- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 44 for trimming (0.04 seconds)
-
src/test/java/org/codelibs/fess/entity/ChatSessionTest.java
session.addAssistantMessage("Assistant 2"); session.addUserMessage("User 3"); session.addAssistantMessage("Assistant 3"); assertEquals(6, session.getMessageCount()); // Trimming to 3 would start at index 3 (assistant), so it should go back to index 2 (user) session.trimHistory(3); final List<ChatMessage> messages = session.getMessages(); assertEquals(4, messages.size());
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 07 01:53:06 GMT 2026 - 12.6K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/base/CharMatcherTest.java
assertThat(CharMatcher.any().collapseFrom("ab", '_')).isEqualTo("_"); assertThat(CharMatcher.any().collapseFrom("abcd", '_')).isEqualTo("_"); } public void testTrimFrom() { // trimming - doTestTrimFrom("-", ""); doTestTrimFrom("x-", "x"); doTestTrimFrom("-x", "x"); doTestTrimFrom("--", ""); doTestTrimFrom("x--", "x"); doTestTrimFrom("--x", "x");
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Mar 13 13:01:07 GMT 2026 - 32.4K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/base/Utf8Test.java
// Four byte characters FOUR_BYTE_ROUNDTRIPPABLE_CHARACTERS; /** Tests that round tripping of all two byte permutations work. */ @GwtIncompatible // java.nio.charset.Charset public void testIsWellFormed_1Byte() { testBytes(1, EXPECTED_ONE_BYTE_ROUNDTRIPPABLE_COUNT); } /** Tests that round tripping of all two byte permutations work. */ @GwtIncompatible // java.nio.charset.CharsetCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 16 15:59:55 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 5K bytes - Click Count (0) -
docs/tr/docs/advanced/security/http-basic-auth.md
# Bir hata döndür ... ``` Ancak `secrets.compare_digest()` kullanarak, "timing attacks" denilen bir saldırı türüne karşı güvenli olursunuz. ### Timing Attacks { #timing-attacks } Peki "timing attack" nedir? Bazı saldırganların kullanıcı adı ve şifreyi tahmin etmeye çalıştığını düşünelim.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.3K bytes - Click Count (0) -
docs/de/docs/advanced/security/http-basic-auth.md
# Einen Error zurückgeben ... ``` Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden. ### Timing-Angriffe { #timing-attacks } Aber was ist ein „Timing-Angriff“? Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 6.1K bytes - Click Count (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks". ### Ataques de Temporização { #timing-attacks } Mas o que é um "timing attack"? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha. E eles enviam uma requisição com um usuário `johndoe` e uma senha `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 5.2K bytes - Click Count (0) -
docs/ko/docs/advanced/security/http-basic-auth.md
```Python if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"): # 어떤 오류를 반환 ... ``` 하지만 `secrets.compare_digest()`를 사용하면 "timing attacks"라고 불리는 한 유형의 공격에 대해 안전해집니다. ### 타이밍 공격 { #timing-attacks } 그렇다면 "timing attack"이란 무엇일까요? 공격자들이 사용자명과 비밀번호를 추측하려고 한다고 가정해봅시다. 그리고 사용자명 `johndoe`, 비밀번호 `love123`으로 요청을 보냅니다. 그러면 애플리케이션의 Python 코드는 대략 다음과 같을 것입니다: ```Python
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:06:26 GMT 2026 - 5.9K bytes - Click Count (0) -
docs/uk/docs/advanced/security/http-basic-auth.md
# Поверніть якусь помилку ... ``` Але використовуючи `secrets.compare_digest()`, це буде захищено від типу атак, що називаються «атаки за часом» (timing attacks). ### Атаки за часом { #timing-attacks } Що таке «атака за часом»? Уявімо, що зловмисники намагаються вгадати ім'я користувача та пароль. Вони надсилають запит з ім'ям користувача `johndoe` та паролем `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:27:41 GMT 2026 - 7.6K bytes - Click Count (0)