- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 100 for Identical (0.05 sec)
-
android/guava-testlib/src/com/google/common/collect/testing/testers/CollectionToArrayTester.java
Object[] array = collection.toArray(); expectArrayContentsAnyOrder(createSamplesArray(), array); } /** * {@link Collection#toArray(Object[])} says: "Note that {@code toArray(new Object[0])} is * identical in function to {@code toArray()}." * * <p>For maximum effect, the collection under test should be created from an element array of a * type other than {@code Object[]}. */
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 8.2K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoRequestTest.java
assertEquals(orderedDialects[i], SMBUtil.readInt2(buffer, 24 + i * 2)); } } @Test @DisplayName("Test multiple encode calls produce identical output") void testMultipleEncodeCallsIdentical() { ValidateNegotiateInfoRequest request =
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 11.7K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactLinkedHashSet.java
* even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior. * * <p>This class should not be assumed to be universally superior to {@code * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memory
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 14:59:07 UTC 2025 - 9.4K bytes - Viewed (0) -
guava/src/com/google/common/collect/RangeMap.java
* value that are {@linkplain Range#isConnected connected} to this range. * * <p>The behavior of {@link #get(Comparable) get(k)} after calling this method is identical to * the behavior described in {@link #put(Range, Object) put(range, value)}, however the ranges * returned from {@link #asMapOfRanges} will be different if there were existing entries which
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 7.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 25.6K bytes - Viewed (0) -
guava/src/com/google/common/reflect/TypeResolver.java
* ours. Therefore, we have to be careful about whether we create our own TypeVariable: * * 2a. If the resolved types are identical to the original types, then we can return the * original, identical JDK TypeVariable. By doing so, we sidestep the problem entirely. * * 2b. If the resolved types are different from the original types, things are trickier. The
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Sep 03 14:03:14 UTC 2025 - 24.2K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3); assertTrue(result1, "Identical passwords should be equal"); assertFalse(result2, "Different passwords should not be equal"); } /** * Measure the average time for equals operations. */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
src/test/java/org/codelibs/fess/helper/NotificationHelperTest.java
String slackResult = notificationHelper.toSlackMessage(discloser); String googleChatResult = notificationHelper.toGoogleChatMessage(discloser); // Both methods should produce identical output assertEquals(slackResult, googleChatResult); } public void test_toSlackMessage_withLongContent() { MockSMailPostingDiscloser discloser = new MockSMailPostingDiscloser();
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 10 13:41:04 UTC 2025 - 19.6K bytes - Viewed (0) -
src/bytes/compare_test.go
if cmp != -1 { t.Errorf(`CompareBbigger(%d,%d) = %d`, len, k, cmp) } b[k] = a[k] } } } func TestEndianBaseCompare(t *testing.T) { // This test compares byte slices that are almost identical, except one // difference that for some j, a[j]>b[j] and a[j+1]<b[j+1]. If the implementation // compares large chunks with wrong endianness, it gets wrong result. // no vector register is larger than 512 bytes for now
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Jul 13 23:11:42 UTC 2023 - 6.8K bytes - Viewed (0) -
docs/ftp/README.md
### Certificate-based authentication `--sftp=trusted-user-ca-key=...` specifies a file containing public key of certificate authority that is trusted to sign user certificates for authentication. Implementation is identical with "TrustedUserCAKeys" setting in OpenSSH server with exception that only one CA key can be defined. If a certificate is presented for authentication and has its signing CA key is in this file, then it may be
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0)