- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 53 for axes (0.01 sec)
-
guava/src/com/google/common/collect/CartesianList.java
} CartesianList(ImmutableList<List<E>> axes) { this.axes = axes; int[] axesSizeProduct = new int[axes.size() + 1]; axesSizeProduct[axes.size()] = 1; try { for (int i = axes.size() - 1; i >= 0; i--) { axesSizeProduct[i] = Math.multiplyExact(axesSizeProduct[i + 1], axes.get(i).size()); } } catch (ArithmeticException e) {
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sun Aug 31 13:15:26 UTC 2025 - 4.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/Sets.java
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 18:35:44 UTC 2025 - 81.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/Lists.java
* * @param lists the lists to choose elements from, in the order that the elements chosen from * those lists should appear in the resulting lists * @param <B> any common base class shared by all axes (often just {@link Object}) * @return the Cartesian product, as an immutable list containing immutable lists * @throws IllegalArgumentException if the size of the cartesian product would be greater thanRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 42.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/io/testdata/alice_in_wonderland.txt
glad to get an opportunity of showing off a little of her knowledge. `Just think of what work it would make with the day and night! You see the earth takes twenty-four hours to turn round on its axis--' `Talking of axes,' said the Duchess, `chop off her head!' Alice glanced rather anxiously at the cook, to see if she meant to take the hint; but the cook was busily stirring the soup, and
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Fri Apr 21 02:27:51 UTC 2017 - 145.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/SecurityDescriptor.java
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SecurityDescriptor.java
throw new IOException("Invalid SecurityDescriptor"); } aces = new ACE[numAces]; for (int i = 0; i < numAces; i++) { aces[i] = new ACE(); bufferIndex += aces[i].decode(buffer, bufferIndex); } } else { aces = null; } return bufferIndex - start; } @Override
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 4.5K bytes - Viewed (0) -
src/test/java/jcifs/internal/dtyp/SecurityDescriptorTest.java
prepareSecurityDescriptorBufferWithDACL(testBuffer, 0, 3); securityDescriptor.decode(testBuffer, 0, testBuffer.length); ACE[] aces = securityDescriptor.getAces(); assertNotNull(aces); assertEquals(3, aces.length); for (ACE ace : aces) { assertNotNull(ace); } } @Test @DisplayName("Test getOwnerUserSid returns correct SID")
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 18.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/ACE.java
* the access mask of the ACE, the access check is successful. Otherwise, * more ACEs are evaluated until all desired access bits (combined) * are "allowed". If all of the desired access bits are not "allowed" * the then same process is repeated for inherited ACEs. * <p> * For example, if user <code>WNET\alice</code> tries to open a file
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.8K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
// Determine key size based on cipher ID for AES-256 support int keyLength = getKeyLength(); String transformation; // Select appropriate AES algorithm based on key length if (keyLength == 32) { // AES-256 support transformation = "AES/GCM/NoPadding"; } else if (keyLength == 16) { // AES-128 (existing)Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 35.5K bytes - Viewed (0) -
src/main/java/jcifs/pac/PacMac.java
ms_usage = 8; case 23: ms_usage = 13; } return ms_usage; } /** * Calculates a MAC using HMAC-SHA1 with AES key derivation. * This method supports both AES-128 and AES-256 encryption types. * * @param usage the Kerberos key usage number for this operation * @param baseKey the base Kerberos key for key derivationRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 9K bytes - Viewed (0)