Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 21 for collisions (0.07 sec)

  1. src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java

            assertTrue(latch.await(10, TimeUnit.SECONDS), "All threads should complete");
            executor.shutdown();
            assertEquals(0, collisions.get(), "There should be no nonce collisions");
            assertEquals(threadCount * noncesPerThread, allNonces.size(), "All nonces should be unique");
        }
    
        @Test
        @DisplayName("Should handle SMB 3.0.2 dialect")
        void testSMB302Dialect() {
            // When
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 44.1K bytes
    - Viewed (0)
  2. cmd/xl-storage-format-utils_test.go

    			m := tt.arg
    			for range n {
    				if got := hashDeterministicString(m); got != want {
    					t.Errorf("hashDeterministicString() = %v, want %v", got, want)
    				}
    			}
    			// Check casual collisions
    			if m == nil {
    				m = make(map[string]string)
    			}
    			m["12312312"] = ""
    			if got := hashDeterministicString(m); got == want {
    				t.Errorf("hashDeterministicString() = %v, does not want %v", got, want)
    			}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/bigger-applications.md

    ///
    
    ### Avoid name collisions { #avoid-name-collisions }
    
    We are importing the submodule `items` directly, instead of importing just its variable `router`.
    
    This is because we also have another variable named `router` in the submodule `users`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 19.1K bytes
    - Viewed (0)
  4. guava/src/com/google/common/base/Predicates.java

            if (!components.get(i).apply(t)) {
              return false;
            }
          }
          return true;
        }
    
        @Override
        public int hashCode() {
          // add a random number to avoid collisions with OrPredicate
          return components.hashCode() + 0x12472c2c;
        }
    
        @Override
        public boolean equals(@Nullable Object obj) {
          if (obj instanceof AndPredicate) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/hash/Hashing.java

       *
       * <p>This is designed for generating persistent fingerprints of strings. It isn't
       * cryptographically secure, but it produces a high-quality hash with fewer collisions than some
       * alternatives we've used in the past.
       *
       * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Jul 17 15:26:41 UTC 2025
    - 29.8K bytes
    - Viewed (0)
  6. guava/src/com/google/common/hash/Hashing.java

       *
       * <p>This is designed for generating persistent fingerprints of strings. It isn't
       * cryptographically secure, but it produces a high-quality hash with fewer collisions than some
       * alternatives we've used in the past.
       *
       * <p>FarmHash fingerprints are encoded by {@link HashCode#asBytes} in little-endian order. This
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 22:06:57 UTC 2025
    - 31.1K bytes
    - Viewed (0)
  7. cmd/erasure-metadata-utils.go

    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    func hashOrder(key string, cardinality int) []int {
    	if cardinality <= 0 {
    		// Returns an empty int slice for cardinality < 0.
    		return nil
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/oauth2-jwt.md

    Using these ideas, JWT can be used for way more sophisticated scenarios.
    
    In those cases, several of those entities could have the same ID, let's say `foo` (a user `foo`, a car `foo`, and a blog post `foo`).
    
    So, to avoid ID collisions, when creating the JWT token for the user, you could prefix the value of the `sub` key, e.g. with `username:`. So, in this example, the value of `sub` could have been: `username:johndoe`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/collect/CompactHashSet.java

       *       </ul>
       *   <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
  10. guava/src/com/google/common/util/concurrent/Striped.java

       * bulkGet(keys)} operation. See <a href="http://www.mathpages.com/home/kmath199.htm">Balls in
       * Bins model</a> for mathematical formulas that can be used to estimate the probability of
       * collisions.
       *
       * @param keys arbitrary non-null keys
       * @return the stripes corresponding to the objects (one per each object, derived by delegating to
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 20.6K bytes
    - Viewed (0)
Back to top