- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 25 for hashKeys (0.12 sec)
-
android/guava/src/com/google/common/collect/MultimapBuilder.java
public static MultimapBuilderWithKeys<@Nullable Object> hashKeys() { return hashKeys(DEFAULT_EXPECTED_KEYS); } /** * Uses a hash table to map keys to value collections, initialized to expect the specified number * of keys. * * @throws IllegalArgumentException if {@code expectedKeys < 0} */ public static MultimapBuilderWithKeys<@Nullable Object> hashKeys(int expectedKeys) {
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 18:35:44 UTC 2025 - 18K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/CertificatePinner.kt
* This class currently pins a certificate's Subject Public Key Info as described on * [Adam Langley's Weblog][langley]. Pins are either base64 SHA-256 hashes as in * [HTTP Public Key Pinning (HPKP)][rfc_7469] or SHA-1 base64 hashes as in Chromium's * [static certificates][static_certificates]. * * ## Setting up Certificate Pinning *
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Wed Mar 19 19:25:20 UTC 2025 - 14.1K bytes - Viewed (1) -
android/guava-tests/test/com/google/common/hash/HashTestUtils.java
byte[] key = new byte[256]; byte[] hashes = new byte[hashBytes * 256]; // Hash keys of the form {}, {0}, {0,1}, {0,1,2}... up to N=255,using 256-N as the seed for (int i = 0; i < 256; i++) { key[i] = (byte) i; int seed = 256 - i; byte[] hash = hashFunction.hash(Arrays.copyOf(key, i), seed); System.arraycopy(hash, 0, hashes, i * hashBytes, hash.length); }Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
*/
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
// Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act byte[] hash1 = NtlmUtil.getNTHash(password1);Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (1) -
src/main/java/jcifs/smb1/http/NtlmHttpFilter.java
import jcifs.smb1.smb1.SmbAuthException; import jcifs.smb1.smb1.SmbSession; import jcifs.smb1.util.Base64; import jcifs.smb1.util.LogStream; /** * This servlet Filter can be used to negotiate password hashes with * MSIE clients using NTLM SSP. This is similar to {@code Authentication: * BASIC} but weakly encrypted and without requiring the user to re-supply * authentication credentials. * <p>Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 11.3K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/Hashing.java
function.bits(), function); } } @Override HashCode makeHash(Hasher[] hashers) { byte[] bytes = new byte[bits() / 8]; int i = 0; for (Hasher hasher : hashers) { HashCode newHash = hasher.hash(); i += newHash.writeBytesTo(bytes, i, newHash.bits() / 8); } return HashCode.fromBytesNoCopy(bytes);
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Jul 17 15:26:41 UTC 2025 - 29.8K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> * * <h3>Providing input to a hash function</h3> *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* these feats has become computationally feasible, the function is deemed "broken" and should * no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i> * cryptographic hashes.) * <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration. * </ul> * * <h3>Providing input to a hash function</h3> *
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
byte[] key = new byte[256]; byte[] hashes = new byte[hashBytes * 256]; // Hash keys of the form {}, {0}, {0,1}, {0,1,2}... up to N=255,using 256-N as the seed for (int i = 0; i < 256; i++) { key[i] = (byte) i; int seed = 256 - i; byte[] hash = hashFunction.hash(Arrays.copyOf(key, i), seed); System.arraycopy(hash, 0, hashes, i * hashBytes, hash.length); }Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue Oct 28 18:19:59 UTC 2025 - 25.6K bytes - Viewed (0)