- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 13 for delicious (0.32 seconds)
-
okhttp/src/jvmTest/kotlin/okhttp3/CookiesTest.kt
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Jun 18 12:28:21 GMT 2025 - 13K bytes - Click Count (0) -
mockwebserver-deprecated/src/test/java/okhttp3/mockwebserver/MockWebServerTest.kt
MockResponse() .clearHeaders() .addHeader("Cookie: s=square") .addHeader("Cookie: a=android") .addHeader("Cookies: delicious") response.setHeader("cookie", "r=robot") assertThat(headersToList(response)) .containsExactly("Cookies: delicious", "cookie: r=robot") } @Test fun mockResponseSetHeaders() { val response = MockResponse() .clearHeaders()
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Jul 03 13:16:34 GMT 2025 - 22.3K bytes - Click Count (0) -
mockwebserver/src/test/java/mockwebserver3/MockWebServerTest.kt
.Builder() .clearHeaders() .addHeader("Cookie: s=square") .addHeader("Cookie: a=android") .addHeader("Cookies: delicious") builder.setHeader("cookie", "r=robot") assertThat(headersToList(builder)).containsExactly("Cookies: delicious", "cookie: r=robot") } @Test fun mockResponseSetHeaders() { val builder = MockResponse .Builder()
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Aug 03 22:38:00 GMT 2025 - 28K bytes - Click Count (0) -
SECURITY.md
BMP, GIF, WAV, RAW, RAW\_PADDED, CSV and PROTO formats. All other input formats, including tensorflow-io should be sandboxed if used to process untrusted data. For example, if an attacker were to upload a malicious video file, they could potentially exploit a vulnerability in the TensorFlow code that handles videos, which could allow them to execute arbitrary code on the system running TensorFlow.
Created: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Wed Oct 16 16:10:43 GMT 2024 - 9.6K bytes - Click Count (0) -
README.md
otherwise. Do not persist these and assume they can be read by a future version of the library. 5. Our classes are not designed to protect against a malicious caller. You should not use them for communication between trusted and untrusted code. 6. For the mainline flavor, we test the libraries using OpenJDK 8, 11, and 17Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 6.2K bytes - Click Count (0) -
cmd/generic-handlers.go
return true case segmentEnd-segmentStart == 1 && path[segmentStart] == '.': return true } i++ } return false } // Check if client is sending a malicious request. func hasMultipleAuth(r *http.Request) bool { authTypeCount := 0 for _, hasValidAuth := range []func(*http.Request) bool{ isRequestSignatureV2, isRequestPresignedSignatureV2,
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 20.7K bytes - Click Count (1) -
cmd/iam.go
if ok { parentInClaim, ok := p.(string) if !ok { // Reject malformed/malicious requests. return false } // The parent claim in the session token should be equal // to the parent detected in the backend if parentInClaim != parentUser { return false } } else { // This is needed so a malicious user cannot // use a leaked session key of another user // to widen its privileges.Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
android/guava/src/com/google/common/io/ByteSource.java
* * <p>Note that the given byte array may be passed directly to methods on, for example, {@code * OutputStream} (when {@code copyTo(OutputStream)} is called on the resulting {@code * ByteSource}). This could allow a malicious {@code OutputStream} implementation to modify the * contents of the array, but provides better performance in the normal case. * * @since 15.0 (since 14.0 as {@code ByteStreams.asByteSource(byte[])}). */Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 08 18:35:13 GMT 2025 - 25.7K bytes - Click Count (0) -
android/guava/src/com/google/common/math/Quantiles.java
* randomly ordered data (the probability decreases faster than exponentially in N), but if you are * passing in unsanitized user data then a malicious user could force it. A light shuffle of the * data using an unpredictable seed should normally be enough to thwart this attack. * * <p>The time taken to compute multiple quantiles on the same dataset using {@link Scale#indexes
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 30.1K bytes - Click Count (0) -
src/archive/zip/reader.go
} } // Assume that uncompressed size 2³²-1 could plausibly happen in // an old zip32 file that was sharding inputs into the largest chunks // possible (or is just malicious; search the web for 42.zip). // If needUSize is true still, it means we didn't see a zip64 extension. // As long as the compressed size is not also 2³²-1 (implausible) // and the header is not also 2³²-1 (equally implausible),
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Tue Mar 11 22:19:38 GMT 2025 - 28.4K bytes - Click Count (0)