Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 367 for hashed (0.11 sec)

  1. cmd/erasure-metadata-utils.go

    	diskCount := 0
    	for _, disk := range disks {
    		if disk == nil {
    			continue
    		}
    		diskCount++
    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  2. guava/src/com/google/common/net/InetAddresses.java

       *   <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that.
       *   <li>Otherwise, it hashes the upper 64 bits of the IPv6 address.
       * </ul>
       *
       * <p>A "coerced" IPv4 address is equivalent to itself.
       *
       * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost
       * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/net/InetAddresses.java

       *   <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that.
       *   <li>Otherwise, it hashes the upper 64 bits of the IPv6 address.
       * </ul>
       *
       * <p>A "coerced" IPv4 address is equivalent to itself.
       *
       * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost
       * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  4. lib/fips140/v1.0.0.zip

    make([]byte, k) em[1] = 1 for i := 2; i < k-len(prefix)-len(hashed)-1; i++ { em[i] = 0xff } copy(em[k-len(prefix)-len(hashed):], prefix) copy(em[k-len(hashed):], hashed) return em, nil } // VerifyPKCS1v15 verifies an RSASSA-PKCS1-v1.5 signature. // // hash is the name of the hash function as returned by [crypto.Hash.String] // or the empty string to indicate that the message is signed directly. func VerifyPKCS1v15(pub *PublicKey, hash string, hashed []byte, sig []byte) error { fipsSelfTest() fips140.RecordApproved()...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
  5. cmd/hasher.go

    	"encoding/hex"
    
    	"github.com/minio/minio/internal/hash/sha256"
    )
    
    // getSHA256Hash returns SHA-256 hash in hex encoding of given data.
    func getSHA256Hash(data []byte) string {
    	return hex.EncodeToString(getSHA256Sum(data))
    }
    
    // getSHA256Hash returns SHA-256 sum of given data.
    func getSHA256Sum(data []byte) []byte {
    	hash := sha256.New()
    	hash.Write(data)
    	return hash.Sum(nil)
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri May 27 13:00:19 UTC 2022
    - 1.4K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/hash/HashingOutputStream.java

    @Beta
    public final class HashingOutputStream extends FilterOutputStream {
      private final Hasher hasher;
    
      /**
       * Creates an output stream that hashes using the given {@link HashFunction}, and forwards all
       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  7. guava-tests/test/com/google/common/hash/HashTestUtils.java

            int key2 = key1 ^ (1 << i);
            // get hashes
            int hash1 = function.hashInt(key1).asInt();
            int hash2 = function.hashInt(key2).asInt();
            // test whether the hash values have same output bits
            same |= ~(hash1 ^ hash2);
            // test whether the hash values have different output bits
            diff |= hash1 ^ hash2;
    
            count++;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  8. guava/src/com/google/common/hash/HashingInputStream.java

     */
    @Beta
    public final class HashingInputStream extends FilterInputStream {
      private final Hasher hasher;
    
      /**
       * Creates an input stream that hashes using the given {@link HashFunction} and delegates all data
       * read from it to the underlying {@link InputStream}.
       *
       * <p>The {@link InputStream} should not be read from before or after the hand-off.
       */
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  9. guava/src/com/google/common/hash/HashingOutputStream.java

    @Beta
    public final class HashingOutputStream extends FilterOutputStream {
      private final Hasher hasher;
    
      /**
       * Creates an output stream that hashes using the given {@link HashFunction}, and forwards all
       * data written to it to the underlying {@link OutputStream}.
       *
       * <p>The {@link OutputStream} should not be written to before or after the hand-off.
       */
      // TODO(user): Evaluate whether it makes sense to always piggyback the computation of a
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Dec 21 03:10:51 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/security/oauth2-jwt.md

    Und mit allen gleichzeitig kompatibel sein.
    
    ///
    
    Erstellen Sie eine Hilfsfunktion, um ein vom Benutzer stammendes Passwort zu hashen.
    
    Und eine weitere, um zu überprüfen, ob ein empfangenes Passwort mit dem gespeicherten Hash übereinstimmt.
    
    Und noch eine, um einen Benutzer zu authentifizieren und zurückzugeben.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
Back to top