- Sort Score
- Result 10 results
- Languages All
Results 301 - 310 of 511 for Never (0.01 sec)
-
guava/src/com/google/common/collect/ArrayTable.java
* to the number of allowed column keys */ public @Nullable V at(int rowIndex, int columnIndex) { // In GWT array access never throws IndexOutOfBoundsException. checkElementIndex(rowIndex, rowList.size()); checkElementIndex(columnIndex, columnList.size()); return array[rowIndex][columnIndex]; } /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 13 19:39:21 UTC 2025 - 26.8K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/cache/CacheInterceptor.kt
} /** * Returns a new source that writes bytes to [cacheRequest] as they are read by the source * consumer. This is careful to discard bytes left over when the stream is closed; otherwise we * may never exhaust the source stream and therefore not complete the cached response. */ @Throws(IOException::class) private fun cacheWritingResponse( cacheRequest: CacheRequest?, response: Response,
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 10.3K bytes - Viewed (0) -
doc/go_mem.html
(at least not without direct knowledge of the precise behavior of <code>f</code>): </p> <pre> f() i := *p *q = 1 </pre> <p> If the call never returned, then once again the original program would never access <code>*p</code> or <code>*q</code>, but the rewritten program would. And if the call contained synchronizing operations, then the original program
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Aug 05 15:41:37 UTC 2025 - 26.6K bytes - Viewed (0) -
cmd/metacache-set.go
// When unset listPath will set this based on Prefix BaseDir string // Scan/return only content with prefix. Prefix string // FilterPrefix will return only results with this prefix when scanning. // Should never contain a slash. // Prefix should still be set. FilterPrefix string // Marker to resume listing. // The response will be the first entry >= this object name. Marker string // Limit the number of results.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 30.7K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java
* * lockA.lock(); // reentrant acquisition is okay * } * * <p>It is the responsibility of the application to ensure that multiple lock instances with the * same rank are never acquired in the same thread. * * @param <E> The Enum type representing the explicit lock ordering. * @since 13.0 */ public static final class WithExplicitOrdering<E extends Enum<E>>
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Fri Jul 18 15:05:43 UTC 2025 - 35.9K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Headers.kt
* simplifies use of single-valued fields whose values routinely contain commas, such as cookies or * dates. * * This class trims whitespace from values. It never returns values with leading or trailing * whitespace. * * Instances of this class are immutable. Use [Builder] to create instances. */ @Suppress("NAME_SHADOWING") class Headers internal constructor(
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue May 27 14:51:25 UTC 2025 - 11.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
} } static { theUnsafe = getUnsafe(); BYTE_ARRAY_BASE_OFFSET = theUnsafe.arrayBaseOffset(byte[].class); // sanity check - this should never fail if (theUnsafe.arrayIndexScale(byte[].class) != 1) { throw new AssertionError(); } } } /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 12 03:49:18 UTC 2025 - 12.3K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
### Check the password { #check-the-password } At this point we have the user data from our database, but we haven't checked the password. Let's put that data in the Pydantic `UserInDB` model first. You should never save plaintext passwords, so, we'll use the (fake) password hashing system. If the passwords don't match, we return the same error. #### Password hashing { #password-hashing }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
src/bytes/bytes_test.go
if p != j { t.Errorf("IndexByte(%q, %d) = %d", b[i:i+15], 100+j, p) } } for j := 0; j < 15; j++ { b[i+j] = 0 } } // Make sure matches outside the slice never trigger. for i := 0; i <= len(b)-15; i++ { for j := 0; j < 15; j++ { b[i+j] = 1 } for j := 0; j < 15; j++ { p := IndexByte(b[i:i+15], byte(0)) if p != -1 {
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon Jul 28 18:13:58 UTC 2025 - 62.9K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/BloomFilterStrategies.java
* close *estimate* of the actual number of bits set. It's not possible to do better than an * estimate without locking. Note that the number, if not exactly accurate, is *always* * underestimating, never overestimating. */ long bitCount() { return bitCount.sum(); } LockFreeBitArray copy() { return new LockFreeBitArray(toPlainArray(data)); } /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 10.6K bytes - Viewed (0)