- Sort Score
- Num 10 results
- Language All
Results 201 - 210 of 281 for checker (0.05 seconds)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnection.kt
* true when removing a connection from the pool; otherwise a racing caller might get it from the * pool when it shouldn't. Symmetrically, this must always be checked before returning a * connection from the pool. * * Once true this is always true. Guarded by this. */ var noNewExchanges = false /**
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Oct 07 21:55:03 GMT 2025 - 14.6K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/publicsuffix/PublicSuffixDatabase.kt
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Mon Jul 28 07:33:49 GMT 2025 - 8.5K bytes - Click Count (0) -
guava/src/com/google/common/util/concurrent/MoreExecutors.java
} @Override public void run() { try { delegate.run(); } catch (Throwable t) { // Any Exception is either a RuntimeException or sneaky checked exception. /* * We fail this `ListenableFuture`, whose result is exposed to the user through the * `ListenableScheduledTask` we return from the `schedule*` methods. */Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Wed Oct 08 18:55:33 GMT 2025 - 45.2K bytes - Click Count (0) -
docs/en/docs/release-notes.md
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 19:06:15 GMT 2025 - 586.7K bytes - Click Count (0) -
docs/en/docs/features.md
* Use of hierarchical Pydantic models, Python `typing`’s `List` and `Dict`, etc. * And validators allow complex data schemas to be clearly and easily defined, checked and documented as JSON Schema. * You can have deeply **nested JSON** objects and have them all validated and annotated. * **Extensible**:Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Oct 11 17:48:49 GMT 2025 - 9.5K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/BloomFilter.java
DataOutputStream dout = new DataOutputStream(out); dout.writeByte(SignedBytes.checkedCast(strategy.ordinal())); dout.writeByte(UnsignedBytes.checkedCast(numHashFunctions)); // note: checked at the c'tor dout.writeInt(bits.data.length()); for (int i = 0; i < bits.data.length(); i++) { dout.writeLong(bits.data.get(i)); } } /**
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 23 19:23:59 GMT 2025 - 26.9K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/internal/aether/ReverseTreeRepositoryListener.java
* filters out currently built artifacts, as events are fired for them as well, but their resolved artifact * file would point to checked out source-tree, not the local repository. * <p> * Visible for testing. */ static boolean isLocalRepositoryArtifactOrMissing(RepositorySystemSession session, Artifact artifact) {Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Wed Jan 29 08:17:07 GMT 2025 - 10.1K bytes - Click Count (0) -
guava/src/com/google/common/collect/LinkedListMultimap.java
if (node.previousSibling == null) { // requireNonNull is safe because we checked that not *both* siblings were null. keyList.head = requireNonNull(node.nextSibling); } else { node.previousSibling.nextSibling = node.nextSibling; } if (node.nextSibling == null) { // requireNonNull is safe because we checked that not *both* siblings were null.
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 22 18:35:44 GMT 2025 - 27K bytes - Click Count (0) -
cmd/metacache-server-pool.go
return nil }) } // listPath will return the requested entries. // If no more entries are in the listing io.EOF is returned, // otherwise nil or an unexpected error is returned. // The listPathOptions given will be checked and modified internally. // Required important fields are Bucket, Prefix, Separator. // Other important fields are Limit, Marker. // List ID always derived from the Marker.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 12.9K bytes - Click Count (0) -
docs/kms/IAM.md
to use a memory-hard function (Argon2) that (on purpose) consumes a lot of memory and CPU. The new KMS-based approach can use a key derivation function that is orders of magnitudes cheaper w.r.t. memory and CPU. - Root credentials can now be changed easily. Before, a two-step process was required to change the cluster root credentials since they were used to en/decrypt the IAM data.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.3K bytes - Click Count (0)