- Sort Score
- Result 10 results
- Languages All
Results 1 - 2 of 2 for sectre (0.15 sec)
-
src/archive/tar/reader_test.go
"../foo", "/foo", "a/b/../../../c", } { var buf bytes.Buffer tw := NewWriter(&buf) tw.WriteHeader(&Header{ Name: path, }) const securePath = "secure" tw.WriteHeader(&Header{ Name: securePath, }) tw.Close() tr := NewReader(&buf) h, err := tr.Next() if err != ErrInsecurePath {
Go - Registered: Tue Apr 30 11:13:12 GMT 2024 - Last Modified: Mon Nov 21 21:14:38 GMT 2022 - 47.1K bytes - Viewed (0) -
doc/godebug.md
Go 1.22 disabled [`ConnectionState.ExportKeyingMaterial`](/pkg/crypto/tls/#ConnectionState.ExportKeyingMaterial) when the connection supports neither TLS 1.3 nor Extended Master Secret (implemented in Go 1.21). It can be reenabled with the [`tlsunsafeekm` setting](/pkg/crypto/tls/#ConnectionState.ExportKeyingMaterial). Go 1.22 changed how the runtime interacts with transparent huge pages on Linux.
Plain Text - Registered: Tue May 07 11:14:38 GMT 2024 - Last Modified: Tue Apr 16 17:29:58 GMT 2024 - 13.5K bytes - Viewed (0)