- Sort Score
- Num 10 results
- Language All
Results 71 - 80 of 89 for destruction (0.09 seconds)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/OkHttpClient.kt
* attempt multiple proxy servers in sequence, eventually falling back to a direct * connection. * * Set this to false to avoid retrying requests when doing so is destructive. In this case the * calling application should do its own recovery of connectivity failures. */ fun retryOnConnectionFailure(retryOnConnectionFailure: Boolean) = apply {Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Tue Oct 07 21:55:03 GMT 2025 - 51.4K bytes - Click Count (0) -
src/cmd/asm/internal/asm/testdata/arm.s
// Copyright 2015 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. // This input was created by taking the instruction productions in // the old assembler's (5a's) grammar and hand-writing complete // instructions for each rule, to guarantee we cover the same space. #include "../../../../../runtime/textflag.h" TEXT foo(SB), DUPOK|NOSPLIT, $0 // ADD //
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Fri Dec 15 20:51:01 GMT 2023 - 69K bytes - Click Count (0) -
docs/changelogs/changelog_3x.md
most common use of duplex calls is [gRPC][grpc_http2]. * New: Prevent OkHttp from retransmitting a request body by overriding `RequestBody.isOneShot()`. This is most useful when writing the request body is destructive. * New: We've added `requestFailed()` and `responseFailed()` methods to `EventListener`. These are called instead of `requestBodyEnd()` and `responseBodyEnd()` in some failure situations.
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sun Feb 06 14:55:54 GMT 2022 - 50.8K bytes - Click Count (0) -
cmd/object-handlers.go
if srcInfo.Legacy { srcInfo.metadataOnly = false } // Check if x-amz-metadata-directive or x-amz-tagging-directive was not set to REPLACE and source, // destination are same objects. Apply this restriction also when // metadataOnly is true indicating that we are not overwriting the object. // if encryption is enabled we do not need explicit "REPLACE" metadata to // be enabled as well - this is to allow for key-rotation.Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 120.6K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.11.md
* Scheduler only activates unschedulable pods if node's scheduling related properties change. ([#71551](https://github.com/kubernetes/kubernetes/pull/71551), [@mlmhl](https://github.com/mlmhl)) * fix issue: vm sku restriction policy does not work in azure disk attach/detach ([#71941](https://github.com/kubernetes/kubernetes/pull/71941), [@andyzhangx](https://github.com/andyzhangx))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Feb 06 06:04:15 GMT 2020 - 328.4K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.33.md
- Allowed dynamic configuration of the service account name and audience that the kubelet could request a token for, as part of the node audience restriction feature. ([#130485](https://github.com/kubernetes/kubernetes/pull/130485), [@aramase](https://github.com/aramase)) [SIG Auth and Testing]
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Wed Dec 10 01:15:24 GMT 2025 - 334.8K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
der" "crypto/internal/fips140deps/cpu" "crypto/internal/impl" ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
`What was that?' inquired Alice. `Reeling and Writhing, of course, to begin with,' the Mock Turtle replied; `and then the different branches of Arithmetic-- Ambition, Distraction, Uglification, and Derision.' `I never heard of "Uglification,"' Alice ventured to say. `What is it?' The Gryphon lifted up both its paws in surprise. `What! Never
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Apr 21 02:27:51 GMT 2017 - 145.2K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.24.md
### Detection Kubernetes Audit logs may indicate if the user name was misspelled to bypass the restriction placed on which user is a pod allowed to run as. If you find evidence that this vulnerability has been exploited, please contact ******@****.*** #### Additional Details
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu Aug 24 00:02:43 GMT 2023 - 473.4K bytes - Click Count (0)