Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 87 for guest (0.14 sec)

  1. cmd/generic-handlers_test.go

    	"net/http/httptest"
    	"net/url"
    	"strconv"
    	"testing"
    
    	"github.com/minio/minio/internal/crypto"
    	"github.com/minio/minio/internal/grid"
    	xhttp "github.com/minio/minio/internal/http"
    )
    
    // Tests request guess function for net/rpc requests.
    func TestGuessIsRPC(t *testing.T) {
    	if guessIsRPCReq(nil) {
    		t.Fatal("Unexpected return for nil request")
    	}
    
    	u, err := url.Parse("http://localhost:9000/minio/lock")
    	if err != nil {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 5.4K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/smb2/ServerMessageBlock2Response.java

                // TODO: SMB2 - do we need to check the MIDs?
                // We only read what we were waiting for, so first guess would be no.
                boolean verify = dgst.verify(buffer, i, size, 0, this);
                this.verifyFailed = verify;
                return !verify;
            }
            return true;
        }
    
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Sun Aug 05 09:45:59 GMT 2018
    - 7.4K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/io/ByteSourceTester.java

        assertExpectedBytes(out.toByteArray());
      }
    
      public void testCopyTo_byteSink() throws IOException {
        final ByteArrayOutputStream out = new ByteArrayOutputStream();
        // HERESY! but it's ok just for this I guess
        source.copyTo(
            new ByteSink() {
              @Override
              public OutputStream openStream() throws IOException {
                return out;
              }
            });
    Java
    - Registered: Fri May 03 12:43:13 GMT 2024
    - Last Modified: Wed Sep 06 17:04:31 GMT 2023
    - 8.6K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/security/http-basic-auth.md

    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    And they send a request with a username `johndoe` and a password `love123`.
    
    Then the Python code in your application would be equivalent to something like:
    
    ```Python
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 14:33:05 GMT 2024
    - 5.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/collect/ImmutableSet.java

        // TODO(cpovirk): Consider using Object[] anyway.
        E[] array = (E[]) elements.toArray();
        /*
         * For a Set, we guess that it contains no duplicates. That's just a guess for purpose of
         * sizing; if the Set uses different equality semantics, it might contain duplicates according
         * to equals(), and we will deduplicate those properly, albeit at some cost in allocations.
    Java
    - Registered: Fri Apr 05 12:43:09 GMT 2024
    - Last Modified: Mon Apr 01 16:15:01 GMT 2024
    - 35.4K bytes
    - Viewed (0)
  6. maven-core/src/site/apt/configuration-management.apt

     plugin parameters and anything else.
    
     We once had a document that Vincent and I agreed upon and I was about to
     implement it and then I disappeared for 8 months so it never came to pass.
    
     So I guess it's important to figure out what people are using properties
     files for and see if we can't incorporate it all into the POM. Or if we do
     have properties file (something I would like to avoid) say they don't
    Plain Text
    - Registered: Sun Apr 28 03:35:10 GMT 2024
    - Last Modified: Mon Mar 18 00:24:53 GMT 2024
    - 5.8K bytes
    - Viewed (0)
  7. tensorflow/c/experimental/next_pluggable_device/BUILD

            "//tensorflow/core/tfrt/common:async_value_tensor",
            "//tensorflow/core/tfrt/common:pjrt_util",
            "@com_google_absl//absl/log:check",
            "@com_google_googletest//:gtest_main",
            "@local_tsl//tsl/lib/core:status_test_util",
            "@local_tsl//tsl/platform:casts",
            "@local_tsl//tsl/platform:status_matchers",
            "@local_tsl//tsl/protobuf:error_codes_proto_impl_cc",
    Plain Text
    - Registered: Tue Feb 27 12:39:08 GMT 2024
    - Last Modified: Tue Jan 09 00:52:04 GMT 2024
    - 3.8K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb1/smb1/Trans2FindFirst2Response.java

                } else {
        
                    /* On NT without Unicode the fileNameLength
                     * includes the '\0' whereas on win98 it doesn't. I
                     * guess most clients only support non-unicode so
                     * they don't run into this.
                     */
        
        /* UPDATE: Maybe not! Could this be a Unicode alignment issue. I hope
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Fri Mar 22 21:10:40 GMT 2019
    - 8.5K bytes
    - Viewed (0)
  9. cmd/net.go

    			return "", "", err
    		}
    
    		host = addr
    
    		switch scheme {
    		case "https":
    			port = "443"
    		case "http":
    			port = "80"
    		default:
    			return "", "", errors.New("unable to guess port from scheme")
    		}
    	}
    
    	return host, port, nil
    }
    
    // isLocalHost - checks if the given parameter
    // correspond to one of the local IP of the
    // current machine
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Mar 26 15:00:38 GMT 2024
    - 9.3K bytes
    - Viewed (0)
  10. docs/sts/wso2.md

    ### 2. Configure WSO2
    
    Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens
    
    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.7K bytes
    - Viewed (0)
Back to top