- Sort Score
- Result 10 results
- Languages All
Results 51 - 60 of 100 for Algorithm (0.18 sec)
-
cmd/xl-storage-format-utils_test.go
Metadata: nil, Parts: nil, Erasure: ErasureInfo{ Algorithm: ReedSolomon.String(), DataBlocks: 4, ParityBlocks: 2, BlockSize: 10000, Index: 1, Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8}, Checksums: []ChecksumInfo{{ PartNumber: 1, Algorithm: HighwayHash256S, Hash: nil, }}, }, MarkDeleted: false,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Sep 02 14:49:24 GMT 2023 - 6K bytes - Viewed (0) -
src/main/java/jcifs/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 3.5K bytes - Viewed (0) -
internal/crypto/key_test.go
sealedKey := key.Seal(extKey[:], iv, "SSE-S3", "bucket", "object") sealedKey.Algorithm = InsecureSealAlgorithm if err := key.Unseal(extKey[:], sealedKey, "SSE-S3", "bucket", "object"); err == nil { t.Errorf("'%s' test succeeded but it should fail because the legacy algorithm was used", sealedKey.Algorithm) } } var derivePartKeyTest = []struct { PartID uint32 PartKey string }{
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Feb 02 00:13:57 GMT 2024 - 6.8K bytes - Viewed (0) -
src/cmd/cgo/internal/test/issue24161e2/main.go
#include <Security/Security.h> #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200 typedef CFStringRef SecKeyAlgorithm; static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;} #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo() static SecKeyAlgorithm foo(void){return NULL;} #endif */ import "C" import ( "fmt"
Go - Registered: Tue Mar 26 11:13:08 GMT 2024 - Last Modified: Fri May 12 12:00:02 GMT 2023 - 1K bytes - Viewed (1) -
src/cmd/cgo/internal/test/issue24161e1/main.go
#include <Security/Security.h> #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200 typedef CFStringRef SecKeyAlgorithm; static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;} #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo() static SecKeyAlgorithm foo(void){return NULL;} #endif */ import "C" import ( "fmt"
Go - Registered: Tue Mar 26 11:13:08 GMT 2024 - Last Modified: Fri May 12 12:00:02 GMT 2023 - 1K bytes - Viewed (0) -
src/cmd/cgo/internal/test/issue24161e0/main.go
#include <Security/Security.h> #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200 typedef CFStringRef SecKeyAlgorithm; static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;} #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo() static SecKeyAlgorithm foo(void){return NULL;} #endif */ import "C" import "testing"
Go - Registered: Tue Mar 26 11:13:08 GMT 2024 - Last Modified: Fri May 12 12:00:02 GMT 2023 - 919 bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Fri Mar 22 21:10:40 GMT 2019 - 7.2K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/PredecessorsFunction.java
* * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as * topological sort) that only need a way of accessing the predecessors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * <pre>{@code * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction); * }</pre> *
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Apr 26 17:43:39 GMT 2021 - 4.1K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/SuccessorsFunction.java
* * <p>This interface is meant to be used as the type of a parameter to graph algorithms (such as * breadth first traversal) that only need a way of accessing the successors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * <pre>{@code * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction); * }</pre> *
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Mon Apr 26 17:43:39 GMT 2021 - 4.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Java - Registered: Sun May 05 00:10:10 GMT 2024 - Last Modified: Sun Jul 01 13:12:10 GMT 2018 - 5.4K bytes - Viewed (0)