Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 199 for Algorithm (0.04 sec)

  1. compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/DefaultWagonManager.java

                    file.deleteOnExit();
                }
            }
        }
    
        private ChecksumObserver addChecksumObserver(Wagon wagon, String algorithm) throws TransferFailedException {
            try {
                ChecksumObserver checksumObserver = new ChecksumObserver(algorithm);
                wagon.addTransferListener(checksumObserver);
                return checksumObserver;
            } catch (NoSuchAlgorithmException e) {
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Sat Apr 05 11:52:05 UTC 2025
    - 29.9K bytes
    - Viewed (0)
  2. src/main/java/jcifs/internal/dtyp/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  3. cmd/sftp-server.go

    				found = true
    				break
    			}
    		}
    		if !found {
    			logger.Fatal(fmt.Errorf("unknown algorithm %q passed to --sftp=%s\nValid algorithms: %v", algo, arg, strings.Join(allowed, ", ")), "unable to start SFTP server")
    		}
    	}
    	if len(filteredAlgos) == 0 {
    		logger.Fatal(fmt.Errorf("no valid algorithms passed to --sftp=%s\nValid algorithms: %v", arg, strings.Join(allowed, ", ")), "unable to start SFTP server")
    	}
    	return filteredAlgos
    }
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb1/smb1/SigningDigest.java

         *
         * @param macSigningKey the MAC signing key for message authentication
         * @param bypass whether to bypass MAC signing
         * @throws SmbException if MD5 algorithm is not available
         */
        public SigningDigest(final byte[] macSigningKey, final boolean bypass) throws SmbException {
            try {
                digest = MessageDigest.getInstance("MD5");
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  5. src/test/java/jcifs/smb/compression/CompressionNegotiateContextTest.java

        }
    
        @Test
        @DisplayName("Test supported algorithms")
        public void testSupportedAlgorithms() {
            int[] algorithms = context.getCompressionAlgorithms();
            assertNotNull(algorithms);
            assertEquals(3, algorithms.length);
            assertTrue(context.supportsAlgorithm(CompressionNegotiateContext.COMPRESSION_LZ77));
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
  7. src/main/java/jcifs/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  8. docs/bucket/versioning/DESIGN.md

              "X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "REFSRXYyLUhNQUMtU0hBMjU2",
              "X-Minio-Internal-Server-Side-Encryption-Iv": "bW5YRDhRUGczMVhkc2pJT1V1UVlnbWJBcndIQVhpTUN1dnVBS0QwNUVpaz0=",
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Jul 17 15:43:14 UTC 2022
    - 5.8K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/graph/PredecessorsFunction.java

     *
     * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as
     * topological sort) that only need a way of accessing the predecessors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * {@snippet :
     * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction);
     * }
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 4K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/graph/SuccessorsFunction.java

     *
     * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as
     * breadth first traversal) that only need a way of accessing the successors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * {@snippet :
     * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction);
     * }
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 4.2K bytes
    - Viewed (0)
Back to top