- Sort Score
- Result 10 results
- Languages All
Results 191 - 200 of 289 for Basic2 (1.05 sec)
-
src/main/java/jcifs/internal/witness/WitnessRpcClient.java
} /** * Tests connectivity to the witness service. * * @throws IOException if connection fails */ private void testConnection() throws IOException { // For now, just test basic connectivity to RPC endpoint try (java.net.Socket socket = new java.net.Socket()) { socket.connect(new java.net.InetSocketAddress(serverAddress, WITNESS_RPC_PORT), WITNESS_RPC_TIMEOUT_MS);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 24 00:12:28 UTC 2025 - 12.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/AbstractMapBasedMultiset.java
import java.util.ConcurrentModificationException; import java.util.Iterator; import java.util.Map; import java.util.Set; import java.util.function.ObjIntConsumer; import org.jspecify.annotations.Nullable; /** * Basic implementation of {@code Multiset<E>} backed by an instance of {@code Map<E, Count>}. * * <p>For serialization to work, the subclass must specify explicit {@code readObject} and {@code * writeObject} methods. *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 10.2K bytes - Viewed (0) -
docs/changelogs/changelog_2x.md
<artifactId>logging-interceptor</artifactId> <version>2.6.0</version> </dependency> ``` Configure basic logging like this: ```java HttpLoggingInterceptor loggingInterceptor = new HttpLoggingInterceptor(); loggingInterceptor.setLevel(HttpLoggingInterceptor.Level.BASIC); client.networkInterceptors().add(loggingInterceptor); ```
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 26.6K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/ioctl/SrvCopychunkTest.java
private int startIndex; @BeforeEach void setUp() { buffer = new byte[100]; startIndex = 10; } @Test @DisplayName("Should encode basic values correctly") void testEncodeBasicValues() { // Given long sourceOffset = 1024L; long targetOffset = 2048L; int length = 4096;Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 12.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/opensearch/config/exentity/DataConfig.java
return factory; } private AuthScheme getAuthScheme(final Map<String, String> paramMap, final String webAuthName, final String scheme) { AuthScheme authScheme = null; if (Constants.BASIC.equals(scheme)) { authScheme = new BasicScheme(); } else if (Constants.DIGEST.equals(scheme)) { authScheme = new DigestScheme(); } else if (Constants.NTLM.equals(scheme)) {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Mon Nov 24 02:07:40 UTC 2025 - 18.8K bytes - Viewed (0) -
okhttp/api/jvm/okhttp.api
public final class okhttp3/Credentials { public static final field INSTANCE Lokhttp3/Credentials; public static final fun basic (Ljava/lang/String;Ljava/lang/String;)Ljava/lang/String; public static final fun basic (Ljava/lang/String;Ljava/lang/String;Ljava/nio/charset/Charset;)Ljava/lang/String; public static synthetic fun basic$default (Ljava/lang/String;Ljava/lang/String;Ljava/nio/charset/Charset;ILjava/lang/Object;)Ljava/lang/String; }Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Nov 05 18:28:35 UTC 2025 - 70.2K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/DiscreteDomain.java
import org.jspecify.annotations.Nullable; /** * A descriptor for a <i>discrete</i> {@code Comparable} domain such as all {@link Integer} * instances. A discrete domain is one that supports the three basic operations: {@link #next}, * {@link #previous} and {@link #distance}, according to their specifications. The methods {@link * #minValue} and {@link #maxValue} should also be overridden for bounded types. *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Feb 13 17:34:21 UTC 2025 - 10.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p>
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
guava/src/com/google/common/base/Stopwatch.java
* reasonably accurate values are sufficient. If the uncommon case that you need to maximize * accuracy, use {@code System.nanoTime()} directly instead. * * <p>Basic usage: * * {@snippet : * Stopwatch stopwatch = Stopwatch.createStarted(); * doSomething(); * stopwatch.stop(); // optional * * Duration duration = stopwatch.elapsed(); *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Oct 08 18:55:33 UTC 2025 - 9.2K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/EventListenerTest.kt
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Nov 05 18:28:35 UTC 2025 - 70.5K bytes - Viewed (0)