- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 49 for normally (0.06 sec)
-
LICENSE
tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, "normally used" refers to a
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Apr 23 18:58:53 UTC 2021 - 33.7K bytes - Viewed (0) -
src/archive/tar/reader.go
// files. Internally, the tar format often uses fake "files" to add meta // data that describes the next file. These meta data "files" should not // normally be visible to the outside. As such, this loop iterates through // one or more "header files" until it finds a "normal file". format := FormatUSTAR | FormatPAX | FormatGNU for { // Discard the remainder of the file and any padding.
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Mar 08 01:59:14 UTC 2024 - 26.8K bytes - Viewed (0) -
src/cmd/cgo/doc.go
C.complexfloat (complex float), and C.complexdouble (complex double). The C type void* is represented by Go's unsafe.Pointer. The C types __int128_t and __uint128_t are represented by [16]byte. A few special C types which would normally be represented by a pointer type in Go are instead represented by a uintptr. See the Special cases section below. To access a struct, union, or enum type directly, prefix it with
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Dec 11 23:57:34 UTC 2024 - 44K bytes - Viewed (0) -
LICENSE
documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attributionRegistered: Fri Sep 19 09:08:11 UTC 2025 - Last Modified: Mon Jan 11 04:30:09 UTC 2021 - 11.1K bytes - Viewed (0) -
LICENSE
documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attributionRegistered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Nov 29 17:31:56 UTC 2021 - 13.3K bytes - Viewed (0) -
fess-crawler/src/main/resources/org/codelibs/fess/crawler/mime/tika-mimetypes.xml
* Highly specific magic matches get a high priority * General magic matches which could trigger a false-positive need a low one * The priority for containers normally need to be higher than for the things they contain, so they don't accidently get detected as what's in them * For logic too complex to be expressed in a magic match, do the bestRegistered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Thu Mar 13 08:18:01 UTC 2025 - 320.1K bytes - Viewed (1) -
src/archive/zip/writer.go
if w.cw.count != 0 { panic("zip: SetOffset called after data was written") } w.cw.count = n } // Flush flushes any buffered data to the underlying writer. // Calling Flush is not normally necessary; calling Close is sufficient. func (w *Writer) Flush() error { return w.cw.w.(*bufio.Writer).Flush() } // SetComment sets the end-of-central-directory comment field.Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Jan 28 04:20:09 UTC 2025 - 19.4K bytes - Viewed (0) -
doc/go_spec.html
If <code>D</code> returns normally, without starting a new <code>panic</code>, the panicking sequence stops. In that case, the state of functions called between <code>G</code> and the call to <code>panic</code> is discarded, and normal execution resumes. Any functions deferred by <code>G</code> before <code>D</code> are then run and <code>G</code>'s
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue May 06 19:12:15 UTC 2025 - 286.2K bytes - Viewed (1) -
VULNERABILITY_REPORT.md
# Vulnerability Management Policy This document formally describes the process of addressing and managing a reported vulnerability that has been found in the MinIO server code base, any directly connected ecosystem component or a direct / indirect dependency of the code base. ## Scope The vulnerability management policy described in this document covers the process of investigating, assessing and resolving a vulnerability report
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Feb 12 00:51:25 UTC 2022 - 1.5K bytes - Viewed (0) -
lib/fips140/v1.0.0.zip
are in bit reversed order. var productTable [16]gcmFieldElement // We precompute 16 multiples of H. However, when we do lookups // into this table we'll be using bits from a field element and // therefore the bits will be in the reverse order. So normally one // would expect, say, 4*H to be in index 4 of the table but due to // this bit ordering it will actually be in index 0010 (base 2) = 2. x := gcmFieldElement{ byteorder.BEUint64(H[:8]), byteorder.BEUint64(H[8:]), } productTable[reverseBits(1)]...
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Jan 29 15:10:35 UTC 2025 - 635K bytes - Viewed (0)