- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 155 for identically (0.06 seconds)
-
android/guava/src/com/google/common/util/concurrent/Striped.java
} int[] stripes = new int[result.size()]; for (int i = 0; i < result.size(); i++) { stripes[i] = indexFor(result.get(i)); } Arrays.sort(stripes); // optimize for runs of identical stripes int previousStripe = stripes[0]; result.set(0, getAt(previousStripe)); for (int i = 1; i < result.size(); i++) { int currentStripe = stripes[i]; if (currentStripe == previousStripe) {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Sep 16 22:01:32 GMT 2025 - 20.6K bytes - Click Count (0) -
docs/ftp/README.md
### Certificate-based authentication `--sftp=trusted-user-ca-key=...` specifies a file containing public key of certificate authority that is trusted to sign user certificates for authentication. Implementation is identical with "TrustedUserCAKeys" setting in OpenSSH server with exception that only one CA key can be defined. If a certificate is presented for authentication and has its signing CA key is in this file, then it may be
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue May 07 06:41:25 GMT 2024 - 7.8K bytes - Click Count (0) -
android/guava/src/com/google/common/io/ReaderInputStream.java
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Apr 14 16:36:11 GMT 2025 - 9.3K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/ioctl/ValidateNegotiateInfoRequestTest.java
assertEquals(orderedDialects[i], SMBUtil.readInt2(buffer, 24 + i * 2)); } } @Test @DisplayName("Test multiple encode calls produce identical output") void testMultipleEncodeCallsIdentical() { ValidateNegotiateInfoRequest request =
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 11.7K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] out14 = new byte[16]; byte[] out7 = new byte[8]; // Act NtlmUtil.E(key14, data8, out14); NtlmUtil.E(key7, data8, out7); // Assert: first block identical to single-chunk encryption assertArrayEquals(Arrays.copyOfRange(out14, 0, 8), out7); // And second block is present and not all zeros
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12K bytes - Click Count (1) -
android/guava/src/com/google/common/collect/CompactLinkedHashSet.java
* even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior. * * <p>This class should not be assumed to be universally superior to {@code * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memoryCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Aug 06 14:59:07 GMT 2025 - 9.4K bytes - Click Count (0) -
guava/src/com/google/common/collect/CompactLinkedHashSet.java
* even {@code java.util.HashSet}, and places considerably less load on the garbage collector. Like * {@code java.util.LinkedHashSet}, it offers insertion-order iteration, with identical behavior. * * <p>This class should not be assumed to be universally superior to {@code * java.util.LinkedHashSet}. Generally speaking, this class reduces object allocation and memoryCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Wed Aug 06 14:59:07 GMT 2025 - 9.6K bytes - Click Count (0) -
guava/src/com/google/common/collect/RangeMap.java
* value that are {@linkplain Range#isConnected connected} to this range. * * <p>The behavior of {@link #get(Comparable) get(k)} after calling this method is identical to * the behavior described in {@link #put(Range, Object) put(range, value)}, however the ranges * returned from {@link #asMapOfRanges} will be different if there were existing entries whichCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Sun Dec 22 03:38:46 GMT 2024 - 7.6K bytes - Click Count (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
* 'affect' a bit(j) in the output if two inputs, identical but for bit(i), will differ at output * bit(j) about half the time * * <p>Funneling is pretty simple to detect. The key idea is to find example keys which * unequivocally demonstrate that funneling cannot be occurring. This is done bit-by-bit. For each * input bit(i) and output bit(j), two pairs of keys must be found with all bits identical except
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Tue Oct 28 18:19:59 GMT 2025 - 25.6K bytes - Click Count (0) -
impl/maven-cli/src/test/java/org/apache/maven/cling/invoker/mvnup/goals/GAVUtilsTest.java
assertNotNull(gavs); assertTrue(gavs.isEmpty(), "Expected collection to be empty but had " + gavs.size() + " elements: " + gavs); } @Test @DisplayName("should deduplicate identical GAVs") void shouldDeduplicateIdenticalGAVs() throws Exception { String pomXml = """ <?xml version="1.0" encoding="UTF-8"?>
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Tue Nov 18 18:03:26 GMT 2025 - 17.3K bytes - Click Count (0)