Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 160 of 231 for Algorithms (0.08 sec)

  1. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

        }
    
        /**
         * Test decrypt with DES encryption.
         *
         * @throws GeneralSecurityException if a security error occurs
         * @throws NoSuchAlgorithmException if the algorithm is not available
         */
        @Test
        void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException {
            KeyGenerator keyGen = KeyGenerator.getInstance("DES");
            keyGen.init(56);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  2. cmd/sts-handlers_test.go

            "claims": {
                "accessKey": "u4ccRswj62HV3Ifwima7",
                "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "ldapUsername": "svc.algorithm",
                "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io",
                "sa-policy": "inherited-policy"
            },
            "sessionPolicy": null,
            "status": "on",
            "name": "",
            "description": ""
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Oct 15 17:00:45 UTC 2025
    - 103.4K bytes
    - Viewed (1)
  3. guava/src/com/google/common/hash/Crc32cHashFunction.java

      }
    
      @Override
      public String toString() {
        return "Hashing.crc32c()";
      }
    
      static final class Crc32cHasher extends AbstractStreamingHasher {
    
        /*
         * The striding algorithm works roughly as follows: it is universally the case that
         * CRC(x ^ y) == CRC(x) ^ CRC(y).  The approach we take is to break the message as follows,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Dec 28 01:26:26 UTC 2024
    - 21.2K bytes
    - Viewed (0)
  4. src/test/java/jcifs/ACETest.java

                verify(ace).getApplyToText();
            }
        }
    
        @Nested
        @DisplayName("Windows Access Check Algorithm Tests")
        class WindowsAccessCheckTests {
    
            @Test
            @DisplayName("Should simulate access check algorithm from documentation")
            void shouldSimulateDocumentationExample() {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 24.4K bytes
    - Viewed (0)
  5. compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java

            Model child = getModel(baseName + "-child");
    
            if (fromRepo) {
                // when model is read from repo, a stream is used, then pomFile == null
                // (has consequences in inheritance algorithm since getProjectDirectory() returns null)
                parent = parent.clone();
                parent.setPomFile(null);
                child = child.clone();
                child.setPomFile(null);
            }
    
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Wed Sep 17 10:01:14 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  6. cmd/storage-errors.go

    var errFileCorrupt = StorageErr("file is corrupted")
    
    // errBitrotHashAlgoInvalid - the algo for bit-rot hash
    // verification is empty or invalid.
    var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid")
    
    // errCrossDeviceLink - rename across devices not allowed.
    var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Apr 04 12:04:40 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  7. internal/lsync/lrwmutex.go

    const (
    	lockRetryInterval = 50 * time.Millisecond
    )
    
    // lockLoop will acquire either a read or a write lock
    //
    // The call will block until the lock is granted using a built-in
    // timing randomized back-off algorithm to try again until successful
    func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) {
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Jan 02 17:15:06 UTC 2022
    - 4.8K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/collect/ImmutableList.java

            : ImmutableList.<E>construct(elements.clone());
      }
    
      /**
       * Returns an immutable list containing the given elements, sorted according to their natural
       * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the
       * order in which they appear in the input.
       *
       * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 17:50:58 UTC 2025
    - 27.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/escape/CharEscaper.java

       * from the resulting text.
       *
       * <p>If the character does not need to be escaped, this method should return {@code null}, rather
       * than a one-character array containing the character itself. This enables the escaping algorithm
       * to perform more efficiently.
       *
       * <p>An escaper is expected to be able to deal with any {@code char} value, so this method should
       * not throw any exceptions.
       *
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Feb 13 15:45:16 UTC 2025
    - 6.7K bytes
    - Viewed (0)
  10. guava/src/com/google/common/math/BigIntegerMath.java

         * and the arithmetic mean is always higher than the geometric mean.
         *
         * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles
         * with each iteration, so this algorithm takes O(log(digits)) iterations.
         *
         * We start out with a double-precision approximation, which may be higher or lower than the
         * true value. Therefore, we perform at least one Newton iteration to get a guess that's
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.8K bytes
    - Viewed (0)
Back to top