- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 35 for isImplicit (0.06 seconds)
-
android/guava/src/com/google/common/math/DoubleUtils.java
// Double#doubleToRawLongBits(double)} spec. static final long SIGN_MASK = 0x8000000000000000L; static final int SIGNIFICAND_BITS = 52; static final int EXPONENT_BIAS = 1023; /** The implicit 1 bit that is omitted in significands of normal doubles. */ static final long IMPLICIT_BIT = SIGNIFICAND_MASK + 1; static long getSignificand(double d) { checkArgument(isFinite(d), "not a normal value");
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Mar 03 04:51:56 GMT 2026 - 5K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
* validity Validity, * subject Name, * subjectPublicKeyInfo SubjectPublicKeyInfo, * issuerUniqueID [1] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version MUST be v2 or v3 * subjectUniqueID [2] IMPLICIT UniqueIdentifier OPTIONAL, -- If present, version MUST be v2 or v3 * extensions [3] EXPLICIT Extensions OPTIONAL -- If present, version MUST be v3 * } * ```
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 13.6K bytes - Click Count (0) -
docs/tr/docs/tutorial/security/index.md
* `oauth2`: OAuth2 ile security’yi yönetmenin tüm yolları ("flow" olarak adlandırılır). * Bu flow’ların birçoğu, bir OAuth 2.0 authentication provider (Google, Facebook, X (Twitter), GitHub vb.) oluşturmak için uygundur: * `implicit` * `clientCredentials` * `authorizationCode` * Ancak, aynı uygulamanın içinde doğrudan authentication yönetmek için mükemmel şekilde kullanılabilecek özel bir "flow" vardır:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 05 15:43:38 GMT 2026 - 5K bytes - Click Count (0) -
docs/uk/docs/tutorial/security/index.md
* `oauth2`: усі способи обробки безпеки за допомогою OAuth2 (так звані «потоки»). * Декілька з цих потоків підходять для створення провайдера автентифікації OAuth 2.0 (наприклад, Google, Facebook, X (Twitter), GitHub тощо): * `implicit` * `clientCredentials` * `authorizationCode` * Але є один окремий «потік», який можна ідеально використати для обробки автентифікації напряму в цьому ж застосунку:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Feb 13 12:42:01 GMT 2026 - 7.3K bytes - Click Count (0) -
docs/tr/docs/advanced/security/oauth2-scopes.md
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 14.7K bytes - Click Count (0) -
docs/ru/docs/advanced/security/oauth2-scopes.md
Самый распространённый — «implicit flow». Самый безопасный — «code flow», но он сложнее в реализации, так как требует больше шагов. Из‑за сложности многие провайдеры в итоге рекомендуют «implicit flow». /// note | Примечание Часто каждый провайдер аутентификации называет свои «flows» по‑разному — как часть бренда.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:56:20 GMT 2026 - 20.6K bytes - Click Count (0) -
docs/pt/docs/tutorial/security/index.md
* `oauth2`: todas as formas do OAuth2 para lidar com segurança (chamados "fluxos"). * Vários desses fluxos são apropriados para construir um provedor de autenticação OAuth2 (como Google, Facebook, X (Twitter), GitHub, etc): * `implicit` * `clientCredentials` * `authorizationCode` * Mas existe um “fluxo” específico que pode ser perfeitamente usado para resolver autenticação diretamente na mesma aplicação:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Feb 13 13:48:53 GMT 2026 - 4.9K bytes - Click Count (0) -
docs/de/docs/tutorial/security/index.md
* `oauth2`: Alle OAuth2-Methoden zum Umgang mit Sicherheit (genannt „Flows“). * Mehrere dieser Flows eignen sich zum Aufbau eines OAuth 2.0-Authentifizierungsanbieters (wie Google, Facebook, X (Twitter), GitHub usw.): * `implicit` * `clientCredentials` * `authorizationCode` * Es gibt jedoch einen bestimmten „Flow“, der perfekt für die direkte Abwicklung der Authentifizierung in derselben Anwendung verwendet werden kann:
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Feb 14 07:57:30 GMT 2026 - 5.2K bytes - Click Count (0) -
docs/en/docs/advanced/security/oauth2-scopes.md
The most common is the implicit flow. The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow. /// note It's common that each authentication provider names their flows in a different way, to make it part of their brand.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 13.4K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/index.md
* Plusieurs de ces flows conviennent pour construire un fournisseur d'authentification OAuth 2.0 (comme Google, Facebook, X (Twitter), GitHub, etc.) : * `implicit` * `clientCredentials` * `authorizationCode` * Mais il existe un « flow » spécifique qui peut parfaitement être utilisé pour gérer l'authentification directement dans la même application :Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Feb 14 08:12:41 GMT 2026 - 5.2K bytes - Click Count (0)