- Sort Score
- Num 10 results
- Language All
Results 1171 - 1180 of 7,900 for usen (0.03 seconds)
-
impl/maven-cli/src/main/java/org/apache/maven/cling/logging/Slf4jLoggerManager.java
import org.codehaus.plexus.logging.LoggerManager; import org.slf4j.ILoggerFactory; import org.slf4j.LoggerFactory; /** * Use an SLF4J {@link ILoggerFactory} as a backing for a Plexus * {@link LoggerManager}, * ignoring Plexus logger API parts that are not classical and probably not really used. * * @since 3.1 */ public class Slf4jLoggerManager implements LoggerManager { private final ILoggerFactory loggerFactory;Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Nov 08 08:49:11 GMT 2024 - 2.9K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/plugin/ExtensionRealmCache.java
* collected from this method in combination with a custom cache implementation to dispose unused records from the * cache. * * @param project The project that employs the plugin realm, must not be {@code null}. * @param record The cache record being used for the project, must not be {@code null}. */Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Oct 25 12:31:46 GMT 2024 - 2.9K bytes - Click Count (0) -
guava/src/com/google/common/io/Files.java
* * <p>This method returns a mutable {@code List}. For an {@code ImmutableList}, use {@code * Files.asCharSource(file, charset).readLines()}. * * <p><b>{@link java.nio.file.Path} equivalent:</b> {@link * java.nio.file.Files#readAllLines(java.nio.file.Path, Charset)}. * * @param file the file to read from * @param charset the charset used to decode the input stream; see {@link StandardCharsets} forCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Sep 25 20:24:13 GMT 2025 - 32.8K bytes - Click Count (0) -
okhttp-tls/README.md
Certificate Authorities ----------------------- The above example uses a self-signed certificate. This is convenient for testing but not representative of real-world HTTPS deployment. To get closer to that we can use `HeldCertificate` to generate a trusted root certificate, an intermediate certificate, and a server certificate. We use `certificateAuthority(int)` to create certificates that can sign other certificates. The
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Oct 30 21:39:59 GMT 2025 - 9.1K bytes - Click Count (0) -
maven-tests/mvnw
# Optional ENV vars # ----------------- # JAVA_HOME - location of a JDK home dir, required when download maven via java source # MVNW_REPOURL - repo url base for downloading maven distribution # MVNW_USERNAME/MVNW_PASSWORD - user and password for downloading maven # MVNW_VERBOSE - true: enable verbose log; debug: trace the mvnw script; others: silence the output # ---------------------------------------------------------------------------- set -euf
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Thu Sep 25 18:22:49 GMT 2025 - 10.4K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
/** * Returns the password in plain text or {@code null} if the raw password * hashes were used to construct this {@code NtlmPasswordAuthentication} * object which will be the case when NTLM HTTP Authentication is * used. There is no way to retrieve a users password in plain text unless * it is supplied by the user at runtime. */ /** * Returns the password in plain text or {@code null} if the raw passwordCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 26.7K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.18.md
- All resources under `apps/v1beta1` and `apps/v1beta2` - use `apps/v1` instead - `daemonsets`, `deployments`, `replicasets` resources under `extensions/v1beta1` - use `apps/v1` instead - `networkpolicies` resources under `extensions/v1beta1` - use `networking.k8s.io/v1` instead
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Jun 16 17:18:28 GMT 2021 - 373.2K bytes - Click Count (0)