- Sort Score
- Num 10 results
- Language All
Results 651 - 660 of 793 for correcta (0.12 seconds)
-
src/test/java/jcifs/util/AuthenticationRateLimiterTest.java
} finally { concurrentLimiter.close(); } } @Test public void testAutoCloseableInterface() throws Exception { // Test that rate limiter implements AutoCloseable correctly try (AuthenticationRateLimiter autoLimiter = new AuthenticationRateLimiter()) { assertTrue(autoLimiter.checkAttempt("user", "192.168.1.13")); } // Should auto-close without issuesCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 15.8K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/AbstractService.java
* methods like {@link #state}, {@link #failureCause} and notably {@link #toString} can be run * without grabbing the lock. * * <p>To update this field correctly the lock must be held to guarantee that the state is * consistent. */ private volatile StateSnapshot snapshot = new StateSnapshot(NEW); /** Constructor for use by subclasses. */Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Feb 19 21:24:11 GMT 2025 - 20.7K bytes - Click Count (0) -
cmd/api-errors.go
HTTPStatusCode: http.StatusBadRequest, }, ErrBucketRemoteArnInvalid: { Code: "XMinioAdminRemoteArnInvalid", Description: "The bucket remote ARN does not have correct format", HTTPStatusCode: http.StatusBadRequest, }, ErrRemoteTargetNotVersionedError: { Code: "RemoteTargetNotVersionedError", Description: "The remote target does not have versioning enabled",Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Apr 16 07:34:24 GMT 2025 - 93K bytes - Click Count (3) -
src/test/java/jcifs/internal/smb1/net/NetServerEnum2Test.java
byte[] dst = new byte[1024]; int bytesWritten = netServerEnum2.writeParametersWireFormat(dst, 0); assertTrue(bytesWritten > 0); // Verify server type is written correctly String expectedDescr = "WrLehDO\u0000B16BBDz\u0000"; int serverTypeOffset = 2 + expectedDescr.getBytes().length + 4; assertEquals(serverType, SMBUtil.readInt4(dst, serverTypeOffset)); }Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 19.7K bytes - Click Count (0) -
src/test/java/org/codelibs/curl/CurlRequestTest.java
assertNotNull(processor.getResponse()); } @Test public void testMethodEnumToString() { // Test that Method enum toString returns correct values assertEquals("GET", Method.GET.toString()); assertEquals("POST", Method.POST.toString()); assertEquals("PUT", Method.PUT.toString()); assertEquals("DELETE", Method.DELETE.toString());
Created: Sat Dec 20 09:13:53 GMT 2025 - Last Modified: Mon Nov 24 03:10:07 GMT 2025 - 20.5K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/ServerMessageBlock.java
if ((n != byteCount) && (LogStream.level >= 5)) { log.println("byteCount=" + byteCount + " but readBytesWireFormat returned " + n); } // Don't think we can rely on n being correct here. Must use byteCount. // Last paragraph of section 3.13.3 eludes to this. bufferIndex += byteCount; } length = bufferIndex - start; return length;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 19.7K bytes - Click Count (0) -
cmd/sftp-server.go
return errSftpCertWithoutPrincipals } // Verify that certificate provided by user is issued by trusted CA, // username in authentication request matches to identities in certificate // and that certificate type is correct. checker := ssh.CertChecker{} checker.IsUserAuthority = func(k ssh.PublicKey) bool { return subtle.ConstantTimeCompare(globalSFTPTrustedCAPubkey.Marshal(), k.Marshal()) == 1 }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
guava/src/com/google/common/hash/HashFunction.java
* prevention and <i>no</i> expectation of bit dispersion. This leaves them perfectly suitable for * use in hash tables, because extra collisions cause only a slight performance hit, while poor bit * dispersion is easily corrected using a secondary hash function (which all reasonable hash table * implementations in Java use). For the many uses of hash functions beyond data structures,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.5.md
## Changelog since v1.5.5 ### Other notable changes * kube-up (with gce/gci and gce/coreos providers) now ensures the authentication token file contains correct tokens for the control plane components, even if the file already exists (ensures upgrades and downgrades work successfully) ([#43676](https://github.com/kubernetes/kubernetes/pull/43676), [@liggitt](https://github.com/liggitt))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Dec 24 02:28:26 GMT 2020 - 136.4K bytes - Click Count (0)