- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 262 for alrgorithm (0.26 seconds)
-
src/main/java/jcifs/util/SecureKeyManager.java
/** * Store a session key * * @param sessionId unique session identifier * @param key the secret key to store * @param algorithm the key algorithm (e.g., "AES") */ public void storeSessionKey(String sessionId, byte[] key, String algorithm) { checkNotClosed(); if (key == null || sessionId == null) { throw new IllegalArgumentException("Session ID and key must not be null");Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 21.5K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/math/QuantilesAlgorithm.java
import org.jspecify.annotations.NullUnmarked; /** * Enumerates several algorithms providing equivalent functionality to {@link Quantiles}, for use in * {@link QuantilesBenchmark}. These algorithms each calculate either a single quantile or multiple * quantiles. All algorithms modify the dataset they are given (the cost of a copy to avoid this * will be constant across algorithms). * * @author Pete Gillin * @since 20.0 */ @GwtIncompatibleCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Mar 03 05:21:26 GMT 2026 - 7.3K bytes - Click Count (0) -
okhttp-zstd/src/test/java/okhttp3/zstd/ZstdInterceptorTest.kt
val responseString = decompressed.body.string() assertThat(responseString).isEqualTo("hello not compressed world") } @Test fun testUnknownAlgorithm() { val s = "hello unknown algorithm world".encodeUtf8() val response = response("https://example.com/", s) { header("Content-Encoding", "deflate") } val decompressed = zstdInterceptor.decompress(response)Created: Fri Apr 03 11:42:14 GMT 2026 - Last Modified: Fri Aug 01 06:04:22 GMT 2025 - 4.8K bytes - Click Count (1) -
guava-tests/test/com/google/common/math/QuantilesAlgorithm.java
import org.jspecify.annotations.NullUnmarked; /** * Enumerates several algorithms providing equivalent functionality to {@link Quantiles}, for use in * {@link QuantilesBenchmark}. These algorithms each calculate either a single quantile or multiple * quantiles. All algorithms modify the dataset they are given (the cost of a copy to avoid this * will be constant across algorithms). * * @author Pete Gillin * @since 20.0 */ @GwtIncompatibleCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Mar 03 05:21:26 GMT 2026 - 7.3K bytes - Click Count (0) -
src/test/java/jcifs/pac/PacMacTest.java
assertEquals("Missing key", e.getMessage()); } /** * Test calculateMac with an invalid algorithm type. */ @Test void testCalculateMacInvalidAlgorithm() { Map<Integer, KerberosKey> keys = new HashMap<>();
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 07:14:38 GMT 2025 - 7.1K bytes - Click Count (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 5.6K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/SigningDigest.java
* * @param macSigningKey the MAC signing key for message authentication * @param bypass whether to bypass MAC signing * @throws SmbException if MD5 algorithm is not available */ public SigningDigest(final byte[] macSigningKey, final boolean bypass) throws SmbException { try { digest = MessageDigest.getInstance("MD5");Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.9K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/Ordering.java
} // Ordering<Object> singletons /** * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements. * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in * the returned instance these are implemented by simply copying the source list.
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Feb 23 19:19:10 GMT 2026 - 39.4K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java
private byte[] salt; /** * Constructs a preauth integrity negotiate context with the specified parameters. * * @param config the SMB configuration * @param hashAlgos the supported hash algorithms * @param salt the salt value for preauth integrity */ public PreauthIntegrityNegotiateContext(final Configuration config, final int[] hashAlgos, final byte[] salt) { this.hashAlgos = hashAlgos;
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 4.4K bytes - Click Count (0) -
src/main/java/jcifs/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0)