- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 67 for guess (0.02 sec)
-
cmd/generic-handlers_test.go
"net/http/httptest" "net/url" "strconv" "testing" "github.com/minio/minio/internal/crypto" "github.com/minio/minio/internal/grid" xhttp "github.com/minio/minio/internal/http" ) // Tests request guess function for net/rpc requests. func TestGuessIsRPC(t *testing.T) { if guessIsRPCReq(nil) { t.Fatal("Unexpected return for nil request") } u, err := url.Parse("http://localhost:9000/minio/lock") if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 18:10:04 UTC 2024 - 5.5K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/Trans2FindFirst2Response.java
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 8.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/ServerMessageBlock2Response.java
// TODO: SMB2 - do we need to check the MIDs? // We only read what we were waiting for, so first guess would be no. boolean verify = dgst.verify(buffer, i, size, 0, this); this.verifyFailed = verify; return !verify; } return true; }
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Aug 05 09:45:59 UTC 2018 - 7.4K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`. Then the Python code in your application would be equivalent to something like: ```Python
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 16:01:27 UTC 2024 - 4.8K bytes - Viewed (0) -
src/main/java/jcifs/netbios/NbtAddress.java
public <T extends Address> T unwrap ( Class<T> type ) { if ( type.isAssignableFrom(this.getClass()) ) { return (T) this; } return null; } /** * Guess next called name to try for session establishment. These * methods are used by the smb package. * * @return guessed name */ @Override public String firstCalledName () {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 15.2K bytes - Viewed (0) -
docs/sts/wso2.md
### 2. Configure WSO2 Once WSO2 is up and running, configure WSO2 to generate Self contained id_tokens. In OAuth 2.0 specification there are primarily two ways to provide id_tokens 1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 8.7K bytes - Viewed (0) -
cmd/net.go
return "", "", err } host = addr switch scheme { case "https": port = "443" case "http": port = "80" default: return "", "", errors.New("unable to guess port from scheme") } } return host, port, nil } // isLocalHost - checks if the given parameter // correspond to one of the local IP of the // current machine
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jun 19 14:34:00 UTC 2024 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/io/TempFileCreator.java
* layer of fallback before consulting the system property, we could try * com.sun.security.auth.module.NTSystem. * * But for now, we use the value from the system property as our best guess. */ return fromSystemProperty; } catch (InvocationTargetException e) { throwIfUnchecked(e.getCause()); // in case it's an Error or something
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 06 17:11:11 UTC 2023 - 12.5K bytes - Viewed (0) -
migrator/migrator.go
Registered: Sun Nov 03 09:35:10 UTC 2024 - Last Modified: Fri Apr 26 07:15:49 UTC 2024 - 29K bytes - Viewed (0) -
docs/bucket/versioning/README.md
version IDs, and they can't be edited. Version IDs are simply of `DCE 1.1 v4 UUID 4` (random data based), UUIDs are 128 bit numbers which are intended to have a high likelihood of uniqueness over space and time and are computationally difficult to guess. They are globally unique identifiers which can be locally generated without contacting a global registration authority. UUIDs are intended as unique identifiers for both mass tagging objects with an extremely short lifetime and to reliably identifying...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 04 21:43:52 UTC 2023 - 11.9K bytes - Viewed (0)