Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 837 for chains (0.1 sec)

  1. platforms/native/platform-native/src/integTest/groovy/org/gradle/nativeplatform/toolchain/MultipleNativeToolChainIntegrationTest.groovy

        }
    
        @Requires(UnitTestPreconditions.CanInstallExecutable)
        @RequiresInstalledToolChain(ToolChainRequirement.GCC)
        @ToBeFixedForConfigurationCache
        def "can build with multiple tool chains"() {
            AvailableToolChains.InstalledToolChain x86ToolChain = OperatingSystem.current().isWindows() ?
                    AvailableToolChains.getToolChain(ToolChainRequirement.VISUALCPP) :
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Thu Nov 16 20:20:03 UTC 2023
    - 3.4K bytes
    - Viewed (0)
  2. src/crypto/internal/nistec/p256_ordinv.go

    	// Inversion is implemented as exponentiation by n - 2, per Fermat's little theorem.
    	//
    	// The sequence of 38 multiplications and 254 squarings is derived from
    	// https://briansmith.org/ecc-inversion-addition-chains-01#p256_scalar_inversion
    	_1 := new(p256OrdElement)
    	_11 := new(p256OrdElement)
    	_101 := new(p256OrdElement)
    	_111 := new(p256OrdElement)
    	_1111 := new(p256OrdElement)
    	_10101 := new(p256OrdElement)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 3K bytes
    - Viewed (0)
  3. platforms/core-runtime/functional/src/main/java/org/gradle/internal/Deferrable.java

                    U result = mapper.apply(value);
                    return Objects.requireNonNull(result, "Mapping a Deferrable to null is not allowed");
                }
            };
        }
    
        /**
         * Chains two {@link Deferrable}s.
         *
         * @param mapper A function which creates the next {@link Deferrable} from the result of the first one.
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Sep 22 08:22:02 UTC 2023
    - 3.9K bytes
    - Viewed (0)
  4. security/pkg/pki/util/keycertbundle.go

    	}
    	cert, err := ParsePemEncodedCertificate(certBytes)
    	if err != nil {
    		return fmt.Errorf("failed to parse cert PEM: %v", err)
    	}
    	chains, err := cert.Verify(opts)
    
    	if len(chains) == 0 || err != nil {
    		return fmt.Errorf(
    			"cannot verify the cert with the provided root chain and cert "+
    				"pool with error: %v", err)
    	}
    
    	// Verify that the key can be correctly parsed.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sun Jan 21 06:07:50 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/util/concurrent/AbstractChainedListenableFutureTest.java

    import java.util.concurrent.TimeUnit;
    import java.util.concurrent.TimeoutException;
    import junit.framework.TestCase;
    
    /**
     * Unit tests for any listenable future that chains other listenable futures. Unit tests need only
     * override buildChainingFuture and getSuccessfulResult, but they can add custom tests as needed.
     *
     * @author Nishant Thakkar
     */
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Wed Sep 06 17:04:31 UTC 2023
    - 3.4K bytes
    - Viewed (0)
  6. platforms/native/platform-native/src/integTest/groovy/org/gradle/nativeplatform/NativePlatformSamplesIntegrationTest.groovy

        @Rule public final Sample variants = sample(testDirectoryProvider, 'variants')
        @Rule public final Sample toolChains = sample(testDirectoryProvider, 'tool-chains')
        @Rule public final Sample prebuilt = sample(testDirectoryProvider, 'prebuilt')
        @Rule public final Sample targetPlatforms = sample(testDirectoryProvider, 'target-platforms')
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Thu Nov 16 20:20:03 UTC 2023
    - 10.8K bytes
    - Viewed (0)
  7. maven-core/src/main/java/org/apache/maven/resolver/MavenChainedWorkspaceReader.java

                }
            }
    
            public int hashCode() {
                return this.keys.hashCode();
            }
        }
    
        /**
         * chains a collection of {@link WorkspaceReader}s
         * @param workspaceReaderCollection the collection of readers, might be empty but never <code>null</code>
    Registered: Wed Jun 12 09:55:16 UTC 2024
    - Last Modified: Fri Apr 12 10:50:18 UTC 2024
    - 5.6K bytes
    - Viewed (0)
  8. pilot/pkg/networking/plugin/authn/authentication.go

    	}
    
    	// Then generate the per-port passthrough filter chains.
    	for port := range b.applier.PortLevelSetting() {
    		// Skip the per-port passthrough filterchain if the port is already handled by InboundMTLSConfiguration().
    		if !needPerPortPassthroughFilterChain(port, b.proxy) {
    			continue
    		}
    
    		authnLog.Debugf("InboundMTLSConfiguration: build extra pass through filter chain for %v:%d", b.proxy.ID, port)
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 22:20:44 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  9. platforms/jvm/toolchains-jvm/src/main/java/org/gradle/jvm/toolchain/internal/task/ToolchainReportRenderer.java

                getTextOutput().withStyle(Description).println(cause.getMessage());
                reportedCauseLines++;
    
                cause = cause.getCause();
    
                // Protect against excessively long cause-chains in the outputs.
                if (reportedCauseLines == INVALID_TOOLCHAIN_ERROR_CAUSE_LIMIT && cause != null) {
                    // Ellipsize the omitted cause lines:
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Jul 28 16:17:59 UTC 2023
    - 4.3K bytes
    - Viewed (0)
  10. okhttp/src/test/java/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt

          }
        }
      }
    
      /**
       * Not checking the CA bit created a vulnerability in old OkHttp releases. It is exploited by
       * triggering different chains to be discovered by the TLS engine and our chain cleaner. In this
       * attack there's several different chains.
       *
       *
       * The victim's gets a non-CA certificate signed by a CA, and pins the CA root and/or
       * intermediate. This is business as usual.
       *
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 23.8K bytes
    - Viewed (0)
Back to top