- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 135 for quickly (1.18 sec)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/RequestBody.kt
* lifted. Such writes occur on an application-provided thread and may occur concurrently with * reads of the [ResponseBody]. For duplex request bodies, [writeTo] should return * quickly, possibly by handing off the provided request body to another thread to perform * writing. * * [grpc]: https://github.com/grpc/grpc/blob/master/doc/PROTOCOL-HTTP2.md */ open fun isDuplex(): Boolean = false
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Tue Oct 07 14:16:29 UTC 2025 - 9.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
assertFalse(auth1.equals(auth3)); // Test empty vs password assertFalse(auth2.equals(auth3)); // These operations should complete quickly and consistently long startTime = System.nanoTime(); for (int i = 0; i < 1000; i++) { auth1.equals(auth2); auth1.equals(auth3); auth2.equals(auth3);
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
guava/src/com/google/common/base/Joiner.java
*/ public String join(Iterable<?> parts) { /* * If we can quickly determine how many elements there are likely to be, then we can use the * fastest possible implementation, which delegates to the array overload of String.join. * * In theory, we can quickly determine the size of any Collection. However, thanks to
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Apr 14 15:16:19 UTC 2025 - 21K bytes - Viewed (0) -
compat/maven-model-builder/src/main/java/org/apache/maven/model/interpolation/reflection/ClassMap.java
} catch (NoSuchMethodException e) { // If the class does not have the method, then neither its superclass // nor any of its interfaces has it so quickly return null. return null; } } // try the superclass Class<?> superclazz = clazz.getSuperclass(); if (superclazz != null) {
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Sat Apr 05 11:52:05 UTC 2025 - 13.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/fscc/FileSystemInformationTest.java
long startTime = System.nanoTime(); info.decode(largeBuffer, 0, 24); long endTime = System.nanoTime(); // Should complete quickly (under 1ms) assertTrue((endTime - startTime) < 1_000_000); } @ParameterizedTest @ValueSource(ints = { 24, 32, 100, 1000, 10000 })Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/ArrayTable.java
/** * Returns the value corresponding to the specified row and column indices. The same value is * returned by {@code get(rowKeyList().get(rowIndex), columnKeyList().get(columnIndex))}, but this * method runs more quickly. * * @param rowIndex position of the row key in {@link #rowKeyList()} * @param columnIndex position of the row key in {@link #columnKeyList()} * @return the value with the specified row and columnRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Nov 17 22:50:48 UTC 2025 - 26.9K bytes - Viewed (0) -
SECURITY.md
when doing so. Write an attack scenario that demonstrates how your issue violates the use cases and security assumptions defined in the threat model. This will help us evaluate your report quickly, especially if the issue is complex. - Whether this vulnerability is public or known to third parties. If it is, please provide details.Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
src/main/config/openapi/openapi-user.yaml
site:
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu May 09 06:31:27 UTC 2024 - 21.6K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ArrayTable.java
/** * Returns the value corresponding to the specified row and column indices. The same value is * returned by {@code get(rowKeyList().get(rowIndex), columnKeyList().get(columnIndex))}, but this * method runs more quickly. * * @param rowIndex position of the row key in {@link #rowKeyList()} * @param columnIndex position of the row key in {@link #columnKeyList()} * @return the value with the specified row and columnRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Aug 13 19:39:21 UTC 2025 - 26.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
## Recap { #recap } With what you have seen up to now, you can set up a secure **FastAPI** application using standards like OAuth2 and JWT. In almost any framework handling the security becomes a rather complex subject quite quickly. Many packages that simplify it a lot have to make many compromises with the data model, database, and available features. And some of these packages that simplify things too much actually have security flaws underneath.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 10.6K bytes - Viewed (0)