Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 4 of 4 for leer (0.05 seconds)

  1. RELEASE.md

    Mustafa Kasap, Nathan Burnham, Nathan Luehr, Naveen Marri, ngc92, nio1814, Oleg
    Zabluda, Ou Changkun, Panos Ipeirotis, Paul Van Eck, Peter Lee, Piotr Czapla,
    qjivy, Rholais Lii, Rodrigo Formigone, Russell Klopfer, ryantimjohn, Sang Han,
    SebastiáN RamíRez, shengfuintel, Siby Jose Plathottam, Silver Chan, Stanislaw
    Antol, Taehoon Lee, Tarang Chugh, Ted Chang, Thomas Bastiani, Xian Xu, Xiaoming
    Created: Tue Dec 30 12:39:10 GMT 2025
    - Last Modified: Tue Oct 28 22:27:41 GMT 2025
    - 740.4K bytes
    - Click Count (3)
  2. okhttp-idna-mapping-table/src/main/resources/okhttp3/internal/idna/IdnaMappingTable.txt

    2FB1          ; mapped                 ; 97CB          # 3.0  KANGXI RADICAL TANNED LEATHER
    2FB2          ; mapped                 ; 97ED          # 3.0  KANGXI RADICAL LEEK
    2FB3          ; mapped                 ; 97F3          # 3.0  KANGXI RADICAL SOUND
    2FB4          ; mapped                 ; 9801          # 3.0  KANGXI RADICAL LEAF
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sat Feb 10 11:25:47 GMT 2024
    - 854.1K bytes
    - Click Count (0)
  3. lib/fips140/v1.0.0-c2097c7c.zip

    &PublicKey{curve: c.curve, q: bytes.Clone(key)}, nil } func ECDH[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { fipsSelfTest() fips140.RecordApproved() return ecdh(c, k, peer) } func ecdh[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { if c.curve != k.pub.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } if k.pub.curve != peer.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } // This applies the Shared Secret Computation...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
  4. lib/fips140/v1.1.0-rc1.zip

    &PublicKey{curve: c.curve, q: bytes.Clone(key)}, nil } func ECDH[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { fipsSelfTest() fips140.RecordApproved() return ecdh(c, k, peer) } func ecdh[P Point[P]](c *Curve[P], k *PrivateKey, peer *PublicKey) ([]byte, error) { if c.curve != k.pub.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } if k.pub.curve != peer.curve { return nil, errors.New("crypto/ecdh: mismatched curves") } // This applies the Shared Secret Computation...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Dec 11 16:27:41 GMT 2025
    - 663K bytes
    - Click Count (0)
Back to Top