Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 197 for dashes (0.09 sec)

  1. src/main/java/jcifs/smb1/util/HMACT64.java

    /**
     * This is an implementation of the HMACT64 keyed hashing algorithm.
     * HMACT64 is defined by Luke Leighton as a modified HMAC-MD5 (RFC 2104)
     * in which the key is truncated at 64 bytes (rather than being hashed
     * via MD5).
     */ 
    public class HMACT64 extends MessageDigest implements Cloneable {
    
        private static final int BLOCK_LENGTH = 64;
    
        private static final byte IPAD = (byte) 0x36;
    
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 20:39:42 UTC 2019
    - 3.4K bytes
    - Viewed (0)
  2. src/main/java/jcifs/util/HMACT64.java

    
    /**
     * This is an implementation of the HMACT64 keyed hashing algorithm.
     * HMACT64 is defined by Luke Leighton as a modified HMAC-MD5 (RFC 2104)
     * in which the key is truncated at 64 bytes (rather than being hashed
     * via MD5).
     */
    class HMACT64 extends MessageDigest implements Cloneable {
    
        private static final int BLOCK_LENGTH = 64;
    
        private static final byte IPAD = (byte) 0x36;
    
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 3.5K bytes
    - Viewed (0)
  3. guava/src/com/google/common/collect/RegularImmutableSet.java

          new RegularImmutableSet<>(EMPTY_ARRAY, 0, EMPTY_ARRAY, 0);
    
      private final transient Object[] elements;
      private final transient int hashCode;
      // the same values as `elements` in hashed positions (plus nulls)
      @VisibleForTesting final transient @Nullable Object[] table;
      // 'and' with an int to get a valid table index.
      private final transient int mask;
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 3.9K bytes
    - Viewed (0)
  4. docs/distributed/DESIGN.md

    - Choosing an erasure set for the object is decided during `PutObject()`, object names are used to find the right erasure set using the following pseudo code.
    
    ```go
    // hashes the key returning an integer.
    func sipHashMod(key string, cardinality int, id [16]byte) int {
            if cardinality <= 0 {
                    return -1
            }
            sip := siphash.New(id[:])
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 15 23:04:20 UTC 2023
    - 8K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/hash/AbstractStreamingHasher.java

      @Override
      @CanIgnoreReturnValue
      public final Hasher putByte(byte b) {
        buffer.put(b);
        munchIfFull();
        return this;
      }
    
      @Override
      @CanIgnoreReturnValue
      public final Hasher putShort(short s) {
        buffer.putShort(s);
        munchIfFull();
        return this;
      }
    
      @Override
      @CanIgnoreReturnValue
      public final Hasher putChar(char c) {
        buffer.putChar(c);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Jun 15 20:59:00 UTC 2022
    - 7.1K bytes
    - Viewed (0)
  6. docs/pt/docs/tutorial/schema-extra-example.md

    /// warning | "Atenção"
    
    Esses são detalhes muito técnicos sobre os padrões **JSON Schema** e **OpenAPI**.
    
    Se as ideias explicadas acima já funcionam para você, isso pode ser o suficiente, e você provavelmente não precisa desses detalhes, fique à vontade para pular.
    
    ///
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 6.1K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/simple-oauth2.md

    But you cannot convert from the gibberish back to the password.
    
    ##### Why use password hashing
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
    
    //// tab | Python 3.10+
    
    ```Python hl_lines="82-85"
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12.3K bytes
    - Viewed (0)
  8. docs/de/docs/tutorial/security/simple-oauth2.md

    /// info
    
    `OAuth2PasswordRequestForm` ist keine spezielle Klasse für **FastAPI**, so wie `OAuth2PasswordBearer`.
    
    `OAuth2PasswordBearer` lässt **FastAPI** wissen, dass es sich um ein Sicherheitsschema handelt. Daher wird es auf diese Weise zu OpenAPI hinzugefügt.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  9. android/guava-tests/test/com/google/common/collect/ImmutableSetTest.java

                .createTestSuite());
    
        suite.addTest(
            SetTestSuiteBuilder.using(new ImmutableSetWithBadHashesGenerator())
                .named(ImmutableSetTest.class.getName() + ", with bad hashes")
                .withFeatures(
                    CollectionSize.ANY,
                    CollectionFeature.KNOWN_ORDER,
                    CollectionFeature.ALLOWS_NULL_QUERIES)
                .createTestSuite());
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  10. fastapi/utils.py

        field: ModelField,
        *,
        cloned_types: Optional[MutableMapping[Type[BaseModel], Type[BaseModel]]] = None,
    ) -> ModelField:
        if PYDANTIC_V2:
            return field
        # cloned_types caches already cloned types to support recursive models and improve
        # performance by avoiding unnecessary cloning
        if cloned_types is None:
            cloned_types = _CLONED_TYPES_CACHE
    
        original_type = field.type_
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Aug 31 23:46:03 UTC 2024
    - 7.8K bytes
    - Viewed (0)
Back to top