Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 233 for hashes (0.04 sec)

  1. docs/en/docs/tutorial/security/simple-oauth2.md

    But you cannot convert from the gibberish back to the password.
    
    ##### Why use password hashing { #why-use-password-hashing }
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
    
    {* ../../docs_src/security/tutorial003_an_py310.py hl[82:85] *}
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  2. docs/distributed/DESIGN.md

    - Choosing an erasure set for the object is decided during `PutObject()`, object names are used to find the right erasure set using the following pseudo code.
    
    ```go
    // hashes the key returning an integer.
    func sipHashMod(key string, cardinality int, id [16]byte) int {
            if cardinality <= 0 {
                    return -1
            }
            sip := siphash.New(id[:])
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 8K bytes
    - Viewed (2)
  3. src/test/java/jcifs/smb1/smb1/NtlmPasswordAuthenticationTest.java

        void testNTOWFv1() {
            byte[] hash = NtlmPasswordAuthentication.nTOWFv1("password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test nTOWFv2
        @Test
        void testNTOWFv2() {
            byte[] hash = NtlmPasswordAuthentication.nTOWFv2("DOMAIN", "user", "password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test unescape method
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 9.7K bytes
    - Viewed (0)
  4. android/guava-tests/test/com/google/common/collect/ImmutableSetTest.java

                .createTestSuite());
    
        suite.addTest(
            SetTestSuiteBuilder.using(new ImmutableSetWithBadHashesGenerator())
                .named(ImmutableSetTest.class.getName() + ", with bad hashes")
                .withFeatures(
                    CollectionSize.ANY,
                    CollectionFeature.KNOWN_ORDER,
                    CollectionFeature.ALLOWS_NULL_QUERIES)
                .createTestSuite());
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 14.1K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/collect/ImmutableSetTest.java

                .createTestSuite());
    
        suite.addTest(
            SetTestSuiteBuilder.using(new ImmutableSetWithBadHashesGenerator())
                .named(ImmutableSetTest.class.getName() + ", with bad hashes")
                .withFeatures(
                    CollectionSize.ANY,
                    CollectionFeature.KNOWN_ORDER,
                    CollectionFeature.ALLOWS_NULL_QUERIES)
                .createTestSuite());
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 14.2K bytes
    - Viewed (0)
  6. docs/pt/docs/tutorial/security/simple-oauth2.md

    ##### Porque usar hashing de senha
    
    Se o seu banco de dados for roubado, o ladrão não terá as senhas em texto simples dos seus usuários, apenas os hashes.
    
    Assim, o ladrão não poderá tentar usar essas mesmas senhas em outro sistema (como muitos usuários usam a mesma senha em todos os lugares, isso seria perigoso).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 10K bytes
    - Viewed (0)
  7. guava-gwt/src-super/com/google/common/collect/super/com/google/common/collect/ImmutableMap.java

        @Override
        boolean isPartialView() {
          return ImmutableMap.this.isPartialView();
        }
    
        @Override
        public int hashCode() {
          // ImmutableSet.of(value).hashCode() == value.hashCode(), so the hashes are the same
          return ImmutableMap.this.hashCode();
        }
    
        @Override
        UnmodifiableIterator<Entry<K, ImmutableSet<V>>> entryIterator() {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Aug 06 18:32:41 UTC 2025
    - 16.7K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb/PreauthIntegrityService.java

        }
    
        /**
         * Gets the selected hash algorithm.
         *
         * @return the hash algorithm
         */
        public int getSelectedHashAlgorithm() {
            return selectedHashAlgorithm;
        }
    
        /**
         * Calculates hash according to SMB 3.1.1 preauth integrity specification.
         *
         * @param previousHash the previous hash in the chain
         * @param messageData the message data to hash
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  9. guava/src/com/google/common/net/InetAddresses.java

       *   <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that.
       *   <li>Otherwise, it hashes the upper 64 bits of the IPv6 address.
       * </ul>
       *
       * <p>A "coerced" IPv4 address is equivalent to itself.
       *
       * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost
       * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  10. cmd/erasure-metadata-utils.go

    	diskCount := 0
    	for _, disk := range disks {
    		if disk == nil {
    			continue
    		}
    		diskCount++
    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
Back to top