- Sort Score
- Result 10 results
- Languages All
Results 41 - 46 of 46 for putString (0.07 sec)
-
CHANGELOG/CHANGELOG-1.35.md
## Changes by Kind ### Deprecation - FailCgroupV1 will be set to true from 1.35. This means that nodes will not start on a cgroup v1 in our default behavior. This is putting cgroup v1 into a deprecated state. ([#134298](https://github.com/kubernetes/kubernetes/pull/134298), [@kannon92](https://github.com/kannon92)) [SIG Node]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Dec 17 13:01:55 UTC 2025 - 228.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.22.md
- After DBus restarts, make `GracefulNodeShutdown` work again ([#100369](https://github.com/kubernetes/kubernetes/pull/100369), [@wzshiming](https://github.com/wzshiming)) - Aggregate errors when putting vmss. ([#98350](https://github.com/kubernetes/kubernetes/pull/98350), [@nilo19](https://github.com/nilo19))
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Tue Dec 13 12:43:45 UTC 2022 - 454.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.21.md
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Fri Oct 14 07:03:14 UTC 2022 - 367.3K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.20.md
### Bug or Regression - Aggregate errors when putting vmss ([#98350](https://github.com/kubernetes/kubernetes/pull/98350), [@nilo19](https://github.com/nilo19)) [SIG Cloud Provider]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Jan 19 21:05:45 UTC 2022 - 409K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
### Bug or Regression - Aggregate errors when putting vmss ([#98350](https://github.com/kubernetes/kubernetes/pull/98350), [@nilo19](https://github.com/nilo19)) [SIG Cloud Provider]
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0) -
lib/fips140/v1.1.0-rc1.zip
:= priv.pub.a[:k*l] computeMatrixA(A, ρ[:], p) for r := range l { priv.s1[r] = ntt(s1[r]) } for r := range k { priv.s2[r] = ntt(s2[r]) } for r := range k { priv.t0[r] = ntt(t0[r]) } // We need to put something in priv.seed, and putting random bytes feels // safer than putting anything predictable. drbg.Read(priv.seed[:]) // Making this format *even more* annoying, we need to recompute t1 from ρ, // s1, and s2 if we want to generate the public key. This is essentially as // much work as regenerating...
Registered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Dec 11 16:27:41 UTC 2025 - 663K bytes - Viewed (0)