Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 171 for courte (0.11 sec)

  1. src/main/java/jcifs/util/SecureKeyManager.java

                // If we need more bytes, hash again with counter
                int counter = 1;
                while (derived.length > hash.length * counter) {
                    md.update(input);
                    md.update((byte) counter);
                    hash = md.digest();
                    int copyLen = Math.min(length - (hash.length * counter), hash.length);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 21.5K bytes
    - Viewed (0)
  2. cmd/metrics-v3-types.go

    type MetricType int
    
    const (
    	// CounterMT - represents a counter metric.
    	CounterMT MetricType = iota
    	// GaugeMT - represents a gauge metric.
    	GaugeMT
    	// HistogramMT - represents a histogram metric.
    	HistogramMT
    )
    
    // rangeL - represents a range label.
    const rangeL = "range"
    
    func (mt MetricType) String() string {
    	switch mt {
    	case CounterMT:
    		return "counter"
    	case GaugeMT:
    		return "gauge"
    	case HistogramMT:
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Feb 28 19:33:08 UTC 2025
    - 15.6K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/smb2/Smb3KeyDerivation.java

    import org.bouncycastle.crypto.generators.KDFCounterBytesGenerator;
    import org.bouncycastle.crypto.macs.HMac;
    import org.bouncycastle.crypto.params.KDFCounterParameters;
    
    /**
     * SMB3 SP800-108 Counter Mode Key Derivation
     *
     * @author mbechler
     *
     */
    public final class Smb3KeyDerivation {
    
        private static final byte[] SIGNCONTEXT_300 = toCBytes("SmbSign");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  4. docs/en/docs/advanced/security/http-basic-auth.md

    And then they can try again knowing that it's probably something more similar to `stanleyjobsox` than to `johndoe`.
    
    #### A "professional" attack { #a-professional-attack }
    
    Of course, the attackers would not try all this by hand, they would write a program to do it, possibly with thousands or millions of tests per second. And they would get just one extra correct letter at a time.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 5K bytes
    - Viewed (0)
  5. docs/em/docs/advanced/index.md

    & โญ ๐Ÿ“„ ๐Ÿค” ๐Ÿ‘† โช โœ โšซ๏ธ, & ๐Ÿค” ๐Ÿ‘ˆ ๐Ÿ‘† ๐Ÿ’ญ ๐Ÿ‘ˆ ๐Ÿ‘‘ ๐Ÿ’ญ.
    
    ## ๐ŸŽ.๐Ÿ…พ โ†—๏ธ
    
    ๐Ÿšฅ ๐Ÿ‘† ๐Ÿ”œ ๐Ÿ’– โœŠ ๐Ÿง-๐Ÿ”ฐ โ†—๏ธ ๐Ÿ”— ๐Ÿ‘‰ ๐Ÿ“„ ๐Ÿฉบ, ๐Ÿ‘† ๐Ÿ’ช ๐Ÿ’š โœ…: <a href="https://testdriven.io/courses/tdd-fastapi/" class="external-link" target="_blank">๐Ÿ’ฏ-๐Ÿ’พ ๐Ÿ› ๏ธ โฎ๏ธ FastAPI &amp; โ˜</a> **๐ŸŽ.๐Ÿ…พ**.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Tue Aug 06 04:48:30 UTC 2024
    - 926 bytes
    - Viewed (0)
  6. guava/src/com/google/common/collect/ImmutableMultiset.java

         * desired count.
         *
         * @param element the element to add or remove occurrences of
         * @param count the desired count of the element in this multiset
         * @return this {@code Builder} object
         * @throws NullPointerException if {@code element} is null
         * @throws IllegalArgumentException if {@code count} is negative
         */
        @CanIgnoreReturnValue
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  7. LICENSE

    which are not part of the work.  For example, Corresponding Source
    includes interface definition files associated with source files for
    the work, and the source code for shared libraries and dynamically
    linked subprograms that the work is specifically designed to require,
    such as by intimate data communication or control flow between those
    subprograms and other parts of the work.
    
      The Corresponding Source need not include anything that users
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  8. cmd/erasure-utils.go

    	}
    
    	// Do we have enough data?
    	if int64(getDataBlockLen(enBlocks, dataBlocks)) < length {
    		return 0, reedsolomon.ErrShortData
    	}
    
    	// Counter to decrement total left to write.
    	write := length
    
    	// Counter to increment total written.
    	var totalWritten int64
    
    	// Write all data blocks to dst.
    	for _, block := range enBlocks[:dataBlocks] {
    		// Skip blocks until we have reached our offset.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Jan 31 02:11:45 UTC 2024
    - 3.1K bytes
    - Viewed (0)
  9. docs/en/docs/tutorial/security/first-steps.md

    <img src="/img/tutorial/security/image02.png">
    
    /// note
    
    It doesn't matter what you type in the form, it won't work yet. But we'll get there.
    
    ///
    
    This is of course not the frontend for the final users, but it's a great automatic tool to document interactively all your API.
    
    It can be used by the frontend team (that can also be yourself).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  10. docs/pt/docs/how-to/custom-request-and-route.md

    Sebastiรกn Ramรญrez <******@****.***> 1731896744 +0100
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 4.7K bytes
    - Viewed (0)
Back to top