Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 729 for overlap (0.14 sec)

  1. pkg/config/analysis/analyzers/analyzers_test.go

    		expected: []message{
    			{msg.InvalidWebhook, "MutatingWebhookConfiguration istio-sidecar-injector-missing-overlap"},
    			{msg.InvalidWebhook, "MutatingWebhookConfiguration istio-sidecar-injector-missing-overlap"},
    			{msg.InvalidWebhook, "MutatingWebhookConfiguration istio-sidecar-injector-overlap"},
    		},
    	},
    	{
    		name: "Route Rule no effect on Ingress",
    		inputFiles: []string{
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Fri Jun 14 07:22:31 UTC 2024
    - 42.6K bytes
    - Viewed (0)
  2. platforms/core-execution/execution/src/test/groovy/org/gradle/internal/execution/history/OutputsCleanerTest.groovy

            outputFiles << outputFile
    
            outputFiles.each {
                it << "output ${it.name}"
            }
    
            def overlappingFile = subDir.file("overlap")
            overlappingFile << "overlapping file"
    
            when:
            cleanupOutput(outputDir, subDir, *outputFiles)
            then:
            _ * dirSafeToDelete.test(subDir) >> true
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Sep 22 09:46:15 UTC 2023
    - 3.4K bytes
    - Viewed (0)
  3. src/crypto/cipher/ctr.go

    }
    
    func (x *ctr) XORKeyStream(dst, src []byte) {
    	if len(dst) < len(src) {
    		panic("crypto/cipher: output smaller than input")
    	}
    	if alias.InexactOverlap(dst[:len(src)], src) {
    		panic("crypto/cipher: invalid buffer overlap")
    	}
    	for len(src) > 0 {
    		if x.outUsed >= len(x.out)-x.b.BlockSize() {
    			x.refill()
    		}
    		n := subtle.XORBytes(dst, src, x.out[x.outUsed:])
    		dst = dst[n:]
    		src = src[n:]
    		x.outUsed += n
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Oct 13 17:09:47 UTC 2023
    - 2.2K bytes
    - Viewed (0)
  4. platforms/core-execution/hashing/src/test/groovy/org/gradle/internal/hash/HashingTest.groovy

            hasher.putInt(1)
            hasher.hash()
    
            when:
            hasher.hash()
    
            then:
            thrown(IllegalStateException)
        }
    
        def 'hashers can overlap'() {
            when:
            def hasher1 = Hashing.newHasher()
            hasher1.putInt(1)
    
            and:
            def hasher2 = Hashing.newHasher()
            hasher2.putInt(1)
    
    Registered: Wed Jun 12 18:38:38 UTC 2024
    - Last Modified: Fri Sep 22 08:43:29 UTC 2023
    - 3.3K bytes
    - Viewed (0)
  5. src/cmd/vendor/golang.org/x/tools/go/analysis/diagnostic.go

    // A SuggestedFix is a code change associated with a Diagnostic that a
    // user can choose to apply to their code. Usually the SuggestedFix is
    // meant to fix the issue flagged by the diagnostic.
    //
    // The TextEdits must not overlap, nor contain edits for other packages.
    type SuggestedFix struct {
    	// A description for this suggested fix to be shown to a user deciding
    	// whether to accept it.
    	Message   string
    	TextEdits []TextEdit
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 04 16:19:04 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  6. src/crypto/aes/ctr_s390x.go

    func (c *aesctr) XORKeyStream(dst, src []byte) {
    	if len(dst) < len(src) {
    		panic("crypto/cipher: output smaller than input")
    	}
    	if alias.InexactOverlap(dst[:len(src)], src) {
    		panic("crypto/cipher: invalid buffer overlap")
    	}
    	for len(src) > 0 {
    		if len(c.buffer) == 0 {
    			c.refill()
    		}
    		n := xorBytes(dst, src, c.buffer)
    		c.buffer = c.buffer[n:]
    		src = src[n:]
    		dst = dst[n:]
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 2.4K bytes
    - Viewed (0)
  7. pkg/config/validation/agent/validation_test.go

    			valid:      false,
    		},
    		{
    			name:       "explicit wildcard region overlap",
    			localities: []string{"*", "a/b/c"},
    			valid:      false,
    		},
    		{
    			name:       "implicit wildcard region overlap",
    			localities: []string{"a", "a/b/c"},
    			valid:      false,
    		},
    		{
    			name:       "explicit wildcard zone overlap",
    			localities: []string{"a/*", "a/b/c"},
    			valid:      false,
    		},
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Wed Apr 17 20:06:41 UTC 2024
    - 39.1K bytes
    - Viewed (0)
  8. src/crypto/internal/nistec/p256.go

    	buf := append(out[:0], 2)
    	buf[0] |= y.Bytes()[p256ElementLength-1] & 1
    	buf = append(buf, x.Bytes()...)
    	return buf
    }
    
    // Add sets q = p1 + p2, and returns q. The points may overlap.
    func (q *P256Point) Add(p1, p2 *P256Point) *P256Point {
    	// Complete addition formula for a = -3 from "Complete addition formulas for
    	// prime order elliptic curves" (https://eprint.iacr.org/2015/1060), §A.2.
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 17.2K bytes
    - Viewed (0)
  9. src/crypto/internal/nistec/p521.go

    	buf := append(out[:0], 2)
    	buf[0] |= y.Bytes()[p521ElementLength-1] & 1
    	buf = append(buf, x.Bytes()...)
    	return buf
    }
    
    // Add sets q = p1 + p2, and returns q. The points may overlap.
    func (q *P521Point) Add(p1, p2 *P521Point) *P521Point {
    	// Complete addition formula for a = -3 from "Complete addition formulas for
    	// prime order elliptic curves" (https://eprint.iacr.org/2015/1060), §A.2.
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Aug 12 00:04:29 UTC 2022
    - 17K bytes
    - Viewed (0)
  10. src/runtime/memmove_arm64.s

    // srcend R4
    // dstend R5
    // data   R6-R17
    // tmp1   R14
    
    // Copies are split into 3 main cases: small copies of up to 32 bytes, medium
    // copies of up to 128 bytes, and large copies. The overhead of the overlap
    // check is negligible since it is only required for large copies.
    //
    // Large copies use a software pipelined loop processing 64 bytes per iteration.
    // The destination pointer is 16-byte aligned to minimize unaligned accesses.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Mar 18 18:26:13 UTC 2022
    - 6K bytes
    - Viewed (0)
Back to top