- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 108 for hashHead (0.15 sec)
-
src/cmd/vendor/golang.org/x/mod/sumdb/dirhash/hash.go
// // Hash1 is "h1:" followed by the base64-encoded SHA-256 hash of a summary // prepared as if by the Unix command: // // sha256sum $(find . -type f | sort) | sha256sum // // More precisely, the hashed summary contains a single line for each file in the list, // ordered by sort.Strings applied to the file names, where each line consists of // the hexadecimal SHA-256 hash of the file content,
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Feb 10 18:59:52 UTC 2023 - 4K bytes - Viewed (0) -
subprojects/core/src/main/java/org/gradle/api/internal/changedetection/state/FileTimeStampInspector.java
* * This strategy could be improved in several ways: * - Don't use the timestamp for files that we've already hashed during this build. * - Potentially only apply the end-of-build timestamp for input files only, as often some or all of the output files of a build will have the end-of-build timestamp.
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Mon Dec 20 16:22:11 UTC 2021 - 5K bytes - Viewed (0) -
src/crypto/md5/md5.go
byteorder.LePutUint64(tmp[1+pad:], d.len<<3) // append length in bits d.Write(tmp[:1+pad+8]) // The previous write ensures that a whole number of // blocks (i.e. a multiple of 64 bytes) have been hashed. if d.nx != 0 { panic("d.nx != 0") } var digest [Size]byte byteorder.LePutUint32(digest[0:], d.s[0]) byteorder.LePutUint32(digest[4:], d.s[1]) byteorder.LePutUint32(digest[8:], d.s[2])
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 4.3K bytes - Viewed (0) -
cmd/erasure-sets_test.go
} if _, err := newErasureSets(ctx, ep, storageDisks, format, parity, 0); err != nil { t.Fatalf("Unable to initialize erasure") } } // TestHashedLayer - tests the hashed layer which will be returned // consistently for a given object name. func TestHashedLayer(t *testing.T) { // Test distribution with 16 sets. var objs [16]*erasureObjects for i := range objs {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Mon Feb 12 07:21:56 UTC 2024 - 6.9K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/net/InetAddressesTest.java
.isEqualTo(InetAddresses.forString("0.0.0.0")); // test compat address (should be hashed) assertThat(InetAddresses.getCoercedIPv4Address(InetAddresses.forString("::1.2.3.4"))) .isNotEqualTo(InetAddresses.forString("1.2.3.4")); // test 6to4 address (should be hashed) assertThat(InetAddresses.getCoercedIPv4Address(InetAddresses.forString("2002:0102:0304::1")))
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Fri May 24 16:44:05 UTC 2024 - 35.3K bytes - Viewed (0) -
guava/src/com/google/common/hash/Hasher.java
/** * Equivalent to processing each {@code char} value in the {@code CharSequence}, in order. In * other words, no character encoding is performed; the low byte and high byte of each {@code * char} are hashed directly (in that order). The input must not be updated while this method is * in progress. * * <p><b>Warning:</b> This method will produce different output than most other languages do when
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Wed Jun 15 20:59:00 UTC 2022 - 5.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
```Python hl_lines="8 49 56-57 60-61 70-76" {!> ../../../docs_src/security/tutorial004.py!} ``` !!! note If you check the new (fake) database `fake_users_db`, you will see how the hashed password looks like now: `"$2b$12$EixZaYVK1fsbw1ZfbX3OXePaWxn96p36WQoeG6Lruj3vjPGga31lW"`. ## Handle JWT tokens Import the modules installed. Create a random secret key that will be used to sign the JWT tokens.
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 12.7K bytes - Viewed (0) -
guava/src/com/google/common/hash/AbstractStreamingHasher.java
import java.nio.ByteBuffer; import java.nio.ByteOrder; /** * A convenience base class for implementors of {@code Hasher}; handles accumulating data until an * entire "chunk" (of implementation-dependent length) is ready to be hashed. * * @author Kevin Bourrillion * @author Dimitris Andreou */ // TODO(kevinb): this class still needs some design-and-document-for-inheritance love @ElementTypesAreNonnullByDefault
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Wed Jun 15 20:59:00 UTC 2022 - 7.1K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/AbstractStreamingHasher.java
import java.nio.ByteBuffer; import java.nio.ByteOrder; /** * A convenience base class for implementors of {@code Hasher}; handles accumulating data until an * entire "chunk" (of implementation-dependent length) is ready to be hashed. * * @author Kevin Bourrillion * @author Dimitris Andreou */ // TODO(kevinb): this class still needs some design-and-document-for-inheritance love @ElementTypesAreNonnullByDefault
Registered: Wed Jun 12 16:38:11 UTC 2024 - Last Modified: Wed Jun 15 20:59:00 UTC 2022 - 7.1K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
This is especially the case for user models, because: * The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. !!! danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Thu Apr 18 19:53:19 UTC 2024 - 7.7K bytes - Viewed (0)