- Sort Score
- Result 10 results
- Languages All
Results 281 - 290 of 891 for sale (0.02 sec)
-
src/test/java/jcifs/internal/smb2/Smb3KeyDerivationTest.java
} @Test @DisplayName("Should produce consistent keys for same input") void testDeriveKeys_Consistency() { // Given int dialect = Smb2Constants.SMB2_DIALECT_0311; // When - derive same key twice byte[] signingKey1 = Smb3KeyDerivation.deriveSigningKey(dialect, sessionKey, preauthIntegrity);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.5K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableLongArray.java
} // Because we happen to use the same formula. If that changes, just don't override this. @Override public int hashCode() { return parent.hashCode(); } @Override public String toString() { return parent.toString(); } } /** * Returns {@code true} if {@code object} is an {@code ImmutableLongArray} containing the same * values as this one, in the same order.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22K bytes - Viewed (0) -
guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedArrayBlockingQueue.java
} finally { monitor.leave(); } } /** * Returns an array containing all of the elements in this queue, in proper sequence. * * <p>The returned array will be "safe" in that no references to it are maintained by this queue. * (In other words, this method must allocate a new array). The caller is thus free to modify the * returned array. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 22.4K bytes - Viewed (0) -
guava/src/com/google/common/primitives/ImmutableIntArray.java
} // Because we happen to use the same formula. If that changes, just don't override this. @Override public int hashCode() { return parent.hashCode(); } @Override public String toString() { return parent.toString(); } } /** * Returns {@code true} if {@code object} is an {@code ImmutableIntArray} containing the same * values as this one, in the same order.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 21.4K bytes - Viewed (0) -
tensorflow/c/c_api_experimental.cc
// These XLA flags are needed to trigger XLA properly from C (more generally // non-Python) clients. If this API is called again with `enable` set to // false, it is safe to keep these flag values as is. tensorflow::MarkForCompilationPassFlags* flags = tensorflow::GetMarkForCompilationPassFlags(); flags->tf_xla_cpu_global_jit = true; flags->tf_xla_min_cluster_size = 1;
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 03:53:25 UTC 2025 - 29.5K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/AbstractBaseGraph.java
return Ints.saturatedCast(edgeCount()); } @Override public boolean remove(@Nullable Object o) { throw new UnsupportedOperationException(); } // Mostly safe: We check contains(u) before calling successors(u), so we perform unsafe // operations only in weird cases like checking for an EndpointPair<ArrayList> in a // Graph<LinkedList>. @SuppressWarnings("unchecked")
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 7.2K bytes - Viewed (0) -
api/maven-api-plugin/src/main/mdo/plugin.mdo
Flags this Mojo as requiring information about the dependencies that would make up the specified class path. As the name suggests, this is similar to requiresDependencyResolution and supports the same values. The important difference is this will not resolve the files for the dependencies, i.e. the artifacts associated with a Maven project can lack a file. As such, this annotation is meant for Mojos that only
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Tue Feb 25 08:28:41 UTC 2025 - 24.8K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
Dessa forma, você pode criar um token com um prazo de expiração, digamos, de 1 semana. E então, quando o usuário voltar no dia seguinte com o token, você sabe que ele ainda está logado no seu sistema.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 11K bytes - Viewed (0) -
src/cmd/asm/internal/lex/input.go
in.peek = false tok := in.peekToken in.text = in.peekText return tok } // If we cannot generate a token after 100 macro invocations, we're in trouble. // The usual case is caught by Push, below, but be safe. for nesting := 0; nesting < 100; { tok := in.Stack.Next() switch tok { case '#': if !in.beginningOfLine { in.Error("'#' must be first item on line") } in.beginningOfLine = in.hash()
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Sep 06 13:17:27 UTC 2024 - 12.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/util/DocumentUtil.java
} /** * Encodes a URL by encoding non-URL-safe characters. * Uses the request's character encoding if available, otherwise defaults to UTF-8. * Only encodes characters that are not considered URL-safe according to CharUtil. * * @param url the URL to encode * @return the encoded URL with non-URL-safe characters properly encoded */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 7.2K bytes - Viewed (0)