Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 155 of 155 for viewer (0.07 sec)

  1. okhttp/src/jvmTest/resources/okhttp3/internal/publicsuffix/public_suffix_list.dat

    // https://www.iana.org/domains/root/db/viajes.html
    viajes
    
    // video : Dog Beach, LLC
    // https://www.iana.org/domains/root/db/video.html
    video
    
    // vig : VIENNA INSURANCE GROUP AG Wiener Versicherung Gruppe
    // https://www.iana.org/domains/root/db/vig.html
    vig
    
    // viking : Viking River Cruises (Bermuda) Ltd.
    // https://www.iana.org/domains/root/db/viking.html
    viking
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Dec 27 13:39:56 UTC 2024
    - 309.7K bytes
    - Viewed (1)
  2. doc/go_spec.html

    p2 := new([]int)  // p2 points to an uninitialized slice with value nil and length 0
    </pre>
    
    <p>
    The length of an array literal is the length specified in the literal type.
    If fewer elements than the length are provided in the literal, the missing
    elements are set to the zero value for the array element type.
    It is an error to provide elements with index values outside the index range
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue May 06 19:12:15 UTC 2025
    - 286.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.19.md

    - github.com/spf13/cobra: [v0.0.5 → v1.0.0](https://github.com/spf13/cobra/compare/v0.0.5...v1.0.0)
    - github.com/spf13/viper: [v1.3.2 → v1.4.0](https://github.com/spf13/viper/compare/v1.3.2...v1.4.0)
    - github.com/tmc/grpc-websocket-proxy: [89b8d40 → 0ad062e](https://github.com/tmc/grpc-websocket-proxy/compare/89b8d40...0ad062e)
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Jan 05 05:42:32 UTC 2022
    - 489.7K bytes
    - Viewed (0)
  4. lib/fips140/v1.0.0.zip

    " ) // This file contains two implementations of AES-GCM. The first implementation // (useGHASH) uses the KMCTR instruction to encrypt using AES in counter mode // and the KIMD instruction for GHASH. The second implementation (useGCM) uses // the newer KMA instruction which performs both operations (but still requires // KIMD to hash large nonces). // Keep in sync with crypto/tls.hasAESGCMHardwareSup. var useGHASH = cpu.S390XHasAES && cpu.S390XHasAESCTR && cpu.S390XHasGHASH var useGCM = useGHASH...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
  5. CREDITS

    code under terms of your choice, provided that, if the incorporated
    material is not limited to numerical parameters, data structure
    layouts and accessors, or small macros, inline functions and templates
    (ten or fewer lines in length), you do both of the following:
    
       a) Give prominent notice with each copy of the object code that the
       Library is used in it and that the Library and its use are
       covered by this License.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
Back to top