- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 203 for unimplemented (0.1 sec)
-
android/guava/src/com/google/common/eventbus/SubscriberRegistry.java
/** * Flattens a class's type hierarchy into a set of {@code Class} objects including all * superclasses (transitively) and all interfaces implemented by these superclasses. */ @VisibleForTesting static ImmutableSet<Class<?>> flattenHierarchy(Class<?> concreteClass) { return flattenHierarchyCache.getUnchecked(concreteClass); }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 15:16:45 UTC 2024 - 10.8K bytes - Viewed (0) -
guava/src/com/google/common/graph/AbstractNetwork.java
import javax.annotation.CheckForNull; /** * This class provides a skeletal implementation of {@link Network}. It is recommended to extend * this class rather than implement {@link Network} directly. * * <p>The methods implemented in this class should not be overridden unless the subclass admits a * more efficient implementation. * * @author James Sexton * @param <N> Node parameter type * @param <E> Edge parameter type * @since 20.0 */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Mar 13 18:17:09 UTC 2024 - 10.4K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/DerReader.kt
* multiple variants of ASN.1, including: * * * DER: Distinguished Encoding Rules. This further constrains ASN.1 for deterministic encoding. * * BER: Basic Encoding Rules. * * This class was implemented according to the [X.690 spec][[x690]], and under the advice of * [Lets Encrypt's ASN.1 and DER][asn1_and_der] guide. * * [x690]: https://www.itu.int/rec/T-REC-X.690
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 10.5K bytes - Viewed (0) -
docs/features/https.md
Specific security vs. connectivity decisions are implemented by [ConnectionSpec](https://square.github.io/okhttp/4.x/okhttp/okhttp3/-connection-spec/). OkHttp includes four built-in connection specs:
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Dec 24 00:16:30 UTC 2022 - 10.5K bytes - Viewed (0) -
cmd/net.go
ipList = set.NewStringSet() for _, addr := range addrs { ipList.Add(addr) } return ipList, err } // sortIPs - sort ips based on higher octets. // The logic to sort by last octet is implemented to // prefer CIDRs with higher octets, this in-turn skips the // localhost/loopback address to be not preferred as the // first ip on the list. Subsequently this list helps us print
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jun 19 14:34:00 UTC 2024 - 9.6K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
BasicConstraints( ca = it[0] as Boolean, maxIntermediateCas = it[1] as Long?, ) }, ) /** * Note that only a subset of available choices are implemented. * * ``` * GeneralName ::= CHOICE { * otherName [0] OtherName, * rfc822Name [1] IA5String,
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 13.6K bytes - Viewed (0) -
docs/en/docs/tutorial/security/first-steps.md
* The frontend (running in the user's browser) sends that `username` and `password` to a specific URL in our API (declared with `tokenUrl="token"`). * The API checks that `username` and `password`, and responds with a "token" (we haven't implemented any of this yet). * A "token" is just a string with some content that we can use later to verify this user. * Normally, a token is set to expire after some time.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 9.2K bytes - Viewed (0) -
SECURITY.md
phase. As part of the differences that make Eager mode easier to debug, the [shape inference functions](https://www.tensorflow.org/guide/create_op#define_the_op_interface) are skipped, and any checks implemented inside the shape inference code are not executed. The security impact of skipping those checks should be low, since the attack scenario would require a malicious user to be able to control the model which as
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 16 16:10:43 UTC 2024 - 9.6K bytes - Viewed (0) -
guava-gwt/src-super/com/google/common/util/concurrent/super/com/google/common/util/concurrent/AbstractFuture.java
try { pendingDescription = pendingToString(); } catch (RuntimeException e) { // Don't call getMessage or toString() on the exception, in case the exception thrown by the // subclass is implemented with bugs similar to the subclass. pendingDescription = "Exception thrown from implementation: " + e.getClass(); } // The future may complete during or before the call to getPendingToString, so we use null
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Jan 22 19:37:41 UTC 2024 - 12.3K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AbstractTransformFuture.java
} catch (CancellationException e) { // TODO(user): verify future behavior - unify logic with getFutureValue in AbstractFuture. This // code should be unreachable with correctly implemented Futures. // Cancel this future and return. // At this point, inputFuture is cancelled and outputFuture doesn't exist, so the value of // mayInterruptIfRunning is irrelevant. cancel(false);
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 25 13:13:32 UTC 2024 - 11K bytes - Viewed (0)