- Sort Score
- Num 10 results
- Language All
Results 111 - 120 of 244 for Remaining (0.11 seconds)
-
apache-maven/src/assembly/maven/bin/mvn
\"-Dmaven.mainClass=$MAVEN_MAIN_CLASS\" \ \"-Dlibrary.jline.path=${MAVEN_HOME}/lib/jline-native\" \ \"-Dmaven.multiModuleProjectDirectory=$MAVEN_PROJECTBASEDIR\" \ $LAUNCHER_CLASS \ $MAVEN_ARGS" # Add remaining arguments with proper quoting for arg in "$@"; do cmd="$cmd \"$arg\"" done if [ -n "$MAVEN_DEBUG_SCRIPT" ]; then echo "[DEBUG] Launching JVM with command:" >&2 echo "[DEBUG] $cmd" >&2 fiCreated: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Dec 10 16:40:06 GMT 2025 - 9.2K bytes - Click Count (0) -
src/test/java/jcifs/internal/util/SMBUtilTest.java
assertEquals((byte) 'S', SMBUtil.SMB_HEADER[1]); assertEquals((byte) 'M', SMBUtil.SMB_HEADER[2]); assertEquals((byte) 'B', SMBUtil.SMB_HEADER[3]); // Verify remaining bytes are zeros for (int i = 4; i < 24; i++) { assertEquals((byte) 0x00, SMBUtil.SMB_HEADER[i]); } } @Test void testSMB2Header() {
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 11.1K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnectionPool.kt
} else -> { // No connections, idle or in use. return -1 } } } /** * Prunes any leaked calls and then returns the number of remaining live calls on [connection]. * Calls are leaked if the connection is tracking them but the application code has abandoned * them. Leak detection is imprecise and relies on garbage collection. */Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 11.1K bytes - Click Count (0) -
guava/src/com/google/common/collect/ObjectArrays.java
* @param array the array of elements to append * @return an array whose size is one larger than {@code array}, with {@code element} occupying * the first position, and the elements of {@code array} occupying the remaining elements. */ public static <T extends @Nullable Object> T[] concat(@ParametricNullness T element, T[] array) { T[] result = newArray(array, array.length + 1); result[0] = element;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Jan 23 17:16:53 GMT 2026 - 9.2K bytes - Click Count (0) -
src/archive/tar/writer.go
if err != nil && err != ErrWriteTooLong { tw.err = err } return n, err } // readFrom populates the content of the current file by reading from r. // The bytes read must match the number of remaining bytes in the current file. // // If the current file is sparse and r is an io.ReadSeeker, // then readFrom uses Seek to skip past holes defined in Header.SparseHoles, // assuming that skipped regions are all NULs.
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon Feb 03 16:38:43 GMT 2025 - 19.7K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/ObjectArrays.java
* @param array the array of elements to append * @return an array whose size is one larger than {@code array}, with {@code element} occupying * the first position, and the elements of {@code array} occupying the remaining elements. */ public static <T extends @Nullable Object> T[] concat(@ParametricNullness T element, T[] array) { T[] result = newArray(array, array.length + 1); result[0] = element;Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Jan 23 17:16:53 GMT 2026 - 9.2K bytes - Click Count (0) -
guava/src/com/google/common/collect/RegularImmutableMap.java
// that have the same key. Then a second pass will remove all but the first of the slots that // have this Entry. The value in the map becomes false when this first entry has been copied, so // we know not to copy the remaining ones. IdentityHashMap<Entry<K, V>, Boolean> duplicates = null; int dupCount = 0; for (int entryIndex = n - 1; entryIndex >= 0; entryIndex--) {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Dec 26 20:08:09 GMT 2025 - 15.7K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/AtomicLongMap.java
* putIfZero. * * - Allow putIfAbsent and replace to distinguish between zero and absent, but don't implement * remove(K, long). Without any two-phase operations it becomes feasible for all remaining * operations to distinguish between zero and absent. If we do this, then perhaps we should add * replace(key, long). *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed May 14 13:21:19 GMT 2025 - 14K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/rdma/RdmaIntegrationTest.java
byte[] testData = "Test RDMA data transfer".getBytes(); sendBuffer.getBuffer().put(testData); sendBuffer.getBuffer().flip(); assertEquals(testData.length, sendBuffer.getBuffer().remaining(), "Buffer should contain test data"); // Clean up bufferManager.releaseSendRegion(sendBuffer); bufferManager.releaseReceiveRegion(recvBuffer);
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 23 05:11:12 GMT 2025 - 13.8K bytes - Click Count (0) -
internal/s3select/message.go
atomic.AddInt64(&writer.bytesReturned, int64(writer.payloadBufferIndex)) writer.payloadBufferIndex = 0 } return result } // Finish is the last call to the message writer - it sends any // remaining record payload, then sends statistics and finally the end // message. func (writer *messageWriter) Finish(bytesScanned, bytesProcessed int64) error { select { case <-writer.doneCh:
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 15.3K bytes - Click Count (0)