Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 55 for hashKeys (0.16 sec)

  1. guava-tests/test/com/google/common/hash/HashTestUtils.java

        byte[] key = new byte[256];
        byte[] hashes = new byte[hashBytes * 256];
    
        // Hash keys of the form {}, {0}, {0,1}, {0,1,2}... up to N=255,using 256-N as the seed
        for (int i = 0; i < 256; i++) {
          key[i] = (byte) i;
          int seed = 256 - i;
          byte[] hash = hashFunction.hash(Arrays.copyOf(key, i), seed);
          System.arraycopy(hash, 0, hashes, i * hashBytes, hash.length);
        }
    
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/hash/HashFunction.java

     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
     * <h3>Providing input to a hash function</h3>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  3. guava/src/com/google/common/hash/HashFunction.java

     *       these feats has become computationally feasible, the function is deemed "broken" and should
     *       no longer be used for secure purposes. (This is the likely eventual fate of <i>all</i>
     *       cryptographic hashes.)
     *   <li><b>fast:</b> perhaps self-explanatory, but often the most important consideration.
     * </ul>
     *
     * <h3>Providing input to a hash function</h3>
     *
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  4. guava-tests/test/com/google/common/collect/SetsTest.java

      }
    
      private static <E> List<E> list(E... elements) {
        return ImmutableList.copyOf(elements);
      }
    
      /**
       * Utility method to verify that the given LinkedHashSet is equal to and hashes identically to a
       * set constructed with the elements in the given collection. Also verifies that the ordering in
       * the set is the same as the ordering of the given contents.
       */
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Wed Oct 30 16:15:19 UTC 2024
    - 48.6K bytes
    - Viewed (0)
  5. android/guava/src/com/google/common/hash/HashingOutputStream.java

     * @since 16.0
     */
    @Beta
    @ElementTypesAreNonnullByDefault
    public final class HashingOutputStream extends FilterOutputStream {
      private final Hasher hasher;
    
      /**
       * Creates an output stream that hashes using the given {@link HashFunction}, and forwards all
       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 11 22:00:03 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous).
    
    ## Install `passlib`
    
    PassLib is a great Python package to handle password hashes.
    
    It supports many secure hashing algorithms and utilities to work with them.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
  7. android/guava/src/com/google/common/hash/Hashing.java

                function.bits(),
                function);
          }
        }
    
        @Override
        HashCode makeHash(Hasher[] hashers) {
          byte[] bytes = new byte[bits() / 8];
          int i = 0;
          for (Hasher hasher : hashers) {
            HashCode newHash = hasher.hash();
            i += newHash.writeBytesTo(bytes, i, newHash.bits() / 8);
          }
          return HashCode.fromBytesNoCopy(bytes);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Jul 19 16:02:36 UTC 2024
    - 29.3K bytes
    - Viewed (0)
  8. cmd/erasure-sets.go

    func crcHashMod(key string, cardinality int) int {
    	if cardinality <= 0 {
    		return -1
    	}
    	keyCrc := crc32.Checksum([]byte(key), crc32.IEEETable)
    	return int(keyCrc % uint32(cardinality))
    }
    
    func hashKey(algo string, key string, cardinality int, id [16]byte) int {
    	switch algo {
    	case formatErasureVersionV2DistributionAlgoV1:
    		return crcHashMod(key, cardinality)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 27 10:41:37 UTC 2024
    - 37K bytes
    - Viewed (1)
  9. src/main/java/jcifs/smb1/http/NtlmSsp.java

    import jcifs.smb1.smb1.NtlmPasswordAuthentication;
    import jcifs.smb1.util.Base64;
    
    /**
     * This class is used internally by <tt>NtlmHttpFilter</tt>,
     * <tt>NtlmServlet</tt>, and <tt>NetworkExplorer</tt> to negiotiate password
     * hashes via NTLM SSP with MSIE. It might also be used directly by servlet
     * containers to incorporate similar functionality.
     * <p>
     * How NTLMSSP is used in conjunction with HTTP and MSIE clients is
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 4.4K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/simple-oauth2.md

    But you cannot convert from the gibberish back to the password.
    
    ##### Why use password hashing
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
    
    //// tab | Python 3.10+
    
    ```Python hl_lines="82-85"
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12.3K bytes
    - Viewed (0)
Back to top