- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 110 for destruction (0.11 seconds)
-
src/cmd/asm/internal/asm/testdata/arm.s
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // This input was created by taking the instruction productions in // the old assembler's (5a's) grammar and hand-writing complete // instructions for each rule, to guarantee we cover the same space. #include "../../../../../runtime/textflag.h" TEXT foo(SB), DUPOK|NOSPLIT, $0 // ADD //
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Fri Dec 15 20:51:01 GMT 2023 - 69K bytes - Click Count (0) -
docs/changelogs/changelog_3x.md
most common use of duplex calls is [gRPC][grpc_http2]. * New: Prevent OkHttp from retransmitting a request body by overriding `RequestBody.isOneShot()`. This is most useful when writing the request body is destructive. * New: We've added `requestFailed()` and `responseFailed()` methods to `EventListener`. These are called instead of `requestBodyEnd()` and `responseBodyEnd()` in some failure situations.
Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Click Count (0) -
src/cmd/cgo/doc.go
automatically defined in the preamble. Note that there is no way for C code to create a value of this type; this is only useful for passing string values from Go to C and back to Go. Using //export in a file places a restriction on the preamble: since it is copied into two different C output files, it must not contain any definitions, only declarations. If a file contains both definitions and declarations, then the two output files will produce
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Mon Dec 08 22:37:14 GMT 2025 - 43.9K bytes - Click Count (0) -
cmd/object-handlers.go
if srcInfo.Legacy { srcInfo.metadataOnly = false } // Check if x-amz-metadata-directive or x-amz-tagging-directive was not set to REPLACE and source, // destination are same objects. Apply this restriction also when // metadataOnly is true indicating that we are not overwriting the object. // if encryption is enabled we do not need explicit "REPLACE" metadata to // be enabled as well - this is to allow for key-rotation.Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 120.6K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
* Scheduler only activates unschedulable pods if node's scheduling related properties change. ([#71551](https://github.com/kubernetes/kubernetes/pull/71551), [@mlmhl](https://github.com/mlmhl)) * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.33.md
- Allowed dynamic configuration of the service account name and audience that the kubelet could request a token for, as part of the node audience restriction feature. ([#130485](https://github.com/kubernetes/kubernetes/pull/130485), [@aramase](https://github.com/aramase)) [SIG Auth and Testing]
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Mar 19 03:17:58 GMT 2026 - 369K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
`What was that?' inquired Alice. `Reeling and Writhing, of course, to begin with,' the Mock Turtle replied; `and then the different branches of Arithmetic-- Ambition, Distraction, Uglification, and Derision.' `I never heard of "Uglification,"' Alice ventured to say. `What is it?' The Gryphon lifted up both its paws in surprise. `What! Never
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Apr 21 02:27:51 GMT 2017 - 145.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.24.md
### Detection Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** #### Additional Details
Created: Fri Apr 03 09:05:14 GMT 2026 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Click Count (0)