- Sort Score
- Result 10 results
- Languages All
Results 201 - 210 of 287 for olinger (0.08 sec)
-
android/guava/src/com/google/common/primitives/ImmutableLongArray.java
} // TODO(kevinb): go up to 11? /** * Returns an immutable array containing the given values, in order. * * <p>The array {@code rest} must not be longer than {@code Integer.MAX_VALUE - 1}. */ // Use (first, rest) so that `of(someLongArray)` won't compile (they should use copyOf), which is // okay since we have to copy the just-created array anyway.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 22.3K bytes - Viewed (0) -
guava-tests/test/com/google/common/reflect/InvokableTest.java
@AndroidIncompatible // lots of failures, possibly some related to bad equals() implementations? public class InvokableTest extends TestCase { // Historically Invokable inherited from java.lang.reflect.AccessibleObject. That's no longer the // case, but we do check that its API still has the same public methods. We exclude some methods // that were added in Java 9 and that people probably weren't calling via Invokable, namely
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 30.7K bytes - Viewed (0) -
guava/src/com/google/common/primitives/ImmutableIntArray.java
} // TODO(kevinb): go up to 11? /** * Returns an immutable array containing the given values, in order. * * <p>The array {@code rest} must not be longer than {@code Integer.MAX_VALUE - 1}. */ // Use (first, rest) so that `of(someIntArray)` won't compile (they should use copyOf), which is // okay since we have to copy the just-created array anyway.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 18:05:56 UTC 2024 - 21.4K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* are called <i>cryptographic hash functions</i>. But, whenever it is learned that either of * these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 25 18:22:59 UTC 2021 - 10.9K bytes - Viewed (0) -
docs/fr/docs/contributing.md
## Développement Si vous avez déjà cloné le dépôt et que vous savez que vous devez vous plonger dans le code, voici quelques directives pour mettre en place votre environnement. ### Environnement virtuel avec `venv` Vous pouvez créer un environnement virtuel dans un répertoire en utilisant le module `venv` de Python :
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Tue Aug 06 04:48:30 UTC 2024 - 16.2K bytes - Viewed (0) -
src/bufio/scan.go
// yet hold a complete token, for instance if it has no newline while // scanning lines, a [SplitFunc] can return (0, nil, nil) to signal the // [Scanner] to read more data into the slice and try again with a // longer slice starting at the same point in the input. // // The function is never called with an empty data slice unless atEOF // is true. If atEOF is true, however, data may be non-empty and, // as always, holds unprocessed text.
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Oct 23 09:06:30 UTC 2023 - 14.2K bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/riscv64.s
JMP 2(PC) // 6f008000 JMP (X5) // 67800200 JMP 4(X5) // 67804200 // CALL and JMP to symbol are encoded as JAL (using LR or ZERO // respectively), with a R_RISCV_JAL relocation. The linker resolves // the real address and updates the immediate, using a trampoline in // the case where the address is not directly reachable. CALL asmtest(SB) // ef000000 JMP asmtest(SB) // 6f000000
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Fri Oct 25 12:05:29 UTC 2024 - 16.8K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.26.md
- Kube-apiserver: redirect responses are no longer returned from backends by default. Set `--aggregator-reject-forwarding-redirect=false` to continue forwarding redirect responses. ([#112193](https://github.com/kubernetes/kubernetes/pull/112193), [@jindijamie](https://github.com/jindijamie)) [SIG API Machinery and Testing]
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Thu Mar 14 16:24:51 UTC 2024 - 425.7K bytes - Viewed (0) -
src/main/java/jcifs/http/NetworkExplorer.java
ssn.removeAttribute("npa-" + server); } if ( sae.getNtStatus() == NtStatus.NT_STATUS_ACCESS_VIOLATION ) { /* * Server challenge no longer valid for * externally supplied password hashes. */ resp.sendRedirect(req.getRequestURL().toString()); return; }
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 21.3K bytes - Viewed (0)