- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 216 for Mallet (0.17 sec)
-
okhttp/src/main/kotlin/okhttp3/internal/ws/RealWebSocket.kt
* enqueue messages followed by pongs, but this sends pongs followed by messages. Pongs are always * written in the order they were enqueued. * * If a frame cannot be sent - because there are none enqueued or because the web socket is not * connected - this does nothing and returns false. Otherwise this returns true and the caller
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Mon Apr 01 14:21:25 GMT 2024 - 22.1K bytes - Viewed (0) -
docs/features/calls.md
Calls are executed in one of two ways: * **Synchronous:** your thread blocks until the response is readable. * **Asynchronous:** you enqueue the request on any thread, and get [called back](https://square.github.io/okhttp/4.x/okhttp/okhttp3/-callback/) on another thread when the response is readable.
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 3.9K bytes - Viewed (0) -
docs/en/docs/how-to/sql-databases-peewee.md
Most of the code is actually the same. So, we are going to focus only on the differences. ## File structure Let's say you have a directory named `my_super_project` that contains a sub-directory called `sql_app` with a structure like this: ``` . └── sql_app ├── __init__.py ├── crud.py ├── database.py ├── main.py └── schemas.py ```
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Tue Jan 16 13:23:25 GMT 2024 - 23.6K bytes - Viewed (1) -
okhttp/src/main/kotlin/okhttp3/internal/http2/Http2Connection.kt
* This is typical for Java but atypical for HTTP/2. This is motivated by exception transparency: * an [IOException] that was triggered by a certain caller can be caught and handled by that caller. */ @Suppress("NAME_SHADOWING") class Http2Connection internal constructor(builder: Builder) : Closeable { internal val lock: ReentrantLock = ReentrantLock()
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sat Apr 20 17:03:43 GMT 2024 - 32.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
understand why it is I hate cats and dogs.' It was high time to go, for the pool was getting quite crowded with the birds and animals that had fallen into it: there were a Duck and a Dodo, a Lory and an Eaglet, and several other curious creatures. Alice led the way, and the whole party swam to the shore. CHAPTER III
Plain Text - Registered: Fri Apr 12 12:43:09 GMT 2024 - Last Modified: Mon Oct 29 21:35:03 GMT 2012 - 145.2K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
```Python if not (credentials.username == "stanleyjobson") or not (credentials.password == "swordfish"): # Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password.
Plain Text - Registered: Sun May 05 07:19:11 GMT 2024 - Last Modified: Thu Jan 11 14:33:05 GMT 2024 - 5.9K bytes - Viewed (0) -
architecture/security/istio-agent.md
the `SecretManager` to Envoy, without much business logic. For each resource requested by Envoy, the SDS server will call `SecretManager.GenerateSecret(resourceName)` 1. When `GenerateSecret` is called, the `SecretManager` is expected to return a new certificate. This can occur in a few ways. 1. The most common method (pictured above) is to sign a new certificate by calling the configured CA. Typically, this is Istiod.
Plain Text - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Aug 22 16:45:50 GMT 2023 - 7.2K bytes - Viewed (1) -
docs/distributed/README.md
start using the least used cluster. This expansion strategy works endlessly, so you can perpetually expand your clusters as needed. When you restart, it is immediate and non-disruptive to the applications. Each group of servers in the command-line is called a pool. There are 2 server pools in this example. New objects are placed in server pools in proportion to the amount of free space in each pool. Within each pool, the location of the erasure-set of drives is determined based on a deterministic hashing...
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.8K bytes - Viewed (0) -
docs/tls/README.md
``` A response similar to this one should be displayed: ``` Generating a 3072 bit RSA private key... ``` #### 3.3.3 Generate a public certificate Create a file called `cert.cnf` with the content below. This file contains all of the information necessary to generate a certificate using `certtool.exe`: ``` # X.509 Certificate options # # DN options
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 8.4K bytes - Viewed (0) -
docs/changelogs/changelog_3x.md
This is most useful when writing the request body is destructive. * New: We've added `requestFailed()` and `responseFailed()` methods to `EventListener`. These are called instead of `requestBodyEnd()` and `responseBodyEnd()` in some failure situations. They may also be fired in cases where no event was published previously. In this release we did
Plain Text - Registered: Fri May 03 11:42:14 GMT 2024 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Viewed (0)