- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 140 for identical (0.04 sec)
-
android/guava-tests/test/com/google/common/math/QuantilesTest.java
Correspondence.tolerance(ALLOWED_ERROR); /** * A {@link Correspondence} which accepts either finite values within {@link #ALLOWED_ERROR} of * each other or identical non-finite values. */ private static final Correspondence<Double, Double> QUANTILE_CORRESPONDENCE = Correspondence.from( new BinaryPredicate<Double, Double>() { @Override
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Dec 11 20:45:32 UTC 2025 - 29.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/RangeMap.java
* value that are {@linkplain Range#isConnected connected} to this range. * * <p>The behavior of {@link #get(Comparable) get(k)} after calling this method is identical to * the behavior described in {@link #put(Range, Object) put(range, value)}, however the ranges * returned from {@link #asMapOfRanges} will be different if there were existing entries whichRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 6.4K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/HashTestUtils.java
* 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0) -
android/guava-testlib/src/com/google/common/collect/testing/testers/CollectionToArrayTester.java
Object[] array = collection.toArray(); expectArrayContentsAnyOrder(createSamplesArray(), array); } /** * {@link Collection#toArray(Object[])} says: "Note that {@code toArray(new Object[0])} is * identical in function to {@code toArray()}." * * <p>For maximum effect, the collection under test should be created from an element array of a * type other than {@code Object[]}. */
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 08 18:35:13 UTC 2025 - 8.2K bytes - Viewed (0) -
android/guava/src/com/google/common/reflect/TypeResolver.java
* ours. Therefore, we have to be careful about whether we create our own TypeVariable: * * 2a. If the resolved types are identical to the original types, then we can return the * original, identical JDK TypeVariable. By doing so, we sidestep the problem entirely. * * 2b. If the resolved types are different from the original types, things are trickier. TheRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 22:30:05 UTC 2025 - 25.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] out14 = new byte[16]; byte[] out7 = new byte[8]; // Act NtlmUtil.E(key14, data8, out14); NtlmUtil.E(key7, data8, out7); // Assert: first block identical to single-chunk encryption assertArrayEquals(Arrays.copyOfRange(out14, 0, 8), out7); // And second block is present and not all zeros
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (1) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3); assertTrue(result1, "Identical passwords should be equal"); assertFalse(result2, "Different passwords should not be equal"); } /** * Measure the average time for equals operations. */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoRequestTest.java
assertEquals(orderedDialects[i], SMBUtil.readInt2(buffer, 24 + i * 2)); } } @Test @DisplayName("Test multiple encode calls produce identical output") void testMultipleEncodeCallsIdentical() { ValidateNegotiateInfoRequest request =
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 11.7K bytes - Viewed (0) -
src/bytes/compare_test.go
if cmp != -1 { t.Errorf(`CompareBbigger(%d,%d) = %d`, len, k, cmp) } b[k] = a[k] } } } func TestEndianBaseCompare(t *testing.T) { // This test compares byte slices that are almost identical, except one // difference that for some j, a[j]>b[j] and a[j+1]<b[j+1]. If the implementation // compares large chunks with wrong endianness, it gets wrong result. // no vector register is larger than 512 bytes for nowRegistered: Tue Dec 30 11:13:12 UTC 2025 - Last Modified: Thu Jul 13 23:11:42 UTC 2023 - 6.8K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactLinkedHashSet.java
* even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior. * * <p>This class should not be assumed to be universally superior to {@code * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memoryRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 14:59:07 UTC 2025 - 9.4K bytes - Viewed (0)