Search Options

Results per page
Sort
Preferred Languages
Advance

Results 521 - 530 of 833 for Caller (0.16 sec)

  1. guava/src/com/google/common/base/NullnessCasts.java

       * code would be responsible for populating a "real" {@code T} (which might still be the value
       * {@code null}!) before returning it to callers. Depending on how the code is structured, a
       * nullness analysis might not understand that the field has been populated. To avoid that problem
       * without having to add {@code @SuppressWarnings}, the code can call this method.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 13 20:49:47 UTC 2025
    - 3.3K bytes
    - Viewed (0)
  2. src/test/java/org/codelibs/fess/util/SearchEngineUtilTest.java

            // Note: In a real test environment, this would require proper SearchEngineClient setup
            // For now, we test that the method signature is correct and can be called
    
            AtomicInteger callbackCount = new AtomicInteger(0);
    
            try {
                // This will likely fail due to missing SearchEngineClient setup,
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 12 07:34:10 UTC 2025
    - 13.6K bytes
    - Viewed (0)
  3. src/test/java/jcifs/pac/kerberos/KerberosApRequestTest.java

            ASN1Encodable badBase = new ASN1Encodable() {
                @Override
                public ASN1Primitive toASN1Primitive() {
                    // Return a primitive that will throw IOException when getEncoded is called
                    return new DEROctetString(new byte[0]) {
                        @Override
                        public byte[] getEncoded() throws IOException {
                            throw new IOException("encode failure");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  4. src/test/java/jcifs/internal/SMBSigningDigestTest.java

                signingDigest.sign(largeData, offset, 10, request, response);
    
                // Assert
                verify(signingDigest).sign(largeData, offset, 10, request, response);
            }
    
            // Verify method was called correct number of times
            verify(signingDigest, times(offsets.length)).sign(any(byte[].class), anyInt(), anyInt(), any(CommonServerMessageBlock.class),
                    any(CommonServerMessageBlock.class));
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. LICENSE

    users of that server.  Therefore, public use of a modified version, on
    a publicly accessible server, gives the public access to the source
    code of the modified version.
    
      An older license, called the Affero General Public License and
    published by Affero, was designed to accomplish similar goals.  This is
    a different license, not a version of the Affero GPL, but Affero has
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Apr 23 18:58:53 UTC 2021
    - 33.7K bytes
    - Viewed (0)
  6. src/test/java/jcifs/internal/smb1/trans2/Trans2QueryFSInformationTest.java

        @Test
        @DisplayName("Test constructor with invalid information level")
        void testConstructorWithInvalidInformationLevel() {
            // The exception is thrown during writeParametersWireFormat when mapInformationLevel is called
            Trans2QueryFSInformation trans2 = new Trans2QueryFSInformation(config, 99);
            assertNotNull(trans2);
    
            // Exception should be thrown when trying to write parameters
            byte[] buffer = new byte[256];
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  7. src/test/java/jcifs/smb1/util/LogStreamTest.java

            LogStream.setLevel(10);
            assertEquals(10, LogStream.level);
        }
    
        @Test
        void testSetInstanceAfterGetInstance() {
            // Test that setInstance after getInstance has been called
            // getInstance first (creates default instance with System.err)
            LogStream instance1 = LogStream.getInstance();
            assertNotNull(instance1);
    
            // Now set a new instance
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 8.3K bytes
    - Viewed (0)
  8. cmd/sftp-server-driver.go

    	}
    
    	_, err = obj.Stat()
    	if err != nil {
    		return nil, err
    	}
    
    	return obj, nil
    }
    
    // TransferError will catch network errors during transfer.
    // When TransferError() is called Close() will also
    // be called, so we do not need to Wait() here.
    func (w *writerAt) TransferError(err error) {
    	_ = w.w.CloseWithError(err)
    	_ = w.r.CloseWithError(err)
    	w.err = err
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Feb 10 16:35:49 UTC 2025
    - 11.6K bytes
    - Viewed (0)
  9. src/test/java/jcifs/smb1/dcerpc/msrpc/LsaPolicyHandleTest.java

                return null;
            }).when(mockDcerpcHandle).sendrecv(any(MsrpcLsarClose.class));
    
            // Act
            handle.close();
    
            // Assert
            // Verify sendrecv was called once for open and once for close
            verify(mockDcerpcHandle, times(1)).sendrecv(any(MsrpcLsarOpenPolicy2.class));
            verify(mockDcerpcHandle, times(1)).sendrecv(any(MsrpcLsarClose.class));
        }
    
        @Test
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/security/index.md

    In vielen Frameworks und Systemen erfordert allein die Handhabung von Sicherheit und Authentifizierung viel Aufwand und Code (in vielen Fällen kann er 50 % oder mehr des gesamten geschriebenen Codes ausmachen).
    
    **FastAPI** bietet mehrere Tools, die Ihnen helfen, schnell und auf standardisierte Weise mit **Sicherheit** umzugehen, ohne alle Sicherheits-Spezifikationen studieren und erlernen zu müssen.
    
    Aber schauen wir uns zunächst ein paar kleine Konzepte an.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 5.1K bytes
    - Viewed (0)
Back to top