Search Options

Results per page
Sort
Preferred Languages
Advance

Results 441 - 450 of 532 for Every (1.11 sec)

  1. docs/en/docs/tutorial/security/first-steps.md

    We will soon also create the actual path operation.
    
    /// info
    
    If you are a very strict "Pythonista" you might dislike the style of the parameter name `tokenUrl` instead of `token_url`.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  2. CHANGELOG/CHANGELOG-1.27.md

    - Fixed kubelet startup getting stuck with `NewVolumeManagerReconstruction` feature enabled and a...
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Wed Jul 17 07:48:22 UTC 2024
    - 466.3K bytes
    - Viewed (2)
  3. src/test/java/jcifs/internal/smb2/lease/DirectoryLeasingIntegrationTest.java

                    DirectoryCacheScope.IMMEDIATE_CHILDREN);
    
            DirectoryCacheEntry entry = directoryLeaseManager.getCacheEntry(directoryPath);
            assertNotNull(entry);
    
            // Set very short expiration time
            entry.setMaxAge(50); // 50ms
    
            // Update cache
            List<SmbFile> files = Arrays.asList(mockFile1);
            directoryLeaseManager.updateDirectoryCache(directoryPath, files);
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 23 01:47:47 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  4. src/test/java/jcifs/util/SecureCredentialStorageTest.java

            assertNull(decrypted, "Decrypting null should return null");
        }
    
        @Test
        public void testEncryptDecryptLongPassword() throws Exception {
            // Test with very long password
            char[] plaintext = new char[10000];
            Arrays.fill(plaintext, 'X');
    
            byte[] encrypted = storage.encryptCredentials(plaintext);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/BloomFilterStrategies.java

          return (long) data.length() * Long.SIZE;
        }
    
        /**
         * Number of set bits (1s).
         *
         * <p>Note that because of concurrent set calls and uses of atomics, this bitCount is a (very)
         * close *estimate* of the actual number of bits set. It's not possible to do better than an
         * estimate without locking. Note that the number, if not exactly accurate, is *always*
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Jan 08 14:27:16 UTC 2025
    - 10.7K bytes
    - Viewed (0)
  6. src/test/java/jcifs/internal/fscc/FsctlPipeWaitRequestTest.java

            assertArrayEquals(nameBytes, encodedName);
        }
    
        @Test
        @DisplayName("Test with long pipe name")
        void testWithLongPipeName() {
            // Test with a very long pipe name
            StringBuilder sb = new StringBuilder();
            for (int i = 0; i < 100; i++) {
                sb.append("LongPipeName");
            }
            String pipeName = sb.toString();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 13.1K bytes
    - Viewed (0)
  7. SECURITY.md

    your report:
    
      - A descriptive title
      - Your name and affiliation (if any).
      - A description of the technical details of the vulnerabilities.
      - A minimal example of the vulnerability. It is very important to let us know
        how we can reproduce your findings. For memory corruption triggerable in
        TensorFlow models, please demonstrate an exploit against one of Alphabet's
        models in <https://tfhub.dev/>
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  8. android/guava-testlib/src/com/google/common/testing/GcFinalization.java

     * hint, so this technique may fail at the whim of the JDK implementation, for example if a user
     * specified the JVM flag {@code -XX:+DisableExplicitGC}. But in practice, it works very well for
     * ordinary tests.
     *
     * <p>Failure of the expected event to occur within an implementation-defined "reasonable" time
     * period or an interrupt while waiting for the expected event will result in a {@link
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 11.5K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/schema-extra-example.md

    They are more relevant for older versions, before OpenAPI 3.1.0 was available.
    
    You can consider this a brief OpenAPI and JSON Schema **history lesson**. 🤓
    
    ///
    
    /// warning
    
    These are very technical details about the standards **JSON Schema** and **OpenAPI**.
    
    If the ideas above already work for you, that might be enough, and you probably don't need these details, feel free to skip them.
    
    ///
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Dec 20 15:55:38 UTC 2025
    - 8.9K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/io/Closer.java

            if (thrown == suppressed) {
              return;
            }
            try {
              thrown.addSuppressed(suppressed);
            } catch (Throwable e) {
              /*
               * A Throwable is very unlikely, but we really don't want to throw from a Suppressor, so
               * we catch everything. (Any Exception is either a RuntimeException or
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.3K bytes
    - Viewed (0)
Back to top