Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1781 - 1790 of 1,927 for usted (0.02 sec)

  1. src/main/java/org/codelibs/core/convert/TimeConversionUtil.java

     * the conversion uses their millisecond value to create the target object.
     * For other types, the conversion uses the string representation of the source object.
     * </p>
     * <p>
     * If no pattern is specified, the pattern used for conversion depends on the locale as follows:
     * </p>
     * <table border="1">
     * <caption>Conversion Patterns</caption>
     * <tr>
     * <th>Category</th>
     * <th>Pattern</th>
     * <th>Example for {@link Locale#JAPANESE}</th>
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Thu Jul 31 08:16:49 UTC 2025
    - 20.3K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/core/convert/TimestampConversionUtil.java

     * For other types, the converted object is created from the string representation of the source object.
     * </p>
     * <p>
     * If no pattern is specified, the pattern used for conversion depends on the locale as follows:
     * </p>
     * <table border="1">
     * <caption>Conversion Patterns</caption>
     * <tr>
     * <th>Category</th>
     * <th>Pattern</th>
     * <th>Example for {@link Locale#JAPANESE}</th>
    Registered: Sat Dec 20 08:55:33 UTC 2025
    - Last Modified: Thu Jul 31 08:16:49 UTC 2025
    - 20.6K bytes
    - Viewed (0)
  3. docs/smb3-features/01-smb3-lease-design.md

        private long leaseDuration;
        
        public Smb2LeaseBreakAcknowledgment(Smb2LeaseKey key, int state) {
            this.leaseKey = key;
            this.leaseState = state;
            this.leaseDuration = 0;  // Not used in acknowledgment
        }
        
        @Override
        protected int writePayload(byte[] dst, int dstIndex) {
            int start = dstIndex;
            
            // StructureSize (2 bytes) - must be 36
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 02:53:50 UTC 2025
    - 22K bytes
    - Viewed (0)
  4. src/main/java/jcifs/internal/smb2/create/Smb2CreateRequest.java

    import jcifs.internal.smb2.Smb2Constants;
    import jcifs.internal.smb2.lease.Smb2LeaseKey;
    import jcifs.internal.util.SMBUtil;
    import jcifs.util.Hexdump;
    
    /**
     * SMB2 Create request message. This command is used to create or open a file or directory
     * on the server with specified access rights and sharing options.
     *
     * @author mbechler
     *
     */
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 23 02:21:31 UTC 2025
    - 22.9K bytes
    - Viewed (0)
  5. android/guava-testlib/src/com/google/common/collect/testing/AbstractIteratorTester.java

         * stack so that it is returned by the next call to {@link Iterator#next()}. If the element is
         * not in {@link #nextElements}, this method throws an {@link UnknownElementException}.
         *
         * <p>This method is used when testing iterators without a known ordering. We poll the target
         * iterator's next element and pass it to the reference iterator through this method so it can
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed May 14 19:40:47 UTC 2025
    - 20.8K bytes
    - Viewed (0)
  6. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

       *                 -> attackerSwitch (not a CA certificate!)
       *                     -> phonyVictim
       * ```
       *
       * But this chain is wrong because the attackerSwitch certificate is being used in a CA role even
       * though it is not a CA certificate. There are pinned certificates in the chain! The correct
       * chain is much shorter because it skips the non-CA certificate.
       *
       * ```
       *   attackerCa
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Fri Jun 20 11:46:46 UTC 2025
    - 24.3K bytes
    - Viewed (2)
  7. guava-testlib/test/com/google/common/testing/ArbitraryInstancesTest.java

        private NonPublicConstantIgnored() {}
      }
    
      public static class NonStaticFieldIgnored {
        // This should cause infinite recursion. But it shouldn't be used anyway.
        public final NonStaticFieldIgnored instance = new NonStaticFieldIgnored();
    
        private NonStaticFieldIgnored() {}
      }
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Dec 11 20:45:32 UTC 2025
    - 22.6K bytes
    - Viewed (0)
  8. cmd/background-newdisks-heal-ops.go

    )
    
    const (
    	defaultMonitorNewDiskInterval = time.Second * 10
    	healingTrackerFilename        = ".healing.bin"
    )
    
    //go:generate msgp -file $GOFILE -unexported
    
    // healingTracker is used to persist healing information during a heal.
    type healingTracker struct {
    	disk StorageAPI    `msg:"-"`
    	mu   *sync.RWMutex `msg:"-"`
    
    	ID         string
    	PoolIndex  int
    	SetIndex   int
    	DiskIndex  int
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  9. cmd/xl-storage-format_test.go

    				fi.VersionID = mustGetUUID()
    				fi.DataDir = mustGetUUID()
    				ids[i] = fi.VersionID
    				fi.ModTime = fi.ModTime.Add(-time.Second)
    				xl.AddVersion(fi)
    			}
    			// Encode all. This is used for benchmarking.
    			enc, err := xl.AppendTo(nil)
    			if err != nil {
    				b.Fatal(err)
    			}
    			b.Logf("Serialized size: %d bytes", len(enc))
    			rng := rand.New(rand.NewSource(0))
    			dump := make([]byte, len(enc))
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 17.5K bytes
    - Viewed (0)
  10. src/main/java/jcifs/http/NetworkExplorer.java

    import jcifs.smb.NtlmPasswordAuthentication;
    import jcifs.smb.SmbAuthException;
    import jcifs.smb.SmbException;
    import jcifs.smb.SmbFile;
    import jcifs.smb.SmbFileInputStream;
    
    /**
     * This servlet may be used to "browse" the entire hierarchy of resources
     * on an SMB network like one might with Network Neighborhood or Windows
     * Explorer. The users credentials with be negotiated using NTLM SSP if
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 23.4K bytes
    - Viewed (0)
Back to top