- Sort Score
- Result 10 results
- Languages All
Results 281 - 290 of 2,311 for Aare (0.08 sec)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/tls/OkHostnameVerifier.kt
hostname += "." } if (!pattern.endsWith(".")) { pattern += "." } // Hostname and pattern are now absolute domain names. pattern = pattern.asciiToLowercase() // Hostname and pattern are now in lower case -- domain names are case-insensitive. if ("*" !in pattern) { // Not a wildcard pattern -- hostname and pattern must match exactly.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 7.6K bytes - Viewed (0) -
.github/workflows/scorecard.yml
# This workflow uses actions that are not certified by GitHub. They are provided # by a third-party and are governed by separate terms of service, privacy # policy, and support documentation. name: Scorecard supply-chain security on: # For Branch-Protection check. Only the default branch is supported. See # https://github.com/ossf/scorecard/blob/main/docs/checks.md#branch-protection branch_protection_rule:
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Sep 03 19:19:31 UTC 2025 - 2.9K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/FluentIterable.java
* <li>{@code FluentIterable} contains several features not available on {@code Stream}, which are * noted in the method descriptions below. * <li>Streams include primitive-specialized variants such as {@code IntStream}, the use of which * is strongly recommended. * <li>Streams are standard Java, not requiring a third-party dependency (but do render your code * incompatible with Java 7 and earlier).
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 35.3K bytes - Viewed (0) -
guava/src/com/google/common/collect/FluentIterable.java
* <li>{@code FluentIterable} contains several features not available on {@code Stream}, which are * noted in the method descriptions below. * <li>Streams include primitive-specialized variants such as {@code IntStream}, the use of which * is strongly recommended. * <li>Streams are standard Java, not requiring a third-party dependency. * </ul> * * <h3>Example</h3> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 34.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableSortedMultiset.java
* safe to do so. The exact circumstances under which a copy will or will not be performed are * undocumented and subject to change. * * <p>This method is not type-safe, as it may be called on elements that are not mutually * comparable. * * @throws ClassCastException if the elements are not mutually comparable * @throws NullPointerException if any of {@code elements} is null */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 29.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/ImmutableMap.java
} /** * Returns a {@link Collector} that accumulates elements into an {@code ImmutableMap} whose keys * and values are the result of applying the provided mapping functions to the input elements. * * <p>If the mapped keys contain duplicates (according to {@link Object#equals(Object)}), the * values are merged using the specified merging function. If the merging function returns {@code
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 44.3K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
docs/en/docs/tutorial/body-nested-models.md
But you don't have to worry about them either, incoming dicts are converted automatically and your output is converted automatically to JSON too. ## Bodies of arbitrary `dict`s { #bodies-of-arbitrary-dicts } You can also declare a body as a `dict` with keys of some type and values of some other type. This way, you don't have to know beforehand what the valid field/attribute names are (as would be the case with Pydantic models).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing * the operation and the desired access bits are compared to the SID * and access mask of each ACE. If the SID matches, the allow/deny flags * and access mask are considered. If the ACE is a "deny" * ACE and <i>any</i> of the desired access bits match bits in the access
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
android/guava-testlib/src/com/google/common/collect/testing/testers/MapReplaceEntryTester.java
// the operation would be a no-op, so exceptions are allowed but not required } expectUnchanged(); } @MapFeature.Require(absent = SUPPORTS_PUT) public void testReplaceEntry_unsupportedAbsentKey() { try { getMap().replace(k3(), v3(), v4()); } catch (UnsupportedOperationException tolerated) { // the operation would be a no-op, so exceptions are allowed but not required }
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Oct 31 14:51:04 UTC 2024 - 5.4K bytes - Viewed (0)