Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 216 for Mallet (0.17 sec)

  1. okhttp/src/main/kotlin/okhttp3/internal/ws/RealWebSocket.kt

       * enqueue messages followed by pongs, but this sends pongs followed by messages. Pongs are always
       * written in the order they were enqueued.
       *
       * If a frame cannot be sent - because there are none enqueued or because the web socket is not
       * connected - this does nothing and returns false. Otherwise this returns true and the caller
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Mon Apr 01 14:21:25 GMT 2024
    - 22.1K bytes
    - Viewed (0)
  2. docs/features/calls.md

    Calls are executed in one of two ways:
    
     * **Synchronous:** your thread blocks until the response is readable.
     * **Asynchronous:** you enqueue the request on any thread, and get [called back](https://square.github.io/okhttp/4.x/okhttp/okhttp3/-callback/) on another thread when the response is readable.
    
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Sun Feb 06 02:19:09 GMT 2022
    - 3.9K bytes
    - Viewed (0)
  3. docs/en/docs/how-to/sql-databases-peewee.md

    Most of the code is actually the same.
    
    So, we are going to focus only on the differences.
    
    ## File structure
    
    Let's say you have a directory named `my_super_project` that contains a sub-directory called `sql_app` with a structure like this:
    
    ```
    .
    └── sql_app
        ├── __init__.py
        ├── crud.py
        ├── database.py
        ├── main.py
        └── schemas.py
    ```
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Tue Jan 16 13:23:25 GMT 2024
    - 23.6K bytes
    - Viewed (1)
  4. okhttp/src/main/kotlin/okhttp3/internal/http2/Http2Connection.kt

     * This is typical for Java but atypical for HTTP/2. This is motivated by exception transparency:
     * an [IOException] that was triggered by a certain caller can be caught and handled by that caller.
     */
    @Suppress("NAME_SHADOWING")
    class Http2Connection internal constructor(builder: Builder) : Closeable {
      internal val lock: ReentrantLock = ReentrantLock()
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Sat Apr 20 17:03:43 GMT 2024
    - 32.6K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

    understand why it is I hate cats and dogs.'
    
      It was high time to go, for the pool was getting quite crowded
    with the birds and animals that had fallen into it:  there were a
    Duck and a Dodo, a Lory and an Eaglet, and several other curious
    creatures.  Alice led the way, and the whole party swam to the
    shore.
    
    
    
                               CHAPTER III
    
    Plain Text
    - Registered: Fri Apr 12 12:43:09 GMT 2024
    - Last Modified: Mon Oct 29 21:35:03 GMT 2012
    - 145.2K bytes
    - Viewed (0)
  6. docs/en/docs/advanced/security/http-basic-auth.md

    ```Python
    if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"):
        # Return some error
        ...
    ```
    
    But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks".
    
    ### Timing Attacks
    
    But what's a "timing attack"?
    
    Let's imagine some attackers are trying to guess the username and password.
    
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 14:33:05 GMT 2024
    - 5.9K bytes
    - Viewed (0)
  7. architecture/security/istio-agent.md

       the `SecretManager` to Envoy, without much business logic. For each resource requested by Envoy, the SDS server
       will call `SecretManager.GenerateSecret(resourceName)`
    1. When `GenerateSecret` is called, the `SecretManager` is expected to return a new certificate. This can occur in a few ways.
       1. The most common method (pictured above) is to sign a new certificate by calling the configured CA. Typically, this is Istiod.
    Plain Text
    - Registered: Wed May 08 22:53:08 GMT 2024
    - Last Modified: Tue Aug 22 16:45:50 GMT 2023
    - 7.2K bytes
    - Viewed (1)
  8. docs/distributed/README.md

    start using the least used cluster. This expansion strategy works endlessly, so you can perpetually expand your clusters as needed.  When you restart, it is immediate and non-disruptive to the applications. Each group of servers in the command-line is called a pool. There are 2 server pools in this example. New objects are placed in server pools in proportion to the amount of free space in each pool. Within each pool, the location of the erasure-set of drives is determined based on a deterministic hashing...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 8.8K bytes
    - Viewed (0)
  9. docs/tls/README.md

    ```
    
    A response similar to this one should be displayed:
    
    ```
    Generating a 3072 bit RSA private key...
    ```
    
    #### 3.3.3 Generate a public certificate
    
    Create a file called `cert.cnf` with the content below. This file contains all of the information necessary to generate a certificate using `certtool.exe`:
    
    ```
    # X.509 Certificate options
    #
    # DN options
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 8.4K bytes
    - Viewed (0)
  10. docs/changelogs/changelog_3x.md

        This is most useful when writing the request body is destructive.
    
     *  New: We've added `requestFailed()` and `responseFailed()` methods to `EventListener`. These
        are called instead of `requestBodyEnd()` and `responseBodyEnd()` in some failure situations.
        They may also be fired in cases where no event was published previously. In this release we did
    Plain Text
    - Registered: Fri May 03 11:42:14 GMT 2024
    - Last Modified: Sun Feb 06 14:55:54 GMT 2022
    - 50.8K bytes
    - Viewed (0)
Back to top