- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 22 for Signature (0.36 sec)
-
KEYS.md
``` ### Verifying signatures Once you've downloaded a Gradle JAR file or a distribution and its corresponding signature file (with a `.asc` extension), you can verify its authenticity against the public key. For example, to verify the signature of `plugin-publish-plugin-2.0.0.jar` and its signature file `plugin-publish-plugin-2.0.0.jar.asc`, use this command: ```bash
Registered: Wed Dec 31 11:36:14 UTC 2025 - Last Modified: Thu Dec 04 14:29:13 UTC 2025 - 4.7K bytes - Viewed (0) -
fastapi/dependencies/utils.py
def _get_signature(call: Callable[..., Any]) -> inspect.Signature: if sys.version_info >= (3, 10): try: signature = inspect.signature(call, eval_str=True) except NameError: # Handle type annotations with if TYPE_CHECKING, not used by FastAPI # e.g. dependency return types signature = inspect.signature(call) else: signature = inspect.signature(call) return signature
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 12:54:56 UTC 2025 - 37.6K bytes - Viewed (3) -
build-logic/binary-compatibility/src/main/groovy/gradlebuild/binarycompatibility/rules/MethodsRemovedInInternalSuperClassRule.groovy
} /** * Returns method parameters from method signature, e.g. "(Ljava/lang/String;I)V" -> "(Ljava/lang/String;I)" */ private static String methodParametersFromSignature(CtMethod method) { return method.signature.substring(0, method.signature.indexOf(")") + 1) }Registered: Wed Dec 31 11:36:14 UTC 2025 - Last Modified: Wed Dec 24 14:15:15 UTC 2025 - 4.2K bytes - Viewed (0) -
tensorflow/c/c_api_function_test.cc
ASSERT_EQ(func_->record->fdef().signature().attr().size(), 2); EXPECT_EQ(func_->record->fdef().signature().attr(0).name(), "v1"); EXPECT_EQ(func_->record->fdef().signature().attr(0).type(), "int"); EXPECT_EQ(func_->record->fdef().signature().attr(1).name(), "v2"); EXPECT_EQ(func_->record->fdef().signature().attr(1).type(), "int"); }
Registered: Tue Dec 30 12:39:10 UTC 2025 - Last Modified: Mon Nov 17 00:00:38 UTC 2025 - 63.6K bytes - Viewed (1) -
pom.xml
</annotations> <checkTestClasses>true</checkTestClasses> <signature> <groupId>org.codehaus.mojo.signature</groupId> <artifactId>java18</artifactId> <version>${java18-signature.version}</version> </signature> </configuration> <executions> <execution>Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Dec 05 03:10:05 UTC 2025 - 26.1K bytes - Viewed (0) -
gradle/libs.versions.toml
robolectric-android = "org.robolectric:android-all:16-robolectric-13921718" robolectric = "org.robolectric:robolectric:4.16" #noinspection UnusedVersionCatalogEntry signature-android-apilevel21 = "net.sf.androidscents.signature:android-api-level-21:5.0.1_r2" #noinspection UnusedVersionCatalogEntry signature-android-apilevel24 = "net.sf.androidscents.signature:android-api-level-24:7.0_r2"
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Fri Dec 19 22:05:50 UTC 2025 - 8.5K bytes - Viewed (0) -
android/pom.xml
<gwt-maven-plugin.version>2.10.0</gwt-maven-plugin.version> <gwt.version>2.12.2</gwt.version> <j2objc.version>3.1</j2objc.version> <java18-signature.version>1.0</java18-signature.version> <javahome-resolver-maven-plugin.version>1.0.2</javahome-resolver-maven-plugin.version> <jimfs.version>1.3.1</jimfs.version> <jspecify.version>1.0.0</jspecify.version>
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Dec 05 03:10:05 UTC 2025 - 26.4K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/sso/oic/OpenIdConnectAuthenticator.java
} // SECURITY WARNING: JWT signature validation is not implemented. // This is a critical security vulnerability. The ID token should be validated // to ensure it was issued by the expected OpenID Connect provider and has not been tampered with. // TODO: Implement JWT signature validation using the provider's public keyRegistered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Sun Dec 14 01:18:25 UTC 2025 - 16.5K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/util/concurrent/GeneratedMonitorTest.java
* {@code enterXxx}, {@code tryEnterXxx}, and {@code waitForXxx} method of the {@code Monitor} class * is analyzed reflectively to determine appropriate test cases based on its signature. Additional * ad hoc test cases can be found in {@link SupplementalMonitorTest}. * * @author Justin T. Sampson */ @NullUnmarked public class GeneratedMonitorTest extends TestCase {Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Dec 11 21:00:51 UTC 2025 - 27.1K bytes - Viewed (0) -
fess-crawler-opensearch/src/test/java/org/codelibs/fess/crawler/client/FesenClientTest.java
assertSame(mockNewClient, fesenClient.client); // Internal client should be updated verify(mockClient).filterWithHeader(headers); } /** * Test: deleteByQuery with new signature (without type parameter) * Verifies the improved scroll cleanup logic */ @Test public void testDeleteByQueryNewSignature() {
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Thu Nov 20 08:44:44 UTC 2025 - 17K bytes - Viewed (0)