Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 197 for Third (0.01 sec)

  1. src/cmd/asm/internal/asm/asm.go

    			case arch.IsARM64STLXR(op):
    				// ARM64 instructions with one input and two outputs.
    				prog.From = a[0]
    				prog.To = a[1]
    				if a[2].Type != obj.TYPE_REG {
    					p.errorf("invalid addressing modes for third operand to %s instruction, must be register", op)
    					return
    				}
    				prog.RegTo2 = a[2].Reg
    			case arch.IsARM64TBL(op):
    				// one of its inputs does not fit into prog.Reg.
    				prog.From = a[0]
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Aug 05 17:31:25 UTC 2025
    - 26.2K bytes
    - Viewed (0)
  2. LICENSES/vendor/github.com/containerd/errdefs/pkg/LICENSE

              documentation, if provided along with the Derivative Works; or,
              within a display generated by the Derivative Works, if and
              wherever such third-party notices normally appear. The contents
              of the NOTICE file are for informational purposes only and
              do not modify the License. You may add Your own attribution
    Registered: Fri Sep 05 09:05:11 UTC 2025
    - Last Modified: Wed Mar 05 11:36:39 UTC 2025
    - 10.7K bytes
    - Viewed (0)
  3. SECURITY.md

        violates the use cases and security assumptions defined in the threat model.
        This will help us evaluate your report quickly, especially if the issue is
        complex.
      - Whether this vulnerability is public or known to third parties. If it is,
        please provide details.
    
    We will try to fix the problems as soon as possible. Vulnerabilities will, in
    general, be batched to be fixed at the same time as a quarterly release. We
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 16 16:10:43 UTC 2024
    - 9.6K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/FileEntryTest.java

                // Act & Assert
                assertNull(mockEntry.getName(), "first call returns null");
                assertEquals("", mockEntry.getName(), "second call returns empty");
                assertEquals(" ", mockEntry.getName(), "third call returns space");
    
                verify(mockEntry, times(3)).getName();
            }
        }
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10K bytes
    - Viewed (0)
  5. src/test/java/jcifs/internal/smb2/lock/Smb2LockTest.java

                assertEquals(300L, SMBUtil.readInt8(buffer, 24));
                assertEquals(400L, SMBUtil.readInt8(buffer, 32));
                assertEquals(2, SMBUtil.readInt4(buffer, 40));
    
                // Verify third lock
                assertEquals(500L, SMBUtil.readInt8(buffer, 48));
                assertEquals(600L, SMBUtil.readInt8(buffer, 56));
                assertEquals(4, SMBUtil.readInt4(buffer, 64));
            }
    
            @Test
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  6. CODE_OF_CONDUCT.md

    1.  Address the perceived conflict directly with those involved, preferably in a
        real-time medium.
    2.  If this fails, get a third party (e.g. a mutual friend, and/or someone with
        background on the issue, but not involved in the conflict) to intercede.
    3.  If you are still unable to resolve the conflict, and you believe it rises to
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Fri Feb 05 18:43:16 UTC 2021
    - 5.2K bytes
    - Viewed (0)
  7. src/test/java/jcifs/internal/fscc/FileInternalInfoTest.java

            SMBUtil.writeInt8(indexNumber2, buffer2, 0);
            fileInternalInfo.decode(buffer2, 0, buffer2.length);
            assertEquals(indexNumber2, fileInternalInfo.getIndexNumber());
    
            // Third decode - should overwrite again
            byte[] buffer3 = new byte[8];
            long indexNumber3 = 0x3333333333333333L;
            SMBUtil.writeInt8(indexNumber3, buffer3, 0);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 13.1K bytes
    - Viewed (0)
  8. tensorflow/api_template_v1.__init__.py

      _tf_dir = _os.path.dirname(_current_file_location)
      _kernel_dir = _os.path.join(_tf_dir, "core", "kernels")
      if _os.path.exists(_kernel_dir):
        _ll.load_library(_kernel_dir)
    
      # Load third party dynamic kernels.
      for _s in _site_packages_dirs:
        _plugin_dir = _os.path.join(_s, "tensorflow-plugins")
        if _os.path.exists(_plugin_dir):
          _ll.load_library(_plugin_dir)
    Registered: Tue Sep 09 12:39:10 UTC 2025
    - Last Modified: Wed Oct 02 22:16:02 UTC 2024
    - 7.5K bytes
    - Viewed (0)
  9. misc/cgo/gmp/gmp.go

    Instead, a separate tool, cgo, processes it to produce three output
    files.  The first two, 6g.go and 6c.c, are a Go source file for 6g and
    a C source file for 6c; both compile as part of the named package
    (gmp, in this example).  The third, gcc.c, is a C source file for gcc;
    it compiles into a shared object (.so) that is dynamically linked into
    any 6.out that imports the first two files.
    
    The stanza
    
    	// #include <gmp.h>
    	import "C"
    
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon Apr 11 16:34:30 UTC 2022
    - 9.5K bytes
    - Viewed (0)
  10. docs/pt/docs/tutorial/security/first-steps.md

    Pode ser usado pelo time de frontend (que pode ser você no caso).
    
    Pode ser usado por aplicações e sistemas third party (de terceiros).
    
    E também pode ser usada por você mesmo, para debugar, checar e testar a mesma aplicação.
    
    ## O Fluxo da `senha`
    
    Agora vamos voltar um pouco e entender o que é isso tudo.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.3K bytes
    - Viewed (0)
Back to top