Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 331 - 340 of 558 for Calling (0.06 seconds)

  1. src/main/java/jcifs/SmbResource.java

         * If no DACL is present, null is returned. If the DACL is empty, an array with 0 elements is returned.
         * <p>
         * Note that this is different from calling <code>getSecurity</code> on a
         * share. There are actually two different ACLs for shares - the ACL on
         * the share and the ACL on the folder being shared.
         * Go to <i>Computer Management</i>
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 28K bytes
    - Click Count (1)
  2. android/guava/src/com/google/common/util/concurrent/CycleDetectingLockFactory.java

     * ReentrantReadWriteLock} instances that detect potential deadlock by checking for cycles in lock
     * acquisition order.
     *
     * <p>Potential deadlocks detected when calling the {@code lock()}, {@code lockInterruptibly()}, or
     * {@code tryLock()} methods will result in the execution of the {@link Policy} specified when
     * creating the factory. The currently available policies are:
     *
     * <ul>
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Wed Apr 01 17:27:13 GMT 2026
    - 36K bytes
    - Click Count (0)
  3. guava/src/com/google/common/collect/Streams.java

       *
       * <p>The resulting stream will only be as long as the shorter of the two input streams; if one
       * stream is longer, its extra elements will be ignored.
       *
       * <p>Note that if you are calling {@link Stream#forEach} on the resulting stream, you might want
       * to consider using {@link #forEachPair} instead of this method.
       *
       * <p><b>Performance note:</b> The resulting stream is not <a
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Feb 23 19:19:10 GMT 2026
    - 36.4K bytes
    - Click Count (0)
  4. guava/src/com/google/common/collect/Ordering.java

       * benchmarking
       * on Open JDK 7, {@link #immutableSortedCopy} generally performs better (in both time and space)
       * than this method, and this method in turn generally performs better than copying the list and
       * calling {@link Collections#sort(List)}.
       */
      // TODO(kevinb): rerun benchmarks including new options
      public <E extends T> List<E> sortedCopy(Iterable<E> elements) {
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Feb 23 19:19:10 GMT 2026
    - 39.4K bytes
    - Click Count (0)
  5. src/main/java/jcifs/smb/SmbSessionImpl.java

                             * Apparently once a successful NTLMSSP login occurs, the
                             * server will return "Access denied" even if a logoff is
                             * sent. Unfortunately calling disconnect() doesn't always
                             * actually shutdown the connection before other threads
                             * have committed themselves (e.g. InterruptTest example).
                             */
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 68.9K bytes
    - Click Count (0)
  6. CONTRIBUTING.md

              implementation is trivial such as with getters and setters, or a
              method just delegates to another object.
           2. However, you should still add Javadoc if there are caveats around
              calling a method that are not immediately obvious from reading the
              method's implementation in isolation.
           3. You can omit Javadoc for simple classes, e.g. where they are a
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Wed Sep 01 07:32:01 GMT 2021
    - 36.5K bytes
    - Click Count (0)
  7. android/guava/src/com/google/common/reflect/TypeToken.java

      }
    
      /**
       * In reflection, {@code Foo<?>.getUpperBounds()[0]} is always {@code Object.class}, even when Foo
       * is defined as {@code Foo<T extends String>}. Thus directly calling {@code <?>.is(String.class)}
       * will return false. To mitigate, we canonicalize wildcards by enforcing the following
       * invariants:
       *
       * <ol>
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Thu Jan 29 22:14:05 GMT 2026
    - 53.8K bytes
    - Click Count (0)
  8. cmd/storage-rest-server.go

    	copy(tmp, b)
    	h.block <- tmp
    	return len(b), h.err
    }
    
    // CloseWithError will close the stream and return the specified error.
    // This can be done several times, but only the first error will be sent.
    // After calling this the stream should not be written to.
    func (h *httpStreamResponse) CloseWithError(err error) {
    	if h.done == nil {
    		return
    	}
    	h.done <- err
    	h.err = err
    	// Indicates that the response is done.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue May 27 15:19:03 GMT 2025
    - 45.7K bytes
    - Click Count (0)
  9. guava/src/com/google/common/collect/ImmutableMap.java

          // a copy of the entries array. Likewise, localSize is the same as size except in that case.
          // It's possible to keep using this Builder after calling buildKeepingLast(), so we need to
          // ensure that its state is not corrupted by removing duplicates that should cause a later
          // buildOrThrow() to fail, or by changing the size.
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Mar 08 16:16:42 GMT 2026
    - 44.7K bytes
    - Click Count (0)
  10. cmd/encryption-v1.go

    // one '-' followed by a 32-bit number.
    // This special case addresses randomly-generated ETags generated
    // by the MinIO server when running in non-compat mode. These
    // random ETags are not encrypt.
    //
    // Calling DecryptETag with a non-randomly generated ETag will
    // fail.
    func DecryptETag(key crypto.ObjectKey, object ObjectInfo) (string, error) {
    	if n := strings.Count(object.ETag, "-"); n > 0 {
    		if n != 1 {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 38K bytes
    - Click Count (0)
Back to Top