Search Options

Results per page
Sort
Preferred Languages
Advance

Results 91 - 100 of 273 for hosting (0.04 sec)

  1. cmd/erasure-sets_test.go

    // along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    package cmd
    
    import (
    	"context"
    	"os"
    	"path/filepath"
    	"testing"
    
    	"github.com/google/uuid"
    )
    
    var testUUID = uuid.MustParse("f5c58c61-7175-4018-ab5e-a94fe9c2de4e")
    
    func BenchmarkCrcHash(b *testing.B) {
    	cases := []struct {
    		key int
    	}{
    		{16},
    		{64},
    		{128},
    		{256},
    		{512},
    		{1024},
    	}
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 6.8K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb1/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 3.6K bytes
    - Viewed (0)
  3. src/main/java/jcifs/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 3.6K bytes
    - Viewed (0)
  4. android/guava/src/com/google/common/hash/HashFunction.java

     *       array. This hashing API accepts an arbitrary sequence of byte and multibyte values (via
     *       {@link Hasher}), but this is merely a convenience; these are always translated into raw
     *       byte sequences under the covers.
     *   <li><b>hash code:</b> each hash function always yields hash codes of the same fixed bit length
     *       (given by {@link #bits}). For example, {@link Hashing#sha1} produces a 160-bit number,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. guava/src/com/google/common/hash/HashFunction.java

     *       array. This hashing API accepts an arbitrary sequence of byte and multibyte values (via
     *       {@link Hasher}), but this is merely a convenience; these are always translated into raw
     *       byte sequences under the covers.
     *   <li><b>hash code:</b> each hash function always yields hash codes of the same fixed bit length
     *       (given by {@link #bits}). For example, {@link Hashing#sha1} produces a 160-bit number,
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Mar 17 20:26:29 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  6. docs/pt/docs/tutorial/security/simple-oauth2.md

    Vamos colocar esses dados primeiro no modelo `UserInDB` do Pydantic.
    
    Você nunca deve salvar senhas em texto simples, portanto, usaremos o sistema de hashing de senhas (falsas).
    
    Se as senhas não corresponderem, retornaremos o mesmo erro.
    
    #### Hashing de senha { #password-hashing }
    
    "Hashing" significa: converter algum conteúdo (uma senha neste caso) em uma sequência de bytes (apenas uma string) que parece algo sem sentido.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  7. code_of_conduct.md

    when an individual is representing the project or its community. Examples of
    representing a project or community include using an official project e-mail
    address, posting via an official social media account, or acting as an appointed
    representative at an online or offline event. Representation of a project may be
    further defined and clarified by project maintainers.
    
    ## Enforcement
    
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Mon Jan 20 18:38:58 UTC 2020
    - 3.5K bytes
    - Viewed (0)
  8. guava/src/com/google/common/collect/RegularImmutableBiMap.java

          V value = entry.getValue();
          checkEntryNotNull(key, value);
          int keyHash = key.hashCode();
          int valueHash = value.hashCode();
          int keyBucket = Hashing.smear(keyHash) & mask;
          int valueBucket = Hashing.smear(valueHash) & mask;
    
          ImmutableMapEntry<K, V> nextInKeyBucket = keyTable[keyBucket];
          ImmutableMapEntry<K, V> nextInValueBucket = valueTable[valueBucket];
          try {
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Mon Sep 22 21:07:18 UTC 2025
    - 11K bytes
    - Viewed (0)
  9. src/test/java/jcifs/util/CryptoTest.java

        }
    
        @ParameterizedTest
        @ValueSource(strings = { "", "a", "short", "medium length text", "very long text that exceeds typical block sizes" })
        @DisplayName("Should handle various input sizes for hashing")
        void testHashVariousInputSizes(String input) {
            // Given
            byte[] data = input.getBytes();
    
            // When
            MessageDigest md4 = Crypto.getMD4();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 7.4K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/util/concurrent/ListenerCallQueue.java

     *   <li>It is easy for the user to ensure that listeners are never invoked while holding locks.
     * </ul>
     *
     * The last point is subtle. Often the observable object will be managing its own internal state
     * using a lock, however it is dangerous to dispatch listeners while holding a lock because they
     * might run on the {@code directExecutor()} or be otherwise re-entrant (call back into your
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Tue May 13 17:27:14 UTC 2025
    - 8.1K bytes
    - Viewed (0)
Back to top