grantablePermissions=new ArraySet<>(Arrays.asList(requestedPermissions)); | grantablePermissions=new ArraySet<>(requestedPermissions); | Arrays.asList(requestedPermissions) | requestedPermissions | platform_frameworks_base | fa894222e67542f59e126771ad381dd44fd19f87 | com.android.server.pm.permission.DefaultPermissionGrantPolicy | | _1 | requestedPermissions |
---|
_2 | requestedPermissions |
---|
| TCIVar | requestedPermissions |
---|
| | TCIVar | requestedPermissions |
---|
| Uses | True |
run(Arrays.asList(files),options); | run(files,options); | Arrays.asList(files) | files | j2objc | 6eaa0d66b443688a4e6e6b960b0d7b2e8facc479 | com.google.devtools.j2objc.J2ObjC | | | | | | Uses | True |
grantablePermissions=new ArraySet<>(Arrays.asList(requestedPermissions)); | grantablePermissions=new ArraySet<>(requestedPermissions); | Arrays.asList(requestedPermissions) | requestedPermissions | platform_frameworks_base | 83f7c3e466dce5d9b7b7505a89d14f68c670bcf5 | com.android.server.pm.permission.DefaultPermissionGrantPolicy | | _1 | requestedPermissions |
---|
_2 | requestedPermissions |
---|
| TCIVar | requestedPermissions |
---|
| | TCIVar | requestedPermissions |
---|
| Uses | True |
return new CertificateTrustRestrictions(Arrays.asList(trustNodeNames)); | return new CertificateTrustRestrictions(trustNodeNames); | Arrays.asList(trustNodeNames) | trustNodeNames | elasticsearch | cd14f33ae2b3c16b05ab0bcdb76327023528db3e | org.elasticsearch.xpack.ssl.RestrictedTrustConfig | | _1 | trustNodeNames |
---|
_2 | trustNodeNames |
---|
| | | | Uses | True |
Certificate[] certificates=CertUtils.readCertificates(Arrays.asList(certificateAuthorities),env); | Certificate[] certificates=CertUtils.readCertificates(certificateAuthorities,env); | Arrays.asList(certificateAuthorities) | certificateAuthorities | elasticsearch | cd14f33ae2b3c16b05ab0bcdb76327023528db3e | org.elasticsearch.xpack.security.authc.pki.PkiRealm | | _1 | certificateAuthorities |
---|
_2 | certificateAuthorities |
---|
| TCIVar | certificateAuthorities |
---|
| | TCIVar | certificateAuthorities |
---|
| Uses | True |
grantablePermissions=new ArraySet<>(Arrays.asList(requestedPermissions)); | grantablePermissions=new ArraySet<>(requestedPermissions); | Arrays.asList(requestedPermissions) | requestedPermissions | platform_frameworks_base | 419749c2e5408262bd6e34c5c6ce45b79ea8e7de | com.android.server.pm.permission.DefaultPermissionGrantPolicy | | _1 | requestedPermissions |
---|
_2 | requestedPermissions |
---|
| TCIVar | requestedPermissions |
---|
| | TCIVar | requestedPermissions |
---|
| Uses | True |
followedByWhitespace=tokens[i + 1].isWhitespaceBefore() || PUNCTUATION.matcher(tokens[i + 1].getToken()).matches() || Arrays.asList(endSymbols).contains(tokens[i + 1].getToken()); | followedByWhitespace=tokens[i + 1].isWhitespaceBefore() || PUNCTUATION.matcher(tokens[i + 1].getToken()).matches() || endSymbols.contains(tokens[i + 1].getToken()); | Arrays.asList(endSymbols) | endSymbols | languagetool | a5313f79a2becccace28f77d163ef88d1690df21 | org.languagetool.rules.GenericUnpairedBracketsRule | | | | | | Uses | True |
precededByWhitespace=tokens[i - 1].isSentenceStart() || tokens[i].isWhitespaceBefore() || PUNCTUATION_NO_DOT.matcher(tokens[i - 1].getToken()).matches()|| Arrays.asList(startSymbols).contains(tokens[i - 1].getToken()); | precededByWhitespace=tokens[i - 1].isSentenceStart() || tokens[i].isWhitespaceBefore() || PUNCTUATION_NO_DOT.matcher(tokens[i - 1].getToken()).matches()|| startSymbols.contains(tokens[i - 1].getToken()); | Arrays.asList(startSymbols) | startSymbols | languagetool | a5313f79a2becccace28f77d163ef88d1690df21 | org.languagetool.rules.GenericUnpairedBracketsRule | | _1 | startSymbols |
