Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 91 - 100 of 262 for alrgorithm (0.26 seconds)

  1. src/main/java/jcifs/util/SecureKeyManager.java

        /**
         * Store a session key
         *
         * @param sessionId unique session identifier
         * @param key the secret key to store
         * @param algorithm the key algorithm (e.g., "AES")
         */
        public void storeSessionKey(String sessionId, byte[] key, String algorithm) {
            checkNotClosed();
    
            if (key == null || sessionId == null) {
                throw new IllegalArgumentException("Session ID and key must not be null");
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 21.5K bytes
    - Click Count (0)
  2. android/guava-tests/test/com/google/common/math/QuantilesAlgorithm.java

    import org.jspecify.annotations.NullUnmarked;
    
    /**
     * Enumerates several algorithms providing equivalent functionality to {@link Quantiles}, for use in
     * {@link QuantilesBenchmark}. These algorithms each calculate either a single quantile or multiple
     * quantiles. All algorithms modify the dataset they are given (the cost of a copy to avoid this
     * will be constant across algorithms).
     *
     * @author Pete Gillin
     * @since 20.0
     */
    @GwtIncompatible
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Mar 03 05:21:26 GMT 2026
    - 7.3K bytes
    - Click Count (0)
  3. okhttp-zstd/src/test/java/okhttp3/zstd/ZstdInterceptorTest.kt

        val responseString = decompressed.body.string()
        assertThat(responseString).isEqualTo("hello not compressed world")
      }
    
      @Test
      fun testUnknownAlgorithm() {
        val s = "hello unknown algorithm world".encodeUtf8()
    
        val response =
          response("https://example.com/", s) {
            header("Content-Encoding", "deflate")
          }
    
        val decompressed = zstdInterceptor.decompress(response)
    Created: Fri Apr 03 11:42:14 GMT 2026
    - Last Modified: Fri Aug 01 06:04:22 GMT 2025
    - 4.8K bytes
    - Click Count (1)
  4. guava-tests/test/com/google/common/math/QuantilesAlgorithm.java

    import org.jspecify.annotations.NullUnmarked;
    
    /**
     * Enumerates several algorithms providing equivalent functionality to {@link Quantiles}, for use in
     * {@link QuantilesBenchmark}. These algorithms each calculate either a single quantile or multiple
     * quantiles. All algorithms modify the dataset they are given (the cost of a copy to avoid this
     * will be constant across algorithms).
     *
     * @author Pete Gillin
     * @since 20.0
     */
    @GwtIncompatible
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Tue Mar 03 05:21:26 GMT 2026
    - 7.3K bytes
    - Click Count (0)
  5. src/test/java/jcifs/pac/PacMacTest.java

            assertEquals("Missing key", e.getMessage());
        }
    
        /**
         * Test calculateMac with an invalid algorithm type.
         */
        @Test
        void testCalculateMacInvalidAlgorithm() {
            Map<Integer, KerberosKey> keys = new HashMap<>();
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Thu Aug 14 07:14:38 GMT 2025
    - 7.1K bytes
    - Click Count (0)
  6. src/main/java/jcifs/internal/dtyp/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 5.6K bytes
    - Click Count (0)
  7. src/main/java/jcifs/smb1/smb1/SigningDigest.java

         *
         * @param macSigningKey the MAC signing key for message authentication
         * @param bypass whether to bypass MAC signing
         * @throws SmbException if MD5 algorithm is not available
         */
        public SigningDigest(final byte[] macSigningKey, final boolean bypass) throws SmbException {
            try {
                digest = MessageDigest.getInstance("MD5");
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 7.9K bytes
    - Click Count (0)
  8. android/guava/src/com/google/common/collect/Ordering.java

      }
    
      // Ordering<Object> singletons
    
      /**
       * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this
       * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements.
       * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in
       * the returned instance these are implemented by simply copying the source list.
    Created: Fri Apr 03 12:43:13 GMT 2026
    - Last Modified: Mon Feb 23 19:19:10 GMT 2026
    - 39.4K bytes
    - Click Count (0)
  9. src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java

        private byte[] salt;
    
        /**
         * Constructs a preauth integrity negotiate context with the specified parameters.
         *
         * @param config the SMB configuration
         * @param hashAlgos the supported hash algorithms
         * @param salt the salt value for preauth integrity
         */
        public PreauthIntegrityNegotiateContext(final Configuration config, final int[] hashAlgos, final byte[] salt) {
            this.hashAlgos = hashAlgos;
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 4.4K bytes
    - Click Count (0)
  10. src/main/java/jcifs/ACE.java

     * based on these entries.
     * <p>
     * To fully understand the information exposed by this class a description
     * of the access check algorithm used by Windows is required. The following
     * is a basic description of the algorithm. For a more complete description
     * we recommend reading the section on Access Control in Keith Brown's
     * "The .NET Developer's Guide to Windows Security" (which is also
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 16 01:32:48 GMT 2025
    - 7.1K bytes
    - Click Count (0)
Back to Top