Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 391 - 400 of 541 for slashes (0.06 seconds)

  1. docs/distributed/DESIGN.md

    - Choosing an erasure set for the object is decided during `PutObject()`, object names are used to find the right erasure set using the following pseudo code.
    
    ```go
    // hashes the key returning an integer.
    func sipHashMod(key string, cardinality int, id [16]byte) int {
            if cardinality <= 0 {
                    return -1
            }
            sip := siphash.New(id[:])
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Feb 26 09:25:50 GMT 2025
    - 8K bytes
    - Click Count (2)
  2. guava/src/com/google/common/io/CharStreams.java

       *
       * <p><b>Java 25+ users:</b> If the input is a {@link Reader}, you may prefer {@link
       * Reader#readAllLines()}. The two may have different performance characteristics for different
       * {@link Reader} classes and Java versions, but both methods read the entire input into memory
       * immediately, so we discourage use of both when memory usage is a concern.
       *
       * @param r the object to read from
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Sep 29 13:56:24 GMT 2025
    - 11.9K bytes
    - Click Count (0)
  3. docs/en/docs/features.md

        * Because pydantic data structures are just instances of classes you define; auto-completion, linting, mypy and your intuition should all work properly with your validated data.
    * Validate **complex structures**:
        * Use of hierarchical Pydantic models, Python `typing`’s `List` and `Dict`, etc.
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Oct 11 17:48:49 GMT 2025
    - 9.5K bytes
    - Click Count (0)
  4. android/guava-tests/test/com/google/common/collect/BenchmarkHelpers.java

    import java.util.concurrent.ConcurrentHashMap;
    import java.util.concurrent.ConcurrentMap;
    import java.util.concurrent.ConcurrentSkipListMap;
    import org.jspecify.annotations.NullUnmarked;
    
    /**
     * Helper classes for various benchmarks.
     *
     * @author Christopher Swenson
     */
    @NullUnmarked
    final class BenchmarkHelpers {
      /** So far, this is the best way to test various implementations of {@link Set} subclasses. */
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Sun Aug 10 19:54:19 GMT 2025
    - 12.5K bytes
    - Click Count (0)
  5. impl/maven-core/src/test/java/org/apache/maven/project/PomConstructionTest.java

            assertEquals(
                    new File(pom.getBasedir(), "target/classes"),
                    new File(pom.getValue("properties/buildMainOut").toString()));
            assertEquals(
                    new File(pom.getBasedir(), "target/test-classes"),
                    new File(pom.getValue("properties/buildTestOut").toString()));
            assertEquals(
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Wed Sep 17 10:01:14 GMT 2025
    - 94.8K bytes
    - Click Count (0)
  6. src/archive/tar/common.go

    // that they are interested in preserving.
    type Header struct {
    	// Typeflag is the type of header entry.
    	// The zero value is automatically promoted to either TypeReg or TypeDir
    	// depending on the presence of a trailing slash in Name.
    	Typeflag byte
    
    	Name     string // Name of file entry
    	Linkname string // Target name of link (valid for TypeLink or TypeSymlink)
    
    	Size  int64  // Logical file size in bytes
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Tue Oct 07 19:46:36 GMT 2025
    - 24.5K bytes
    - Click Count (0)
  7. docs/de/docs/tutorial/security/simple-oauth2.md

    ##### Warum Passwort-Hashing verwenden? { #why-use-password-hashing }
    
    Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes.
    
    Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Sep 20 15:10:09 GMT 2025
    - 11.2K bytes
    - Click Count (0)
  8. docs/en/docs/tutorial/security/simple-oauth2.md

    But you cannot convert from the gibberish back to the password.
    
    ##### Why use password hashing { #why-use-password-hashing }
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
    
    {* ../../docs_src/security/tutorial003_an_py310.py hl[82:85] *}
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 09:15:41 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  9. docs/es/docs/tutorial/security/simple-oauth2.md

    Pero no puedes convertir del galimatías al password.
    
    ##### Por qué usar hashing de passwords { #why-use-password-hashing }
    
    Si tu base de datos es robada, el ladrón no tendrá los passwords en texto plano de tus usuarios, solo los hashes.
    
    Entonces, el ladrón no podrá intentar usar esos mismos passwords en otro sistema (como muchos usuarios usan el mismo password en todas partes, esto sería peligroso).
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Tue Dec 16 16:33:45 GMT 2025
    - 10.3K bytes
    - Click Count (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    But when you import `Query`, `Path`, `Depends`, `Security` and others from `fastapi`, those are actually functions that return special classes.
    
    ///
    
    ## Use `SecurityScopes` { #use-securityscopes }
    
    Now update the dependency `get_current_user`.
    
    This is the one used by the dependencies above.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 10:49:48 GMT 2025
    - 13.5K bytes
    - Click Count (0)
Back to Top