Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 444 for overlap (0.13 sec)

  1. subprojects/core/src/integTest/groovy/org/gradle/api/internal/changedetection/rules/OverlappingOutputsIntegrationTest.groovy

                task cleanSecond(type: Delete) {
                    delete second
                }
            """
            return [":first", file("build/overlap/first.txt"),
                    ":second", file("build/overlap/second.txt")]
        }
    
        def "overlapping output directory with first, second then first, second"() {
            def (String first, TestFile firstOutput,
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Wed May 15 20:54:14 UTC 2024
    - 30K bytes
    - Viewed (0)
  2. src/crypto/des/cipher.go

    		panic("crypto/des: input not full block")
    	}
    	if len(dst) < BlockSize {
    		panic("crypto/des: output not full block")
    	}
    	if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
    		panic("crypto/des: invalid buffer overlap")
    	}
    	cryptBlock(c.subkeys[:], dst, src, false)
    }
    
    func (c *desCipher) Decrypt(dst, src []byte) {
    	if len(src) < BlockSize {
    		panic("crypto/des: input not full block")
    	}
    	if len(dst) < BlockSize {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 4K bytes
    - Viewed (0)
  3. src/regexp/onepass_test.go

    		[]rune{},
    		[]uint32{mergeFailed},
    		1, 2,
    	},
    	{
    		// overlap at interval begin
    		[]rune{69, 74},
    		[]rune{74, 75},
    		[]rune{},
    		[]uint32{mergeFailed},
    		1, 2,
    	},
    	{
    		// overlap ar interval end
    		[]rune{69, 74},
    		[]rune{65, 69},
    		[]rune{},
    		[]uint32{mergeFailed},
    		1, 2,
    	},
    	{
    		// overlap from above
    		[]rune{69, 74},
    		[]rune{71, 74},
    		[]rune{},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 19:36:03 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  4. src/cmd/compile/internal/liveness/intervals.go

    	for {
    		second := pv.nxt()
    		if second.done() {
    			break
    		}
    
    		// Check for overlap between cur and second. If no overlap
    		// then add cur to result and move on.
    		if !cur.i.Overlaps(second.i) && !cur.i.adjacent(second.i) {
    			ret = append(ret, cur.i)
    			cur = second
    			continue
    		}
    		// cur overlaps with second; merge second into cur
    		cur.i.MergeInto(second.i)
    	}
    	ret = append(ret, cur.i)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Mar 29 21:55:27 UTC 2024
    - 10K bytes
    - Viewed (0)
  5. pkg/controller/job/success_policy.go

    	for rulePointer < len(ruleIndexes) && succeededPointer < len(succeededIndexes) {
    		if overlap := min(ruleIndexes[rulePointer].Last, succeededIndexes[succeededPointer].Last) -
    			max(ruleIndexes[rulePointer].First, succeededIndexes[succeededPointer].First) + 1; overlap > 0 {
    			contains += overlap
    		}
    		if succeededIndexes[succeededPointer].Last < ruleIndexes[rulePointer].Last {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 11 15:36:36 UTC 2024
    - 3.4K bytes
    - Viewed (0)
  6. src/crypto/internal/boring/aes.go

    	}
    	return c, nil
    }
    
    func (c *aesCipher) BlockSize() int { return aesBlockSize }
    
    func (c *aesCipher) Encrypt(dst, src []byte) {
    	if inexactOverlap(dst, src) {
    		panic("crypto/cipher: invalid buffer overlap")
    	}
    	if len(src) < aesBlockSize {
    		panic("crypto/aes: input not full block")
    	}
    	if len(dst) < aesBlockSize {
    		panic("crypto/aes: output not full block")
    	}
    	C._goboringcrypto_AES_encrypt(
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jan 26 22:52:27 UTC 2024
    - 10.2K bytes
    - Viewed (0)
  7. src/crypto/aes/cipher.go

    		panic("crypto/aes: input not full block")
    	}
    	if len(dst) < BlockSize {
    		panic("crypto/aes: output not full block")
    	}
    	if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
    		panic("crypto/aes: invalid buffer overlap")
    	}
    	encryptBlockGo(c.enc[:c.l], dst, src)
    }
    
    func (c *aesCipher) Decrypt(dst, src []byte) {
    	if len(src) < BlockSize {
    		panic("crypto/aes: input not full block")
    	}
    	if len(dst) < BlockSize {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 14:58:19 UTC 2024
    - 2K bytes
    - Viewed (0)
  8. cluster/gce/upgrade-aliases.sh

    # $1: true or false for the desired allowSubnetCidrRoutesOverlap.
    #
    # Assumed vars:
    #   IP_ALIAS_SUBNETWORK
    #   GCE_API_ENDPOINT
    #   PROJECT
    #   REGION
    function set-allow-subnet-cidr-routes-overlap() {
      local allow_subnet_cidr_routes_overlap
      allow_subnet_cidr_routes_overlap=$(gcloud compute networks subnets \
        describe "${IP_ALIAS_SUBNETWORK}" --project="${PROJECT}" --region="${REGION}" \
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sat Jun 01 03:36:35 UTC 2024
    - 6K bytes
    - Viewed (0)
  9. src/crypto/aes/cipher_s390x.go

    		panic("crypto/aes: input not full block")
    	}
    	if len(dst) < BlockSize {
    		panic("crypto/aes: output not full block")
    	}
    	if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
    		panic("crypto/aes: invalid buffer overlap")
    	}
    	cryptBlocks(c.function, &c.key[0], &dst[0], &src[0], BlockSize)
    }
    
    func (c *aesCipherAsm) Decrypt(dst, src []byte) {
    	if len(src) < BlockSize {
    		panic("crypto/aes: input not full block")
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  10. src/crypto/aes/cipher_asm.go

    		panic("crypto/aes: input not full block")
    	}
    	if len(dst) < BlockSize {
    		panic("crypto/aes: output not full block")
    	}
    	if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
    		panic("crypto/aes: invalid buffer overlap")
    	}
    	encryptBlockAsm(int(c.l)/4-1, &c.enc[0], &dst[0], &src[0])
    }
    
    func (c *aesCipherAsm) Decrypt(dst, src []byte) {
    	boring.Unreachable()
    	if len(src) < BlockSize {
    		panic("crypto/aes: input not full block")
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 14:58:19 UTC 2024
    - 3K bytes
    - Viewed (0)
Back to top