- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for dsn_string (0.62 sec)
-
docs/bucket/notifications/README.md
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 84.2K bytes - Viewed (0) -
cmd/testdata/undeleteable-object.tgz
y":"keep_alive_interval","value":"0s"},{"key":"reconnect_interval","value":"0s"},{"key":"queue_dir","value":""},{"key":"queue_limit","value":"0"}]},"notify_mysql":{"_":[{"key":"enable","value":"off"},{"key":"format","value":"namespace"},{"key":"dsn_string","value":""},{"key":"table","value":""},{"key":"queue_dir","value":""},{"key":"queue_limit","value":"0"},{"key":"max_open_connections","value":"2"}]},"notify_nats":{"_":[{"key":"enable","value":"off"},{"key":"address","value":""},{"key":"subjec...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 26 00:31:12 UTC 2024 - 8.7M bytes - Viewed (0) -
src/test/java/jcifs/smb1/smb1/NtlmChallengeTest.java
NtlmChallenge nc = new NtlmChallenge(challenge, dc); String result = nc.toString(); // The format is: NtlmChallenge[challenge=0x<hex>,dc=<dc_string>] assertTrue(result.startsWith("NtlmChallenge[challenge=0x")); assertTrue(result.endsWith(",dc=SERVER123]")); // Hexdump.toHexString with size = length * 2 produces 8 uppercase hex chars
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 6K bytes - Viewed (0) -
tensorflow/c/c_api_test.cc
absl::Status status; for (const std::vector<int64_t>& dims : std::vector<std::vector<int64_t>>{{n}, {1, n}, {n, 1}, {n / 2, 2}}) { // Create C++ Tensor Tensor src(tensorflow::DT_STRING, TensorShape(dims)); for (int64_t i = 0; i < src.NumElements(); ++i) { src.flat<tstring>()(i) = data[i]; } TF_Tensor* dst = TF_TensorFromTensor(src, &status);
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Fri Dec 27 12:18:10 UTC 2024 - 97K bytes - Viewed (0) -
RELEASE.md
* Fixes an integer truncation vulnerability in code using the work sharder API, ([CVE-2020-15202](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15202)) * Fixes a format string vulnerability in `tf.strings.as_string`, ([CVE-2020-15203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15203)) * Fixes segfault raised by calling session-only ops in eager mode,
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (1)