Search Options

Results per page
Sort
Preferred Languages
Advance

Results 531 - 540 of 1,053 for alla (0.08 sec)

  1. api/go1.23.txt

    pkg iter, type Seq2[$0 interface{}, $1 interface{}] func(func($0, $1) bool) #61897
    pkg iter, type Seq[$0 interface{}] func(func($0) bool) #61897
    pkg maps, func All[$0 interface{ ~map[$1]$2 }, $1 comparable, $2 interface{}]($0) iter.Seq2[$1, $2] #61900
    pkg maps, func Collect[$0 comparable, $1 interface{}](iter.Seq2[$0, $1]) map[$0]$1 #61900
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Jun 25 17:08:08 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  2. src/bufio/bufio_test.go

    	0, minReadBufferSize, 23, 32, 46, 64, 93, 128, 1024, 4096,
    }
    
    func TestReader(t *testing.T) {
    	var texts [31]string
    	str := ""
    	all := ""
    	for i := 0; i < len(texts)-1; i++ {
    		texts[i] = str + "\n"
    		all += texts[i]
    		str += string(rune(i%26 + 'a'))
    	}
    	texts[len(texts)-1] = all
    
    	for h := 0; h < len(texts); h++ {
    		text := texts[h]
    		for i := 0; i < len(readMakers); i++ {
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 07 01:08:54 UTC 2025
    - 51.6K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/collect/MultimapBuilder.java

       *
       * <p>The collections returned by {@link Multimap#keySet()}, {@link Multimap#keys()}, and {@link
       * Multimap#asMap()} will iterate through the keys in the order that they were first added to the
       * multimap, save that if all values associated with a key are removed and then the key is added
       * back into the multimap, that key will come last in the key iteration order.
       */
      public static MultimapBuilderWithKeys<@Nullable Object> linkedHashKeys() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Jul 16 17:42:14 UTC 2025
    - 18K bytes
    - Viewed (0)
  4. guava/src/com/google/common/collect/MultimapBuilder.java

       *
       * <p>The collections returned by {@link Multimap#keySet()}, {@link Multimap#keys()}, and {@link
       * Multimap#asMap()} will iterate through the keys in the order that they were first added to the
       * multimap, save that if all values associated with a key are removed and then the key is added
       * back into the multimap, that key will come last in the key iteration order.
       */
      public static MultimapBuilderWithKeys<@Nullable Object> linkedHashKeys() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Jul 16 17:42:14 UTC 2025
    - 18K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/util/DES.java

    // HIGH RISK ACTIVITIES.
    //
    //
    // The rest is:
    //
    // Copyright (C) 1996 by Jef Poskanzer <******@****.***>.  All rights reserved.
    //
    // Copyright (C) 1996 by Wolfgang Platzer
    // email: ******@****.***
    //
    // All rights reserved.
    //
    // Redistribution and use in source and binary forms, with or without
    // modification, are permitted provided that the following conditions
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 22.7K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/query-params-str-validations.md

    * `^`: starts with the following characters, doesn't have characters before.
    * `fixedquery`: has the exact value `fixedquery`.
    * `$`: ends there, doesn't have any more characters after `fixedquery`.
    
    If you feel lost with all these **"regular expression"** ideas, don't worry. They are a hard topic for many people. You can still do a lot of stuff without needing regular expressions yet.
    
    Now you know that whenever you need them you can use them in **FastAPI**.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 17.2K bytes
    - Viewed (0)
  7. guava/src/com/google/common/collect/ArrayTable.java

      }
    
      // TODO(jlevy): Add eraseRow and eraseColumn methods?
    
      @Override
      public int size() {
        return rowList.size() * columnList.size();
      }
    
      /**
       * Returns an unmodifiable set of all row key / column key / value triplets. Changes to the table
       * will update the returned set.
       *
       * <p>The returned set's iterator traverses the mappings with the first row key, the mappings with
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 13 19:39:21 UTC 2025
    - 26.8K bytes
    - Viewed (0)
  8. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

        /**
         * Constant-time array copy to prevent timing attacks
         */
        private void constantTimeCopy(byte[] src, int srcPos, byte[] dest, int destPos, int length) {
            // Simple constant-time copy - always process all bytes
            for (int i = 0; i < length; i++) {
                dest[destPos + i] = src[srcPos + i];
            }
        }
    
        /**
         * Decrypt an SMB2 message
         *
         * @param encryptedMessage
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 35.5K bytes
    - Viewed (0)
  9. guava-gwt/src-super/com/google/common/util/concurrent/super/com/google/common/util/concurrent/AggregateFutureState.java

    abstract class AggregateFutureState<OutputT extends @Nullable Object>
        extends AbstractFuture.TrustedFuture<OutputT> {
      // Lazily initialized the first time we see an exception; not released until all the input futures
      // & this future completes. Released when the future releases the reference to the running state
      private @Nullable Set<Throwable> seenExceptions = null;
      private int remaining;
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 1.7K bytes
    - Viewed (0)
  10. SECURITY.md

    ## Reporting a Vulnerability
    
    If you think you found a vulnerability, and even if you are not sure about it, please report it right away by sending an email to: ******@****.***. Please try to be as explicit as possible, describing all the steps and example code to reproduce the security issue.
    
    I (the author, [@tiangolo](https://x.com/tiangolo)) will review it thoroughly and get back to you.
    
    ## Public Discussions
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 1.3K bytes
    - Viewed (0)
Back to top