- Sort Score
- Result 10 results
- Languages All
Results 191 - 200 of 433 for reefing (0.04 sec)
-
docs/changelogs/changelog_1x.md
* Fix: Don't unzip if there isn't a response body. * Fix: Don't leak gzip streams on redirects. * Fix: Don't do DNS lookups on invalid hosts. * Fix: Exhaust the underlying stream when reading gzip streams. * Fix: Support the `PATCH` method. * Fix: Support request bodies on `DELETE` method. * Fix: Drop the `okhttp-protocols` module. * Internal: Replaced internal byte array buffers with pooled buffers ("OkBuffer").
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 6.4K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/Smb2EchoRequestTest.java
} @Test @DisplayName("Should handle null buffer") void testReadBytesWithNullBuffer() { // This is expected behavior for echo request - no reading needed assertDoesNotThrow(() -> { int result = echoRequest.readBytesWireFormat(null, 0); assertEquals(0, result); }); } } @Nested
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 11.3K bytes - Viewed (0) -
docs/select/README.md
Type inference and automatic conversion of values is performed based on the context when the value is un-typed (such as when reading CSV data). If present, the CAST function overrides automatic conversion. The [mc sql](https://docs.min.io/community/minio-object-store/reference/minio-mc/mc-sql.html) command can be used for executing queries using the command line.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6.6K bytes - Viewed (0) -
guava/src/com/google/common/io/CharStreams.java
* Reads all of the lines from a {@link Readable} object. The lines do not include * line-termination characters, but do include other leading and trailing whitespace. * * <p>Does not close the {@code Readable}. If reading files or resources you should use the {@link * Files#readLines} and {@link Resources#readLines} methods. * * @param r the object to read from * @return a mutable {@link List} containing all the lines
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jul 30 17:25:01 UTC 2025 - 10.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
And you want to have a way for the frontend to authenticate with the backend, using a **username** and **password**. We can use **OAuth2** to build that with **FastAPI**. But let's save you the time of reading the full long specification just to find those little pieces of information you need. Let's use the tools provided by **FastAPI** to handle security. ## How it looks { #how-it-looks }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 8.4K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hasher.java
import java.nio.ByteBuffer; import java.nio.charset.Charset; import org.jspecify.annotations.Nullable; /** * A {@link PrimitiveSink} that can compute a hash code after reading the input. Each hasher should * translate all multibyte values ({@link #putInt(int)}, {@link #putLong(long)}, etc) to bytes in * little-endian order. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 5.5K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/MonotonicClock.java
* between time measurements. * <p> * This implementation is singleton-based and always uses UTC timezone. The clock * cannot be adjusted to different timezones to maintain consistent monotonic behavior. * Users needing local time representation should convert the result of {@link #instant()} * to their desired timezone: * <pre>{@code * Instant now = MonotonicClock.now(); * ZonedDateTime local = now.atZone(ZoneId.systemDefault());
Registered: Sun Sep 07 03:35:12 UTC 2025 - Last Modified: Wed Jan 15 06:28:29 UTC 2025 - 5.6K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
cmd/tier.go
r := rand.New(rand.NewSource(time.Now().UnixNano())) randInterval := func() time.Duration { return time.Duration(r.Float64() * 5 * float64(time.Second)) } // To avoid all MinIO nodes reading the tier config object at the same // time. t := time.NewTimer(tierCfgRefresh + randInterval()) defer t.Stop() for { select { case <-ctx.Done(): return case <-t.C:
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 15.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/suggest/Suggester.java
/** The OpenSearch client. */ protected final Client client; /** The suggest settings. */ protected final SuggestSettings suggestSettings; /** The reading converter. */ protected final ReadingConverter readingConverter; /** The contents reading converter. */ protected final ReadingConverter contentsReadingConverter; /** The normalizer. */ protected final Normalizer normalizer; /** The analyzer. */
Registered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Thu Aug 07 02:41:28 UTC 2025 - 20.7K bytes - Viewed (3)