- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 535 for dirent (0.04 sec)
-
android/guava-tests/test/com/google/common/hash/MessageDigestHashFunctionTest.java
try { MessageDigest digest = MessageDigest.getInstance(algorithmName); assertEquals( HashCode.fromBytes(digest.digest(input)), ALGORITHMS.get(algorithmName).hashBytes(input)); for (int bytes = 4; bytes <= digest.getDigestLength(); bytes++) { assertEquals( HashCode.fromBytes(Arrays.copyOf(digest.digest(input), bytes)),Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 4.2K bytes - Viewed (0) -
docs/de/docs/features.md
Daher können Sie in vielen Fällen das Objekt eines Requests **direkt zur Datenbank** schicken, weil alles automatisch validiert wird. Das gleiche gilt auch für die andere Richtung: Sie können in vielen Fällen das Objekt aus der Datenbank **direkt zum Client** senden.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Oct 11 17:48:49 UTC 2025 - 10.9K bytes - Viewed (0) -
docs/de/docs/tutorial/testing.md
Dadurch können Sie `pytest` ohne Komplikationen direkt nutzen. /// /// note | Technische Details Sie könnten auch `from starlette.testclient import TestClient` verwenden. **FastAPI** stellt denselben `starlette.testclient` auch via `fastapi.testclient` bereit, als Annehmlichkeit für Sie, den Entwickler. Es kommt aber tatsächlich direkt von Starlette. /// /// tip | Tipp
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 7K bytes - Viewed (0) -
src/main/webapp/css/admin/adminlte.min.css
}.direct-chat-olive .right>.direct-chat-text::after,.direct-chat-olive .right>.direct-chat-text::before{border-left-color:#3d9970}.direct-chat-lime .right>.direct-chat-text{background-color:#01ff70;border-color:#01ff70;color:#1f2d3d}.direct-chat-lime .right>.direct-chat-text::after,.direct-chat-lime .right>.direct-chat-text::before{border-left-color:#01ff70}.direct-chat-fuchsia .right>.direct-chat-text{background-color:#f012be;border-color:#f012be;color:#fff}.direct-chat-fuchsia .right>.direct-c...
Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 1.3M bytes - Viewed (0) -
LICENSES/third_party/forked/golang/LICENSE
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Aug 10 21:37:28 UTC 2021 - 1.4K bytes - Viewed (0) -
LICENSES/vendor/github.com/JeffAshton/win_pdh/LICENSE
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Fri May 08 04:49:00 UTC 2020 - 1.5K bytes - Viewed (0) -
VULNERABILITY_REPORT.md
# Vulnerability Management Policy This document formally describes the process of addressing and managing a reported vulnerability that has been found in the MinIO server code base, any directly connected ecosystem component or a direct / indirect dependency of the code base. ## Scope The vulnerability management policy described in this document covers the process of investigating, assessing and resolving a vulnerability report
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 1.5K bytes - Viewed (0) -
docs/de/docs/tutorial/background-tasks.md
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 5.8K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
JWT kann auch für andere Dinge verwendet werden, abgesehen davon, einen Benutzer zu identifizieren und ihm zu erlauben, Operationen direkt auf Ihrer API auszuführen. Sie könnten beispielsweise ein „Auto“ oder einen „Blog-Beitrag“ identifizieren.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Oct 01 15:19:54 UTC 2025 - 12.7K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/rdma/disni/DisniMemoryRegion.java
return keyGenerator.getAndIncrement(); } @Override protected long getBufferAddress(ByteBuffer buffer) { // In real implementation, this would get the native memory address: // For direct ByteBuffers, this could be obtained through unsafe operations // or DiSNI-specific methods if (buffer.isDirect()) { // Assign a unique address to each buffer instance
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 23 05:11:12 UTC 2025 - 5.3K bytes - Viewed (0)