- Sort Score
- Result 10 results
- Languages All
Results 2611 - 2620 of 7,879 for To (0.02 sec)
-
cmd/encryption-v1.go
if err != nil { return encryptedETag } return hex.EncodeToString(etagBytes) } // GetDecryptedRange - To decrypt the range (off, length) of the // decrypted object stream, we need to read the range (encOff, // encLength) of the encrypted object stream to decrypt it, and // compute skipLen, the number of bytes to skip in the beginning of // the encrypted range. // // In addition we also compute the object part number for where theRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 37.8K bytes - Viewed (0) -
cmd/erasure-server-pool-decom.go
} // However many we ask, versions must exist on ~50% listingQuorum := (set.setDriveCount + 1) / 2 // How to resolve partial results. resolver := metadataResolutionParams{ dirQuorum: listingQuorum, // make sure to capture all quorum ratios objQuorum: listingQuorum, // make sure to capture all quorum ratios bucket: bi.Name, } err := listPathRaw(ctx, listPathRawOptions{ disks: disks,Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 42.1K bytes - Viewed (1) -
LICENSE
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectivelyRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 33.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ForwardingMultiset.java
* to forward to this implementation. * * @since 7.0 */ @Override protected boolean standardRemoveAll(Collection<?> elementsToRemove) { return Multisets.removeAllImpl(this, elementsToRemove); } /** * A sensible definition of {@link #retainAll} in terms of the {@code retainAll} method of {@link
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 10.3K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* most key spaces are ANYTHING BUT uniformly distributed. A bit(i) in the input is said to * 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 25.6K bytes - Viewed (0) -
cmd/os_unix.go
} typ = fi.Mode() & os.ModeType } if err = fn(string(name), typ); err == errDoneForNow { // fn() requested to return by caller. return nil } } return err } // Return count entries at the directory dirPath and all entries // if count is set to -1 func readDirWithOpts(dirPath string, opts readDirOpts) (entries []string, err error) { fd, err := openFileWithFD(dirPath, readMode, 0o666)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 9.3K bytes - Viewed (0) -
cmd/peer-rest-client.go
return nil } gridConn.Store(gc) return gc }, } } // Wrapper to restClient.Call to handle network errors, in case of network error the connection is marked disconnected // permanently. The only way to restore the connection is at the xl-sets layer by xlsets.monitorAndConnectEndpoints() // after verifying format.json
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Sep 09 16:58:30 UTC 2024 - 26.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/netbios/NodeStatusResponse.java
private byte[] stats; NbtAddress[] addressArray; /* It is a little awkward but prudent to pass the quering address * so that it may be included in the list of results. IOW we do * not want to create a new NbtAddress object for this particular * address from which the query is constructed, we want to populate * the data of the existing address that should be one of several * returned by the node status.
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 5.8K bytes - Viewed (0) -
src/main/java/jcifs/netbios/Lmhosts.java
* not throw an {@link java.net.UnknownHostException} because this * is queried frequently and exceptions would be rather costly to * throw on a regular basis here. * * @param host the hostname to resolve * @param tc the CIFS context * @return resolved name, null if not found */ public synchronized NbtAddress getByName(final String host, final CIFSContext tc) {Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 6.3K bytes - Viewed (0) -
compat/maven-compat/src/test/java/org/apache/maven/project/AbstractMavenProjectTestCase.java
/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at *
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Jun 06 20:01:00 UTC 2025 - 7.2K bytes - Viewed (0)