Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 199 for algorithm (0.04 sec)

  1. android/guava/src/com/google/common/hash/Crc32cHashFunction.java

      }
    
      @Override
      public String toString() {
        return "Hashing.crc32c()";
      }
    
      static final class Crc32cHasher extends AbstractStreamingHasher {
    
        /*
         * The striding algorithm works roughly as follows: it is universally the case that
         * CRC(x ^ y) == CRC(x) ^ CRC(y).  The approach we take is to break the message as follows,
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 28 01:26:26 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/ImmutableList.java

            : ImmutableList.<E>construct(elements.clone());
      }
    
      /**
       * Returns an immutable list containing the given elements, sorted according to their natural
       * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the
       * order in which they appear in the input.
       *
       * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 27.5K bytes
    - Viewed (0)
  3. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

        }
    
        /**
         * Test decrypt with DES encryption.
         *
         * @throws GeneralSecurityException if a security error occurs
         * @throws NoSuchAlgorithmException if the algorithm is not available
         */
        @Test
        void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException {
            KeyGenerator keyGen = KeyGenerator.getInstance("DES");
            keyGen.init(56);
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  4. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if object.IsDeleteMarker {
    				log.Println("SKIPPED: DELETE marker object:", objFullPath(object))
    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Feb 17 01:15:57 UTC 2024
    - 6.3K bytes
    - Viewed (0)
  5. docs/em/docs/tutorial/security/oauth2-jwt.md

    <div class="termy">
    
    ```console
    $ openssl rand -hex 32
    
    09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7
    ```
    
    </div>
    
    &amp; 📁 🔢 🔢 `SECRET_KEY` (🚫 ⚙️ 1️⃣ 🖼).
    
    ✍ 🔢 `ALGORITHM` ⏮️ 📊 ⚙️ 🛑 🥙 🤝 &amp; ⚒ ⚫️ `"HS256"`.
    
    ✍ 🔢 👔 🤝.
    
    🔬 Pydantic 🏷 👈 🔜 ⚙️ 🤝 🔗 📨.
    
    ✍ 🚙 🔢 🏗 🆕 🔐 🤝.
    
    {* ../../docs_src/security/tutorial004.py hl[6,12:14,28:30,78:86] *}
    
    ## ℹ 🔗
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.6K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java

         *            the SMB2 dialect version
         * @param preauthIntegrityHash
         *            the pre-authentication integrity hash (for SMB 3.1.1)
         * @throws GeneralSecurityException
         *             if the signing algorithm cannot be initialized
         *
         */
        public Smb2SigningDigest(final byte[] sessionKey, final int dialect, final byte[] preauthIntegrityHash)
                throws GeneralSecurityException {
            switch (dialect) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.9K bytes
    - Viewed (0)
  7. cmd/storage-errors.go

    var errFileCorrupt = StorageErr("file is corrupted")
    
    // errBitrotHashAlgoInvalid - the algo for bit-rot hash
    // verification is empty or invalid.
    var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid")
    
    // errCrossDeviceLink - rename across devices not allowed.
    var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Apr 04 12:04:40 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  8. guava/src/com/google/common/math/BigIntegerMath.java

         * and the arithmetic mean is always higher than the geometric mean.
         *
         * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles
         * with each iteration, so this algorithm takes O(log(digits)) iterations.
         *
         * We start out with a double-precision approximation, which may be higher or lower than the
         * true value. Therefore, we perform at least one Newton iteration to get a guess that's
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.8K bytes
    - Viewed (0)
  9. src/test/java/jcifs/ACETest.java

                verify(ace).getApplyToText();
            }
        }
    
        @Nested
        @DisplayName("Windows Access Check Algorithm Tests")
        class WindowsAccessCheckTests {
    
            @Test
            @DisplayName("Should simulate access check algorithm from documentation")
            void shouldSimulateDocumentationExample() {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 24.4K bytes
    - Viewed (0)
  10. compat/maven-compat/src/main/java/org/apache/maven/project/interpolation/AbstractStringBasedModelInterpolator.java

            }
    
            return model;
        }
    
        /**
         * Interpolates all expressions in the src parameter.
         * <p>
         * The algorithm used for each expression is:
         * <ul>
         *   <li>If it starts with either "pom." or "project.", the expression is evaluated against the model.</li>
         *   <li>If the value is null, get the value from the context.</li>
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Fri Jun 06 14:28:57 UTC 2025
    - 13.6K bytes
    - Viewed (0)
Back to top