Search Options

Results per page
Sort
Preferred Languages
Advance

Results 251 - 260 of 381 for Gladding (0.87 sec)

  1. src/main/java/jcifs/dcerpc/ndr/NdrBuffer.java

            return this.buf;
        }
    
        /**
         * Aligns the buffer index to the specified boundary with a fill value.
         *
         * @param boundary the alignment boundary
         * @param value the fill value for padding
         * @return the number of bytes added for alignment
         */
        public int align(final int boundary, final byte value) {
            final int n = align(boundary);
            int i = n;
            while (i > 0) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 10.7K bytes
    - Viewed (0)
  2. guava/src/com/google/common/collect/AbstractMapBasedMultimap.java

     * replace an existing pair with the same key and value, if such a pair is present. With collections
     * like {@link List} that allow duplicates, the collection will keep the existing key-value pairs
     * while adding a new pair.
     *
     * <p>This class is not threadsafe when any concurrent operations update the multimap, even if the
     * underlying map and {@link #createCollection()} method return threadsafe classes. Concurrent read
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Aug 12 15:51:57 UTC 2025
    - 48.2K bytes
    - Viewed (0)
  3. android/guava-tests/test/com/google/common/graph/AbstractStandardDirectedGraphTest.java

        putEdge(5, 1);
        putEdge(1, 2);
        putEdge(3, 1);
      }
    
      // Element Mutation
    
      @Test
      public void putEdge_existingNodes() {
        assume().that(graphIsMutable()).isTrue();
    
        // Adding nodes initially for safety (insulating from possible future
        // modifications to proxy methods)
        addNode(N1);
        addNode(N2);
    
        assertThat(graphAsMutableGraph.putEdge(N1, N2)).isTrue();
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 13.9K bytes
    - Viewed (0)
  4. src/archive/tar/common.go

    	paxGNUSparseRealSize  = "GNU.sparse.realsize"
    )
    
    // basicKeys is a set of the PAX keys for which we have built-in support.
    // This does not contain "charset" or "comment", which are both PAX-specific,
    // so adding them as first-class features of Header is unlikely.
    // Users can use the PAXRecords field to set it themselves.
    var basicKeys = map[string]bool{
    	paxPath: true, paxLinkpath: true, paxSize: true, paxUid: true, paxGid: true,
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Sep 13 21:03:27 UTC 2024
    - 24.5K bytes
    - Viewed (0)
  5. src/test/java/jcifs/internal/smb2/Smb2SigningDigestTest.java

                assertTrue(result, "Should return true for valid signature with offset");
            }
    
            @Test
            @DisplayName("Should handle extra padding")
            void testVerifyWithExtraPadding() {
                // Set signed flag
                SMBUtil.writeInt4(ServerMessageBlock2.SMB2_FLAGS_SIGNED, data, 16);
    
                // Place some signature
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 43.7K bytes
    - Viewed (0)
  6. guava-gwt/pom.xml

                One way to eliminate the warnings is to make base.testModule include the not really
                necessary <inherits> lines for c.g.c.collect.testModule, etc. However, adding <inherits>
                lines could make c.g.c.base.testModule transitively inherit from extra modules. If some
                of those modules are ones that it uses but forgets to list in its own <inherits>, we'd
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Sep 04 21:35:58 UTC 2025
    - 19.4K bytes
    - Viewed (0)
  7. src/main/webapp/js/jquery-3.7.1.min.js

    "):t}function it(e,t,n,r,i,o){var a="width"===t?1:0,s=0,u=0,l=0;if(n===(r?"border":"content"))return 0;for(;a<4;a+=2)"margin"===n&&(l+=ce.css(e,n+Q[a],!0,i)),r?("content"===n&&(u-=ce.css(e,"padding"+Q[a],!0,i)),"margin"!==n&&(u-=ce.css(e,"border"+Q[a]+"Width",!0,i))):(u+=ce.css(e,"padding"+Q[a],!0,i),"padding"!==n?u+=ce.css(e,"border"+Q[a]+"Width",!0,i):s+=ce.css(e,"border"+Q[a]+"Width",!0,i));return!r&&0<=o&&(u+=Math.max(0,Math.ceil(e["offset"+t[0].toUpperCase()+t.slice(1)]-o-u-s-.5))||0),u+l}function...
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Oct 26 01:07:52 UTC 2024
    - 85.5K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/collect/Table.java

    @DoNotMock("Use ImmutableTable, HashBasedTable, or another implementation")
    @GwtCompatible
    public interface Table<
        R extends @Nullable Object, C extends @Nullable Object, V extends @Nullable Object> {
      // TODO(jlevy): Consider adding methods similar to ConcurrentMap methods.
    
      // Accessors
    
      /**
       * Returns {@code true} if the table contains a mapping with the specified row and column keys.
       *
       * @param rowKey key of row to search for
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  9. docs/bucket/replication/DESIGN.md

    to allow both DeleteMarker replication and replication of versioned deletes with the `DeleteMarkerReplication` and `DeleteReplication` fields in the replication configuration. By default, this is set to `Disabled` unless the user specifies it while adding a replication rule.
    
    Similar to object version replication, DeleteMarker replication also cycles through `PENDING` to `COMPLETED` or `FAILED` states for the `X-Amz-Replication-Status` on the source when a delete marker is set (i.e. performing...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 14.7K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    And we return the scopes as part of the JWT token.
    
    /// danger
    
    For simplicity, here we are just adding the scopes received directly to the token.
    
    But in your application, for security, you should make sure you only add the scopes that the user is actually able to have, or the ones you have predefined.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
Back to top