Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 111 - 120 of 262 for alrgorithm (0.09 seconds)

  1. internal/event/target/kafka_scram_client_contrib.go

    	scram.HashGeneratorFcn
    }
    
    // Begin constructs a SCRAM client component based on a given hash.Hash
    // factory receiver.  This constructor will normalize the username, password
    // and authzID via the SASLprep algorithm, as recommended by RFC-5802.  If
    // SASLprep fails, the method returns an error.
    func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) {
    	x.Client, err = x.NewClient(userName, password, authzID)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 3.2K bytes
    - Click Count (0)
  2. TESTING.asciidoc

    ==== Password hashing algorithm
    
    Test clusters are configured with `xpack.security.fips_mode.enabled` set to true. This means that
    FIPS 140-2 related bootstrap checks are enabled and the test cluster will fail to form if the
    password hashing algorithm is set to something else than a PBKDF2 based one. You can delegate the choice
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Mon Jun 07 13:55:20 GMT 2021
    - 32.5K bytes
    - Click Count (0)
  3. guava/src/com/google/common/collect/Ordering.java

      }
    
      // Ordering<Object> singletons
    
      /**
       * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this
       * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements.
       * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in
       * the returned instance these are implemented by simply copying the source list.
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Feb 23 19:19:10 GMT 2026
    - 39.4K bytes
    - Click Count (0)
  4. src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java

        private int getTransformFlags() {
            if (this.dialect.atLeast(DialectVersion.SMB311)) {
                return TRANSFORM_FLAG_ENCRYPTED;
            }
            // For SMB 3.0/3.0.2, this field contains the encryption algorithm
            return this.cipherId;
        }
    
        private byte[] getEncryptionKey() {
            if (keyManager != null) {
                String encKeyId = sessionId + "-enc";
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 35.5K bytes
    - Click Count (0)
  5. okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt

          when (signedByKeyPair.private) {
            is RSAPrivateKey -> {
              AlgorithmIdentifier(
                algorithm = SHA256_WITH_RSA_ENCRYPTION,
                parameters = null,
              )
            }
    
            else -> {
              AlgorithmIdentifier(
                algorithm = SHA256_WITH_ECDSA,
                parameters = ByteString.EMPTY,
              )
            }
          }
    
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Tue Jan 27 09:00:39 GMT 2026
    - 21.6K bytes
    - Click Count (0)
  6. docs/debugging/hash-set/main.go

    	"encoding/binary"
    	"flag"
    	"fmt"
    	"hash/crc32"
    	"log"
    	"os"
    	"strings"
    
    	"github.com/dchest/siphash"
    	"github.com/google/uuid"
    )
    
    // hashes the key returning an integer based on the input algorithm.
    // This function currently supports
    // - SIPMOD
    func sipHashMod(key string, cardinality int, id [16]byte) int {
    	if cardinality <= 0 {
    		return -1
    	}
    	// use the faster version as per siphash docs
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Mon Sep 19 18:05:16 GMT 2022
    - 3.7K bytes
    - Click Count (0)
  7. internal/logger/target/kafka/kafka_scram_client_contrib.go

    	scram.HashGeneratorFcn
    }
    
    // Begin constructs a SCRAM client component based on a given hash.Hash
    // factory receiver.  This constructor will normalize the username, password
    // and authzID via the SASLprep algorithm, as recommended by RFC-5802.  If
    // SASLprep fails, the method returns an error.
    func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) {
    	x.Client, err = x.NewClient(userName, password, authzID)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 3.3K bytes
    - Click Count (0)
  8. cmd/xl-storage-format-v2.go

    )
    
    func (e VersionType) valid() bool {
    	return e > invalidVersionType && e < lastVersionType
    }
    
    // ErasureAlgo defines common type of different erasure algorithms
    type ErasureAlgo uint8
    
    // List of currently supported erasure coding algorithms
    const (
    	invalidErasureAlgo ErasureAlgo = 0
    	ReedSolomon        ErasureAlgo = 1
    	lastErasureAlgo    ErasureAlgo = 2
    )
    
    func (e ErasureAlgo) valid() bool {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 65.6K bytes
    - Click Count (1)
  9. impl/maven-core/src/main/java/org/apache/maven/lifecycle/internal/builder/multithreaded/SmartProjectComparator.java

    /**
     * Smart project comparator that orders projects based on critical path analysis.
     * Projects with longer downstream dependency chains are prioritized to maximize
     * parallel execution efficiency.
     *
     * <p>The algorithm calculates a weight for each project as:
     * weight = 1 + max(downstream_project_weights)
     *
     * <p>Projects are then sorted by weight in descending order, ensuring that
    Created: Sun Apr 05 03:35:12 GMT 2026
    - Last Modified: Wed Aug 06 12:03:40 GMT 2025
    - 4.6K bytes
    - Click Count (0)
  10. android/guava/src/com/google/common/collect/Collections2.java

      }
    
      /**
       * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}.
       *
       * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations
       * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7,
       * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Sat Aug 09 01:14:59 GMT 2025
    - 22.6K bytes
    - Click Count (0)
Back to Top