- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 31 for guest (0.01 seconds)
-
CONTRIBUTING.md
If you need to check on [CI](http://builds.gradle.org/) status as an external contributor, you can click "Log in as guest". ## Useful tips ### How Gradle Works We have [a series of blog](https://blog.gradle.org/how-gradle-works-1) that explains how Gradle works. This may help you better understand and contribute to Gradle.
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Tue Nov 25 06:57:22 GMT 2025 - 19K bytes - Click Count (0) -
guava/src/com/google/common/math/BigIntegerMath.java
* guess with an application of Newton's method, which sets guess := (guess + (x / guess)) / 2. * This iteration has the following two properties: * * a) every iteration (except potentially the first) has guess >= floor(sqrt(x)). This is * because guess' is the arithmetic mean of guess and x / guess, sqrt(x) is the geometric mean,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 18.8K bytes - Click Count (0) -
mockwebserver/src/main/kotlin/mockwebserver3/Dispatcher.kt
* a CountdownLatch). */ @Throws(InterruptedException::class) public abstract fun dispatch(request: RecordedRequest): MockResponse /** * Returns an early guess of the next response, used for policy on how an incoming request should * be received. The default implementation returns an empty response. Mischievous implementations
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Jun 20 11:46:46 GMT 2025 - 1.6K bytes - Click Count (0) -
android/guava-tests/benchmark/com/google/common/io/ByteSourceAsCharSourceReadBenchmark.java
CharStreams.copy(reader, sb); } return sb.toString(); } }, // It really seems like this should be faster than TO_BYTE_ARRAY_NEW_STRING. But it just isn't // my best guess is that the jdk authors have spent more time optimizing that callpath than this // one. (StringCoding$StringDecoder vs. StreamDecoder). StringCoding has a ton of special cases
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue May 13 18:46:00 GMT 2025 - 5.2K bytes - Click Count (0) -
guava/src/com/google/common/math/LongMath.java
checkRoundingUnnecessary(guessSquared == x); return guess; case FLOOR: case DOWN: if (x < guessSquared) { return guess - 1; } return guess; case CEILING: case UP: if (x > guessSquared) { return guess + 1; } return guess; case HALF_DOWN: case HALF_UP: case HALF_EVEN:
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Nov 03 21:01:09 GMT 2025 - 46.8K bytes - Click Count (0) -
src/archive/tar/format.go
func (b *block) toSparse() sparseArray { return sparseArray(b[:]) } // getFormat checks that the block is a valid tar header based on the checksum. // It then attempts to guess the specific format based on magic values. // If the checksum fails, then FormatUnknown is returned. func (b *block) getFormat() Format { // Verify checksum. var p parser value := p.parseOctal(b.toV7().chksum())
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Fri Oct 13 18:36:46 GMT 2023 - 11.3K bytes - Click Count (0) -
cmd/generic-handlers_test.go
"net/url" "strconv" "strings" "testing" "github.com/minio/minio/internal/crypto" "github.com/minio/minio/internal/grid" xhttp "github.com/minio/minio/internal/http" ) // Tests request guess function for net/rpc requests. func TestGuessIsRPC(t *testing.T) { if guessIsRPCReq(nil) { t.Fatal("Unexpected return for nil request") } u, err := url.Parse("http://localhost:9000/minio/lock") if err != nil {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 6.2K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`. Then the Python code in your application would be equivalent to something like: ```PythonCreated: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 5K bytes - Click Count (0) -
android/guava/src/com/google/common/io/TempFileCreator.java
* layer of fallback before consulting the system property, we could try * com.sun.security.auth.module.NTSystem. * * But for now, we use the value from the system property as our best guess. */ return fromSystemProperty; } catch (InvocationTargetException e) { throwIfUnchecked(e.getCause()); // in case it's an Error or somethingCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 29 18:50:14 GMT 2025 - 11.8K bytes - Click Count (0) -
docs/sts/wso2.md
### 2. Configure WSO2 Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens 1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.7K bytes - Click Count (0)