- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 193 for algorism (0.09 sec)
-
src/main/java/jcifs/smb1/util/MD4.java
*/ package jcifs.smb1.util; import java.security.MessageDigest; /** * Implements the MD4 message digest algorithm in Java. * <p> * <b>References:</b> * <ol> * <li> Ronald L. Rivest, * "<a href="http://www.roxen.com/rfc/rfc1320.html"> * The MD4 Message-Digest Algorithm</a>", * IETF RFC-1320 (informational). * </ol> * * <p><b>$Revision: 1.2 $</b> * @author Raif S. Naffah */
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 9.3K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> And copy the output to the variable `SECRET_KEY` (don't use the one in the example). Create a variable `ALGORITHM` with the algorithm used to sign the JWT token and set it to `"HS256"`. Create a variable for the expiration of the token. Define a Pydantic Model that will be used in the token endpoint for the response.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 5.4K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 6.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Ordering.java
} // Ordering<Object> singletons /** * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements. * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in * the returned instance these are implemented by simply copying the source list.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 30 16:15:19 UTC 2024 - 39.4K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
rep_obj4_md5=$(echo "${stat_out4}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"') # Check the algo and keyId of replicated objects if [ "${rep_obj1_algo}" != "${src_obj1_algo}" ]; then echo "BUG: Algorithm: '${rep_obj1_algo}' of replicated object: 'minio2/test-bucket/encrypted' doesn't match with source value: '${src_obj1_algo}'" exit_1 fi if [ "${rep_obj1_keyid}" != "${src_obj1_keyid}" ]; then
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 11.5K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 21:10:40 UTC 2019 - 7.2K bytes - Viewed (0) -
compat/maven-compat/src/main/java/org/apache/maven/repository/legacy/DefaultWagonManager.java
file.deleteOnExit(); } } } private ChecksumObserver addChecksumObserver(Wagon wagon, String algorithm) throws TransferFailedException { try { ChecksumObserver checksumObserver = new ChecksumObserver(algorithm); wagon.addTransferListener(checksumObserver); return checksumObserver; } catch (NoSuchAlgorithmException e) {
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 29.9K bytes - Viewed (0) -
internal/hash/checksum.go
} // IsSet returns whether the type is valid and known. func (c ChecksumType) IsSet() bool { return !c.Is(ChecksumInvalid) && !c.Is(ChecksumNone) } // NewChecksumType returns a checksum type based on the algorithm string. func NewChecksumType(alg string) ChecksumType { switch strings.ToUpper(alg) { case "CRC32": return ChecksumCRC32 case "CRC32C": return ChecksumCRC32C case "SHA1": return ChecksumSHA1
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 19 12:59:07 UTC 2024 - 12.7K bytes - Viewed (0) -
cmd/erasure-healing-common_test.go
Checksums: map[string]string(nil), }, }, Erasure: ErasureInfo{ Algorithm: "ReedSolomon", DataBlocks: 6, ParityBlocks: 6, BlockSize: 1048576, Index: 1, Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}, Checksums: []ChecksumInfo{{PartNumber: 1, Algorithm: 0x3, Hash: []uint8{}}}, }, NumVersions: 1, Idx: 0, }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 01 15:19:10 UTC 2024 - 23.1K bytes - Viewed (0)