- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 44 for Algorithm (0.16 sec)
-
api/maven-api-core/src/main/java/org/apache/maven/api/services/ChecksumAlgorithmService.java
* @param algorithms The checksum algorithms to use, must not be {@code null}. * @return The calculated checksums, indexed by algorithms, never {@code null}. * @throws NullPointerException if passed in any parameter is {@code null}. */ @Nonnull Map<ChecksumAlgorithm, String> calculate(@Nonnull byte[] data, @Nonnull Collection<ChecksumAlgorithm> algorithms); /**
Java - Registered: Sun May 05 03:35:11 GMT 2024 - Last Modified: Thu Dec 21 08:05:10 GMT 2023 - 6.4K bytes - Viewed (0) -
maven-core/src/main/java/org/apache/maven/internal/impl/DefaultChecksumAlgorithmService.java
private final org.eclipse.aether.spi.connector.checksum.ChecksumAlgorithm algorithm; DefaultChecksumCalculator(org.eclipse.aether.spi.connector.checksum.ChecksumAlgorithm algorithm) { this.algorithm = algorithm; } @Override public void update(ByteBuffer input) { algorithm.update(input); } @Override public String checksum() {
Java - Registered: Sun Mar 24 03:35:10 GMT 2024 - Last Modified: Thu Dec 21 08:05:10 GMT 2023 - 7K bytes - Viewed (0) -
maven-api-impl/src/main/java/org/apache/maven/internal/impl/DefaultChecksumAlgorithmService.java
private final org.eclipse.aether.spi.connector.checksum.ChecksumAlgorithm algorithm; DefaultChecksumCalculator(org.eclipse.aether.spi.connector.checksum.ChecksumAlgorithm algorithm) { this.algorithm = algorithm; } @Override public void update(ByteBuffer input) { algorithm.update(input); } @Override public String checksum() {
Java - Registered: Sun May 05 03:35:11 GMT 2024 - Last Modified: Mon Mar 25 10:50:01 GMT 2024 - 7.4K bytes - Viewed (0) -
src/main/java/org/codelibs/core/security/MessageDigestUtil.java
assertArgumentNotEmpty("algorithm", algorithm); if (text == null) { return null; } final MessageDigest msgDigest = getInstance(algorithm); try { msgDigest.update(text.getBytes("UTF-8")); } catch (final UnsupportedEncodingException e) { throw new ClIllegalStateException(e); }
Java - Registered: Fri May 03 20:58:11 GMT 2024 - Last Modified: Thu Mar 07 01:59:08 GMT 2024 - 3.1K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hashing.java
/** * Returns a hash function implementing the Message Authentication Code (MAC) algorithm, using the * MD5 (128 hash bits) hash function and a {@link SecretKeySpec} created from the given byte array * and the MD5 algorithm. * * <p>If you are designing a new system that needs HMAC, prefer {@link #hmacSha256} or other * future-proof algorithms <a
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Tue Apr 09 00:37:15 GMT 2024 - 29.2K bytes - Viewed (0) -
src/main/java/org/codelibs/core/crypto/CachedCipher.java
protected void offerDecryptoCipher(final Cipher cipher) { decryptoQueue.offer(cipher); } public String getAlgorithm() { return algorithm; } public void setAlgorithm(final String algorithm) { this.algorithm = algorithm; } public String getTransformation() { return transformation; } public void setTransformation(final String transformation) {
Java - Registered: Fri May 03 20:58:11 GMT 2024 - Last Modified: Thu Mar 07 01:59:08 GMT 2024 - 8.1K bytes - Viewed (0) -
android/guava/src/com/google/common/math/IntMath.java
return b; } else if (b == 0) { return a; // similar logic } /* * Uses the binary GCD algorithm; see http://en.wikipedia.org/wiki/Binary_GCD_algorithm. This is * >40% faster than the Euclidean algorithm in benchmarks. */ int aTwos = Integer.numberOfTrailingZeros(a); a >>= aTwos; // divide out all 2s int bTwos = Integer.numberOfTrailingZeros(b);
Java - Registered: Fri Apr 26 12:43:10 GMT 2024 - Last Modified: Wed Feb 07 17:50:39 GMT 2024 - 23.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Collections2.java
} /** * Returns a {@link Collection} of all the permutations of the specified {@link Iterable}. * * <p><i>Notes:</i> This is an implementation of the algorithm for Lexicographical Permutations * Generation, described in Knuth's "The Art of Computer Programming", Volume 4, Chapter 7, * Section 7.2.1.2. The iteration order follows the lexicographical order. This means that the
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Mon Apr 01 16:15:01 GMT 2024 - 22.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/SortedLists.java
} }; abstract int resultIndex(int higherIndex); } /** * Searches the specified naturally ordered list for the specified object using the binary search * algorithm. * * <p>Equivalent to {@link #binarySearch(List, Function, Object, Comparator, KeyPresentBehavior, * KeyAbsentBehavior)} using {@link Ordering#natural}. */
Java - Registered: Fri May 03 12:43:13 GMT 2024 - Last Modified: Thu Feb 22 21:19:52 GMT 2024 - 10.9K bytes - Viewed (0) -
maven-core/src/main/java/org/apache/maven/internal/impl/PathModularization.java
* be null instead of the actual module name. This option can avoid the cost of reading module * descriptors when only the modules existence needs to be verified.</p> * * <p><b>Algorithm:</b> * If the given path is a directory, then there is a choice: * </p> * <ul> * <li><b>Package hierarchy:</b> if a {@code module-info.class} file is found at the root,
Java - Registered: Sun Mar 24 03:35:10 GMT 2024 - Last Modified: Fri Mar 01 17:18:13 GMT 2024 - 11.2K bytes - Viewed (0)