Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for sectre (0.15 sec)

  1. src/archive/tar/reader_test.go

    		"../foo",
    		"/foo",
    		"a/b/../../../c",
    	} {
    		var buf bytes.Buffer
    		tw := NewWriter(&buf)
    		tw.WriteHeader(&Header{
    			Name: path,
    		})
    		const securePath = "secure"
    		tw.WriteHeader(&Header{
    			Name: securePath,
    		})
    		tw.Close()
    
    		tr := NewReader(&buf)
    		h, err := tr.Next()
    		if err != ErrInsecurePath {
    Go
    - Registered: Tue Apr 30 11:13:12 GMT 2024
    - Last Modified: Mon Nov 21 21:14:38 GMT 2022
    - 47.1K bytes
    - Viewed (0)
  2. doc/godebug.md

    Go 1.22 disabled
    [`ConnectionState.ExportKeyingMaterial`](/pkg/crypto/tls/#ConnectionState.ExportKeyingMaterial)
    when the connection supports neither TLS 1.3 nor Extended Master Secret
    (implemented in Go 1.21). It can be reenabled with the [`tlsunsafeekm`
    setting](/pkg/crypto/tls/#ConnectionState.ExportKeyingMaterial).
    
    Go 1.22 changed how the runtime interacts with transparent huge pages on Linux.
    Plain Text
    - Registered: Tue May 07 11:14:38 GMT 2024
    - Last Modified: Tue Apr 16 17:29:58 GMT 2024
    - 13.5K bytes
    - Viewed (0)
Back to top