- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 98 for dashes (0.04 sec)
-
android/guava/src/com/google/common/net/InternetDomainName.java
* * <ul> * <li>Any part containing non-ASCII characters is considered valid. * <li>Underscores ('_') are permitted wherever dashes ('-') are permitted. * <li>Parts other than the final part may start with a digit, as mandated by <a * href="https://tools.ietf.org/html/rfc1123#section-2">RFC 1123</a>. * </ul> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 27.9K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/helper/QueryHelperTest.java
assertTrue(id1.length() > 0); assertFalse(id1.contains("-")); } public void test_generateId_format() { String id = queryHelper.generateId(); // UUID without dashes should be 32 characters assertEquals(32, id.length()); assertTrue(id.matches("[a-f0-9]{32}")); } public void test_addDefaultSort_singleField() {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 52.6K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
Se o seu banco de dados for roubado, o invasor não terá as senhas em texto puro dos seus usuários, apenas os hashes. Então, o invasor não poderá tentar usar essas senhas em outro sistema (como muitos usuários utilizam a mesma senha em vários lugares, isso seria perigoso). ## Instalar o `passlib` O PassLib é uma excelente biblioteca Python para lidar com hashes de senhas. Ele suporta muitos algoritmos de hashing seguros e utilitários para trabalhar com eles.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 11K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
* hashes and the other does then they will not be considered equal even * though they may be. */ } return true; } return false; } /** * Check whether the password hashes are externally supplied. * * @return whether the hashes are externally supplied */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.3K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hashing.java
function.bits(), function); } } @Override HashCode makeHash(Hasher[] hashers) { byte[] bytes = new byte[bits() / 8]; int i = 0; for (Hasher hasher : hashers) { HashCode newHash = hasher.hash(); i += newHash.writeBytesTo(bytes, i, newHash.bits() / 8); } return HashCode.fromBytesNoCopy(bytes); }
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:06:57 UTC 2025 - 31.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
*/
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich). ## `passlib` installieren PassLib ist ein großartiges Python-Package, um Passwort-Hashes zu handhaben.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
Siempre que pases exactamente el mismo contenido (exactamente la misma contraseña) obtienes exactamente el mismo galimatías. Pero no puedes convertir del galimatías de nuevo a la contraseña. ### Por qué usar hashing de contraseñas Si tu base de datos es robada, el ladrón no tendrá las contraseñas en texto claro de tus usuarios, solo los hashes.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
cmd/metacache-bucket.go
remove[id] = struct{}{} continue } } // If above limit, remove the caches with the oldest handout time. if len(caches)-len(remove) > metacacheMaxEntries { remainCaches := make([]metacache, 0, len(caches)-len(remove)) for id, cache := range caches { if _, ok := remove[id]; ok { continue } remainCaches = append(remainCaches, cache) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/cache/CacheReferencesTest.java
.withKeyStrengths(ImmutableSet.of(STRONG, Strength.WEAK)) .withValueStrengths(ImmutableSet.of(STRONG, Strength.WEAK, Strength.SOFT)); } private Iterable<LoadingCache<Key, String>> caches() { CacheBuilderFactory factory = factoryWithAllKeyStrengths(); return Iterables.transform( factory.buildAllPermutations(), new Function<CacheBuilder<Object, Object>, LoadingCache<Key, String>>() {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 20:58:01 UTC 2025 - 5.1K bytes - Viewed (0)