- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 297 for hosting (0.09 sec)
-
guava-tests/benchmark/com/google/common/hash/ChecksumBenchmark.java
byte result = 0x01; // Trick the JVM to prevent it from using the hash function non-polymorphically result ^= Hashing.crc32().hashInt(reps).asBytes()[0]; result ^= Hashing.adler32().hashInt(reps).asBytes()[0]; result ^= Hashing.fingerprint2011().hashInt(reps).asBytes()[0]; for (int i = 0; i < reps; i++) { result ^= hashFunction.hashBytes(testBytes).asBytes()[0]; }
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 16 16:53:43 UTC 2024 - 3.4K bytes - Viewed (0) -
internal/event/target/kafka_scram_client_contrib.go
// KafkaSHA256 is a function that returns a crypto/sha256 hasher and should be used // to create Client objects configured for SHA-256 hashing. var KafkaSHA256 scram.HashGeneratorFcn = sha256.New // KafkaSHA512 is a function that returns a crypto/sha512 hasher and should be used // to create Client objects configured for SHA-512 hashing. var KafkaSHA512 scram.HashGeneratorFcn = sha512.New // XDGSCRAMClient implements the client-side of an authentication
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Nov 09 04:04:01 UTC 2023 - 3.2K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
assertEquals(3, hashCodes.size()); } public void testToString() { assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITH_KEY.toString()); assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITHOUT_KEY.toString()); assertEquals("Hashing.sipHash24(20, 13)", Hashing.sipHash24(20, 13).toString()); } private static void assertSip(String input, long expected) {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.6K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
assertEquals(3, hashCodes.size()); } public void testToString() { assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITH_KEY.toString()); assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITHOUT_KEY.toString()); assertEquals("Hashing.sipHash24(20, 13)", Hashing.sipHash24(20, 13).toString()); } private static void assertSip(String input, long expected) {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jul 23 14:22:54 UTC 2024 - 6.6K bytes - Viewed (0) -
misc/cgo/gmp/gmp.go
Garbage collection is the big problem. It is fine for the Go world to have pointers into the C world and to free those pointers when they are no longer needed. To help, the Go code can define Go objects holding the C pointers and use runtime.SetFinalizer on those Go objects. It is much more difficult for the C world to have pointers into the Go world, because the Go garbage collector is unaware of the memory
Registered: Tue Nov 05 11:13:11 UTC 2024 - Last Modified: Mon Apr 11 16:34:30 UTC 2022 - 9.5K bytes - Viewed (0) -
guava/src/com/google/common/hash/BloomFilterStrategies.java
} if (!bits.get(combinedHash % bitSize)) { return false; } } return true; } }, /** * This strategy uses all 128 bits of {@link Hashing#murmur3_128} when hashing. It looks different * from the implementation in MURMUR128_MITZ_32 because we're avoiding the multiplication in the * loop and doing a (much simpler) += hash2. We're also changing the index to a positive number by
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Oct 10 19:45:10 UTC 2022 - 10.7K bytes - Viewed (0) -
api/maven-api-core/src/main/java/org/apache/maven/api/services/ArtifactFactory.java
* * @since 4.0.0 */ @Experimental public interface ArtifactFactory extends Service { /** * Creates an artifact. * * @param request the request holding artifact creation parameters * @return an {@code Artifact}, never {@code null} * @throws IllegalArgumentException if {@code request} is null or {@code request.session} is null or invalid */ @Nonnull
Registered: Sun Nov 03 03:35:11 UTC 2024 - Last Modified: Tue Aug 27 21:13:34 UTC 2024 - 3.3K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/HashingOutputStreamTest.java
} public void testHash_hashesCorrectly() throws Exception { byte[] buf = new byte[] {'y', 'a', 'm', 's'}; HashCode expectedHash = Hashing.md5().hashBytes(buf); HashingOutputStream out = new HashingOutputStream(Hashing.md5(), buffer); out.write(buf); assertEquals(expectedHash, out.hash()); } public void testChecksForNull() throws Exception {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Fri Oct 11 22:00:03 UTC 2024 - 3.1K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/Striped.java
* itself is reclaimable. <i>Weak</i> means that locks/semaphores are created lazily, and they are * allowed to be reclaimed if nobody is holding on to them. This is useful, for example, if one * wants to create a {@code Striped<Lock>} of many locks, but worries that in most cases only a * small portion of these would be in use. *
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Jun 26 12:58:35 UTC 2024 - 20.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/ntlmssp/Type1Message.java
String suppliedWorkstation = getSuppliedWorkstation(); int flags = getFlags(); boolean hostInfo = false; byte[] domain = new byte[0]; if (suppliedDomain != null && suppliedDomain.length() != 0) { hostInfo = true; flags |= NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED; domain = suppliedDomain.toUpperCase().getBytes(
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 8K bytes - Viewed (0)