Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 71 - 80 of 89 for destruction (0.09 seconds)

  1. okhttp/src/commonJvmAndroid/kotlin/okhttp3/OkHttpClient.kt

         *   attempt multiple proxy servers in sequence, eventually falling back to a direct
         *   connection.
         *
         * Set this to false to avoid retrying requests when doing so is destructive. In this case the
         * calling application should do its own recovery of connectivity failures.
         */
        fun retryOnConnectionFailure(retryOnConnectionFailure: Boolean) =
          apply {
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Tue Oct 07 21:55:03 GMT 2025
    - 51.4K bytes
    - Click Count (0)
  2. src/cmd/asm/internal/asm/testdata/arm.s

    // Copyright 2015 The Go Authors. All rights reserved.
    // Use of this source code is governed by a BSD-style
    // license that can be found in the LICENSE file.
    
    // This input was created by taking the instruction productions in
    // the old assembler's (5a's) grammar and hand-writing complete
    // instructions for each rule, to guarantee we cover the same space.
    
    #include "../../../../../runtime/textflag.h"
    
    TEXT	foo(SB), DUPOK|NOSPLIT, $0
    
    // ADD
    //
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Fri Dec 15 20:51:01 GMT 2023
    - 69K bytes
    - Click Count (0)
  3. docs/changelogs/changelog_3x.md

        most common use of duplex calls is [gRPC][grpc_http2].
    
     *  New: Prevent OkHttp from retransmitting a request body by overriding `RequestBody.isOneShot()`.
        This is most useful when writing the request body is destructive.
    
     *  New: We've added `requestFailed()` and `responseFailed()` methods to `EventListener`. These
        are called instead of `requestBodyEnd()` and `responseBodyEnd()` in some failure situations.
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sun Feb 06 14:55:54 GMT 2022
    - 50.8K bytes
    - Click Count (0)
  4. cmd/object-handlers.go

    	if srcInfo.Legacy {
    		srcInfo.metadataOnly = false
    	}
    
    	// Check if x-amz-metadata-directive or x-amz-tagging-directive was not set to REPLACE and source,
    	// destination are same objects. Apply this restriction also when
    	// metadataOnly is true indicating that we are not overwriting the object.
    	// if encryption is enabled we do not need explicit "REPLACE" metadata to
    	// be enabled as well - this is to allow for key-rotation.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 120.6K bytes
    - Click Count (0)
  5. CHANGELOG/CHANGELOG-1.11.md

    * Scheduler only activates unschedulable pods if node's scheduling related properties change. ([#71551](https://github.com/kubernetes/kubernetes/pull/71551), [@mlmhl](https://github.com/mlmhl))
    * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Feb 06 06:04:15 GMT 2020
    - 328.4K bytes
    - Click Count (0)
  6. lib/fips140/v1.0.0-c2097c7c.zip

    der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
  7. CHANGELOG/CHANGELOG-1.33.md

    - Allowed dynamic configuration of the service account name and audience that the kubelet could request a token for, as part of the node audience restriction feature. ([#130485](https://github.com/kubernetes/kubernetes/pull/130485), [@aramase](https://github.com/aramase)) [SIG Auth and Testing]
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Wed Dec 10 01:15:24 GMT 2025
    - 334.8K bytes
    - Click Count (0)
  8. lib/fips140/v1.1.0-rc1.zip

    der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Dec 11 16:27:41 GMT 2025
    - 663K bytes
    - Click Count (0)
  9. android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt

      `What was that?' inquired Alice.
    
      `Reeling and Writhing, of course, to begin with,' the Mock
    Turtle replied; `and then the different branches of Arithmetic--
    Ambition, Distraction, Uglification, and Derision.'
    
      `I never heard of "Uglification,"' Alice ventured to say.  `What is it?'
    
      The Gryphon lifted up both its paws in surprise.  `What!  Never
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Fri Apr 21 02:27:51 GMT 2017
    - 145.2K bytes
    - Click Count (0)
  10. CHANGELOG/CHANGELOG-1.24.md

    ### Detection
    
    Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as.
    
    If you find evidence that this vulnerability has been exploited, please contact ******@****.***
    
    #### Additional Details
    
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Aug 24 00:02:43 GMT 2023
    - 473.4K bytes
    - Click Count (0)
Back to Top