- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 85 for spinning (0.1 seconds)
-
internal/dsync/dsync_test.go
benchmarkMutex(b, true, true) } func BenchmarkMutexNoSpin(b *testing.B) { b.ResetTimer() b.ReportAllocs() // This benchmark models a situation where spinning in the mutex should be // non-profitable and allows to confirm that spinning does not do harm. // To achieve this we create excess of goroutines most of which do local work. // These goroutines yield during local work, so that switching from
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 10.8K bytes - Click Count (0) -
android/guava/src/com/google/common/util/concurrent/AbstractFutureState.java
// have observed 12 micros on 64-bit linux systems to wake up a parked thread). So if the // timeout is small we shouldn't park(). This needs to be traded off with the cpu overhead of // spinning, so we use SPIN_THRESHOLD_NANOS which is what AbstractQueuedSynchronizer uses for // similar purposes. // * We want to behave reasonably for timeouts of 0
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Aug 07 16:05:33 GMT 2025 - 33.2K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
* * ## Warning: Certificate Pinning is Dangerous! * * Pinning certificates limits your server team's abilities to update their TLS certificates. By * pinning certificates, you take on additional operational complexity and limit your ability to * migrate between certificate authorities. Do not use certificate pinning without the blessing of * your server's TLS administrator! *
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 14.2K bytes - Click Count (1) -
okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/CertificatePinnerChainValidationTest.kt
// rogue CA is trusted) but it should fail certificate pinning. val request = Request .Builder() .url(server.url("/")) .build() val call = client.newCall(request) assertFailsWith<SSLPeerUnverifiedException> { call.execute() }.also { expected -> // Certificate pinning fails!Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Tue Jan 27 09:00:39 GMT 2026 - 24.4K bytes - Click Count (2) -
src/test/java/jcifs/internal/smb2/Smb3KeyDerivationTest.java
// Then assertNotNull(signingKey, "Signing key should not be null"); assertEquals(16, signingKey.length, "Signing key should be 16 bytes"); assertFalse(Arrays.equals(sessionKey, signingKey), "Signing key should be different from session key"); } @Test @DisplayName("Should derive signing key for SMB 3.1.1 dialect") void testDeriveSigningKey_SMB311() { // GivenCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 17.5K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java
import jcifs.internal.SMBSigningDigest; import jcifs.internal.util.SMBUtil; import jcifs.util.Crypto; /** * SMB2/SMB3 message signing digest implementation. * * This class handles cryptographic signing of SMB2/SMB3 messages to ensure * message integrity and authenticity. It supports different signing algorithms * used in various SMB2/SMB3 dialect versions. * * @author mbechler */
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 9.9K bytes - Click Count (0) -
src/bufio/scan.go
// // Scanning stops if the function returns an error, in which case some of // the input may be discarded. If that error is [ErrFinalToken], scanning // stops with no error. A non-nil token delivered with [ErrFinalToken] // will be the last token, and a nil token with [ErrFinalToken] // immediately stops the scanning. // // Otherwise, the [Scanner] advances the input. If the token is not nil,
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Wed May 21 18:05:26 GMT 2025 - 14.2K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/SMB1SigningDigest.java
} /** * Constructs a signing digest with bypass option and initial sequence number * * @param macSigningKey * The MAC signing key used for generating signatures * @param bypass * Whether to bypass signature verification * @param initialSequence * The initial sequence number for signing */Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 11.9K bytes - Click Count (0) -
cmd/erasure.go
di.UsedSpace = info.Used di.AvailableSpace = info.Free di.UUID = info.ID di.Major = info.Major di.Minor = info.Minor di.RootDisk = info.RootDisk di.Healing = info.Healing di.Scanning = info.Scanning di.State = diskErrToDriveState(err) di.FreeInodes = info.FreeInodes di.UsedInodes = info.UsedInodes if hi := disks[index].Healing(); hi != nil { hd := hi.toHealingDisk()
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.1K bytes - Click Count (0) -
src/test/java/jcifs/internal/SmbNegotiationResponseTest.java
assertFalse(result); verify(negotiationResponse).canReuse(null, false); } @Test @DisplayName("Test signing state combinations") void testSigningStateCombinations() { // Test all combinations of signing states // Signing disabled when(negotiationResponse.isSigningEnabled()).thenReturn(false); when(negotiationResponse.isSigningRequired()).thenReturn(false);
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 20.6K bytes - Click Count (0)