- Sort Score
- Num 10 results
- Language All
Results 1 - 9 of 9 for breakage (0.28 seconds)
-
build-logic/binary-compatibility/src/main/groovy/gradlebuild/binarycompatibility/rules/BinaryBreakingSuperclassChangeRule.groovy
import javassist.CtClass import me.champeau.gradle.japicmp.report.Violation /** * Workaround for <a href="https://github.com/melix/japicmp-gradle-plugin/issues/56">japicmp issue w.r.t. superclass breakage</a>. * * <p> * Reports simple superclass changes (e.g. the removal of a superclass) as a breaking change, as it affects what methods can be * called with the given type, even if the methods and fields inherited don't change.
Created: Wed Dec 31 11:36:14 GMT 2025 - Last Modified: Thu Oct 06 19:15:15 GMT 2022 - 1.8K bytes - Click Count (0) -
guava-tests/benchmark/com/google/common/base/LazyStackTraceBenchmark.java
return asList(t.getStackTrace()); } }; boolean timeIt(int reps, int breakAt) { boolean dummy = false; for (int i = 0; i < reps; i++) { int f = 0; Throwable t = new Throwable(); for (StackTraceElement ste : getStackTrace(t)) { dummy |= ste == duh; if (f++ == breakAt) { break; } } } return dummy; }
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Dec 19 18:03:30 GMT 2024 - 2.6K bytes - Click Count (0) -
android/guava-tests/benchmark/com/google/common/base/LazyStackTraceBenchmark.java
return asList(t.getStackTrace()); } }; boolean timeIt(int reps, int breakAt) { boolean dummy = false; for (int i = 0; i < reps; i++) { int f = 0; Throwable t = new Throwable(); for (StackTraceElement ste : getStackTrace(t)) { dummy |= ste == duh; if (f++ == breakAt) { break; } } } return dummy; }
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Dec 19 18:03:30 GMT 2024 - 2.6K bytes - Click Count (0) -
RELEASE.md
for all the RNG in Keras. We plan to switch on the new code path by default in tf 2.8, and the behavior change will likely to cause some breakage on user side (eg if the test is checking against some golden number). These 3 APIs will allow user to disable and switch back to legacy behavior if they prefer. In future (eg TF 2.10), we expect toCreated: Tue Dec 30 12:39:10 GMT 2025 - Last Modified: Tue Oct 28 22:27:41 GMT 2025 - 740.4K bytes - Click Count (3) -
impl/maven-core/src/test/java/org/apache/maven/project/RepositoryLeakageTest.java
// Check for leakage: child2 should NOT have child1's repository boolean child2HasChild1Repo = child2Project.getRemoteArtifactRepositories().stream() .anyMatch(repo -> "child1-repo".equals(repo.getId())); assertFalse(child2HasChild1Repo, "Child2 should NOT have child1's repository (leakage detected!)"); // Check for leakage in the shared requestCreated: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Thu Oct 16 06:12:36 GMT 2025 - 9.3K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/project/DefaultProjectBuilder.java
private final ModelBuilder.ModelBuilderSession modelBuilderSession; private final Map<String, MavenProject> projectIndex = new ConcurrentHashMap<>(256); // Store computed repositories per project to avoid leakage between projects private final Map<String, List<ArtifactRepository>> projectRepositories = new ConcurrentHashMap<>(); /**Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Nov 18 17:20:31 GMT 2025 - 51.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.7.md
* kubeadm deb/rpm packages: cAdvisor doesn't listen on `0.0.0.0:4194` without authentication/authorization because of the possible information leakage. The cAdvisor API can still be accessed via `https://{node-ip}:10250/stats/`, though. ([kubernetes/release#356](https://github.com/kubernetes/release/pull/356), [@luxas](https://github.com/luxas)) ### Cloud Providers
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 308.7K bytes - Click Count (1) -
lib/fips140/v1.0.0-c2097c7c.zip
= p - q diff.ExpandFor(p).Sub(qP, p) } // A tiny bit of leakage is acceptable because it's not adaptive, an // attacker only learns the magnitude of p - q. if diff.BitLenVarTime() <= N.BitLen()/2-100 { return errors.New("crypto/rsa: |p - q| too small") } // Check that d > 2^(nlen/2). // // See section 3 of https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf // for more details about attacks on small d values. // // Likewise, the leakage of the magnitude of d is not adaptive. if priv.d.BitLenVarTime()...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
= p - q diff.ExpandFor(p).Sub(qP, p) } // A tiny bit of leakage is acceptable because it's not adaptive, an // attacker only learns the magnitude of p - q. if diff.BitLenVarTime() <= N.BitLen()/2-100 { return errors.New("crypto/rsa: |p - q| too small") } // Check that d > 2^(nlen/2). // // See section 3 of https://crypto.stanford.edu/~dabo/papers/RSA-survey.pdf // for more details about attacks on small d values. // // Likewise, the leakage of the magnitude of d is not adaptive. if priv.d.BitLenVarTime()...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0)