- Sort Score
- Result 10 results
- Languages All
Results 291 - 300 of 350 for enough (0.72 sec)
-
LICENSE
If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Mon Jan 18 20:25:38 UTC 2016 - 25.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
additional persistent storage is available everywhere in the cluster and has infinite capacity. Topology constraints addressed the first point, but up to now pod scheduling was still done without considering that the remaining storage capacity may not be enough to start a new pod. [Storage capacity tracking](https://github.com/kubernetes/enhancements/tree/master/keps/sig-storage/1472-storage-capacity-tracking), a new alpha feature, addresses that by adding an API for a CSI driver to report storage capacity...
Registered: Fri Sep 05 09:05:11 UTC 2025 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/com/ServerDataTest.java
assertEquals(256, serverData.encryptionKeyLength); assertEquals((byte) 0, serverData.encryptionKey[0]); assertEquals((byte) 255, serverData.encryptionKey[255]); // Test with large GUID (though typically 16 bytes) byte[] largeGuid = new byte[1024]; Arrays.fill(largeGuid, (byte) 0xCA); serverData.guid = largeGuid; assertEquals(1024, serverData.guid.length);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17K bytes - Viewed (0) -
src/main/java/jcifs/smb1/netbios/NameServiceClient.java
* BCAST, Node Status) we need to augment the hashcode generated * for the addresses hostname or failed lookups for one type will * be cached and cause other types to fail even though they may * not be the authority for the name. For example, if a WINS lookup * for FOO fails and caches unknownAddress for FOO, a subsequent
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 17.6K bytes - Viewed (0) -
guava-gwt/src-super/com/google/common/collect/super/com/google/common/collect/ImmutableSortedSet.java
* comparator only as a comparator. It does NOT assume empty contents. (It requires an * implementation of iterator() to define its contents, and methods like contains() are * implemented in terms of that method (though they will likely be overridden by subclasses for * performance reasons).) This means that a call to this method have can different behavior in GWT
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 18:32:41 UTC 2025 - 15.5K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbTreeImpl.java
} if (request == null || chainedResponse != null && chainedResponse.isReceived()) { return chainedResponse; } // fall trough if the tree connection is already established // and send it as a separate request instead String svc = null; final int t = this.tid; request.setTid(t);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 30K bytes - Viewed (0) -
docs/en/docs/tutorial/query-params-str-validations.md
Having `str | None` will allow your editor to give you better support and detect errors. /// ## Additional validation { #additional-validation } We are going to enforce that even though `q` is optional, whenever it is provided, **its length doesn't exceed 50 characters**. ### Import `Query` and `Annotated` { #import-query-and-annotated } To achieve that, first import: * `Query` from `fastapi`
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 17.2K bytes - Viewed (0) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
* -> attackerSwitch (not a CA certificate!) * -> phonyVictim * ``` * * But this chain is wrong because the attackerSwitch certificate is being used in a CA role even * though it is not a CA certificate. There are pinned certificates in the chain! The correct * chain is much shorter because it skips the non-CA certificate. * * ``` * attackerCa * -> attackerIntermediate
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Fri Jun 20 11:46:46 UTC 2025 - 24.3K bytes - Viewed (1) -
src/test/java/jcifs/config/DelegatingConfigurationTest.java
void testConstructorWithNullDelegate() { // When & Then assertDoesNotThrow(() -> { new DelegatingConfiguration(null); }, "Constructor should accept null delegate (though it would cause NPE on use)"); } @Test @DisplayName("Constructor should store delegate reference") void testConstructorStoresDelegate() { // Given
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 20.7K bytes - Viewed (0) -
docs/security/README.md
MinIO does not assume or require that the client-provided key is unique. It may be used for multiple objects or buckets. Especially a single client-provided key may be used for all objects - even though all objects must be treated as compromised if that key is ever compromised. #### Key rotation
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 26 09:25:50 UTC 2025 - 13.8K bytes - Viewed (0)