- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 140 for identical (0.12 sec)
-
guava/src/com/google/common/collect/CompactLinkedHashSet.java
* even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior. * * <p>This class should not be assumed to be universally superior to {@code * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memoryRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Wed Aug 06 14:59:07 UTC 2025 - 9.6K bytes - Viewed (0) -
guava/src/com/google/common/collect/RangeMap.java
* value that are {@linkplain Range#isConnected connected} to this range. * * <p>The behavior of {@link #get(Comparable) get(k)} after calling this method is identical to * the behavior described in {@link #put(Range, Object) put(range, value)}, however the ranges * returned from {@link #asMapOfRanges} will be different if there were existing entries whichRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 7.6K bytes - Viewed (0) -
docs/ftp/README.md
### Certificate-based authentication `--sftp=trusted-user-ca-key=...` specifies a file containing public key of certificate authority that is trusted to sign user certificates for authentication. Implementation is identical with "TrustedUserCAKeys" setting in OpenSSH server with exception that only one CA key can be defined. If a certificate is presented for authentication and has its signing CA key is in this file, then it may be
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue May 07 06:41:25 UTC 2024 - 7.8K bytes - Viewed (0) -
internal/bucket/replication/replication_test.go
destBucket: "destinationbucket", sameTarget: false, expectedParsingErr: nil, expectedValidationErr: errDestinationArnMissing, }, // 5 replication destination in different rules not identical {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 32.4K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Striped.java
} int[] stripes = new int[result.size()]; for (int i = 0; i < result.size(); i++) { stripes[i] = indexFor(result.get(i)); } Arrays.sort(stripes); // optimize for runs of identical stripes int previousStripe = stripes[0]; result.set(0, getAt(previousStripe)); for (int i = 1; i < result.size(); i++) { int currentStripe = stripes[i]; if (currentStripe == previousStripe) {Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 16 22:01:32 UTC 2025 - 20.6K bytes - Viewed (0) -
impl/maven-cli/src/test/java/org/apache/maven/cling/invoker/mvnup/goals/GAVUtilsTest.java
assertNotNull(gavs); assertTrue(gavs.isEmpty(), "Expected collection to be empty but had " + gavs.size() + " elements: " + gavs); } @Test @DisplayName("should deduplicate identical GAVs") void shouldDeduplicateIdenticalGAVs() throws Exception { String pomXml = """ <?xml version="1.0" encoding="UTF-8"?>
Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Tue Nov 18 18:03:26 UTC 2025 - 17.3K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0) -
guava/src/com/google/common/reflect/TypeResolver.java
* ours. Therefore, we have to be careful about whether we create our own TypeVariable: * * 2a. If the resolved types are identical to the original types, then we can return the * original, identical JDK TypeVariable. By doing so, we sidestep the problem entirely. * * 2b. If the resolved types are different from the original types, things are trickier. TheRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Sep 23 22:30:05 UTC 2025 - 25.3K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/Smb3KeyDerivationTest.java
byte[] signingKey2 = Smb3KeyDerivation.deriveSigningKey(dialect, sessionKey, preauthIntegrity); // Then - should produce identical results assertArrayEquals(signingKey1, signingKey2, "Same input should produce same output"); } @Test @DisplayName("Should handle empty session key") void testDeriveKeys_EmptySessionKey() {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashCode.java
return ch - 'a' + 10; } throw new IllegalArgumentException("Illegal hexadecimal character: " + ch); } /** * Returns {@code true} if {@code object} is a {@link HashCode} instance with the identical byte * representation to this hash code. * * <p><b>Security note:</b> this method uses a constant-time (not short-circuiting) implementationRegistered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 12.6K bytes - Viewed (0)