- Sort Score
- Result 10 results
- Languages All
Results 21 - 23 of 23 for Strip (0.41 sec)
-
src/crypto/x509/x509_test.go
} } else { // When we hack our custom Subject in the test cases above, // we don't set the additional fields (such as Names) in the // hacked issuer. Round-trip a parsing of pkix.Name so that // we add these missing fields for the comparison. issuerRDN := tc.issuer.Subject.ToRDNSequence() var caIssuer pkix.Name caIssuer.FillFromRDNSequence(&issuerRDN)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 21:00:16 UTC 2024 - 163.4K bytes - Viewed (0) -
src/net/http/server.go
// allow a misbehaving client to soak up server connections indefinitely by // withholding an ACK, nor do we want to go through the complexity or overhead // of using low-level APIs to figure out when a TCP round-trip has completed. // // Instead, we declare that we are “reasonably certain” that we received the // ACK if maxRSTAvoidanceDelay has elapsed. time.Sleep(rstAvoidanceDelay) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jun 07 17:57:01 UTC 2024 - 123.4K bytes - Viewed (0) -
src/runtime/proc.go
gp.m.locks++ // Entersyscall must not call any function that might split/grow the stack. // (See details in comment above.) // Catch calls that might, by replacing the stack guard with something that // will trip any stack check and leaving a flag to tell newstack to die. gp.stackguard0 = stackPreempt gp.throwsplit = true // Leave SP around for GC and traceback. save(pc, sp, bp) gp.syscallsp = sp
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 207.5K bytes - Viewed (0)