- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 63 for algorism (0.03 sec)
-
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
when (signedByKeyPair.private) { is RSAPrivateKey -> AlgorithmIdentifier( algorithm = SHA256_WITH_RSA_ENCRYPTION, parameters = null, ) else -> AlgorithmIdentifier( algorithm = SHA256_WITH_ECDSA, parameters = ByteString.EMPTY, ) } private fun generateKeyPair(): KeyPair =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 21.6K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/PredecessorsFunction.java
* topological sort) that only need a way of accessing the predecessors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * {@snippet : * public <N> someGraphAlgorithm(N startNode, PredecessorsFunction<N> predecessorsFunction); * } * * you will invoke it depending on the graph representation you're using. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 4K bytes - Viewed (0) -
android/guava/src/com/google/common/graph/SuccessorsFunction.java
* breadth first traversal) that only need a way of accessing the successors of a node in a graph. * * <h3>Usage</h3> * * Given an algorithm, for example: * * {@snippet : * public <N> someGraphAlgorithm(N startNode, SuccessorsFunction<N> successorsFunction); * } * * you will invoke it depending on the graph representation you're using. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 4.2K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/collect/BinaryTreeTraverserBenchmark.java
for (int i = 0; i < size; i++) { keys[i] = rng.nextInt(); } return createTreap(Ints.asList(keys)); } // See http://en.wikipedia.org/wiki/Treap for details on the algorithm. private Optional<BinaryNode> createTreap(List<Integer> keys) { if (keys.isEmpty()) { return Optional.absent(); } int minIndex = 0; for (int i = 1; i < keys.size(); i++) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 4.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/AbstractStreamingHasher.java
*/ // TODO(kevinb): this class still needs some design-and-document-for-inheritance love abstract class AbstractStreamingHasher extends AbstractHasher { /** Buffer via which we pass data to the hash algorithm (the implementor) */ private final ByteBuffer buffer; /** Number of bytes to be filled before process() invocation(s). */ private final int bufferSize; /** Number of bytes processed per process() invocation. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 7.1K bytes - Viewed (0) -
guava/src/com/google/common/hash/Fingerprint2011.java
import com.google.common.annotations.VisibleForTesting; /** * Implementation of Geoff Pike's fingerprint2011 hash function. See {@link Hashing#fingerprint2011} * for information on the behaviour of the algorithm. * * <p>On Intel Core2 2.66, on 1000 bytes, fingerprint2011 takes 0.9 microseconds compared to * fingerprint at 4.0 microseconds and md5 at 4.5 microseconds. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 6.5K bytes - Viewed (0) -
guava/src/com/google/common/escape/CharEscaper.java
* from the resulting text. * * <p>If the character does not need to be escaped, this method should return {@code null}, rather * than a one-character array containing the character itself. This enables the escaping algorithm * to perform more efficiently. * * <p>An escaper is expected to be able to deal with any {@code char} value, so this method should * not throw any exceptions. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Feb 13 15:45:16 UTC 2025 - 6.7K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Crc32cHashFunction.java
} @Override public String toString() { return "Hashing.crc32c()"; } static final class Crc32cHasher extends AbstractStreamingHasher { /* * The striding algorithm works roughly as follows: it is universally the case that * CRC(x ^ y) == CRC(x) ^ CRC(y). The approach we take is to break the message as follows,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 28 01:26:26 UTC 2024 - 21.2K bytes - Viewed (0) -
docs/works_with_okhttp.md
* [Ok2Curl](https://github.com/mrmike/Ok2Curl): Convert OkHttp requests into curl logs. * [OkHttp AWS Signer](https://github.com/babbel/okhttp-aws-signer): AWS V4 signing algorithm for OkHttp requests * [okhttp-digest](https://github.com/rburgst/okhttp-digest): A digest authenticator for OkHttp.
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Sat Feb 15 16:18:51 UTC 2025 - 3.9K bytes - Viewed (0) -
guava-tests/benchmark/com/google/common/collect/BinaryTreeTraverserBenchmark.java
for (int i = 0; i < size; i++) { keys[i] = rng.nextInt(); } return createTreap(Ints.asList(keys)); } // See http://en.wikipedia.org/wiki/Treap for details on the algorithm. private Optional<BinaryNode> createTreap(List<Integer> keys) { if (keys.isEmpty()) { return Optional.absent(); } int minIndex = 0; for (int i = 1; i < keys.size(); i++) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 4.9K bytes - Viewed (0)