- Sort Score
- Result 10 results
- Languages All
Results 561 - 570 of 796 for PROVIDED (0.04 sec)
-
src/main/config/openapi/openapi-user.yaml
site: type: string example: "fess.codelibs.org/"Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu May 09 06:31:27 UTC 2024 - 21.6K bytes - Viewed (0) -
src/main/java/jcifs/smb/SmbFileInputStream.java
return 0; } /** * Skip n bytes of data on this stream. This operation will not result * in any IO with the server. Unlink <code>InputStream</code> value less than * the one provided will not be returned if it exceeds the end of the file * (if this is a problem let us know). */ @Override public long skip(final long n) throws IOException { if (n > 0) {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 15.6K bytes - Viewed (0) -
internal/ioutil/ioutil.go
} type nopCloser struct { io.Writer } func (nopCloser) Close() error { return nil } // NopCloser returns a WriteCloser with a no-op Close method wrapping // the provided Writer w. func NopCloser(w io.Writer) io.WriteCloser { return nopCloser{w} } // SkipReader skips a given number of bytes and then returns all // remaining data. type SkipReader struct { io.ReaderRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 11.1K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
/** The ANSI password hash */ private byte[] ansiHash; /** The Unicode password hash */ private byte[] unicodeHash; /** Flag indicating if hashes are externally provided */ private boolean hashesExternal = false; /** The CIFS context for this authentication */ private CIFSContext context; /** * */ private NtlmPasswordAuthentication() { }Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/SmbPipeInputStreamTest.java
when(tree.isSMB2()).thenReturn(false); when(tree.getConfig()).thenReturn(config); when(config.getPid()).thenReturn(1234); // Stub send to populate the provided response instance via reflection Mockito.doAnswer(inv -> { Object resp = inv.getArgument(1); // Set private fields: status on SmbComTransactionResponse and available on TransPeekNamedPipeResponse
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 9.9K bytes - Viewed (0) -
internal/kms/kes.go
// the key at the KES server referenced by the key ID. // // The default key ID will be used if keyID is empty. // // The context is associated and tied to the generated DEK. // The same context must be provided when the generated // key should be decrypted. func (c *kesConn) GenerateKey(ctx context.Context, req *GenerateKeyRequest) (DEK, error) { aad, err := req.AssociatedData.MarshalText() if err != nil {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 7.3K bytes - Viewed (0) -
guava/src/com/google/common/collect/Comparators.java
* majority of usages of {@code Ordering} can be written using only built-in JDK APIs. This class is * intended to "fill the gap" and provide those features of {@code Ordering} not already provided by * the JDK. * * @since 21.0 * @author Louis Wasserman */ @GwtCompatible public final class Comparators { private Comparators() {} /**Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
cmd/erasure-healing-common.go
// 3. __availableWithParts__ - has the latest copy of xl.meta and has all // parts with checksums matching; returned by disksWithAllParts // // 4. __outdated__ - returned by outDatedDisk, provided []StorageAPI // returned by diskWithAllParts is passed for latestDisks. // - has an old copy of xl.meta // - doesn't have xl.meta (errFileNotFound)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 12K bytes - Viewed (0) -
SECURITY.md
### Model sharing If the multitenant design allows sharing models, make sure that tenants and users are aware of the security risks detailed here and that they are going to be practically running code provided by other users. Currently there are no good ways to detect malicious models/graphs/checkpoints, so the recommended way to mitigate the risk in this scenario is to sandbox the model execution. ### Hardware attacks
Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/math/LongMath.java
a >>= Long.numberOfTrailingZeros(a); // divide out all 2s, since 2 doesn't divide b } return a << min(aTwos, bTwos); } /** * Returns the sum of {@code a} and {@code b}, provided it does not overflow. * * <p><b>Note:</b> this method is now unnecessary and should be treated as deprecated; use {@link * Math#addExact(long, long)} instead. Note that if both arguments are {@code int} values, writing
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Nov 03 21:01:09 UTC 2025 - 46.8K bytes - Viewed (0)