Search Options

Results per page
Sort
Preferred Languages
Advance

Results 321 - 330 of 529 for fetches (0.26 sec)

  1. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnectionPool.kt

        //     we find them, regardless of what the address policies need.
        //
        //  2. EVICTABLE: Connections not required by any address policy. This matches connections that
        //     don't participate in any policy, plus connections whose policies won't be violated if the
        //     connection is closed. We only close these if the idle connection limit is exceeded.
        //
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Oct 08 03:50:05 UTC 2025
    - 11.1K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

                key = encrypt ? getEncryptionKey() : getDecryptionKey();
                keyCopy = Arrays.copyOf(key, key.length);
    
                // Validate key length matches expected cipher requirements
                if (keyCopy.length != keyLength) {
                    throw new IllegalArgumentException("Key length mismatch: expected " + keyLength + ", got " + keyCopy.length);
                }
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  3. docs/de/docs/virtual-environments.md

    ```console
    $ python -m venv .venv
    ```
    
    </div>
    
    /// details | Was dieser Befehl bedeutet
    
    * `python`: das Programm namens `python` verwenden
    * `-m`: ein Modul als Skript aufrufen, wir geben als nächstes an, welches Modul
    * `venv`: das Modul namens `venv` verwenden, das normalerweise mit Python installiert wird
    * `.venv`: die virtuelle Umgebung im neuen Verzeichnis `.venv` erstellen
    
    ///
    
    ////
    
    //// tab | `uv`
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 02 17:32:56 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  4. src/test/java/org/codelibs/curl/CurlTest.java

            // ## Act & Assert ##
            assertTrue(Curl.tmpDir.exists());
        }
    
        @Test
        public void test_TmpDirMatchesSystemProperty() {
            // ## Test that tmpDir matches system property ##
    
            // ## Act ##
            final String systemTmpDir = System.getProperty("java.io.tmpdir");
            final String curlTmpDir = Curl.tmpDir.getAbsolutePath();
    
            // ## Assert ##
    Registered: Sat Dec 20 09:13:53 UTC 2025
    - Last Modified: Thu Nov 20 13:34:13 UTC 2025
    - 16.3K bytes
    - Viewed (0)
  5. cmd/erasure-healing-common.go

    		dataErrsByPart[i] = make([]int, len(onlineDisks))
    	}
    
    	inconsistent := 0
    	for i, meta := range partsMetadata {
    		if !meta.IsValid() {
    			// Since for majority of the cases erasure.Index matches with erasure.Distribution we can
    			// consider the offline disks as consistent.
    			continue
    		}
    		if !meta.Deleted {
    			if len(meta.Erasure.Distribution) != len(onlineDisks) {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 12K bytes
    - Viewed (0)
  6. SECURITY.md

    potentially exploit a vulnerability in the TensorFlow code that handles videos,
    which could allow them to execute arbitrary code on the system running
    TensorFlow.
    
    It is important to keep TensorFlow up to date with the latest security patches
    and follow the sandboxing guideline above to protect against these types of
    vulnerabilities.
    
    ## Security properties of execution modes
    
    TensorFlow has several execution modes, with Eager-mode being the default in v2.
    Registered: Tue Dec 30 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  7. src/test/java/jcifs/internal/smb2/io/Smb2FlushRequestTest.java

            System.arraycopy(buffer, 8, copiedFileId, 0, 16);
            assertArrayEquals(expectedFileId, copiedFileId);
        }
    
        @Test
        @DisplayName("Test wire format structure matches SMB2 specification")
        void testWireFormatStructure() {
            byte[] buffer = new byte[256];
            Arrays.fill(buffer, (byte) 0xCC); // Fill with pattern to detect unwritten areas
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 11.5K bytes
    - Viewed (0)
  8. src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoResponseTest.java

            // Decode
            response.decode(buffer, 0, 24);
    
            // Get the server GUID
            byte[] returnedGuid = response.getServerGuid();
    
            // Verify it matches original
            assertArrayEquals(originalGuid, returnedGuid, "Returned GUID should match original");
    
            // Test that the same reference is returned (implementation detail)
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10.8K bytes
    - Viewed (0)
  9. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/HtmlXpathExtractor.java

     * It also provides methods to add custom features and properties to the {@link DOMParser}.
     * </p>
     * <p>
     * The encoding of the HTML document is automatically detected using a regular expression that matches the charset attribute in the meta tag.
     * </p>
     *
     */
    public class HtmlXpathExtractor extends AbstractXmlExtractor {
        /**
    Registered: Sat Dec 20 11:21:39 UTC 2025
    - Last Modified: Sat Oct 04 08:47:19 UTC 2025
    - 10.4K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * available online).
     * <p>
     * Direct ACEs are evaluated first in order. The SID of the user performing
     * the operation and the desired access bits are compared to the SID
     * and access mask of each ACE. If the SID matches, the allow/deny flags
     * and access mask are considered. If the ACE is a "deny"
     * ACE and <i>any</i> of the desired access bits match bits in the access
     * mask of the ACE, the whole access check fails. If the ACE is an "allow"
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
Back to top