Search Options

Results per page
Sort
Preferred Languages
Advance

Results 381 - 390 of 432 for hasTest (0.04 sec)

  1. guava-tests/test/com/google/common/base/CharMatcherTest.java

    import com.google.common.annotations.J2ktIncompatible;
    import com.google.common.collect.Sets;
    import com.google.common.testing.NullPointerTester;
    import java.util.Arrays;
    import java.util.BitSet;
    import java.util.HashSet;
    import java.util.Random;
    import java.util.Set;
    import junit.framework.AssertionFailedError;
    import junit.framework.TestCase;
    import org.jspecify.annotations.NullMarked;
    
    /**
     * Unit test for {@link CharMatcher}.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 30.4K bytes
    - Viewed (0)
  2. android/guava-tests/test/com/google/common/cache/LocalCacheTest.java

          Random random = new Random();
          List<ReferenceEntry<Object, Object>> reads = new ArrayList<>();
          Iterator<ReferenceEntry<Object, Object>> i = readOrder.iterator();
          while (i.hasNext()) {
            ReferenceEntry<Object, Object> entry = i.next();
            if (random.nextBoolean()) {
              map.get(entry.getKey(), loader);
              reads.add(entry);
              i.remove();
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 110.5K bytes
    - Viewed (0)
  3. src/main/java/org/codelibs/fess/helper/SystemHelper.java

    import java.time.LocalDateTime;
    import java.time.ZoneId;
    import java.util.ArrayList;
    import java.util.Calendar;
    import java.util.Collections;
    import java.util.Date;
    import java.util.HashMap;
    import java.util.HashSet;
    import java.util.LinkedHashMap;
    import java.util.List;
    import java.util.Locale;
    import java.util.Map;
    import java.util.Map.Entry;
    import java.util.Properties;
    import java.util.Set;
    import java.util.TimeZone;
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sun Aug 31 08:19:00 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  4. okhttp/src/commonJvmAndroid/kotlin/okhttp3/ResponseBody.kt

     * * `Response.body().bytes()`
     * * `Response.body().string()`
     *
     * There is no benefit to invoking multiple `close()` methods for the same response body.
     *
     * For synchronous calls, the easiest way to make sure a response body is closed is with a `try`
     * block. With this structure the compiler inserts an implicit `finally` clause that calls
     * [close()][Response.close] for you.
     *
     * ```java
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Tue May 27 14:51:25 UTC 2025
    - 11.6K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/base/CharMatcherTest.java

    import com.google.common.annotations.J2ktIncompatible;
    import com.google.common.collect.Sets;
    import com.google.common.testing.NullPointerTester;
    import java.util.Arrays;
    import java.util.BitSet;
    import java.util.HashSet;
    import java.util.Random;
    import java.util.Set;
    import junit.framework.AssertionFailedError;
    import junit.framework.TestCase;
    import org.jspecify.annotations.NullMarked;
    
    /**
     * Unit test for {@link CharMatcher}.
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 30.3K bytes
    - Viewed (0)
  6. docs/distributed/DESIGN.md

    - Choosing an erasure set for the object is decided during `PutObject()`, object names are used to find the right erasure set using the following pseudo code.
    
    ```go
    // hashes the key returning an integer.
    func sipHashMod(key string, cardinality int, id [16]byte) int {
            if cardinality <= 0 {
                    return -1
            }
            sip := siphash.New(id[:])
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 8K bytes
    - Viewed (1)
  7. okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/connection/RealConnectionPool.kt

          scheduleOpener(connection.route.address)
          true
        } else {
          scheduleCloser()
          false
        }
      }
    
      fun evictAll() {
        val i = connections.iterator()
        while (i.hasNext()) {
          val connection = i.next()
          val socketToClose =
            connection.withLock {
              if (connection.calls.isEmpty()) {
                i.remove()
                connection.noNewExchanges = true
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Tue Jun 03 17:10:08 UTC 2025
    - 16.1K bytes
    - Viewed (0)
  8. android/guava/src/com/google/common/hash/HashCode.java

        }
        return false;
      }
    
      /**
       * Returns a "Java hash code" for this {@code HashCode} instance; this is well-defined (so, for
       * example, you can safely put {@code HashCode} instances into a {@code HashSet}) but is otherwise
       * probably not what you want to use.
       */
      @Override
      public final int hashCode() {
        // If we have at least 4 bytes (32 bits), just take the first 4 bytes. Since this is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 12.6K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/TopKSelector.java

       * {@link Ordering#leastOf(Iterator, int)}, which provides a simpler API for that use case.
       */
      public void offerAll(Iterator<? extends T> elements) {
        while (elements.hasNext()) {
          offer(elements.next());
        }
      }
    
      /**
       * Returns the top {@code k} elements offered to this {@code TopKSelector}, or all elements if
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Aug 31 13:15:26 UTC 2025
    - 11.4K bytes
    - Viewed (0)
  10. docs/pt/docs/tutorial/security/simple-oauth2.md

    ##### Porque usar hashing de senha
    
    Se o seu banco de dados for roubado, o ladrão não terá as senhas em texto simples dos seus usuários, apenas os hashes.
    
    Assim, o ladrão não poderá tentar usar essas mesmas senhas em outro sistema (como muitos usuários usam a mesma senha em todos os lugares, isso seria perigoso).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10K bytes
    - Viewed (0)
Back to top