Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 131 - 134 of 134 for reply (0.2 seconds)

  1. CHANGELOG/CHANGELOG-1.28.md

    http/2 requests from multiple clients share the same backend connection. An API server on a private network may choose not to enable the kube-apiserver mitigation to prevent performance regressions for unauthenticated clients. Authenticated requests rely on the fix in golang.org/x/net v0.17.0 alone. https://issue.k8s.io/121197 tracks further mitigation of http/2 attacks by authenticated clients. ([#121196](https://github.com/kubernetes/kubernetes/pull/121196), [@enj](https://github.com/enj)) [SIG API...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Fri Sep 05 03:47:18 GMT 2025
    - 456.9K bytes
    - Click Count (1)
  2. docs/en/docs/release-notes.md

    Additionally, a background task is normally an independent set of logic that should be handled separately, with its own resources (e.g. its own database connection).
    
    If you used to rely on this behavior, now you should create the resources for background tasks inside the background task itself, and use internally only data that doesn't depend on the resources of dependencies with `yield`.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Dec 27 19:06:15 GMT 2025
    - 586.7K bytes
    - Click Count (0)
  3. lib/fips140/v1.1.0-rc1.zip

    read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput := new([SeedSize]byte) sysrand.Read(additionalInput[:16]) drbg := drbgInstance.Swap(nil) if drbg == nil { drbg = drbgPool.Get().(*Counter)...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Dec 11 16:27:41 GMT 2025
    - 663K bytes
    - Click Count (0)
  4. lib/fips140/v1.0.0-c2097c7c.zip

    read, 128 random bits from the operating system are mixed as // additional input, to make the output as strong as non-FIPS randomness. // This is not credited as entropy for FIPS purposes, as allowed by Section // 8.7.2: "Note that a DRBG does not rely on additional input to provide // entropy, even though entropy could be provided in the additional input". additionalInput := new([SeedSize]byte) sysrand.Read(additionalInput[:16]) drbg := drbgs.Get().(*Counter) defer drbgs.Put(drbg) for len(b) > 0...
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Thu Sep 25 19:53:19 GMT 2025
    - 642.7K bytes
    - Click Count (0)
Back to Top