Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 299 for implicit (0.04 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. okhttp-tls/src/test/java/okhttp3/tls/internal/der/DerTest.kt

        }
    
        assertThat(buffer.readByteString()).isEqualTo("A20743054A6F6E6573".decodeHex())
      }
    
      @Test fun `decode implicit tagged implicit prefixed type`() {
        // Type1 ::= VisibleString
        // Type2 ::= [APPLICATION 3] IMPLICIT Type1
        // Type3 ::= [2] Type2
        // Type4 ::= [APPLICATION 7] IMPLICIT Type3
        val buffer =
          Buffer()
            .write("670743054A6F6E6573".decodeHex())
    
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Wed Mar 19 19:25:20 GMT 2025
    - 31.7K bytes
    - Click Count (0)
  2. dbflute_fess/dfprop/classificationDefinitionMap.dfprop

    #                     ; groupComment=[comment]
    #                     ; elementList=list:{[the list of classification element's name]}
    #                 }
    #             }
    #         }
    #         # classification elements for implicit classification
    #         ; map:{
    #             ; code=[code]; name=[name]; alias=[alias]; comment=[comment]
    #             ; sisterCode=[code or code-list]; subItemMap=map:{[free-map]}
    #         }
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Jul 04 22:46:31 GMT 2015
    - 2.2K bytes
    - Click Count (0)
  3. build-tools-internal/src/main/resources/forbidden/es-server-signatures.txt

    java.util.concurrent.Executors#defaultThreadFactory()
    java.util.concurrent.Executors#privilegedThreadFactory()
    
    java.lang.Character#codePointBefore(char[],int) @ Implicit start offset is error-prone when the char[] is a buffer and the first chars are random chars
    java.lang.Character#codePointAt(char[],int) @ Implicit end offset is error-prone when the char[] is a buffer and the last chars are random chars
    
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Tue Jun 08 16:53:28 GMT 2021
    - 7.6K bytes
    - Click Count (0)
  4. android/guava/src/com/google/common/graph/MultiEdgesConnecting.java

    import java.util.AbstractSet;
    import java.util.Iterator;
    import java.util.Map;
    import java.util.Map.Entry;
    import org.jspecify.annotations.Nullable;
    
    /**
     * A class to represent the set of edges connecting an (implicit) origin node to a target node.
     *
     * <p>The {@link #outEdgeToNode} map allows this class to work on networks with parallel edges. See
     * {@link EdgesConnecting} for a class that is more efficient but forbids parallel edges.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sun Dec 22 03:38:46 GMT 2024
    - 2.2K bytes
    - Click Count (0)
  5. android/guava/src/com/google/common/math/DoubleUtils.java

      // Double#doubleToRawLongBits(double)} spec.
      static final long SIGN_MASK = 0x8000000000000000L;
    
      static final int SIGNIFICAND_BITS = 52;
    
      static final int EXPONENT_BIAS = 1023;
    
      /** The implicit 1 bit that is omitted in significands of normal doubles. */
      static final long IMPLICIT_BIT = SIGNIFICAND_MASK + 1;
    
      static long getSignificand(double d) {
        checkArgument(isFinite(d), "not a normal value");
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Mar 03 04:51:56 GMT 2026
    - 5K bytes
    - Click Count (0)
  6. android/guava/src/com/google/common/graph/EdgesConnecting.java

    import com.google.common.collect.UnmodifiableIterator;
    import java.util.AbstractSet;
    import java.util.Map;
    import org.jspecify.annotations.Nullable;
    
    /**
     * A class to represent the set of edges connecting an (implicit) origin node to a target node.
     *
     * <p>The {@link #nodeToOutEdge} map means this class only works on networks without parallel edges.
     * See {@link MultiEdgesConnecting} for a class that works with parallel edges.
     *
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Aug 11 19:31:30 GMT 2025
    - 2.1K bytes
    - Click Count (0)
  7. okhttp/src/commonJvmAndroid/kotlin/okhttp3/EventListener.kt

       */
      open fun connectionReleased(
        call: Call,
        connection: Connection,
      ) {
      }
    
      /**
       * Invoked just prior to sending request headers.
       *
       * The connection is implicit, and will generally relate to the last [connectionAcquired] event.
       *
       * This can be invoked more than 1 time for a single [Call]. For example, if the response to the
       * [Call.request] is a redirect to a different address.
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Oct 07 21:03:04 GMT 2025
    - 24.9K bytes
    - Click Count (0)
  8. build-logic-commons/publishing/src/main/kotlin/gradlebuild.publish-public-libraries.gradle.kts

            // Otherwise we get
            // ask ':tooling-api:publishGradleDistributionPublicationToRemoteRepository' uses this output of task ':tooling-api:signLocalPublication'
            // without declaring an explicit or implicit dependency. This can lead to incorrect results being produced, depending on what order the tasks are executed.
            tasks.named("publishGradleDistributionPublicationToRemoteRepository") {
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Thu Oct 30 16:56:31 GMT 2025
    - 5.7K bytes
    - Click Count (0)
  9. build-logic/binary-compatibility/src/test/groovy/gradlebuild/binarycompatibility/PublicAPIRulesTest.groovy

                    public interface Inner {
                    }
                }
            """
    
            then:
            rule.maybeViolation(jApiInnerClass) == null
        }
    
        def "the @since annotation on implicit enum method '#implicitMethod#paramTypes' is not required"() {
            given:
            def rule = withContext(new SinceAnnotationRule([:]))
            def jApiMethod = Stub(JApiMethod)
            jApiMethod.name >> implicitMethod
    Created: Wed Apr 01 11:36:16 GMT 2026
    - Last Modified: Fri Jun 06 17:52:09 GMT 2025
    - 16K bytes
    - Click Count (0)
  10. docs/en/docs/advanced/security/oauth2-scopes.md

    The most common is the implicit flow.
    
    The most secure is the code flow, but it's more complex to implement as it requires more steps. As it is more complex, many providers end up suggesting the implicit flow.
    
    /// note
    
    It's common that each authentication provider names their flows in a different way, to make it part of their brand.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 13.4K bytes
    - Click Count (0)
Back to Top