- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 673 for doPing (0.12 sec)
-
internal/grid/muxclient.go
// Next loop will catch it. case <-pingTimer: if !m.doPing(respHandler) { return } goto sendResp } case <-pingTimer: if !m.doPing(respHandler) { return } } } } // doPing checks last ping time and sends another ping. func (m *muxClient) doPing(respHandler chan<- Response) (ok bool) { m.respMu.Lock() if m.closed {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri Jun 07 15:51:52 UTC 2024 - 15.9K bytes - Viewed (0) -
src/go/build/deps_test.go
NET, log < net/mail; NONE < crypto/internal/boring/sig, crypto/internal/boring/syso; sync/atomic < crypto/internal/boring/bcache, crypto/internal/boring/fipstls; crypto/internal/boring/sig, crypto/internal/boring/fipstls < crypto/tls/fipsonly; # CRYPTO is core crypto algorithms - no cgo, fmt, net. crypto/internal/boring/sig, crypto/internal/boring/syso, golang.org/x/sys/cpu, hash, embed < crypto
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 24 16:41:13 UTC 2024 - 19.2K bytes - Viewed (0) -
README.md
require distributed deploying MinIO with Erasure Coding. For extended development and production, deploy MinIO with Erasure Coding enabled - specifically, with a *minimum* of 4 drives per MinIO server. See [MinIO Erasure Code Overview](https://min.io/docs/minio/linux/operations/concepts/erasure-coding.html) for more complete documentation. ### Stable
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 10 00:22:36 UTC 2024 - 18.3K bytes - Viewed (0) -
docs/en/docs/async.md
But as you go away from the counter and sit at the table with a number for your turn, you can switch 🔀 your attention to your crush, and "work" ⏯ 🤓 on that. Then you are again doing something very "productive" as is flirting with your crush 😍.
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Mon May 20 00:24:48 UTC 2024 - 23K bytes - Viewed (0) -
src/cmd/compile/internal/types2/subst.go
if base != t.base { return &Pointer{base: base} } case *Tuple: return subst.tuple(t) case *Signature: // Preserve the receiver: it is handled during *Interface and *Named type // substitution. // // Naively doing the substitution here can lead to an infinite recursion in // the case where the receiver is an interface. For example, consider the // following declaration: //
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:04:07 UTC 2024 - 11K bytes - Viewed (0) -
src/crypto/rsa/pkcs1v15.go
return nil, err } k := pub.Size() if len(msg) > k-11 { return nil, ErrMessageTooLong } if boring.Enabled && random == boring.RandReader { bkey, err := boringPublicKey(pub) if err != nil { return nil, err } return boring.EncryptRSAPKCS1(bkey, msg) } boring.UnreachableExceptTests() // EM = 0x00 || 0x02 || PS || 0x00 || M em := make([]byte, k) em[1] = 2
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:21 UTC 2024 - 12.8K bytes - Viewed (0) -
CONTRIBUTING.md
#### C++ coding style Changes to TensorFlow C++ code should conform to [Google C++ Style Guide](https://google.github.io/styleguide/cppguide.html). Use `clang-tidy` to check your C/C++ changes. To install `clang-tidy` on ubuntu:16.04, do: ```bash apt-get install -y clang-tidy ``` You can check a C/C++ file by doing: ```bash
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu Mar 21 11:45:51 UTC 2024 - 15.6K bytes - Viewed (0) -
src/crypto/rsa/rsa.go
k := pub.Size() if len(msg) > k-2*hash.Size()-2 { return nil, ErrMessageTooLong } if boring.Enabled && random == boring.RandReader { bkey, err := boringPublicKey(pub) if err != nil { return nil, err } return boring.EncryptRSAOAEP(hash, hash, bkey, msg, label) } boring.UnreachableExceptTests() hash.Write(label) lHash := hash.Sum(nil) hash.Reset()
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 23.4K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa.go
randutil.MaybeReadByte(rand) if boring.Enabled && rand == boring.RandReader { x, y, d, err := boring.GenerateKeyECDSA(c.Params().Name) if err != nil { return nil, err } return &PrivateKey{PublicKey: PublicKey{Curve: c, X: bbig.Dec(x), Y: bbig.Dec(y)}, D: bbig.Dec(d)}, nil } boring.UnreachableExceptTests() switch c.Params() { case elliptic.P224().Params():
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 20.4K bytes - Viewed (0) -
platforms/documentation/docs/src/docs/userguide/authoring-builds/tasks/task_configuration_avoidance.adoc
- `Created during configuration` represents tasks created using the configuration avoidance APIs, but were realized explicitly (via `TaskProvider#get()`) or implicitly using the eager task query APIs. - Both `Created immediately` and `Created during configuration` numbers are considered "bad" numbers that should be minimized as much as possible.
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Wed Mar 27 23:45:25 UTC 2024 - 21.4K bytes - Viewed (0)