Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 371 - 380 of 703 for peru (0.02 seconds)

  1. docs/distributed/CONFIG.md

    ```
    
    ### Things to know
    
    - Fields such as `version` and `pools` are mandatory, however all other fields are optional.
    - Each pool expects a minimum of 2 nodes per pool, and unique non-repeating hosts for each argument.
    - Each pool expects each host in this pool has the same number of drives specified as any other host.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Jun 25 02:30:18 GMT 2024
    - 4.2K bytes
    - Click Count (0)
  2. cmd/local-locker_test.go

    	// Numbers of unique locks
    	for _, locks := range []int{100, 1000, 1e6} {
    		if testing.Short() && locks > 100 {
    			continue
    		}
    		t.Run(fmt.Sprintf("%d-locks", locks), func(t *testing.T) {
    			// Number of readers per lock...
    			for _, readers := range []int{1, 10, 100} {
    				if locks > 1000 && readers > 1 {
    					continue
    				}
    				if testing.Short() && readers > 10 {
    					continue
    				}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 11.8K bytes
    - Click Count (0)
  3. docs/security/README.md

    ### Server-Side Encryption - Preliminaries
    
    #### Secret Keys
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Feb 26 09:25:50 GMT 2025
    - 13.8K bytes
    - Click Count (0)
  4. android/guava/src/com/google/common/collect/ForwardingSortedMap.java

    import org.jspecify.annotations.Nullable;
    
    /**
     * A sorted map which forwards all its method calls to another sorted map. Subclasses should
     * override one or more methods to modify the behavior of the backing sorted map as desired per the
     * <a href="http://en.wikipedia.org/wiki/Decorator_pattern">decorator pattern</a>.
     *
     * <p><b>Warning:</b> The methods of {@code ForwardingSortedMap} forward <i>indiscriminately</i> to
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Wed Feb 12 16:28:01 GMT 2025
    - 5.7K bytes
    - Click Count (0)
  5. src/test/java/jcifs/smb/SmbSessionInternalTest.java

            assertTrue(ex.getMessage().contains("invalid"));
            verify(session).getSmbTree(eq(share), eq(service));
        }
    
        // Edge: unknown service returns null per stub
        @Test
        @DisplayName("getSmbTree unknown service returns null as stubbed")
        void getSmbTree_unknownService() {
            when(session.getSmbTree(eq("share"), eq("UNKNOWN"))).thenReturn(null);
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 6.8K bytes
    - Click Count (0)
  6. internal/config/scanner/scanner.go

    	// Sleep always or based on incoming S3 requests.
    	IdleMode int32 // 0 => on, 1 => off
    
    	// Alert upon this many excess object versions
    	ExcessVersions int64 // 100
    
    	// Alert upon this many excess sub-folders per folder in an erasure set.
    	ExcessFolders int64 // 50000
    
    	// MaxWait is maximum wait time between operations
    	MaxWait time.Duration
    	// Cycle is the time.Duration between each scanner cycles
    	Cycle time.Duration
    }
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri May 24 23:05:23 GMT 2024
    - 5.5K bytes
    - Click Count (0)
  7. src/test/java/org/codelibs/fess/exception/ContentNotFoundExceptionTest.java

            assertTrue(exception instanceof RuntimeException);
        }
    
        @Test
        public void test_suppressionAndStackTrace() {
            // Test that suppression and stack trace are disabled (as per constructor)
            String parentUrl = "http://example.com/parent";
            String url = "http://example.com/child";
            ContentNotFoundException exception = new ContentNotFoundException(parentUrl, url);
    
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sun Jan 11 08:43:05 GMT 2026
    - 7.9K bytes
    - Click Count (0)
  8. src/main/java/jcifs/internal/smb2/Smb3KeyDerivation.java

            final KDFCounterBytesGenerator gen = new KDFCounterBytesGenerator(new HMac(new SHA256Digest()));
    
            final int r = 32;
            final byte[] suffix = new byte[label.length + context.length + 5];
            // per bouncycastle
            // <li>1: K(i) := PRF( KI, [i]_2 || Label || 0x00 || Context || [L]_2 ) with the counter at the very beginning
            // of the fixedInputData (The default implementation has this format)</li>
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 6.5K bytes
    - Click Count (0)
  9. src/test/java/jcifs/smb1/smb1/Trans2FindNext2Test.java

         */
        @Test
        void testToStringContainsExpectedFields() {
            // Given
            int sid = 4660; // 0x1234, printed as decimal
            int resumeKey = 0x01020304; // shows only low 4 hex digits per implementation
            String name = "name";
            Trans2FindNext2 next = new Trans2FindNext2(sid, resumeKey, name);
    
            // When
            String s = next.toString();
    
            // Then
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 05:31:44 GMT 2025
    - 6.9K bytes
    - Click Count (0)
  10. docs/en/docs/advanced/security/http-basic-auth.md

    #### A "professional" attack { #a-professional-attack }
    
    Of course, the attackers would not try all this by hand, they would write a program to do it, possibly with thousands or millions of tests per second. And they would get just one extra correct letter at a time.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 5K bytes
    - Click Count (0)
Back to Top