Search Options

Results per page
Sort
Preferred Languages
Advance

Results 121 - 130 of 231 for Algorithms (0.13 sec)

  1. src/test/java/jcifs/pac/PacMacTest.java

            assertEquals("Missing key", e.getMessage());
        }
    
        /**
         * Test calculateMac with an invalid algorithm type.
         */
        @Test
        void testCalculateMacInvalidAlgorithm() {
            Map<Integer, KerberosKey> keys = new HashMap<>();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb1/smb1/SigningDigest.java

         *
         * @param macSigningKey the MAC signing key for message authentication
         * @param bypass whether to bypass MAC signing
         * @throws SmbException if MD5 algorithm is not available
         */
        public SigningDigest(final byte[] macSigningKey, final boolean bypass) throws SmbException {
            try {
                digest = MessageDigest.getInstance("MD5");
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.9K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/dtyp/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 5.6K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/app/web/admin/dict/stemmeroverride/EditForm.java

     * This form extends CreateForm to include fields necessary for updating existing stemmer override entries.
     * Stemmer overrides define custom stemming rules that take precedence over the default stemming algorithm.
     *
     */
    public class EditForm extends CreateForm {
    
        /**
         * Creates a new EditForm instance.
         */
        public EditForm() {
            super();
        }
    
        /**
    Registered: Sat Dec 20 09:19:18 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 1.8K bytes
    - Viewed (0)
  5. docs/site-replication/run-sse-kms-object-replication.sh

    rep_obj4_md5=$(echo "${stat_out4}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"')
    
    # Check the algo and keyId of replicated objects
    if [ "${rep_obj1_algo}" != "${src_obj1_algo}" ]; then
    	echo "BUG: Algorithm: '${rep_obj1_algo}' of replicated object: 'minio2/test-bucket/encrypted' doesn't match with source value: '${src_obj1_algo}'"
    	exit_1
    fi
    if [ "${rep_obj1_keyid}" != "${src_obj1_keyid}" ]; then
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/Ordering.java

      }
    
      // Ordering<Object> singletons
    
      /**
       * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this
       * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements.
       * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in
       * the returned instance these are implemented by simply copying the source list.
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 17:50:58 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  7. CHANGELOG/CHANGELOG-1.19.md

    ### KubeSchedulerConfiguration graduates to Beta
    
    Registered: Fri Dec 26 09:05:12 UTC 2025
    - Last Modified: Wed Jan 05 05:42:32 UTC 2022
    - 489.7K bytes
    - Viewed (0)
  8. src/main/java/jcifs/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  9. cmd/erasure-healing-common_test.go

    				Checksums:  map[string]string(nil),
    			},
    		},
    		Erasure: ErasureInfo{
    			Algorithm:    "ReedSolomon",
    			DataBlocks:   6,
    			ParityBlocks: 6,
    			BlockSize:    1048576,
    			Index:        1,
    			Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12},
    			Checksums:    []ChecksumInfo{{PartNumber: 1, Algorithm: 0x3, Hash: []uint8{}}},
    		},
    		NumVersions: 1,
    		Idx:         0,
    	}
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 22.4K bytes
    - Viewed (0)
  10. src/main/java/jcifs/smb1/smb1/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.8K bytes
    - Viewed (0)
Back to top