- Sort Score
- Num 10 results
- Language All
Results 301 - 310 of 522 for reusing (0.05 seconds)
-
src/test/java/jcifs/internal/smb2/tree/Smb2TreeConnectResponseTest.java
assertEquals(0xFFFFFFFF, response.getCapabilities()); assertEquals(0xFFFFFFFF, response.getMaximalAccess()); } @Test @DisplayName("Should handle buffer too small for reading") void testBufferTooSmall() { // Given byte[] buffer = new byte[15]; // Too small for 16-byte structure SMBUtil.writeInt2(16, buffer, 0); // When & Then
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 19.3K bytes - Click Count (0) -
guava/src/com/google/common/io/CharStreams.java
* Reads all of the lines from a {@link Readable} object. The lines do not include * line-termination characters, but do include other leading and trailing whitespace. * * <p>Does not close the {@code Readable}. If reading files or resources you should use the {@link * Files#readLines} and {@link Resources#readLines} methods. * * <p>This method prioritizes convenience over performance: It reads the entire input into memoryCreated: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 29 13:56:24 GMT 2025 - 11.9K bytes - Click Count (0) -
docs/ru/docs/advanced/settings.md
После этого можно протестировать, что он используется. ## Чтение файла `.env` { #reading-a-env-file } Если у вас много настроек, которые могут часто меняться, возможно в разных окружениях, может быть удобно поместить их в файл и читать оттуда как переменные окружения.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 18.3K bytes - Click Count (0) -
internal/s3select/csv/reader.go
} // We don't need the input any more. //nolint:staticcheck // SA6002 Using pointer would allocate more since we would have to copy slice header before taking a pointer. r.bufferPool.Put(in.input) in.input = nil in.dst <- all } }() } return nil } // NewReader - creates new CSV reader using readCloser. func NewReader(readCloser io.ReadCloser, args *ReaderArgs) (*Reader, error) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue May 27 15:19:03 GMT 2025 - 8.8K bytes - Click Count (0) -
fess-crawler/src/main/java/org/codelibs/fess/net/protocol/gcs/Handler.java
} } /** * Gets an input stream to read from the GCS object. * * @return An input stream for reading the object content * @throws IOException If the object cannot be accessed */ @Override public InputStream getInputStream() throws IOException { if (!connected) {Created: Sat Dec 20 11:21:39 GMT 2025 - Last Modified: Thu Dec 11 08:38:29 GMT 2025 - 9.6K bytes - Click Count (0) -
fess-crawler/src/main/java/org/codelibs/fess/net/protocol/s3/Handler.java
} } /** * Gets an input stream to read from the S3 object. * * @return An input stream for reading the object content * @throws IOException If the object cannot be accessed */ @Override public InputStream getInputStream() throws IOException { if (!connected) {Created: Sat Dec 20 11:21:39 GMT 2025 - Last Modified: Thu Dec 11 07:57:44 GMT 2025 - 9.5K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/ws/WebSocketReader.kt
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Nov 04 16:11:23 GMT 2025 - 10K bytes - Click Count (0) -
src/test/java/jcifs/internal/util/SMBUtilTest.java
// Test zero time separately - it's handled specially SMBUtil.writeTime(0L, buffer, 0); long readTime = SMBUtil.readTime(buffer, 0); // When writing 0, it writes 0 directly, and when reading 0, it returns negative offset assertEquals(-SmbConstants.MILLISECONDS_BETWEEN_1970_AND_1601, readTime); } @Test void testUTimeConversionRoundTrip() {Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 11.1K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoResponseTest.java
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 10.8K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.8K bytes - Click Count (0)