- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 273 for hosting (0.04 sec)
-
cmd/erasure-sets_test.go
// along with this program. If not, see <http://www.gnu.org/licenses/>. package cmd import ( "context" "os" "path/filepath" "testing" "github.com/google/uuid" ) var testUUID = uuid.MustParse("f5c58c61-7175-4018-ab5e-a94fe9c2de4e") func BenchmarkCrcHash(b *testing.B) { cases := []struct { key int }{ {16}, {64}, {128}, {256}, {512}, {1024}, }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 3.6K bytes - Viewed (0) -
src/main/java/jcifs/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 3.6K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/HashFunction.java
* array. This hashing API accepts an arbitrary sequence of byte and multibyte values (via * {@link Hasher}), but this is merely a convenience; these are always translated into raw * byte sequences under the covers. * <li><b>hash code:</b> each hash function always yields hash codes of the same fixed bit length * (given by {@link #bits}). For example, {@link Hashing#sha1} produces a 160-bit number,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/HashFunction.java
* array. This hashing API accepts an arbitrary sequence of byte and multibyte values (via * {@link Hasher}), but this is merely a convenience; these are always translated into raw * byte sequences under the covers. * <li><b>hash code:</b> each hash function always yields hash codes of the same fixed bit length * (given by {@link #bits}). For example, {@link Hashing#sha1} produces a 160-bit number,
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Mar 17 20:26:29 UTC 2025 - 10.9K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/simple-oauth2.md
Vamos colocar esses dados primeiro no modelo `UserInDB` do Pydantic. Você nunca deve salvar senhas em texto simples, portanto, usaremos o sistema de hashing de senhas (falsas). Se as senhas não corresponderem, retornaremos o mesmo erro. #### Hashing de senha { #password-hashing } "Hashing" significa: converter algum conteúdo (uma senha neste caso) em uma sequência de bytes (apenas uma string) que parece algo sem sentido.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Nov 12 16:23:57 UTC 2025 - 10.3K bytes - Viewed (0) -
code_of_conduct.md
when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers. ## Enforcement
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Jan 20 18:38:58 UTC 2020 - 3.5K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableBiMap.java
V value = entry.getValue(); checkEntryNotNull(key, value); int keyHash = key.hashCode(); int valueHash = value.hashCode(); int keyBucket = Hashing.smear(keyHash) & mask; int valueBucket = Hashing.smear(valueHash) & mask; ImmutableMapEntry<K, V> nextInKeyBucket = keyTable[keyBucket]; ImmutableMapEntry<K, V> nextInValueBucket = valueTable[valueBucket]; try {
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Mon Sep 22 21:07:18 UTC 2025 - 11K bytes - Viewed (0) -
src/test/java/jcifs/util/CryptoTest.java
} @ParameterizedTest @ValueSource(strings = { "", "a", "short", "medium length text", "very long text that exceeds typical block sizes" }) @DisplayName("Should handle various input sizes for hashing") void testHashVariousInputSizes(String input) { // Given byte[] data = input.getBytes(); // When MessageDigest md4 = Crypto.getMD4();Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.4K bytes - Viewed (0) -
android/guava/src/com/google/common/util/concurrent/ListenerCallQueue.java
* <li>It is easy for the user to ensure that listeners are never invoked while holding locks. * </ul> * * The last point is subtle. Often the observable object will be managing its own internal state * using a lock, however it is dangerous to dispatch listeners while holding a lock because they * might run on the {@code directExecutor()} or be otherwise re-entrant (call back into your
Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 8.1K bytes - Viewed (0)