Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 160 of 814 for ensure (0.08 sec)

  1. guava/src/com/google/common/hash/LittleEndianByteArray.java

                ByteOrder.nativeOrder().equals(ByteOrder.LITTLE_ENDIAN)
                    ? UnsafeByteArray.UNSAFE_LITTLE_ENDIAN
                    : UnsafeByteArray.UNSAFE_BIG_ENDIAN;
          }
        } catch (Throwable t) {
          // ensure we really catch *everything*
        }
        byteArray = theGetter;
      }
    
      /** Deter instantiation of this class. */
      private LittleEndianByteArray() {}
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Sat Oct 19 00:26:48 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  2. cmd/bitrot.go

    			return errFileCorrupt
    		}
    
    		left -= read
    		if !bytes.Equal(h.Sum(nil), hashBuf[:n]) {
    			return errFileCorrupt
    		}
    	}
    	return nil
    }
    
    // bitrotSelfTest performs a self-test to ensure that bitrot
    // algorithms compute correct checksums. If any algorithm
    // produces an incorrect checksum it fails with a hard error.
    //
    // bitrotSelfTest tries to catch any issue in the bitrot implementation
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Jan 30 20:43:25 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  3. internal/grid/grid.go

    	case <-w.ctx.Done():
    		return 0, context.Cause(w.ctx)
    	}
    }
    
    // WriterToChannel will return an io.Writer that writes to the given channel.
    // The context both allows returning errors on writes and to ensure that
    // this isn't abandoned if the channel is no longer being read from.
    func WriterToChannel(ctx context.Context, ch chan<- []byte) io.Writer {
    	return &writerWrapper{ch: ch, ctx: ctx}
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jul 29 18:10:04 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  4. cni/pkg/install/cniconfig.go

    				continue
    			}
    		} else {
    			conf, err := libcni.ConfFromFile(confFile)
    			if err != nil {
    				installLog.Warnf("Error loading CNI config file %s: %v", confFile, err)
    				continue
    			}
    			// Ensure the config has a "type" so we know what plugin to run.
    			// Also catches the case where somebody put a conflist into a conf file.
    			if conf.Network.Type == "" {
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Thu Aug 01 18:38:14 UTC 2024
    - 8.2K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java

          for (int insertion = 0; insertion < totalInsertions; insertion++) {
            RandomHasherAction.pickAtRandom(random).performAction(random, sinksAndControl);
          }
          // We need to ensure that at least 4 bytes have been put into the hasher or else
          // Hasher#hash will throw an ISE.
          int intToPut = random.nextInt();
          for (Hasher hasher : sinksAndControl) {
            hasher.putInt(intToPut);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  6. docs/bucket/replication/DESIGN.md

    `COMPLETED` only after the replication operation succeeds on each of the targets specified in the replication configuration. If multiple targets are configured to use active-active replication and multi destination replication, the administrator should ensure that the replication features enabled (such as replica metadata sync, delete marker replication etc) are identical to avoid asymmetric state. This is because all replication activity is inherently a one-way operation from source to target, irrespective...
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 14.7K bytes
    - Viewed (0)
  7. okhttp-idna-mapping-table/src/main/kotlin/okhttp3/internal/idn/MappingTables.kt

              ranges.removeAt(j)
            } else {
              break@mergeAdjacent
            }
          }
        }
        i++
      }
      return ranges
    }
    
    /**
     * Returns a copy of [mappings], splitting to ensure that each mapping is entirely contained within
     * a single section.
     */
    internal fun withoutSectionSpans(mappings: List<Mapping>): List<Mapping> {
      val result = mutableListOf<Mapping>()
    
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 8.2K bytes
    - Viewed (0)
  8. docs/kms/README.md

    - [Understand the KES server concepts](https://github.com/minio/kes/wiki/Concepts)
    
    ## Auto Encryption
    
    Auto-Encryption is useful when MinIO administrator wants to ensure that all data stored on MinIO is encrypted at rest.
    
    ### Using `mc encrypt` (recommended)
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  9. src/cmd/asm/internal/asm/testdata/amd64dynlinkerror.s

    two:
    	RET
    TEXT ·a12(SB), 0, $0-0
    	CMPL runtime·writeBarrier(SB), $0
    	JMP one
    two:
    	ORQ R15, R15
    	RET
    one:
    	MOVL $0, R15
    	JMP two
    
    // Ensure 3-arg instructions get GOT-rewritten without errors.
    // See issue 58735.
    TEXT ·a13(SB), 0, $0-0
    	MULXQ runtime·writeBarrier(SB), AX, CX
    	RET
    
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Wed Mar 15 20:45:41 UTC 2023
    - 4.8K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/CompactHashing.java

       * then we should have {@code 0 ≤ entry ≤ 255}, and if {@code table} is a {@code short[]} then we
       * should have {@code 0 ≤ entry ≤ 65535}. It is the caller's responsibility to ensure this.
       */
      static void tableSet(Object table, int index, int entry) {
        if (table instanceof byte[]) {
          ((byte[]) table)[index] = (byte) entry; // unsigned write
        } else if (table instanceof short[]) {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 25 15:34:52 UTC 2024
    - 7.1K bytes
    - Viewed (0)
Back to top