopy(bytes);
        }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:06:57 UTC 2025
    - 31.1K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  7. docs/de/docs/tutorial/security/oauth2-jwt.md

    Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
    
    ## `passlib` installieren
    
    PassLib ist ein großartiges Python-Package, um Passwort-Hashes zu handhaben.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  8. docs/es/docs/tutorial/security/oauth2-jwt.md

    Siempre que pases exactamente el mismo contenido (exactamente la misma contraseña) obtienes exactamente el mismo galimatías.
    
    Pero no puedes convertir del galimatías de nuevo a la contraseña.
    
    ### Por qué usar hashing de contraseñas
    
    Si tu base de datos es robada, el ladrón no tendrá las contraseñas en texto claro de tus usuarios, solo los hashes.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  9. cmd/metacache-bucket.go

    			remove[id] = struct{}{}
    			continue
    		}
    	}
    
    	// If above limit, remove the caches with the oldest handout time.
    	if len(caches)-len(remove) > metacacheMaxEntries {
    		remainCaches := make([]metacache, 0, len(caches)-len(remove))
    		for id, cache := range caches {
    			if _, ok := remove[id]; ok {
    				continue
    			}
    			remainCaches = append(remainCaches, cache)
    		}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6.6K bytes
    - Viewed (0)
  10. android/guava-tests/test/com/google/common/cache/CacheReferencesTest.java

            .withKeyStrengths(ImmutableSet.of(STRONG, Strength.WEAK))
            .withValueStrengths(ImmutableSet.of(STRONG, Strength.WEAK, Strength.SOFT));
      }
    
      private Iterable<LoadingCache<Key, String>> caches() {
        CacheBuilderFactory factory = factoryWithAllKeyStrengths();
        return Iterables.transform(
            factory.buildAllPermutations(),
            new Function<CacheBuilder<Object, Object>, LoadingCache<Key, String>>() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 20:58:01 UTC 2025
    - 5.1K bytes
    - Viewed (0)
Back to top