- Sort Score
- Result 10 results
- Languages All
Results 381 - 390 of 1,201 for because (0.04 sec)
-
cmd/sts-errors.go
HTTPStatusCode: http.StatusBadRequest, }, ErrSTSMalformedPolicyDocument: { Code: "MalformedPolicyDocument", Description: "The request was rejected because the policy document was malformed.", HTTPStatusCode: http.StatusBadRequest, }, ErrSTSInsecureConnection: { Code: "InsecureConnection",
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Feb 05 00:29:41 UTC 2025 - 6K bytes - Viewed (1) -
android/guava/src/com/google/common/collect/Iterators.java
} @Override public I next() { if (!hasNext()) { throw new NoSuchElementException(); } /* * requireNonNull is safe because our callers always pass non-null arguments. Each element * of the array becomes null only when we iterate past it and then clear it. */ I result = requireNonNull(elements[index]);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 50.5K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosApRequestTest.java
v.add(appTag); ASN1Sequence seq = new DERSequence(v); // Act + Assert // The KerberosTicket constructor will throw because the empty sequence is not a valid ticket assertThrows(PACDecodingException.class, () -> new KerberosApRequest(seq, new KerberosKey[0])); // Verify apOptions is set correctly in a minimal sequence without ticket
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 10.3K bytes - Viewed (0) -
android/guava/src/com/google/common/primitives/ImmutableLongArray.java
/* * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most * instances. Note that the instances that would get smaller are the right set to care about * optimizing, because the rest have the option of calling `trimmed`. */ private final transient int start; // it happens that we only serialize instances where this is 0 private final int end; // exclusive
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22K bytes - Viewed (0) -
guava-tests/benchmark/com/google/common/util/concurrent/MonitorBasedArrayBlockingQueue.java
* of this queue less the current {@code size} of this queue. * * <p>Note that you cannot always tell if an attempt to insert an element will succeed by * inspecting {@code remainingCapacity} because it may be the case that another thread is about to * insert or remove an element. */ @CanIgnoreReturnValue @Override public int remainingCapacity() { Monitor monitor = this.monitor;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 22.4K bytes - Viewed (0) -
guava/src/com/google/common/primitives/ImmutableIntArray.java
/* * TODO(kevinb): evaluate the trade-offs of going bimorphic to save these two fields from most * instances. Note that the instances that would get smaller are the right set to care about * optimizing, because the rest have the option of calling `trimmed`. */ private final transient int start; // it happens that we only serialize instances where this is 0 private final int end; // exclusive
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 21.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match. If you want to play with JWT tokens and see how they work, check <a href="https://jwt.io/" class="external-link" target="_blank">https://jwt.io</a>. ## Install `PyJWT` { #install-pyjwt }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/LittleEndianByteArray.java
| ((source[offset + 2] & 0xFF) << 16) | ((source[offset + 3] & 0xFF) << 24); } /** * Indicates that the load and store operations will be very efficient because of use of VarHandle * or Unsafe. May be useful for calling code to fall back on an alternative implementation that is * slower than those implementations but faster than the pure-Java mask-and-shift. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 12 03:49:18 UTC 2025 - 12.3K bytes - Viewed (0) -
docs/features/calls.md
## Rewriting Responses If transparent compression was used, OkHttp will drop the corresponding response headers `Content-Encoding` and `Content-Length` because they don’t apply to the decompressed response body. If a conditional GET was successful, responses from the network and cache are merged as directed by the spec. ## Follow-up Requests
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sun Feb 06 02:19:09 UTC 2022 - 3.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/opensearch/user/allcommon/EsAbstractEntity.java
} public void modifiedToSpecified() { if (__modifiedProperties.isEmpty()) { return; // basically no way when called in Framework (because called when SpecifyColumn exists) } __specifiedProperties = newModifiedProperties(); __specifiedProperties.accept(__modifiedProperties); }
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Mar 15 06:53:53 UTC 2025 - 10.9K bytes - Viewed (0)