- Sort Score
- Result 10 results
- Languages All
Results 121 - 130 of 243 for algorithm (0.09 sec)
-
src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java
* the SMB2 dialect version * @param preauthIntegrityHash * the pre-authentication integrity hash (for SMB 3.1.1) * @throws GeneralSecurityException * if the signing algorithm cannot be initialized * */ public Smb2SigningDigest(final byte[] sessionKey, final int dialect, final byte[] preauthIntegrityHash) throws GeneralSecurityException { switch (dialect) {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.9K bytes - Viewed (0) -
cmd/erasure-coding.go
tillOffset := min(endShard*shardSize+shardSize, shardFileSize) return tillOffset } // erasureSelfTest performs a self-test to ensure that erasure // algorithms compute expected erasure codes. If any algorithm // produces an incorrect value it fails with a hard error. // // erasureSelfTest tries to catch any issue in the erasure implementation // early instead of silently corrupting data.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 8.5K bytes - Viewed (0) -
src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java
} /** * Test decrypt with DES encryption. * * @throws GeneralSecurityException if a security error occurs * @throws NoSuchAlgorithmException if the algorithm is not available */ @Test void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException { KeyGenerator keyGen = KeyGenerator.getInstance("DES"); keyGen.init(56);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.7K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo). Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`. Crea una variable para la expiración del token. Define un Modelo de Pydantic que se usará en el endpoint de token para el response.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Tue Dec 16 16:33:45 UTC 2025 - 11.3K bytes - Viewed (0) -
src/test/java/jcifs/ACETest.java
verify(ace).getApplyToText(); } } @Nested @DisplayName("Windows Access Check Algorithm Tests") class WindowsAccessCheckTests { @Test @DisplayName("Should simulate access check algorithm from documentation") void shouldSimulateDocumentationExample() {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 24.4K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/AbstractStreamingHasher.java
*/ // TODO(kevinb): this class still needs some design-and-document-for-inheritance love abstract class AbstractStreamingHasher extends AbstractHasher { /** Buffer via which we pass data to the hash algorithm (the implementor) */ private final ByteBuffer buffer; /** Number of bytes to be filled before process() invocation(s). */ private final int bufferSize; /** Number of bytes processed per process() invocation. */
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 7.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/ImmutableList.java
: ImmutableList.<E>construct(elements.clone()); } /** * Returns an immutable list containing the given elements, sorted according to their natural * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the * order in which they appear in the input. * * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 17:50:58 UTC 2025 - 27.5K bytes - Viewed (0) -
compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java
Model child = getModel(baseName + "-child"); if (fromRepo) { // when model is read from repo, a stream is used, then pomFile == null // (has consequences in inheritance algorithm since getProjectDirectory() returns null) parent = parent.clone(); parent.setPomFile(null); child = child.clone(); child.setPomFile(null); }Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Wed Sep 17 10:01:14 UTC 2025 - 8.2K bytes - Viewed (0) -
cmd/storage-errors.go
var errFileCorrupt = StorageErr("file is corrupted") // errBitrotHashAlgoInvalid - the algo for bit-rot hash // verification is empty or invalid. var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid") // errCrossDeviceLink - rename across devices not allowed. var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Thu Apr 04 12:04:40 UTC 2024 - 6.4K bytes - Viewed (0) -
guava/src/com/google/common/math/BigIntegerMath.java
* and the arithmetic mean is always higher than the geometric mean. * * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles * with each iteration, so this algorithm takes O(log(digits)) iterations. * * We start out with a double-precision approximation, which may be higher or lower than the * true value. Therefore, we perform at least one Newton iteration to get a guess that'sRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 18.8K bytes - Viewed (0)