Search Options

Results per page
Sort
Preferred Languages
Advance

Results 221 - 230 of 326 for hard (0.01 sec)

  1. SECURITY.md

    issue (DoS, authentication bypass, information disclose, ...) and the assumptions you're making (e.g. do
    you need access credentials for a successful exploit).
    
    If you have not received a reply to your email within 48 hours or you have not heard from the security team
    for the past five days please contact the security team directly:
    
    - Primary security coordinator: ******@****.***
    - Secondary coordinator: ******@****.***
    - If you receive no response: ******@****.***
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Feb 12 00:51:25 UTC 2022
    - 2.2K bytes
    - Viewed (0)
  2. guava/src/com/google/common/hash/HashingOutputStream.java

       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
      // HashCode on an existing OutputStream, compared to creating a separate OutputStream that could
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  3. guava/src/com/google/common/hash/HashingInputStream.java

       * read from it to the underlying {@link InputStream}.
       *
       * <p>The {@link InputStream} should not be read from before or after the hand-off.
       */
      public HashingInputStream(HashFunction hashFunction, InputStream in) {
        super(checkNotNull(in));
        this.hasher = checkNotNull(hashFunction.newHasher());
      }
    
      /**
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  4. cmd/erasure-decode.go

    				// Reading first time on this disk, hence the buffer needs to be allocated.
    				// Subsequent reads will reuse this buffer.
    				p.buf[bufIdx] = make([]byte, p.shardSize)
    			}
    			// For the last shard, the shardsize might be less than previous shard sizes.
    			// Hence the following statement ensures that the buffer size is reset to the right size.
    			p.buf[bufIdx] = p.buf[bufIdx][:p.shardSize]
    			n, err := rr.ReadAt(p.buf[bufIdx], p.offset)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Aug 29 01:40:52 UTC 2024
    - 9.5K bytes
    - Viewed (0)
  5. docs/fr/docs/tutorial/index.md

    ```
    
    Et la même chose pour chacune des dépendances facultatives que vous voulez utiliser.
    
    ///
    
    ## Guide utilisateur avancé
    
    Il existe également un **Guide d'utilisation avancé** que vous pouvez lire plus tard après ce **Tutoriel - Guide d'utilisation**.
    
    Le **Guide d'utilisation avancé**, qui s'appuie sur cette base, utilise les mêmes concepts et vous apprend quelques fonctionnalités supplémentaires.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 3K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/EmptyImmutableSetMultimap.java

    import com.google.common.annotations.J2ktIncompatible;
    import java.util.Collection;
    
    /**
     * Implementation of {@link ImmutableListMultimap} with no entries.
     *
     * @author Mike Ward
     */
    @GwtCompatible
    final class EmptyImmutableSetMultimap extends ImmutableSetMultimap<Object, Object> {
      static final EmptyImmutableSetMultimap INSTANCE = new EmptyImmutableSetMultimap();
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 06 14:59:07 UTC 2025
    - 1.8K bytes
    - Viewed (0)
  7. src/test/java/jcifs/dcerpc/ndr/NdrObjectTest.java

         */
        @Test
        void testEncode() throws NdrException {
            // When
            ndrObject.encode(mockBuffer);
    
            // Then
            // Verify that our mock buffer had the expected method called.
            verify(mockBuffer).enc_ndr_long(123);
        }
    
        /**
         * Test case for the decode method.
         * Verifies that the decode method of a concrete implementation is called
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 3.4K bytes
    - Viewed (0)
  8. docs/es/docs/advanced/response-directly.md

    /// tip | Consejo
    
    `JSONResponse` en sí misma es una subclase de `Response`.
    
    ///
    
    Y cuando devuelves una `Response`, **FastAPI** la pasará directamente.
    
    No hará ninguna conversión de datos con los modelos de Pydantic, no convertirá los contenidos a ningún tipo, etc.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 17:46:44 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/hash/HashingOutputStream.java

       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
      // HashCode on an existing OutputStream, compared to creating a separate OutputStream that could
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  10. cmd/bitrot-whole.go

    	"hash"
    	"io"
    )
    
    // Implementation to calculate bitrot for the whole file.
    type wholeBitrotWriter struct {
    	disk      StorageAPI
    	volume    string
    	filePath  string
    	shardSize int64 // This is the shard size of the erasure logic
    	hash.Hash       // For bitrot hash
    }
    
    func (b *wholeBitrotWriter) Write(p []byte) (int, error) {
    	err := b.disk.AppendFile(context.TODO(), b.volume, b.filePath, p)
    	if err != nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Jan 31 02:11:45 UTC 2024
    - 2.7K bytes
    - Viewed (0)
Back to top