- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 231 for Algorithms (0.05 sec)
-
src/test/java/jcifs/pac/PacMacTest.java
assertEquals("Missing key", e.getMessage()); } /** * Test calculateMac with an invalid algorithm type. */ @Test void testCalculateMacInvalidAlgorithm() { Map<Integer, KerberosKey> keys = new HashMap<>();
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SigningDigest.java
* * @param macSigningKey the MAC signing key for message authentication * @param bypass whether to bypass MAC signing * @throws SmbException if MD5 algorithm is not available */ public SigningDigest(final byte[] macSigningKey, final boolean bypass) throws SmbException { try { digest = MessageDigest.getInstance("MD5");Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/admin/dict/stemmeroverride/EditForm.java
* This form extends CreateForm to include fields necessary for updating existing stemmer override entries. * Stemmer overrides define custom stemming rules that take precedence over the default stemming algorithm. * */ public class EditForm extends CreateForm { /** * Creates a new EditForm instance. */ public EditForm() { super(); } /**Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 1.8K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
rep_obj4_md5=$(echo "${stat_out4}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"') # Check the algo and keyId of replicated objects if [ "${rep_obj1_algo}" != "${src_obj1_algo}" ]; then echo "BUG: Algorithm: '${rep_obj1_algo}' of replicated object: 'minio2/test-bucket/encrypted' doesn't match with source value: '${src_obj1_algo}'" exit_1 fi if [ "${rep_obj1_keyid}" != "${src_obj1_keyid}" ]; thenRegistered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 11.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Ordering.java
} // Ordering<Object> singletons /** * Returns an ordering which treats all values as equal, indicating "no ordering." Passing this * ordering to any <i>stable</i> sort algorithm results in no change to the order of elements. * Note especially that {@link #sortedCopy} and {@link #immutableSortedCopy} are stable, and in * the returned instance these are implemented by simply copying the source list.
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 17:50:58 UTC 2025 - 39.5K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.19.md
### KubeSchedulerConfiguration graduates to Beta
Registered: Fri Dec 26 09:05:12 UTC 2025 - Last Modified: Wed Jan 05 05:42:32 UTC 2022 - 489.7K bytes - Viewed (0) -
src/main/java/jcifs/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
cmd/erasure-healing-common_test.go
Checksums: map[string]string(nil), }, }, Erasure: ErasureInfo{ Algorithm: "ReedSolomon", DataBlocks: 6, ParityBlocks: 6, BlockSize: 1048576, Index: 1, Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12}, Checksums: []ChecksumInfo{{PartNumber: 1, Algorithm: 0x3, Hash: []uint8{}}}, }, NumVersions: 1, Idx: 0, }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 22.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* based on these entries. * <p> * To fully understand the information exposed by this class a description * of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0)