- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 112 for trimming (0.07 seconds)
-
impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/mvnup/goals/InferenceStrategy.java
Element parentElement = root.child(PARENT).orElse(null); if (parentElement == null) { return false; } // Apply full inference (parent element trimming based on relativePath) return trimParentElementFull(context, root, parentElement, pomMap); } /** * Applies dependency-related inference optimizations.
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Tue Nov 18 18:03:26 GMT 2025 - 27.6K bytes - Click Count (0) -
docs/changelogs/changelog_3x.md
prevents a potential crash when using certificate pinning with the Google Play Services security provider. * Fix: Make IPv6 request lines consistent with Firefox and Chrome. * Fix: Recover gracefully when trimming the response cache fails. * New: Add multiple path segments using a single string in `HttpUrl.Builder`. * New: Support SHA-256 pins in certificate pinner. ## Version 3.1.2 _2016-02-10_Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
/** * Security-focused test cases for NtlmPasswordAuthenticator to verify timing attack resistance. */ public class NtlmPasswordAuthenticatorTimingAttackTest { private static final int TIMING_ITERATIONS = 1000; private static final double TIMING_TOLERANCE = 2.0; // 200% tolerance - JVM timing is inherently variable for timing variations @BeforeEach public void setUp() {Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/base/Utf8Test.java
// Four byte characters FOUR_BYTE_ROUNDTRIPPABLE_CHARACTERS; /** Tests that round tripping of all two byte permutations work. */ @GwtIncompatible // java.nio.charset.Charset public void testIsWellFormed_1Byte() { testBytes(1, EXPECTED_ONE_BYTE_ROUNDTRIPPABLE_COUNT); } /** Tests that round tripping of all two byte permutations work. */ @GwtIncompatible // java.nio.charset.CharsetCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 16 15:59:55 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 5K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/TimeLimiter.java
* annotation type, rather than an interface */ <T> T newProxy(T target, Class<T> interfaceType, long timeoutDuration, TimeUnit timeoutUnit); /** * Invokes a specified Callable, timing out after the specified time limit. If the target method * call finishes before the limit is reached, the return value or a wrapped exception is
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Jan 18 02:54:30 GMT 2025 - 8.2K bytes - Click Count (0) -
docs/tr/docs/advanced/security/http-basic-auth.md
# Bir hata döndür ... ``` Ancak `secrets.compare_digest()` kullanarak, "timing attacks" denilen bir saldırı türüne karşı güvenli olursunuz. ### Timing Attacks { #timing-attacks } Peki "timing attack" nedir? Bazı saldırganların kullanıcı adı ve şifreyi tahmin etmeye çalıştığını düşünelim.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 5.5K bytes - Click Count (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 5.3K bytes - Click Count (0) -
docs/de/docs/advanced/security/http-basic-auth.md
# Einen Error zurückgeben ... ``` Aber durch die Verwendung von `secrets.compare_digest()` ist dieser Code sicher vor einer Art von Angriffen, die „Timing-Angriffe“ genannt werden. ### Timing-Angriffe { #timing-attacks } Aber was ist ein „Timing-Angriff“? Stellen wir uns vor, dass einige Angreifer versuchen, den Benutzernamen und das Passwort zu erraten.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 6.1K bytes - Click Count (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks". ### Ataques de Temporização { #timing-attacks } Mas o que é um "timing attack"? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha. E eles enviam uma requisição com um usuário `johndoe` e uma senha `love123`.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:20:43 GMT 2026 - 5.2K bytes - Click Count (0)