- Sort Score
- Num 10 results
- Language All
Results 201 - 210 of 262 for Algorithm (0.05 seconds)
-
android/guava/src/com/google/common/cache/CacheBuilder.java
* once after loading completes). Much internal cache management is performed at the segment * granularity. For example, access queues and write queues are kept per segment when they are * required by the selected eviction algorithm. As such, when writing unit tests it is not * uncommon to specify {@code concurrencyLevel(1)} in order to achieve more deterministic eviction * behavior. *Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Feb 23 13:13:59 GMT 2026 - 52K bytes - Click Count (0) -
cmd/object-api-utils.go
} // Will get index or nil if closed. gotIdx = <-indexCh return gotIdx } } // compressSelfTest performs a self-test to ensure that compression // algorithms completes a roundtrip. If any algorithm // produces an incorrect checksum it fails with a hard error. // // compressSelfTest tries to catch any issue in the compression implementation // early instead of silently corrupting data.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Jun 25 15:08:54 GMT 2025 - 37.3K bytes - Click Count (0) -
cmd/sts-handlers_test.go
"claims": { "accessKey": "u4ccRswj62HV3Ifwima7", "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "ldapUsername": "svc.algorithm", "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "sa-policy": "inherited-policy" }, "sessionPolicy": null, "status": "on", "name": "", "description": ""
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 103.4K bytes - Click Count (1) -
cmd/xl-storage-format-v2.go
) func (e VersionType) valid() bool { return e > invalidVersionType && e < lastVersionType } // ErasureAlgo defines common type of different erasure algorithms type ErasureAlgo uint8 // List of currently supported erasure coding algorithms const ( invalidErasureAlgo ErasureAlgo = 0 ReedSolomon ErasureAlgo = 1 lastErasureAlgo ErasureAlgo = 2 ) func (e ErasureAlgo) valid() bool {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 65.6K bytes - Click Count (1) -
cmd/erasure-healing-common.go
checksumInfo := meta.Erasure.GetChecksumInfo(meta.Parts[0].Number) verifyErr := bitrotVerify(bytes.NewReader(meta.Data), int64(len(meta.Data)), meta.Erasure.ShardFileSize(meta.Size), checksumInfo.Algorithm, checksumInfo.Hash, meta.Erasure.ShardSize()) dataErrsByPart[0][i] = convPartErrToInt(verifyErr) continue } var ( verifyErr error verifyResp *CheckPartsResp )
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 12K bytes - Click Count (0) -
cmd/object-handlers.go
dstOpts.WantChecksum = nil } } else { // S3: All copied objects without checksums and specified destination checksum algorithms // automatically gain a CRC-64NVME checksum algorithm. dstOpts.WantServerSideChecksumType = hash.ChecksumCRC64NVME srcInfo.Reader.AddServerSideChecksumHasher(dstOpts.WantServerSideChecksumType) dstOpts.WantChecksum = nil }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 120.6K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/oauth2-jwt.md
09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Et copiez la sortie dans la variable `SECRET_KEY` (n'utilisez pas celle de l'exemple). Créez une variable `ALGORITHM` avec l'algorithme utilisé pour signer le jeton JWT, et définissez-la à `"HS256"`. Créez une variable pour l'expiration du jeton.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.6K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel). Erstellen Sie eine Variable `ALGORITHM` für den Algorithmus, der zum Signieren des JWT-Tokens verwendet wird, und setzen Sie sie auf `"HS256"`. Erstellen Sie eine Variable für das Ablaufdatum des Tokens.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
$ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo). Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`. Crea una variable para la expiración del token. Define un Modelo de Pydantic que se usará en el endpoint de token para el response.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0) -
docs/tr/docs/tutorial/security/oauth2-jwt.md
09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Çıktıyı `SECRET_KEY` değişkenine kopyalayın (örnektekini kullanmayın). JWT token'ını imzalamak için kullanılan algoritmayı tutacak `ALGORITHM` adlı bir değişken oluşturup değerini `"HS256"` yapın. Token'ın süre sonu (expiration) için bir değişken oluşturun. Response için token endpoint'inde kullanılacak bir Pydantic Model tanımlayın.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 12.1K bytes - Click Count (0)