- Sort Score
- Result 10 results
- Languages All
Results 591 - 600 of 1,040 for each (0.02 sec)
-
src/test/java/jcifs/netbios/SessionRequestPacketTest.java
byte[] dst = new byte[256]; int bytesWritten = packet.writeTrailerWireFormat(dst, 0); assertTrue(bytesWritten > 0); // Each name should write at least 34 bytes (encoded name + scope) assertTrue(bytesWritten >= 68); } @Test @DisplayName("writeTrailerWireFormat with scope should handle scoped names")Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 11.5K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/AbstractStringBasedModelInterpolator.java
} return model; } /** * Interpolates all expressions in the src parameter. * <p> * The algorithm used for each expression is: * <ul> * <li>If it starts with either "pom." or "project.", the expression is evaluated against the model.</li> * <li>If the value is null, get the value from the context.</li>Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Fri Jun 06 14:28:57 UTC 2025 - 13.6K bytes - Viewed (0) -
docs/en/docs/tutorial/body-nested-models.md
And whenever you output that data, even if the source had duplicates, it will be output as a set of unique items. And it will be annotated / documented accordingly too. ## Nested Models { #nested-models } Each attribute of a Pydantic model has a type. But that type can itself be another Pydantic model. So, you can declare deeply nested JSON "objects" with specific attribute names, types and validations.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.3K bytes - Viewed (0) -
cmd/erasure-coding.go
failOnErr(err) encoded, err := e.EncodeData(GlobalContext, testData[:]) failOnErr(err) hash := xxhash.New() for i, data := range encoded { // Write index to keep track of sizes of each. _, err = hash.Write([]byte{byte(i)}) failOnErr(err) _, err = hash.Write(data) failOnErr(err) got[conf] = map[ErasureAlgo]uint64{algo: hash.Sum64()} }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8.5K bytes - Viewed (0) -
src/main/java/org/codelibs/curl/Curl.java
*/ package org.codelibs.curl; import java.io.File; /** * The Curl class provides a simple interface for creating HTTP requests using various HTTP methods. * It includes static methods for each HTTP method that return a CurlRequest object. * * <p>Example usage:</p> * <pre> * CurlRequest request = Curl.get("http://example.com"); * </pre> * * <p>Supported HTTP methods:</p> * <ul>
Registered: Thu Sep 04 15:34:10 UTC 2025 - Last Modified: Sat Jul 05 01:38:18 UTC 2025 - 5.5K bytes - Viewed (0) -
guava-tests/test/com/google/common/util/concurrent/AggregateFutureStateFallbackAtomicHelperTest.java
checkHelperVersion(getClass().getClassLoader(), "SafeAtomicHelper"); checkHelperVersion(NO_ATOMIC_FIELD_UPDATER, "SynchronizedAtomicHelper"); // Then, run the actual tests under each alternative classloader: runTestMethod(NO_ATOMIC_FIELD_UPDATER); // TODO(lukes): assert that the logs are full of errors } /**Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 6.5K bytes - Viewed (0) -
src/main/java/jcifs/SidResolver.java
/** * This specialized method returns a Map of users and local groups for the * target server where keys are SIDs representing an account and each value * is an ArrayList of SIDs represents the local groups that the account is * a member of. * * This method is designed to assist with computing access control for aRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.2K bytes - Viewed (0) -
src/main/webapp/css/admin/bootstrap.min.css.map
,MAAA,KACA,OAAA,2BACA,cAAA,EAGF,mBACE,SAAA,SACA,QAAA,EACA,MAAA,KACA,OAAA,2BACA,OAAA,EACA,SAAA,OACA,QAAA,EAPF,4CAUI,aAAA,QACA,WAAA,EAAA,EAAA,EAAA,MAAA,oB5BqoHJ,+C4BhpHA,gDAiBI,iBAAA,QAjBJ,sDAsBM,QAAA,SAtBN,0DA2BI,QAAA,kBAIJ,mBACE,SAAA,SACA,IAAA,EACA,MAAA,EACA,KAAA,EACA,QAAA,EACA,OAAA,2BACA,QAAA,QAAA,OACA,SAAA,OAEA,YAAA,IACA,YAAA,IACA,MAAA,QACA,iBAAA,KACA,OAAA,IAAA,MAAA,QpBlVE,cAAA,OoBoUJ,0BAmBI,SAAA,SACA,IAAA,EACA,MAAA,EACA,OAAA,EACA,QAAA,EACA,QAAA,MACA,OAAA,qBACA,QAAA,QAAA,OACA,YAAA,IACA,MAAA,QA...
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Oct 26 01:49:09 UTC 2024 - 639.3K bytes - Viewed (1) -
src/cmd/cgo/doc.go
containing debug information. Cgo parses the DWARF debug information for __cgo__N to learn the type of each identifier. (The types also distinguish functions from global variables.) Cgo reads the constant values from the __cgodebug_* from the object file's data segment. At this point cgo knows the meaning of each C.xxx well enough to start the translation process. Translating Go
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Dec 11 23:57:34 UTC 2024 - 44K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0)