- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 1,571 for bist (0.02 sec)
-
okhttp/src/commonJvmAndroid/kotlin/okhttp3/internal/http2/Hpack.kt
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Mon May 05 16:01:00 UTC 2025 - 22.4K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
subjectKeyPair.public.encoded.toByteString(), ) val subject: List<List<AttributeTypeAndValue>> = subject() // Issuer/signer keys & identity. May be the subject if it is self-signed. val issuerKeyPair: KeyPair val issuer: List<List<AttributeTypeAndValue>> if (signedBy != null) { issuerKeyPair = signedBy!!.keyPair issuer =
Registered: Fri Sep 05 11:42:10 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 21.6K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
import java.io.ByteArrayOutputStream; import java.nio.ByteBuffer; import java.nio.ByteOrder; import java.util.ArrayList; import java.util.Arrays; import java.util.Collections; import java.util.List; import java.util.Random; import junit.framework.TestCase; import org.jspecify.annotations.NullUnmarked; /** * Tests for AbstractStreamingHasher. * * @author Dimitris Andreou */ @NullUnmarked
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 8.5K bytes - Viewed (0) -
guava-tests/test/com/google/common/collect/IterablesTest.java
} public void testAny() { List<String> list = new ArrayList<>(); Predicate<String> predicate = equalTo("pants"); assertFalse(any(list, predicate)); list.add("cool"); assertFalse(any(list, predicate)); list.add("pants"); assertTrue(any(list, predicate)); } public void testAll() { List<String> list = new ArrayList<>();
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 46.6K bytes - Viewed (0) -
guava/src/com/google/common/math/BigIntegerMath.java
long numeratorAccum = n; long denominatorAccum = 1; int bits = LongMath.log2(n, CEILING); int numeratorBits = bits; for (int i = 1; i < k; i++) { int p = n - i; int q = i + 1; // log2(p) >= bits - 1, because p >= n/2 if (numeratorBits + bits >= Long.SIZE - 1) { // The numerator is as big as it can get without risking overflow.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 18.8K bytes - Viewed (0) -
guava/src/com/google/common/net/InetAddresses.java
* This method does so by hashing 64 bits of the IPv6 address into {@code 224.0.0.0/3} (64 bits * into 29 bits): * * <ul> * <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that. * <li>Otherwise, it hashes the upper 64 bits of the IPv6 address. * </ul> * * <p>A "coerced" IPv4 address is equivalent to itself.
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
guava/src/com/google/common/math/DoubleUtils.java
signifFloor &= SIGNIFICAND_MASK; // remove the implied bit /* * We round up if either the fractional part of signif is strictly greater than 0.5 (which is * true if the 0.5 bit is set and any lower bit is set), or if the fractional part of signif is * >= 0.5 and signifFloor is odd (which is true if both the 0.5 bit and the 1 bit are set). */ boolean increment =
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Dec 21 03:10:51 UTC 2024 - 5.1K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashingTest.java
assertEquals( Hashing.md5().bits() + Hashing.md5().bits(), Hashing.concatenating(asList(Hashing.md5(), Hashing.md5())).bits()); assertEquals( Hashing.md5().bits() + Hashing.murmur3_32().bits(), Hashing.concatenating(asList(Hashing.md5(), Hashing.murmur3_32())).bits()); assertEquals( Hashing.md5().bits() + Hashing.murmur3_32().bits() + Hashing.murmur3_128().bits(),
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 26.4K bytes - Viewed (2) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except * bit(i). One pair must differ in output bit(j), and one pair must not. This proves that input * bit(i) can alter output bit(j). */ static void checkNoFunnels(HashFunction function) { Random rand = new Random(0);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 25.6K bytes - Viewed (0) -
guava/src/com/google/common/primitives/UnsignedLong.java
* interpreted as an unsigned 64-bit value. Specifically, the sign bit of {@code bits} is * interpreted as a normal bit, and all other bits are treated as usual. * * <p>If the argument is nonnegative, the returned result will be equal to {@code bits}, * otherwise, the result will be equal to {@code 2^64 + bits}. *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jun 04 13:03:16 UTC 2025 - 8.8K bytes - Viewed (0)