Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 160 of 667 for caching (0.08 sec)

  1. src/main/java/jcifs/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 3.5K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/ComputationException.java

     *     {@code MapMaker}, it was added to {@code CacheBuilder}, which throws {@code
     *     ExecutionException}, {@code UncheckedExecutionException}, and {@code ExecutionError}. Any
     *     code that is still catching {@code ComputationException} may need to be updated to catch some
     *     of those types instead. (Note that this type, though deprecated, is not planned to be removed
     *     from Guava.)
     */
    @Deprecated
    @GwtCompatible
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Aug 04 13:28:27 UTC 2021
    - 1.7K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Wir bauen auf dem vorherigen Kapitel auf.
    
    ## Über JWT
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 15K bytes
    - Viewed (0)
  4. guava/src/com/google/common/collect/ForwardingListIterator.java

    import org.checkerframework.checker.nullness.qual.Nullable;
    
    /**
     * A list iterator which forwards all its method calls to another list iterator. Subclasses should
     * override one or more methods to modify the behavior of the backing iterator as desired per the <a
     * href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>.
     *
     * <p><b>{@code default} method warning:</b> This class forwards calls to <i>only some</i> {@code
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jun 29 19:42:21 UTC 2021
    - 2.5K bytes
    - Viewed (0)
  5. okhttp-logging-interceptor/README.md

    HttpLoggingInterceptor logging = new HttpLoggingInterceptor();
    logging.setLevel(Level.BASIC);
    OkHttpClient client = new OkHttpClient.Builder()
      .addInterceptor(logging)
      .build();
    ```
    
    You can change the log level at any time by calling `setLevel()`.
    
    To log to a custom location, pass a `Logger` instance to the constructor.
    ```java
    HttpLoggingInterceptor logging = new HttpLoggingInterceptor(new Logger() {
      @Override public void log(String message) {
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Dec 17 15:34:10 UTC 2023
    - 1.3K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/RangeSet.java

      @CheckForNull
      Range<C> rangeContaining(C value);
    
      /**
       * Returns {@code true} if there exists a non-empty range enclosed by both a member range in this
       * range set and the specified range. This is equivalent to calling {@code
       * subRangeSet(otherRange)} and testing whether the resulting range set is non-empty.
       *
       * @since 20.0
       */
      boolean intersects(Range<C> otherRange);
    
      /**
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Thu Feb 22 21:19:52 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/simple-oauth2.md

    Let's put that data in the Pydantic `UserInDB` model first.
    
    You should never save plaintext passwords, so, we'll use the (fake) password hashing system.
    
    If the passwords don't match, we return the same error.
    
    #### Password hashing
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12.3K bytes
    - Viewed (0)
  9. docs/de/docs/tutorial/security/simple-oauth2.md

    Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System.
    
    Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück.
    
    #### Passwort-HashingHashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/util/concurrent/AtomicLongMap.java

            }
            // value changed
          }
        }
      }
    
      /**
       * Copies all of the mappings from the specified map to this map. The effect of this call is
       * equivalent to that of calling {@code put(k, v)} on this map once for each mapping from key
       * {@code k} to value {@code v} in the specified map. The behavior of this operation is undefined
       * if the specified map is modified while the operation is in progress.
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Apr 01 16:15:01 UTC 2024
    - 14.1K bytes
    - Viewed (0)
Back to top