Search Options

Results per page
Sort
Preferred Languages
Advance

Results 111 - 120 of 243 for algorithm (0.58 sec)

  1. android/guava/src/com/google/common/collect/Collections2.java

      }
    
      /**
       * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}.
       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 22.6K bytes
    - Viewed (0)
  2. docs/de/docs/tutorial/security/oauth2-jwt.md

    /// tip | Tipp
    
    pwdlib unterstützt auch den bcrypt-Hashing-Algorithmus, enthält jedoch keine Legacy-Algorithmen – für die Arbeit mit veralteten Hashes wird die Verwendung der Bibliothek passlib empfohlen.
    
    Sie könnten sie beispielsweise verwenden, um von einem anderen System (wie Django) generierte Passwörter zu lesen und zu verifizieren, aber alle neuen Passwörter mit einem anderen Algorithmus wie Argon2 oder Bcrypt zu hashen.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Oct 01 15:19:54 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  3. internal/lsync/lrwmutex.go

    const (
    	lockRetryInterval = 50 * time.Millisecond
    )
    
    // lockLoop will acquire either a read or a write lock
    //
    // The call will block until the lock is granted using a built-in
    // timing randomized back-off algorithm to try again until successful
    func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) {
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Jan 02 17:15:06 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  4. maven-tests/mvnw.cmd

      }
      Import-Module $PSHOME\Modules\Microsoft.PowerShell.Utility -Function Get-FileHash
      if ((Get-FileHash "$TMP_DOWNLOAD_DIR/$distributionUrlName" -Algorithm SHA256).Hash.ToLower() -ne $distributionSha256Sum) {
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Thu Sep 25 18:22:49 UTC 2025
    - 6.8K bytes
    - Viewed (0)
  5. docs/erasure/README.md

    ## What is Erasure Code?
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 4.2K bytes
    - Viewed (0)
  6. cmd/sts-handlers_test.go

            "claims": {
                "accessKey": "u4ccRswj62HV3Ifwima7",
                "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "ldapUsername": "svc.algorithm",
                "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "sa-policy": "inherited-policy"
            },
            "sessionPolicy": null,
            "status": "on",
            "name": "",
            "description": ""
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Oct 15 17:00:45 UTC 2025
    - 103.4K bytes
    - Viewed (1)
  7. docs/ftp/README.md

    
    ### Custom Algorithms (SFTP)
    
    Custom algorithms can be specified via command line parameters.
    Algorithms are comma separated. 
    Note that valid values does not in all cases represent default values.
    
    `--sftp=pub-key-algos=...` specifies the supported client public key
    authentication algorithms. Note that this doesn't include certificate types
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue May 07 06:41:25 UTC 2024
    - 7.8K bytes
    - Viewed (0)
  8. docs/compression/README.md

    MinIO uses [`klauspost/compress/s2`](https://github.com/klauspost/compress/tree/master/s2)
    streaming compression due to its stability and performance.
    
    This algorithm is specifically optimized for machine generated content.
    Write throughput is typically at least 500MB/s per CPU core,
    and scales with the number of available CPU cores.
    Decompression speed is typically at least 1GB/s.
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  9. guava/src/com/google/common/hash/Crc32cHashFunction.java

      }
    
      @Override
      public String toString() {
        return "Hashing.crc32c()";
      }
    
      static final class Crc32cHasher extends AbstractStreamingHasher {
    
        /*
         * The striding algorithm works roughly as follows: it is universally the case that
         * CRC(x ^ y) == CRC(x) ^ CRC(y).  The approach we take is to break the message as follows,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Dec 28 01:26:26 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  10. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if object.IsDeleteMarker {
    				log.Println("SKIPPED: DELETE marker object:", objFullPath(object))
    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 6.3K bytes
    - Viewed (0)
Back to top