- Sort Score
- Num 10 results
- Language All
Results 1 - 5 of 5 for closeAll (0.07 seconds)
-
compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/DefaultUpdateCheckManager.java
int hash = (auth.getUsername() + auth.getPassword()).hashCode(); buffer.append(hash).append('@'); } // consider the URL (instead of the id) as this most closely relates to the contents in the repo buffer.append(repository.getUrl()); return buffer.toString(); } private void writeLastUpdated(File touchfile, String key, String error) {
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Dec 16 13:41:14 GMT 2025 - 9.4K bytes - Click Count (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/JavaPathType.java
* <p>Path types are often exclusive. For example, a dependency should not be both on the Java class path * and on the Java module path.</p> * * <h2>Relationship with Java compiler standard location</h2> * This enumeration is closely related to the {@link JavaFileManager.Location} enumerations. * A difference is that the latter enumerates input and output files, while {@code JavaPathType}
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Mon Dec 15 11:13:42 GMT 2025 - 15.7K bytes - Click Count (1) -
doc/godebug.md
Using `panicnil=1` restores the behavior of Go 1.20 and earlier. When compiling a work module or workspace that declares an older Go version, the Go toolchain amends its defaults to match that older Go version as closely as possible. For example, when a Go 1.21 toolchain compiles a program, if the work module's `go.mod` or the workspace's `go.work` says `go` `1.20`, then the program defaults to `panicnil=1`, matching Go 1.20 instead of Go 1.21.
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Wed Dec 03 00:18:09 GMT 2025 - 24.7K bytes - Click Count (0) -
fastapi/applications.py
""" ), deprecated( """ "openapi_prefix" has been deprecated in favor of "root_path", which follows more closely the ASGI standard, is simpler, and more automatic. """ ), ] = "", root_path: Annotated[ str, Doc( """Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 21:25:59 GMT 2025 - 176.3K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
fipsSelfTest() // Random ECDSA is dangerous, because a failure of the RNG would immediately // leak the private key. Instead, we use a "hedged" approach, as specified // in draft-irtf-cfrg-det-sigs-with-noise-04, Section 4. This has also the // advantage of closely resembling Deterministic ECDSA. Z := make([]byte, len(priv.d)) if err := drbg.ReadWithReader(rand, Z); err != nil { return nil, err } // See https://github.com/cfrg/draft-irtf-cfrg-det-sigs-with-noise/issues/6 // for the FIPS compliance of this method....
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)