---|
_2 | startSymbols |
---|
| | | | Uses | True |
final LanguageSet languages=LanguageSet.from(new HashSet<>(Arrays.asList(languageset))); | final LanguageSet languages=LanguageSet.from(new HashSet<>(languageset)); | Arrays.asList(languageset) | languageset | elasticsearch | cdd7c1e6c26474721a1513c83ab3ca6473e9f9ef | org.elasticsearch.index.analysis.PhoneticTokenFilterFactory | | _1 | languageset |
---|
_2 | languageset |
---|
| | | | Uses | True |
this.keepTypes=new HashSet<>(Arrays.asList(arrayKeepTypes)); | this.keepTypes=new HashSet<>(arrayKeepTypes); | Arrays.asList(arrayKeepTypes) | arrayKeepTypes | elasticsearch | cdd7c1e6c26474721a1513c83ab3ca6473e9f9ef | org.elasticsearch.analysis.common.KeepTypesFilterFactory | | _1 | arrayKeepTypes |
---|
_2 | arrayKeepTypes |
---|
| | | | Uses | True |
scripts.removeAll(Arrays.asList(asArray)); | scripts.removeAll(asArray); | Arrays.asList(asArray) | asArray | elasticsearch | cdd7c1e6c26474721a1513c83ab3ca6473e9f9ef | org.elasticsearch.analysis.common.CJKBigramFilterFactory | | | | | | Uses | True |
return Arrays.asList(explicitWordList); | return explicitWordList; | Arrays.asList(explicitWordList) | explicitWordList | elasticsearch | cdd7c1e6c26474721a1513c83ab3ca6473e9f9ef | org.elasticsearch.index.analysis.Analysis | | _1 | explicitWordList |
---|
_2 | explicitWordList |
---|
| | | | Uses | True |
return new CharArraySet(Arrays.asList(stemExclusion),false); | return new CharArraySet(stemExclusion,false); | Arrays.asList(stemExclusion) | stemExclusion | elasticsearch | cdd7c1e6c26474721a1513c83ab3ca6473e9f9ef | org.elasticsearch.index.analysis.Analysis | | _1 | stemExclusion |
---|
_2 | stemExclusion |
---|
| | | | Uses | True |
newCommandLineElements.addAll(Arrays.asList(commandLineElements)); | newCommandLineElements.addAll(commandLineElements); | Arrays.asList(commandLineElements) | commandLineElements | bazel | bc16cc2f49a398d57f68dcd8268b2bb6bd2b3baa | com.google.devtools.build.remote.WatcherServer | | _1 | commandLineElements |
---|
_2 | commandLineElements |
---|
| TCIVar | commandLineElements |
---|
| | TCIVar | commandLineElements |
---|
| Uses | True |
newCommandLineElements.addAll(Arrays.asList(commandLineElements)); | newCommandLineElements.addAll(commandLineElements); | Arrays.asList(commandLineElements) | commandLineElements | bazel | bc16cc2f49a398d57f68dcd8268b2bb6bd2b3baa | com.google.devtools.build.remote.WatcherServer | | _1 | commandLineElements |
---|
_2 | commandLineElements |
---|
| TCIVar | commandLineElements |
---|
| | TCIVar | commandLineElements |
---|
| Uses | True |
set.addAll(Arrays.asList(classes)); | set.addAll(classes); | Arrays.asList(classes) | classes | camel | f14ad2fd535087877b1e02353ddfdd3a4ca11614 | org.apache.camel.maven.packaging.GenerateConfigurerMojo | | | | | | Uses | True |
enabledSecureTransportProtocols=new LinkedHashSet<>(Arrays.asList(DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS)); | enabledSecureTransportProtocols=new LinkedHashSet<>(DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS); | Arrays.asList(DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS) | DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS | vert.x | ef15fed2b51f902299a0d3727c02c44dcdca6cdd | io.vertx.core.net.TCPSSLOptions | | _1 | DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS |
---|
_2 | DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS |
---|
| TCIVar | DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS |
---|
| | TCIVar | DEFAULT_ENABLED_SECURE_TRANSPORT_PROTOCOLS |
---|
| Uses | True |