Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 109 for Estep (0.03 sec)

  1. docs/features/connections.md

     4. If it's a new route, it connects by building either a direct socket connection, a TLS tunnel (for HTTPS over an HTTP proxy), or a direct TLS connection. It does TLS handshakes as necessary. This step may be retried for tunnel challenges and TLS handshake failures.
     5. It sends the HTTP request and reads the response.
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Mon Feb 21 03:33:59 UTC 2022
    - 5.4K bytes
    - Viewed (0)
  2. docs/kms/README.md

    ### 1. Fetch the root identity
    
    As the initial step, fetch the private key and certificate of the root identity:
    
    ```sh
    curl -sSL --tlsv1.2 \
         -O 'https://raw.githubusercontent.com/minio/kes/master/root.key' \
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  3. docs/changelogs/upgrading_to_okhttp_4.md

    We’ve included deprecated APIs in OkHttp 4.0 because they make migration easy. We will remove them
    in a future release! If you’re skipping releases, it’ll be much easier if you upgrade to OkHttp 4.0
    as an intermediate step.
    
    #### Vars and Vals
    
    Java doesn’t have language support for properties so developers make do with getters and setters.
    Kotlin does have properties and we take advantage of them in OkHttp.
    
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Sun Feb 06 16:58:16 UTC 2022
    - 10.9K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/Murmur3_32HashFunction.java

        k1 = mixK1(high);
        h1 = mixH1(h1, k1);
    
        return fmix(h1, Longs.BYTES);
      }
    
      @Override
      public HashCode hashUnencodedChars(CharSequence input) {
        int h1 = seed;
    
        // step through the CharSequence 2 chars at a time
        for (int i = 1; i < input.length(); i += 2) {
          int k1 = input.charAt(i - 1) | (input.charAt(i) << 16);
          k1 = mixK1(k1);
          h1 = mixH1(h1, k1);
        }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Apr 14 16:36:11 UTC 2025
    - 11.8K bytes
    - Viewed (0)
  5. src/bytes/bytes_test.go

    		buf[n-7] = '\x00'
    	})
    }
    
    func BenchmarkCountSingle(b *testing.B) {
    	benchBytes(b, indexSizes, func(b *testing.B, n int) {
    		buf := bmbuf[0:n]
    		step := 8
    		for i := 0; i < len(buf); i += step {
    			buf[i] = 1
    		}
    		expect := (len(buf) + (step - 1)) / step
    		for i := 0; i < b.N; i++ {
    			j := Count(buf, []byte{1})
    			if j != expect {
    				b.Fatal("bad count", j, expect)
    			}
    		}
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon Jul 28 18:13:58 UTC 2025
    - 62.9K bytes
    - Viewed (0)
  6. docs/sts/README.md

    - [Configuring etcd](https://github.com/minio/minio/blob/master/docs/sts/etcd.md)
    
    ### Setup MinIO with Identity Provider
    
    Make sure we have followed the previous step and configured each software independently, once done we can now proceed to use MinIO STS API and MinIO server to use these credentials to perform object API operations.
    
    #### KeyCloak
    
    ```
    export MINIO_ROOT_USER=minio
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  7. docs/kms/IAM.md

       The new KMS-based approach can use a key derivation function that is orders of magnitudes
       cheaper w.r.t. memory and CPU.
    - Root credentials can now be changed easily. Before, a two-step process was required to
       change the cluster root credentials since they were used to en/decrypt the IAM data.
       So, both - the old and new credentials - had to be present at the same time during a rotation
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  8. cmd/erasure-object_test.go

    	}
    
    	for i, testCase := range testCases {
    		// Step 1: create a bucket
    		err = z.MakeBucket(ctx, testCase.bucket, MakeBucketOptions{VersioningEnabled: testCase.versioned})
    		if err != nil {
    			t.Fatalf("Test %d: Failed to create a bucket: %v", i+1, err)
    		}
    
    		// Step 2: Upload an object with a random content
    		initialData := bytes.Repeat([]byte{'b'}, len(testCase.content))
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 38.3K bytes
    - Viewed (0)
  9. src/bufio/bufio_test.go

    	}
    }
    
    // A StringReader delivers its data one string segment at a time via Read.
    type StringReader struct {
    	data []string
    	step int
    }
    
    func (r *StringReader) Read(p []byte) (n int, err error) {
    	if r.step < len(r.data) {
    		s := r.data[r.step]
    		n = copy(p, s)
    		r.step++
    	} else {
    		err = io.EOF
    	}
    	return
    }
    
    func readRuneSegments(t *testing.T, segments []string) {
    	got := ""
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Fri Feb 07 01:08:54 UTC 2025
    - 51.6K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/dependencies/index.md

    In the end, a hierarchical tree of dependencies is built, and the **Dependency Injection** system takes care of solving all these dependencies for you (and their sub-dependencies) and providing (injecting) the results at each step.
    
    For example, let's say you have 4 API endpoints (*path operations*):
    
    * `/items/public/`
    * `/items/private/`
    * `/users/{user_id}/activate`
    * `/items/pro/`
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.6K bytes
    - Viewed (0)
Back to top