- Sort Score
- Num 10 results
- Language All
Results 171 - 180 of 250 for SEQUENCE (0.23 seconds)
-
guava/src/com/google/common/base/Strings.java
* Preconditions} class use this formatter, for both of the reasons just discussed. * * <p><b>Warning:</b> Only the exact two-character placeholder sequence {@code "%s"} is * recognized. * * @param template a string containing zero or more {@code "%s"} placeholder sequences. {@code * null} is treated as the four-character string {@code "null"}.Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jan 29 22:14:05 GMT 2026 - 12.5K bytes - Click Count (0) -
cmd/encryption-v1.go
type DecryptBlocksReader struct { // Source of the encrypted content that will be decrypted reader io.Reader // Current decrypter for the current encrypted data block decrypter io.Reader // Start sequence number startSeqNum uint32 // Current part index partIndex int // Parts information parts []ObjectPartInfo objectEncryptionKey []byte partDecRelOffset, partEncRelOffset int64 }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 38K bytes - Click Count (0) -
android/guava/src/com/google/common/primitives/Doubles.java
* * <p>Note that this always returns {@code -1} when {@code target} contains {@code NaN}. * * @param array the array to search for the sequence {@code target} * @param target the array to search for as a sub-sequence of {@code array} */ public static int indexOf(double[] array, double[] target) { checkNotNull(array, "array"); checkNotNull(target, "target");Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 23 16:38:16 GMT 2026 - 27.8K bytes - Click Count (0) -
android/guava/src/com/google/common/eventbus/EventBus.java
* superclasses, and all interfaces implemented by superclasses. * * <p>When {@code post} is called, all registered subscribers for an event are run in sequence, so * subscribers should be reasonably quick. If an event may trigger an extended process (such as a * database load), spawn a thread or queue it for later. (For a convenient way to do this, use an * {@link AsyncEventBus}.)Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Dec 21 03:10:51 GMT 2024 - 12.7K bytes - Click Count (0) -
cmd/signature-v4.go
// according to the AWS S3 signature V4 spec. func compareSignatureV4(sig1, sig2 string) bool { // The CTC using []byte(str) works because the hex encoding // is unique for a sequence of bytes. See also compareSignatureV2. return subtle.ConstantTimeCompare([]byte(sig1), []byte(sig2)) == 1 } // doesPolicySignatureMatch - Verify query headers with post policy
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Dec 13 22:19:12 GMT 2024 - 12.4K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* they've confirmed that the owner of the private key is also the owner of the certificate's * other properties. * * Certificates are signed by other certificates and a sequence of them is called a certificate * chain. The chain terminates in a self-signed "root" certificate. Signing certificates in the * middle of the chain are called "intermediates". Organizations that offer certificate signing are
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 21.6K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/ServerMessageBlock.java
public final void setUid(final int uid) { this.uid = uid; } /** * Gets the signature sequence number * @return the signSeq */ public int getSignSeq() { return this.signSeq; } /** * Sets the signature sequence number * @param signSeq * the signSeq to set */ public final void setSignSeq(final int signSeq) {
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 38.9K bytes - Click Count (0) -
src/test/java/jcifs/smb/SmbResourceLocatorImplTest.java
when(config.isIpcSigningEnforced()).thenReturn(true); when(creds.isAnonymous()).thenReturn(true); assertFalse(ipc.shouldForceSigning()); // Verify interactions sequence for one call InOrder inOrder = inOrder(config, creds); ipc = locator("smb://server/IPC$/"); ipc.shouldForceSigning(); inOrder.verify(config, atLeastOnce()).isIpcSigningEnforced();
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 17.6K bytes - Click Count (0) -
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
## Execution of dependencies with `yield` { #execution-of-dependencies-with-yield } The sequence of execution is more or less like this diagram. Time flows from top to bottom. And each column is one of the parts interacting or executing code. ```mermaid sequenceDiagram participant client as ClientCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 12.6K bytes - Click Count (0)