- Sort Score
- Result 10 results
- Languages All
Results 151 - 160 of 231 for Algorithms (0.06 sec)
-
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
} /** * Test decrypt with DES encryption. * * @throws GeneralSecurityException if a security error occurs * @throws NoSuchAlgorithmException if the algorithm is not available */ @Test void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException { KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0) -
cmd/sts-handlers_test.go
"claims": { "accessKey": "u4ccRswj62HV3Ifwima7", "ldapUser": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "ldapUsername": "svc.algorithm", "parent": "uid=svc.algorithm,ou=swengg,dc=min,dc=io", "sa-policy": "inherited-policy" }, "sessionPolicy": null, "status": "on", "name": "", "description": ""
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 103.4K bytes - Viewed (1) -
guava/src/com/google/common/hash/Crc32cHashFunction.java
} @Override public String toString() { return "Hashing.crc32c()"; } static final class Crc32cHasher extends AbstractStreamingHasher { /* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Dec 28 01:26:26 UTC 2024 - 21.2K bytes - Viewed (0) -
src/test/java/jcifs/ACETest.java
verify(ace).getApplyToText(); } } @Nested @DisplayName("Windows Access Check Algorithm Tests") class WindowsAccessCheckTests { @Test @DisplayName("Should simulate access check algorithm from documentation") void shouldSimulateDocumentationExample() {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 24.4K bytes - Viewed (0) -
compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java
Model child = getModel(baseName + "-child"); if (fromRepo) { // when model is read from repo, a stream is used, then pomFile == null // (has consequences in inheritance algorithm since getProjectDirectory() returns null) parent = parent.clone(); parent.setPomFile(null); child = child.clone(); child.setPomFile(null); }Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Sep 17 10:01:14 UTC 2025 - 8.2K bytes - Viewed (0) -
cmd/storage-errors.go
var errFileCorrupt = StorageErr("file is corrupted") // errBitrotHashAlgoInvalid - the algo for bit-rot hash // verification is empty or invalid. var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid") // errCrossDeviceLink - rename across devices not allowed. var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Apr 04 12:04:40 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/lsync/lrwmutex.go
const ( lockRetryInterval = 50 * time.Millisecond ) // lockLoop will acquire either a read or a write lock // // The call will block until the lock is granted using a built-in // timing randomized back-off algorithm to try again until successful func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) { r := rand.New(rand.NewSource(time.Now().UnixNano()))
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Jan 02 17:15:06 UTC 2022 - 4.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ImmutableList.java
: ImmutableList.<E>construct(elements.clone()); } /** * Returns an immutable list containing the given elements, sorted according to their natural * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the * order in which they appear in the input. * * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 17:50:58 UTC 2025 - 27.5K bytes - Viewed (0) -
android/guava/src/com/google/common/escape/CharEscaper.java
* from the resulting text. * * <p>If the character does not need to be escaped, this method should return {@code null}, rather * than a one-character array containing the character itself. This enables the escaping algorithm * to perform more efficiently. * * <p>An escaper is expected to be able to deal with any {@code char} value, so this method should * not throw any exceptions. *Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Feb 13 15:45:16 UTC 2025 - 6.7K bytes - Viewed (0) -
guava/src/com/google/common/math/BigIntegerMath.java
* and the arithmetic mean is always higher than the geometric mean. * * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles * with each iteration, so this algorithm takes O(log(digits)) iterations. * * We start out with a double-precision approximation, which may be higher or lower than the * true value. Therefore, we perform at least one Newton iteration to get a guess that'sRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 18.8K bytes - Viewed (0)