- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 180 for hashed (0.28 sec)
-
src/main/java/org/codelibs/fess/helper/CrawlingInfoHelper.java
}); } /** * Generates a hashed ID from the provided URL ID string. * Encodes special characters using URL encoding or Base64 encoding as needed, * then applies a message digest algorithm to create a unique hash. * * @param urlId the URL ID string to generate a hash for * @return a hashed ID string generated from the input URL ID */
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Aug 07 03:06:29 UTC 2025 - 15.2K bytes - Viewed (0) -
android/guava/src/com/google/common/cache/Striped64.java
* * Per-thread hash codes are initialized to random values. * Contention and/or table collisions are indicated by failed * CASes when performing an update operation (see method * retryUpdate). Upon a collision, if the table size is less than * the capacity, it is doubled in size unless some other thread * holds the lock. If a hashed slot is empty, and lock is
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Jan 15 22:17:15 UTC 2025 - 11.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes. So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous). ## Install `passlib` { #install-passlib } PassLib is a great Python package to handle password hashes. It supports many secure hashing algorithms and utilities to work with them.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
src/test/java/jcifs/util/HMACT64Test.java
// This test uses a real MD5 instance to verify the HMAC calculation logic // HMACT64 is a modified HMAC-MD5 where the key is truncated at 64 bytes // instead of being hashed when it exceeds the block size. byte[] key = { (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b, (byte) 0x0b,
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 14.6K bytes - Viewed (0) -
cmd/erasure-metadata-utils.go
diskCount := 0 for _, disk := range disks { if disk == nil { continue } diskCount++ } return diskCount } // hashOrder - hashes input key to return consistent // hashed integer slice. Returned integer order is salted // with an input key. This results in consistent order. // NOTE: collisions are fine, we are not looking for uniqueness // in the slices returned.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 11.7K bytes - Viewed (0) -
guava/src/com/google/common/net/InetAddresses.java
* <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that. * <li>Otherwise, it hashes the upper 64 bits of the IPv6 address. * </ul> * * <p>A "coerced" IPv4 address is equivalent to itself. * * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
android/guava/src/com/google/common/net/InetAddresses.java
* <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that. * <li>Otherwise, it hashes the upper 64 bits of the IPv6 address. * </ul> * * <p>A "coerced" IPv4 address is equivalent to itself. * * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Wed Feb 19 21:24:11 UTC 2025 - 47.4K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashTestUtils.java
int key2 = key1 ^ (1 << i); // get hashes int hash1 = function.hashInt(key1).asInt(); int hash2 = function.hashInt(key2).asInt(); // test whether the hash values have same output bits same |= ~(hash1 ^ hash2); // test whether the hash values have different output bits diff |= hash1 ^ hash2; count++;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 25.6K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Und mit allen gleichzeitig kompatibel sein. /// Erstellen Sie eine Hilfsfunktion, um ein vom Benutzer stammendes Passwort zu hashen. Und eine weitere, um zu überprüfen, ob ein empfangenes Passwort mit dem gespeicherten Hash übereinstimmt. Und noch eine, um einen Benutzer zu authentifizieren und zurückzugeben.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
android/guava/src/com/google/common/io/ByteSource.java
} } /** * Hashes the contents of this byte source using the given hash function. * * @throws IOException if an I/O error occurs while reading from this source */ public HashCode hash(HashFunction hashFunction) throws IOException { Hasher hasher = hashFunction.newHasher(); copyTo(Funnels.asOutputStream(hasher)); return hasher.hash(); } /**
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Mar 20 20:55:20 UTC 2025 - 25.7K bytes - Viewed (0)