Search Options

Results per page
Sort
Preferred Languages
Advance

Results 51 - 60 of 100 for Algorithm (0.18 sec)

  1. cmd/xl-storage-format-utils_test.go

    		Metadata:         nil,
    		Parts:            nil,
    		Erasure: ErasureInfo{
    			Algorithm:    ReedSolomon.String(),
    			DataBlocks:   4,
    			ParityBlocks: 2,
    			BlockSize:    10000,
    			Index:        1,
    			Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8},
    			Checksums: []ChecksumInfo{{
    				PartNumber: 1,
    				Algorithm:  HighwayHash256S,
    				Hash:       nil,
    			}},
    		},
    		MarkDeleted:      false,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Sep 02 14:49:24 GMT 2023
    - 6K bytes
    - Viewed (0)
  2. src/main/java/jcifs/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Sun Jul 01 13:12:10 GMT 2018
    - 3.5K bytes
    - Viewed (0)
  3. internal/crypto/key_test.go

    	sealedKey := key.Seal(extKey[:], iv, "SSE-S3", "bucket", "object")
    	sealedKey.Algorithm = InsecureSealAlgorithm
    	if err := key.Unseal(extKey[:], sealedKey, "SSE-S3", "bucket", "object"); err == nil {
    		t.Errorf("'%s' test succeeded but it should fail because the legacy algorithm was used", sealedKey.Algorithm)
    	}
    }
    
    var derivePartKeyTest = []struct {
    	PartID  uint32
    	PartKey string
    }{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Feb 02 00:13:57 GMT 2024
    - 6.8K bytes
    - Viewed (0)
  4. src/cmd/cgo/internal/test/issue24161e2/main.go

    #include <Security/Security.h>
    #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200
      typedef CFStringRef SecKeyAlgorithm;
      static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;}
      #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo()
      static SecKeyAlgorithm foo(void){return NULL;}
    #endif
    */
    import "C"
    import (
    	"fmt"
    Go
    - Registered: Tue Mar 26 11:13:08 GMT 2024
    - Last Modified: Fri May 12 12:00:02 GMT 2023
    - 1K bytes
    - Viewed (1)
  5. src/cmd/cgo/internal/test/issue24161e1/main.go

    #include <Security/Security.h>
    #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200
      typedef CFStringRef SecKeyAlgorithm;
      static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;}
      #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo()
      static SecKeyAlgorithm foo(void){return NULL;}
    #endif
    */
    import "C"
    import (
    	"fmt"
    Go
    - Registered: Tue Mar 26 11:13:08 GMT 2024
    - Last Modified: Fri May 12 12:00:02 GMT 2023
    - 1K bytes
    - Viewed (0)
  6. src/cmd/cgo/internal/test/issue24161e0/main.go

    #include <Security/Security.h>
    #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200
      typedef CFStringRef SecKeyAlgorithm;
      static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;}
      #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo()
      static SecKeyAlgorithm foo(void){return NULL;}
    #endif
    */
    import "C"
    import "testing"
    
    Go
    - Registered: Tue Mar 26 11:13:08 GMT 2024
    - Last Modified: Fri May 12 12:00:02 GMT 2023
    - 919 bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/smb1/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Fri Mar 22 21:10:40 GMT 2019
    - 7.2K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/graph/PredecessorsFunction.java

     *
     * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as
     * topological sort) that only need a way of accessing the predecessors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * <pre>{@code
     * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction);
     * }</pre>
     *
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Mon Apr 26 17:43:39 GMT 2021
    - 4.1K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/graph/SuccessorsFunction.java

     *
     * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as
     * breadth first traversal) that only need a way of accessing the successors of a node in a graph.
     *
     * <h3>Usage</h3>
     *
     * Given an algorithm, for example:
     *
     * <pre>{@code
     * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction);
     * }</pre>
     *
    Java
    - Registered: Fri Apr 26 12:43:10 GMT 2024
    - Last Modified: Mon Apr 26 17:43:39 GMT 2021
    - 4.3K bytes
    - Viewed (0)
  10. src/main/java/jcifs/internal/dtyp/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Java
    - Registered: Sun May 05 00:10:10 GMT 2024
    - Last Modified: Sun Jul 01 13:12:10 GMT 2018
    - 5.4K bytes
    - Viewed (0)
Back to top