- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 168 for tArn (0.02 sec)
-
docs/en/docs/tutorial/dependencies/dependencies-with-yield.md
And all of them can use `yield`. In this case `dependency_c`, to execute its exit code, needs the value from `dependency_b` (here named `dep_b`) to still be available. And, in turn, `dependency_b` needs the value from `dependency_a` (here named `dep_a`) to be available for its exit code. {* ../../docs_src/dependencies/tutorial008_an_py39.py hl[18:19,26:27] *}Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 12.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
*/ public void setKey(final byte[] key) { // CHECK PAROTY TBD deskey(key, true, encryptKeys); deskey(key, false, decryptKeys); } // Turn an 8-byte key into internal keys. private void deskey(final byte[] keyBlock, final boolean encrypting, final int[] KnL) { int i, j, l, m, n; final int[] pc1m = new int[56];Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0) -
docs/bucket/replication/DESIGN.md
targets are participating in active-active replication, the replication configuration for replica metadata sync, delete marker replication and delete replication should match to avoid inconsistent picture between the clusters. It is not recommended to turn on asymmetric replication - for e.g. if three sites A,B,C are participating in replication, it would be better to avoid replication setups like A -> [B, C], B -> A. In this particular example, an object uploaded to A will be replicated to B,C. If replica...
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 14.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
} } /** * Create an {@code NtlmPasswordAuthentication} object with raw password * hashes. This is used exclusively by the {@code jcifs.smb1.http.NtlmSsp} * class which is in turn used by NTLM HTTP authentication functionality. */ /** * Create an NtlmPasswordAuthentication object with raw password hashes. * * @param domain the authentication domainRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
* collection {@code c}. * * <p>This method iterates over the specified collection {@code c}, checking each element returned * by the iterator in turn to see if it is contained in the specified collection {@code self}. If * all elements are so contained, {@code true} is returned, otherwise {@code false}. *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22.6K bytes - Viewed (0) -
impl/maven-core/src/main/java/org/apache/maven/DefaultMaven.java
// required after the execution of 9) as the AbstractLifecycleParticipants are free to mutate the MavenProject // instances, which may change dependencies which can, in turn, affect the build order. // // 11) Execute LifecycleStarter.start() // @SuppressWarnings("checkstyle:methodlength") private MavenExecutionResult doExecute(MavenExecutionRequest request) {Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Mon May 05 16:58:52 UTC 2025 - 28.7K bytes - Viewed (1) -
android/guava/src/com/google/common/primitives/Ints.java
// (1) "Reversal", the one we have here. // (2) "Dolphin". If we're rotating an array a of size n by a distance of d, then element a[0] // ends up at a[d], which in turn ends up at a[2d], and so on until we get back to a[0]. // (All indices taken mod n.) If d and n are mutually prime, all elements will have been
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Oct 22 18:14:49 UTC 2025 - 31.3K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
// linked list starting from `newTable`. In general, each element from the old linked list // belongs to a different linked list from `newTable`. We insert each element in turn at the // head of its appropriate `newTable` linked list. while (oldNext != UNSET) { int entryIndex = oldNext - 1; int oldEntry = entries[entryIndex];Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0) -
docs/changelogs/changelog_4x.md
fix insecure hosts crash with an `IllegalArgumentException` on Android. ## Version 4.7.0 _2020-05-17_ * New: `HandshakeCertificates.Builder.addInsecureHost()` makes it easy to turn off security in private development environments that only carry test data. Prefer this over creating an all-trusting `TrustManager` because only hosts on the allowlist are insecure. From
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Apr 17 13:25:31 UTC 2024 - 25.2K bytes - Viewed (0) -
cmd/admin-heal-ops.go
h.traverseAndHealDoneCh <- h.healItems(objAPI) xioutil.SafeClose(h.traverseAndHealDoneCh) } // healMinioSysMeta - heals all files under a given meta prefix, returns a function // which in-turn heals the respective meta directory path and any files in int. func (h *healSequence) healMinioSysMeta(objAPI ObjectLayer, metaPrefix string) func() error { return func() error { // NOTE: Healing on meta is run regardless
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0)