- Sort Score
- Num 10 results
- Language All
Results 121 - 130 of 397 for hosting (0.05 seconds)
-
internal/lru/lru.go
nextCleanupBucket uint8 } // bucket is a container for holding entries to be expired type bucket[K comparable, V any] struct { entries map[K]*Entry[K, V] newestEntry time.Time } // noEvictionTTL - very long ttl to prevent eviction const noEvictionTTL = time.Hour * 24 * 365 * 10 // because of uint8 usage for nextCleanupBucket, should not exceed 256. // casting it as uint8 explicitly requires type conversions in multiple places
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Sat Mar 21 11:35:55 GMT 2026 - 12.6K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0) -
misc/cgo/gmp/gmp.go
Garbage collection is the big problem. It is fine for the Go world to have pointers into the C world and to free those pointers when they are no longer needed. To help, the Go code can define Go objects holding the C pointers and use runtime.SetFinalizer on those Go objects. It is much more difficult for the C world to have pointers into the Go world, because the Go garbage collector is unaware of the memory
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon Apr 11 16:34:30 GMT 2022 - 9.5K bytes - Click Count (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System. Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück. #### Passwort-Hashing { #password-hashing } „Hashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 11.1K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Let's put that data in the Pydantic `UserInDB` model first. You should never save plaintext passwords, so, we'll use the (fake) password hashing system. If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/ListenerCallQueue.java
* <li>It is easy for the user to ensure that listeners are never invoked while holding locks. * </ul> * * The last point is subtle. Often the observable object will be managing its own internal state * using a lock, however it is dangerous to dispatch listeners while holding a lock because they * might run on the {@code directExecutor()} or be otherwise re-entrant (call back into your
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue May 13 17:27:14 GMT 2025 - 8.1K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/Striped.java
* itself is reclaimable. <i>Weak</i> means that locks/semaphores are created lazily, and they are * allowed to be reclaimed if nobody is holding on to them. This is useful, for example, if one * wants to create a {@code Striped<Lock>} of many locks, but worries that in most cases only a * small portion of these would be in use. *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 20.6K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
assertEquals(3, hashCodes.size()); } public void testToString() { assertThat(SIP_WITH_KEY.toString()).isEqualTo("Hashing.sipHash24(" + K0 + ", " + K1 + ")"); assertThat(SIP_WITHOUT_KEY.toString()).isEqualTo("Hashing.sipHash24(" + K0 + ", " + K1 + ")"); assertThat(sipHash24(20, 13).toString()).isEqualTo("Hashing.sipHash24(20, 13)"); } private static void assertSip(String input, long expected) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 6.8K bytes - Click Count (0) -
guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
assertEquals(3, hashCodes.size()); } public void testToString() { assertThat(SIP_WITH_KEY.toString()).isEqualTo("Hashing.sipHash24(" + K0 + ", " + K1 + ")"); assertThat(SIP_WITHOUT_KEY.toString()).isEqualTo("Hashing.sipHash24(" + K0 + ", " + K1 + ")"); assertThat(sipHash24(20, 13).toString()).isEqualTo("Hashing.sipHash24(20, 13)"); } private static void assertSip(String input, long expected) {
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 6.8K bytes - Click Count (0)