Search Options

Results per page
Sort
Preferred Languages
Advance

Results 561 - 570 of 570 for Allow (0.32 sec)

  1. cmd/xl-storage.go

    	if err = checkPathLength(dstFilePath); err != nil {
    		return err
    	}
    	if srcIsDir {
    		// If source is a directory, we expect the destination to be non-existent but we
    		// we still need to allow overwriting an empty directory since it represents
    		// an object empty directory.
    		dirInfo, err := Lstat(dstFilePath)
    		if isSysErrIO(err) {
    			return errFaultyDisk
    		}
    		if err != nil {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 91.7K bytes
    - Viewed (0)
  2. src/main/webapp/js/admin/bootstrap.min.js.map

    would stop cycling until user tapped out of it;\n        // here, we listen for touchend, explicitly pause the carousel\n        // (as if it's the second time we tap on it, mouseenter compat event\n        // is NOT fired) and after a timeout (to allow for mouse compatibility\n        // events to fire) we explicitly restart cycling\n\n        this.pause()\n        if (this.touchTimeout) {\n          clearTimeout(this.touchTimeout)\n        }\n\n        this.touchTimeout = setTimeout(event => this.cycle(event),...
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 180.9K bytes
    - Viewed (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/URLConnectionTest.kt

        assertFailsWith<IOException> {
          getResponse(newRequest("/foo"))
        }.also { expected ->
          when (expected) {
            is SSLHandshakeException -> {
              // Allow conscrypt to fail in different ways
              if (!platform.isConscrypt()) {
                assertThat(expected.cause!!).isInstanceOf<CertificateException>()
              }
            }
            is TlsFatalAlert -> {}
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Sat Jun 21 20:36:35 UTC 2025
    - 133.2K bytes
    - Viewed (0)
  4. doc/go_spec.html

    Go is a general-purpose language designed with systems programming
    in mind. It is strongly typed and garbage-collected and has explicit
    support for concurrent programming.  Programs are constructed from
    <i>packages</i>, whose properties allow efficient management of
    dependencies.
    </p>
    
    <p>
    The syntax is compact and simple to parse, allowing for easy analysis
    by automatic tools such as integrated development environments.
    </p>
    
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Dec 02 23:07:19 UTC 2025
    - 286.5K bytes
    - Viewed (1)
  5. fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml

        <!-- and a lower priority than pcap - TIKA-4174 -->
        <magic priority="55">
          <match minShouldMatch="2">
            <match value="user-agent:" type="stringignorecase" offset="0"/>
            <match value="allow:" type="stringignorecase" offset="0"/>
            <match value="disallow:" type="stringignorecase" offset="0"/>
            <match value="sitemap:" type="stringignorecase" offset="0"/>
    Registered: Sat Dec 20 11:21:39 UTC 2025
    - Last Modified: Thu Oct 16 07:46:32 UTC 2025
    - 320.2K bytes
    - Viewed (5)
  6. src/main/java/jcifs/internal/smb1/com/LockingAndXRange.java

                this.byteOffset = boHigh << 32 | boLow;
    
                final int lHigh = SMBUtil.readInt4(buffer, bufferIndex + 12);
                final int lLow = SMBUtil.readInt4(buffer, bufferIndex + 16);
    
                this.lengthInBytes = lHigh << 32 | lLow;
                return 20;
            }
            this.pid = SMBUtil.readInt2(buffer, bufferIndex);
            this.byteOffset = SMBUtil.readInt4(buffer, bufferIndex + 2);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  7. CREDITS

      rights and licenses granted hereunder, each Recipient hereby
      assumes sole responsibility to secure any other intellectual
      property rights needed, if any. For example, if a third party
      patent license is required to allow Recipient to Distribute the
      Program, it is Recipient's responsibility to acquire that license
      before distributing the Program.
    
      d) Each Contributor represents that to its knowledge it has
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
  8. src/main/webapp/css/admin/adminlte.min.css.map

    $font-family-monospace;\n  @include font-size(1em); // Correct the odd `em` font sizing in all browsers.\n}\n\npre {\n  // Remove browser default top margin\n  margin-top: 0;\n  // Reset browser default of `1em` to use `rem`s\n  margin-bottom: 1rem;\n  // Don't allow content to break outside\n  overflow: auto;\n  // Disable auto-hiding scrollbar in IE & legacy Edge to avoid overlap,\n  // making it impossible to interact with the content\n  -ms-overflow-style: scrollbar;\n}\n\n\n//\n// Figures\n//\n\nfigure {\n...
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Sat Oct 26 01:49:09 UTC 2024
    - 3.7M bytes
    - Viewed (3)
  9. lib/fips140/v1.1.0-rc1.zip

    packet number does not reset on key updates, so the XOR mask must be // provided explicitly instead of being learned on the first Seal call. Note // that the nonce passed to Seal must already be XOR'd with the IV, the IV is // provided here only to allow Seal to enforce that the counter is strictly // increasing. // // This complies with FIPS 140-3 IG C.H Scenario 5. func NewGCMForQUIC(cipher *aes.Block, iv []byte) (*GCMWithXORCounterNon, error) { g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize,...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Dec 11 16:27:41 UTC 2025
    - 663K bytes
    - Viewed (0)
  10. lib/fips140/v1.0.0-c2097c7c.zip

    BLK_OUT R4 #define BLK_KEY R5 #define KEY_LEN R6 #define BLK_IDX R7 #define IDX R8 #define IN_LEN R9 #define COUNTER R10 #define CONPTR R14 #define MASK V5 // Implementation of the counterCrypt function in assembler. // Original loop is unrolled to allow for multiple encryption // streams to be done in parallel, which is achieved by interleaving // vcipher instructions from each stream. This is also referred to as // stitching, and provides significant performance improvements. // Some macros are defined...
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Sep 25 19:53:19 UTC 2025
    - 642.7K bytes
    - Viewed (0)
Back to top