- Sort Score
- Num 10 results
- Language All
Results 291 - 300 of 418 for badBic (0.04 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessTimeResourceProviderTest.java
FessTimeResourceProvider provider1 = new FessTimeResourceProvider(mockConfig); FessTimeResourceProvider provider2 = new FessTimeResourceProvider(mockConfig); // Test basic object equality assertNotSame(provider1, provider2); assertEquals(provider1, provider1); // Self equality assertFalse(provider1.equals(null)); // Null check
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 17.8K bytes - Click Count (0) -
guava/src/com/google/common/base/Stopwatch.java
* reasonably accurate values are sufficient. If the uncommon case that you need to maximize * accuracy, use {@code System.nanoTime()} directly instead. * * <p>Basic usage: * * {@snippet : * Stopwatch stopwatch = Stopwatch.createStarted(); * doSomething(); * stopwatch.stop(); // optional * * Duration duration = stopwatch.elapsed(); *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Oct 08 18:55:33 GMT 2025 - 9.2K bytes - Click Count (0) -
guava-tests/test/com/google/common/util/concurrent/JSR166TestCase.java
* to check these for the most central aspects of functionality.) So, most tests use the * smallest sensible numbers of threads, collection sizes, etc needed to check basic * conformance. * <li>The test classes currently do not declare inclusion in any particular package to simplify * things for people integrating them in TCK test suites. * </ul> */ @SuppressWarnings({
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sat Mar 07 02:20:33 GMT 2026 - 8.8K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p>
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/configuration/internal/EnhancedCompositeBeanHelper.java
if (!paramType.getRawType().isInstance(value)) { if (configuration.getChildCount() > 0) { throw new ComponentConfigurationException( "Basic element '" + configuration.getName() + "' must not contain child elements"); } value = convertProperty(beanType, paramType.getRawType(), paramType.getType(), configuration); }Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Wed Nov 12 14:59:46 GMT 2025 - 12.3K bytes - Click Count (0) -
docs/tr/docs/features.md
Güvenlik ve kimlik doğrulama entegredir. Veritabanları veya veri modelleriyle ilgili hiçbir taviz yoktur. OpenAPI’da tanımlanan tüm güvenlik şemaları, şunlar dâhil: * HTTP Basic. * **OAuth2** (ayrıca **JWT token**’larla). Şu eğitime göz atın: [OAuth2 with JWT](tutorial/security/oauth2-jwt.md). * API anahtarları: * Header’larda. * Query parametrelerinde. * Cookie’lerde vb.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/changelogs/changelog_2x.md
<artifactId>logging-interceptor</artifactId> <version>2.6.0</version> </dependency> ``` Configure basic logging like this: ```java HttpLoggingInterceptor loggingInterceptor = new HttpLoggingInterceptor(); loggingInterceptor.setLevel(HttpLoggingInterceptor.Level.BASIC); client.networkInterceptors().add(loggingInterceptor); ```
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 02:19:09 GMT 2022 - 26.6K bytes - Click Count (0) -
guava/src/com/google/common/collect/Range.java
* <i>endpoint</i> value, and the range is considered to be either <i>open</i> (does not include the * endpoint) or <i>closed</i> (includes the endpoint) on that side. With three possibilities on each * side, this yields nine basic types of ranges, enumerated below. (Notation: a square bracket * ({@code [ ]}) indicates that the range is closed on that side; a parenthesis ({@code ( )}) means
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Sep 22 18:35:44 GMT 2025 - 28.3K bytes - Click Count (0) -
src/main/resources/fess_label_es.properties
labels.spnego_login_server_module=Login Server Module labels.spnego_preauth_username=Pre-Auth Username labels.spnego_preauth_password=Pre-Auth Password labels.spnego_allow_basic=Allow Basic Auth labels.spnego_allow_unsecure_basic=Allow Unsecure Basic Auth labels.spnego_prompt_ntlm=Prompt NTLM labels.spnego_allow_localhost=Allow Localhost labels.spnego_allow_delegation=Allow Delegation labels.spnego_exclude_dirs=Exclude Directories
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 11:54:13 GMT 2026 - 54.3K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/DiscreteDomain.java
import org.jspecify.annotations.Nullable; /** * A descriptor for a <i>discrete</i> {@code Comparable} domain such as all {@link Integer} * instances. A discrete domain is one that supports the three basic operations: {@link #next}, * {@link #previous} and {@link #distance}, according to their specifications. The methods {@link * #minValue} and {@link #maxValue} should also be overridden for bounded types. *
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Feb 13 17:34:21 GMT 2025 - 10.4K bytes - Click Count (0)