- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 199 for Hashing (0.05 seconds)
-
android/guava/src/com/google/common/hash/Hashing.java
* specific length. * * <p>For example, if you need 1024-bit hash codes, you could join two {@link Hashing#sha512} hash * functions together: {@code Hashing.concatenating(Hashing.sha512(), Hashing.sha512())}. * * @since 19.0 */ public static HashFunction concatenating( HashFunction first, HashFunction second, HashFunction... rest) {Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Jul 17 15:26:41 GMT 2025 - 29.8K bytes - Click Count (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* array. This hashing API accepts an arbitrary sequence of byte and multibyte values (via * {@link Hasher}), but this is merely a convenience; these are always translated into raw * byte sequences under the covers. * <li><b>hash code:</b> each hash function always yields hash codes of the same fixed bit length * (given by {@link #bits}). For example, {@link Hashing#sha1} produces a 160-bit number,
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Mon Mar 17 20:26:29 GMT 2025 - 10.9K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
guava-tests/test/com/google/common/hash/HashingTest.java
Hashing.md5().bits() + Hashing.md5().bits(), Hashing.concatenating(Hashing.md5(), Hashing.md5()).bits()); assertEquals( Hashing.md5().bits() + Hashing.murmur3_32().bits(), Hashing.concatenating(Hashing.md5(), Hashing.murmur3_32()).bits()); assertEquals( Hashing.md5().bits() + Hashing.murmur3_32().bits() + Hashing.murmur3_128().bits(),
Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Fri Mar 13 13:01:07 GMT 2026 - 26.7K bytes - Click Count (2) -
android/guava/src/com/google/common/hash/BloomFilterStrategies.java
} if (!bits.get(combinedHash % bitSize)) { return false; } } return true; } }, /** * This strategy uses all 128 bits of {@link Hashing#murmur3_128} when hashing. It looks different * from the implementation in MURMUR128_MITZ_32 because we're avoiding the multiplication in the * loop and doing a (much simpler) += hash2. We're also changing the index to a positive number byCreated: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 10.7K bytes - Click Count (0) -
docs/zh-hant/docs/tutorial/security/oauth2-jwt.md
更多內容可參考 [PyJWT 安裝文件](https://pyjwt.readthedocs.io/en/latest/installation.html)。 /// ## 密碼雜湊 { #password-hashing } 「雜湊」是指把某些內容(此處為密碼)轉換成一串看起來像亂碼的位元組序列(其實就是字串)。 每當你輸入完全相同的內容(完全相同的密碼),就會得到完全相同的亂碼。 但你無法從這串亂碼再反推回原本的密碼。 ### 為什麼要用密碼雜湊 { #why-use-password-hashing } 如果你的資料庫被偷了,竊賊拿到的不是使用者的明文密碼,而只是雜湊值。 因此,竊賊無法直接拿該密碼去嘗試登入其他系統(由於許多使用者在各處都用同一組密碼,這會很危險)。 ## 安裝 `pwdlib` { #install-pwdlib }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/oauth2-jwt.md
可以在 [PyJWT 安装文档](https://pyjwt.readthedocs.io/en/latest/installation.html)中了解更多。 /// ## 密码哈希 { #password-hashing } “哈希”是指把一些内容(这里是密码)转换成看起来像乱码的一串字节(其实就是字符串)。 当你每次传入完全相同的内容(完全相同的密码)时,都会得到完全相同的“乱码”。 但你无法从这个“乱码”反向还原出密码。 ### 为什么使用密码哈希 { #why-use-password-hashing } 如果你的数据库被盗,窃贼拿到的不会是用户的明文密码,而只是哈希值。 因此,窃贼无法把该密码拿去尝试登录另一个系统(很多用户在各处都用相同的密码,这将非常危险)。 ## 安装 `pwdlib` { #install-pwdlib }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 10.1K bytes - Click Count (0) -
.teamcity/subprojects.json
"functionalTests": false, "crossVersionTests": false }, { "name": "hashing", "path": "platforms/core-execution/hashing", "unitTests": true, "functionalTests": false, "crossVersionTests": false }, { "name": "hashing-services", "path": "platforms/core-execution/hashing-services", "unitTests": true, "functionalTests": false, "crossVersionTests": false
Created: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Fri Mar 27 15:03:00 GMT 2026 - 42K bytes - Click Count (0) -
TESTING.asciidoc
When using TLS, ensure that private keys used are longer than 2048 bits, or mute the test in fips mode. ==== Password hashing algorithm Test clusters are configured with `xpack.security.fips_mode.enabled` set to true. This means that FIPS 140-2 related bootstrap checks are enabled and the test cluster will fail to form if the password hashing algorithm is set to something else than a PBKDF2 based one. You can delegate the choice
Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Mon Jun 07 13:55:20 GMT 2021 - 32.5K bytes - Click Count (0) -
docs/ja/docs/tutorial/security/oauth2-jwt.md
/// ## パスワードのハッシュ化 { #password-hashing } 「ハッシュ化」とは、あるコンテンツ(ここではパスワード)を、規則性のないバイト列(単なる文字列)に変換することです。 特徴として、全く同じ内容(全く同じパスワード)を渡すと、全く同じ規則性のないバイト列に変換されます。 しかし、規則性のないバイト列から元のパスワードに戻すことはできません。 ### パスワードのハッシュ化を使う理由 { #why-use-password-hashing } データベースが盗まれても、ユーザーの平文のパスワードは盗まれず、ハッシュ値だけが盗まれます。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:07:17 GMT 2026 - 14.6K bytes - Click Count (1)