- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for partlen (0.2 sec)
-
src/cmd/compile/internal/ssagen/ssa.go
case ir.OSLICE2ARRPTR: // if arrlen > slice.len { // panic(...) // } // slice.ptr n := n.(*ir.ConvExpr) v := s.expr(n.X) nelem := n.Type().Elem().NumElem() arrlen := s.constInt(types.Types[types.TINT], nelem) cap := s.newValue1(ssa.OpSliceLen, types.Types[types.TINT], v) s.boundsCheck(arrlen, cap, ssa.BoundsConvert, false) op := ssa.OpSlicePtr
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Jun 10 19:44:43 UTC 2024 - 284.9K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.25.md
There is no mitigation from this issue. Cluster admins should take care to secure aggregated API servers and should not grant access to mutate `APIService`s to untrusted parties. **Affected Versions**: - kube-apiserver v1.25.0 - kube-apiserver v1.24.0 - v1.24.4
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon May 06 09:23:20 UTC 2024 - 419.1K bytes - Viewed (0) -
src/net/http/h2_bundle.go
// (Section 5.4.1) of type INADEQUATE_SECURITY if one of // the prohibited cipher suites are negotiated." // // We choose that. In my opinion, the spec is weak // here. It also says both parties must support at least // TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 so there's no // excuses here. If we really must, we could allow an // "AllowInsecureWeakCiphers" option on the server later.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 04 16:19:04 UTC 2024 - 364.1K bytes - Viewed (0)