Search Options

Results per page
Sort
Preferred Languages
Advance

Results 451 - 455 of 455 for _manager (3.29 sec)

  1. src/cmd/cgo/doc.go

    Go values created by calling new, by taking the address of a composite
    literal, or by taking the address of a local variable may also have their
    memory pinned using [runtime.Pinner]. This type may be used to manage
    the duration of the memory's pinned status, potentially beyond the
    duration of a C function call. Memory may be pinned more than once and
    must be unpinned exactly the same number of times it has been pinned.
    
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Dec 11 23:57:34 UTC 2024
    - 44K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/mylasta/action/FessLabels.java

        /** The key of the message: File to Upload */
        public static final String LABELS_design_title_file_upload = "{labels.design_title_file_upload}";
    
        /** The key of the message: File Manager */
        public static final String LABELS_design_title_file = "{labels.design_title_file}";
    
        /** The key of the message: Upload File */
        public static final String LABELS_design_file = "{labels.design_file}";
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 05 02:36:47 UTC 2025
    - 146.4K bytes
    - Viewed (0)
  3. RELEASE.md

            V2 but existing endpoint removals are only applied in V2.
        *   Deprecates behavior where device assignment overrides collocation
            constraints inside a collocation context manager.
    *   Keras & Python API
        *   Add to Keras functionality analogous to
            `tf.register_tensor_conversion_function`.
        *   Subclassed Keras models can now be saved through
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Mon Aug 18 20:54:38 UTC 2025
    - 740K bytes
    - Viewed (1)
  4. doc/go_spec.html

    </p>
    
    <pre>
    panic(42)
    panic("unreachable")
    panic(Error("cannot parse"))
    </pre>
    
    <p>
    The <code>recover</code> function allows a program to manage behavior
    of a panicking goroutine.
    Suppose a function <code>G</code> defers a function <code>D</code> that calls
    <code>recover</code> and a panic occurs in a function on the same goroutine in which <code>G</code>
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue May 06 19:12:15 UTC 2025
    - 286.2K bytes
    - Viewed (0)
  5. lib/fips140/v1.0.0.zip

    subtle.ConstantTimeByteEq(em[0], 0) seed := em[1 : hash.Size()+1] db := em[hash.Size()+1:] mgf1XOR(seed, mgfHash, db) mgf1XOR(db, mgfHash, seed) lHash2 := db[0:hash.Size()] // We have to validate the plaintext in constant time in order to avoid // attacks like: J. Manger. A Chosen Ciphertext Attack on RSA Optimal // Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 // v2.0. In J. Kilian, editor, Advances in Cryptology. lHash2Good := subtle.ConstantTimeCompare(lHash, lHash2) // The remainder of the plaintext...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top