Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 230 for verified$ (0.14 sec)

  1. tensorflow/compiler/jit/flags.h

      bool tf_mlir_enable_strict_clusters;
      bool tf_mlir_enable_tpu_variable_runtime_reformatting_pass;
      // TODO(pineapplejuice233): Revisit this flag once the performance impact is verified
      // with different local CPU devices settings.
      bool tf_mlir_enable_multiple_local_cpu_devices;
    };
    
    // Flags for the JitRt pipeline -- see tf_jitrt_pipeline.h for details.
    struct JitRtFlags {
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Wed Apr 17 18:52:57 UTC 2024
    - 14.5K bytes
    - Viewed (0)
  2. pilot/pkg/model/context.go

    	// VerifiedIdentity determines whether a proxy had its identity verified. This
    	// generally occurs by JWT or mTLS authentication. This can be false when
    	// connecting over plaintext. If this is set to true, we can verify the proxy has
    	// access to ConfigNamespace namespace. However, other options such as node type
    	// are not part of an Istio identity and thus are not verified.
    	VerifiedIdentity *spiffe.Identity
    
    	// IPMode of proxy.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Mon Jun 03 08:29:05 UTC 2024
    - 33.6K bytes
    - Viewed (0)
  3. src/runtime/mspanset.go

    		// the buf may not be empty.
    	}
    	top, bottom := head/spanSetBlockEntries, head%spanSetBlockEntries
    
    	// We may be reading a stale spine pointer, but because the length
    	// grows monotonically and we've already verified it, we'll definitely
    	// be reading from a valid block.
    	blockp := b.spine.Load().lookup(uintptr(top))
    
    	// Given that the spine length is correct, we know we will never
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 25 19:53:03 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  4. src/net/tcpsock.go

    // intentionally / accidentally filtered out by a device in between, a
    // fallback to TCP will be done. This method does its best to check if
    // MPTCP is still being used or not.
    //
    // On Linux, more conditions are verified on kernels >= v5.16, improving
    // the results.
    func (c *TCPConn) MultipathTCP() (bool, error) {
    	if !c.ok() {
    		return false, syscall.EINVAL
    	}
    	return isUsingMultipathTCP(c.fd), nil
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Apr 15 03:10:07 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  5. src/mime/multipart/multipart.go

    	}
    	return len(buf), readErr
    }
    
    // matchAfterPrefix checks whether buf should be considered to match the boundary.
    // The prefix is "--boundary" or "\r\n--boundary" or "\n--boundary",
    // and the caller has verified already that bytes.HasPrefix(buf, prefix) is true.
    //
    // matchAfterPrefix returns +1 if the buffer does match the boundary,
    // meaning the prefix is followed by a double dash, space, tab, cr, nl,
    // or end of input.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu Mar 21 16:12:35 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  6. platforms/documentation/docs/src/docs/userguide/authoring-builds/other/test_kit.adoc

    * The build's output;
    * The build's logging (i.e. console output);
    * The set of tasks executed by the build and their results (e.g. FAILED, UP-TO-DATE etc.).
    
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Tue Apr 23 05:36:09 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  7. cmd/erasure-healing.go

    	// the diskWithAllParts needs to reach the drive to ensure
    	// validity of the metadata content, we should make sure that
    	// we pass in disks as is for it to be verified. Once verified
    	// the disksWithAllParts() returns the actual disks that can be
    	// used here for reconstruction. This is done to ensure that
    	// we do not skip drives that have inconsistent metadata to be
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 10 15:51:27 UTC 2024
    - 33.8K bytes
    - Viewed (0)
  8. docs/sts/ldap.md

    ```
    
    The search filter must use the LDAP username to find the user DN. This is done via [variable substitution](#variable-substitution-in-configuration-strings).
    
    The returned user's DN and their password are then verified with the LDAP server. The user DN may also be associated with an [access policy](#managing-usergroup-access-policy).
    
    The User DN attributes configuration parameter:
    ```
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 18.9K bytes
    - Viewed (0)
  9. src/archive/tar/writer_test.go

    				Uname:    "dsymonds",
    				Gname:    "eng",
    				ModTime:  time.Unix(1254699560, 0),
    				Format:   FormatGNU,
    			}, nil},
    		},
    	}, {
    		// This truncated file was produced using this library.
    		// It was verified to work with GNU tar 1.27.1 and BSD tar 3.1.2.
    		//  dd if=/dev/zero bs=1G count=16 >> writer-big-long.tar
    		//  gnutar -xvf writer-big-long.tar
    		//  bsdtar -xvf writer-big-long.tar
    		//
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 01:00:11 UTC 2024
    - 38.7K bytes
    - Viewed (0)
  10. src/crypto/ecdsa/ecdsa_test.go

    	if err != nil {
    		panic(err)
    	}
    
    	// Sign a hash consisting of all zeros.
    	r, s, err := Sign(rand.Reader, privKey, zeroHash)
    	if err != nil {
    		panic(err)
    	}
    
    	// Confirm that it can be verified.
    	if !Verify(&privKey.PublicKey, zeroHash, r, s) {
    		t.Errorf("zero hash signature verify failed for %T", curve)
    	}
    }
    
    func TestRandomPoint(t *testing.T) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Feb 26 21:33:58 UTC 2024
    - 13.5K bytes
    - Viewed (0)
Back to top