Search Options

Results per page
Sort
Preferred Languages
Advance

Results 121 - 130 of 243 for algorithm (0.09 sec)

  1. src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java

         *            the SMB2 dialect version
         * @param preauthIntegrityHash
         *            the pre-authentication integrity hash (for SMB 3.1.1)
         * @throws GeneralSecurityException
         *             if the signing algorithm cannot be initialized
         *
         */
        public Smb2SigningDigest(final byte[] sessionKey, final int dialect, final byte[] preauthIntegrityHash)
                throws GeneralSecurityException {
            switch (dialect) {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.9K bytes
    - Viewed (0)
  2. cmd/erasure-coding.go

    	tillOffset := min(endShard*shardSize+shardSize, shardFileSize)
    	return tillOffset
    }
    
    // erasureSelfTest performs a self-test to ensure that erasure
    // algorithms compute expected erasure codes. If any algorithm
    // produces an incorrect value it fails with a hard error.
    //
    // erasureSelfTest tries to catch any issue in the erasure implementation
    // early instead of silently corrupting data.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  3. src/test/java/jcifs/pac/kerberos/KerberosEncDataTest.java

        }
    
        /**
         * Test decrypt with DES encryption.
         *
         * @throws GeneralSecurityException if a security error occurs
         * @throws NoSuchAlgorithmException if the algorithm is not available
         */
        @Test
        void testDecryptDes() throws GeneralSecurityException, NoSuchAlgorithmException {
            KeyGenerator keyGen = KeyGenerator.getInstance("DES");
            keyGen.init(56);
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.7K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/security/oauth2-jwt.md

    09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7
    ```
    
    </div>
    
    Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo).
    
    Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`.
    
    Crea una variable para la expiración del token.
    
    Define un Modelo de Pydantic que se usará en el endpoint de token para el response.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 11.3K bytes
    - Viewed (0)
  5. src/test/java/jcifs/ACETest.java

                verify(ace).getApplyToText();
            }
        }
    
        @Nested
        @DisplayName("Windows Access Check Algorithm Tests")
        class WindowsAccessCheckTests {
    
            @Test
            @DisplayName("Should simulate access check algorithm from documentation")
            void shouldSimulateDocumentationExample() {
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 24.4K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/hash/AbstractStreamingHasher.java

     */
    // TODO(kevinb): this class still needs some design-and-document-for-inheritance love
    abstract class AbstractStreamingHasher extends AbstractHasher {
      /** Buffer via which we pass data to the hash algorithm (the implementor) */
      private final ByteBuffer buffer;
    
      /** Number of bytes to be filled before process() invocation(s). */
      private final int bufferSize;
    
      /** Number of bytes processed per process() invocation. */
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/collect/ImmutableList.java

            : ImmutableList.<E>construct(elements.clone());
      }
    
      /**
       * Returns an immutable list containing the given elements, sorted according to their natural
       * order. The sorting algorithm used is stable, so elements that compare as equal will stay in the
       * order in which they appear in the input.
       *
       * <p>If your data has no duplicates, or you wish to deduplicate elements, use {@code
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue Sep 23 17:50:58 UTC 2025
    - 27.5K bytes
    - Viewed (0)
  8. compat/maven-model-builder/src/test/java/org/apache/maven/model/inheritance/DefaultInheritanceAssemblerTest.java

            Model child = getModel(baseName + "-child");
    
            if (fromRepo) {
                // when model is read from repo, a stream is used, then pomFile == null
                // (has consequences in inheritance algorithm since getProjectDirectory() returns null)
                parent = parent.clone();
                parent.setPomFile(null);
                child = child.clone();
                child.setPomFile(null);
            }
    
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Wed Sep 17 10:01:14 UTC 2025
    - 8.2K bytes
    - Viewed (0)
  9. cmd/storage-errors.go

    var errFileCorrupt = StorageErr("file is corrupted")
    
    // errBitrotHashAlgoInvalid - the algo for bit-rot hash
    // verification is empty or invalid.
    var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid")
    
    // errCrossDeviceLink - rename across devices not allowed.
    var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Thu Apr 04 12:04:40 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  10. guava/src/com/google/common/math/BigIntegerMath.java

         * and the arithmetic mean is always higher than the geometric mean.
         *
         * b) this iteration converges to floor(sqrt(x)). In fact, the number of correct digits doubles
         * with each iteration, so this algorithm takes O(log(digits)) iterations.
         *
         * We start out with a double-precision approximation, which may be higher or lower than the
         * true value. Therefore, we perform at least one Newton iteration to get a guess that's
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 18.8K bytes
    - Viewed (0)
Back to top