14%
28.11.2021
import (
04 "crypto/md5"
05 "crypto/sha1"
06 "crypto/sha256"
07 "crypto/sha512"
08 "encoding/hex"
09 "hash"
10 "io"
11 "log"
12 "os"
13 )
14
15 func genChecksum(file, hashfunc string
14%
30.11.2025
System (output follows)
09 DOWNLOAD PKGS FILES XFER (MB)
10 Completed 20/20 3021/3021 42.55/42.55
11
12 PHASE
14%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
14%
30.11.2020
Initiative Daemon
Loaded: loaded (/usr/local/lib/systemd/system/crio.service; enabled; vendor preset: enabled)
Active: inactive (dead) since Sun 2020-09-20 17:01:22 UTC; 14s ago
Docs: https
14%
09.01.2013
a 256-bit AES key. An additional SHA-256 HMAC checksum protects the data from manipulation.
Compression: S3QL compresses the data before storing, using either LZMA, bzip2, or gzip. This compression
13%
07.10.2014
_string;
08
09 static int prochello_show( struct seq_file *m, void *v )
10 {
11 int error = 0;
12
13 error = seq_printf( m, "%s\n", output_string);
14 return error;
15 }
16
17 static int prochello
13%
07.10.2014
/* 64 bit Fowler/Noll/Vo FNV-1a hash code */
05 static inline uint64_t fnv_64a_buf(const void *buf, size_t len, uint64_t hval)
06 {
07 const unsigned char *p = (const unsigned char *) buf;
08
09
13%
30.11.2025
2: unknown file or directory type
which was difficult to troubleshoot. It finally turned out that Guestfish (or the e2fsprogs version 1.40.5 and newer it was relying on) used an inode size of 256
13%
30.11.2025
.";
04 String s04 = "Hello, Linux Magazine!";
05 %>
06
07
08
<%= message%>
09 <%= s04%>
10 <%= new java
13%
18.07.2013
buffered disk reads: 616 MB in
3.00 seconds = 205.03 MB/sec
$ hdparm -T /dev/sda
/dev/sda:
Timing cached reads: 6292 MB in
2.00 seconds = 3153.09 MB/sec
If this were a spinning disk, you would also