- Sort Score
- Result 10 results
- Languages All
Results 651 - 660 of 916 for orders (0.14 sec)
-
okhttp-testing-support/src/main/kotlin/okhttp3/RecordingEventListener.kt
import okhttp3.CallEvent.SecureConnectEnd import okhttp3.CallEvent.SecureConnectStart import org.junit.jupiter.api.Assertions.fail open class RecordingEventListener( /** * An override to ignore the normal order that is enforced. * EventListeners added by Interceptors will not see all events. */ private val enforceOrder: Boolean = true, ) : EventListener() { val eventSequence: Deque<CallEvent> = ConcurrentLinkedDeque()
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Tue May 27 14:58:02 UTC 2025 - 9.5K bytes - Viewed (0) -
tests/count_test.go
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Oct 30 09:15:49 UTC 2023 - 6.9K bytes - Viewed (0) -
guava/src/com/google/common/collect/ComparisonChain.java
* * <p>This method is declared to accept any 2 {@code Comparable} objects, even if they are not <a * href="https://docs.oracle.com/javase/tutorial/collections/interfaces/order.html">mutually * comparable</a>. If you pass objects that are not mutually comparable, this method may throw an * exception. (The reason for this decision is lost to time, but the reason <i>might</i> be that
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 11.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
When we create an instance of the `OAuth2PasswordBearer` class we pass in the `tokenUrl` parameter. This parameter contains the URL that the client (the frontend running in the user's browser) will use to send the `username` and `password` in order to get a token. {* ../../docs_src/security/tutorial001_an_py39.py hl[8] *} /// tip
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 8.4K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hashing.java
* the information of these hash codes in an ordered fashion. That is, whenever two equal hash * codes are produced by two calls to this method, it is <i>as likely as possible</i> that each * was computed from the <i>same</i> input hash codes in the <i>same</i> order. * * @throws IllegalArgumentException if {@code hashCodes} is empty, or the hash codes do not all
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 22:06:57 UTC 2025 - 31.1K bytes - Viewed (0) -
tensorflow/BUILD
# Do not sort: Copybara rule # copybara:uncomment_begin # # buildifier: disable=out-of-order-load # load("//devtools/build_cleaner/skylark:action_config_test.bzl", "action_config_test") # load("//devtools/copybara/rules:copybara.bzl", "copybara_config_test") # load("@rules_license//rules:license.bzl", "license") # # buildifier: enable=out-of-order-load # copybara:uncomment_end # copybara:comment_begin(oss-only)
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Thu Aug 28 19:11:51 UTC 2025 - 53.4K bytes - Viewed (0) -
src/test/java/jcifs/smb/FileEntryTest.java
verify(mockEntry, times(1)).lastModified(); verify(mockEntry, times(1)).lastAccess(); verify(mockEntry, times(1)).length(); verify(mockEntry, never()).getFileIndex(); // Verify order among a subset of calls InOrder inOrder = inOrder(mockEntry); inOrder.verify(mockEntry).getName(); inOrder.verify(mockEntry, times(2)).getType(); } @Test
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 10K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/trans/nt/NtTransQuerySecurityDescResponseTest.java
*/ private byte[] createValidSecurityDescriptorBuffer(int size) { ByteBuffer buffer = ByteBuffer.allocate(size); buffer.order(ByteOrder.LITTLE_ENDIAN); // Security descriptor header buffer.put((byte) 0x01); // Revision buffer.put((byte) 0x00); // Padding
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 10.8K bytes - Viewed (0) -
src/bytes/compare_test.go
if Compare(b, b) != 0 { t.Error("b != b") } if Compare(b, b[:1]) != 1 { t.Error("b > b[:1] failed") } } func TestCompareBytes(t *testing.T) { lengths := make([]int, 0) // lengths to test in ascending order for i := 0; i <= 128; i++ { lengths = append(lengths, i) } lengths = append(lengths, 256, 512, 1024, 1333, 4095, 4096, 4097) if !testing.Short() { lengths = append(lengths, 65535, 65536, 65537, 99999) }
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Jul 13 23:11:42 UTC 2023 - 6.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny"
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0)