Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 228 for hashes (0.65 sec)

  1. docs/distributed/DESIGN.md

    - Choosing an erasure set for the object is decided during `PutObject()`, object names are used to find the right erasure set using the following pseudo code.
    
    ```go
    // hashes the key returning an integer.
    func sipHashMod(key string, cardinality int, id [16]byte) int {
            if cardinality <= 0 {
                    return -1
            }
            sip := siphash.New(id[:])
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 8K bytes
    - Viewed (2)
  2. docs/de/docs/tutorial/security/simple-oauth2.md

    ##### Warum Passwort-Hashing verwenden? { #why-use-password-hashing }
    
    Wenn Ihre Datenbank gestohlen wird, hat der Dieb nicht die Klartext-Passwörter Ihrer Benutzer, sondern nur die Hashes.
    
    Der Dieb kann also nicht versuchen, die gleichen Passwörter in einem anderen System zu verwenden (da viele Benutzer überall das gleiche Passwort verwenden, wäre dies gefährlich).
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/simple-oauth2.md

    But you cannot convert from the gibberish back to the password.
    
    ##### Why use password hashing { #why-use-password-hashing }
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use those same passwords in another system (as many users use the same password everywhere, this would be dangerous).
    
    {* ../../docs_src/security/tutorial003_an_py310.py hl[82:85] *}
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/security/simple-oauth2.md

    Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso).
    
    Si los passwords no coinciden, devolvemos el mismo error.
    
    #### Hashing de passwords { #password-hashing }
    
    "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/collect/ImmutableSetTest.java

                .createTestSuite());
    
        suite.addTest(
            SetTestSuiteBuilder.using(new ImmutableSetWithBadHashesGenerator())
                .named(ImmutableSetTest.class.getName() + ", with bad hashes")
                .withFeatures(
                    CollectionSize.ANY,
                    CollectionFeature.KNOWN_ORDER,
                    CollectionFeature.ALLOWS_NULL_QUERIES)
                .createTestSuite());
    
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Thu Aug 07 16:05:33 UTC 2025
    - 14.1K bytes
    - Viewed (0)
  6. src/test/java/jcifs/smb1/smb1/NtlmPasswordAuthenticationTest.java

        void testNTOWFv1() {
            byte[] hash = NtlmPasswordAuthentication.nTOWFv1("password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test nTOWFv2
        @Test
        void testNTOWFv2() {
            byte[] hash = NtlmPasswordAuthentication.nTOWFv2("DOMAIN", "user", "password");
            assertNotNull(hash);
            assertEquals(16, hash.length);
        }
    
        // Test unescape method
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 9.7K bytes
    - Viewed (0)
  7. docs/pt/docs/tutorial/security/simple-oauth2.md

    ##### Porque usar hashing de senha { #why-use-password-hashing }
    
    Se o seu banco de dados for roubado, o ladrão não terá as senhas em texto simples dos seus usuários, apenas os hashes.
    
    Assim, o ladrão não poderá tentar usar essas mesmas senhas em outro sistema (como muitos usuários usam a mesma senha em todos os lugares, isso seria perigoso).
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb/PreauthIntegrityService.java

        }
    
        /**
         * Gets the selected hash algorithm.
         *
         * @return the hash algorithm
         */
        public int getSelectedHashAlgorithm() {
            return selectedHashAlgorithm;
        }
    
        /**
         * Calculates hash according to SMB 3.1.1 preauth integrity specification.
         *
         * @param previousHash the previous hash in the chain
         * @param messageData the message data to hash
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  9. cmd/erasure-metadata-utils.go

    	diskCount := 0
    	for _, disk := range disks {
    		if disk == nil {
    			continue
    		}
    		diskCount++
    	}
    	return diskCount
    }
    
    // hashOrder - hashes input key to return consistent
    // hashed integer slice. Returned integer order is salted
    // with an input key. This results in consistent order.
    // NOTE: collisions are fine, we are not looking for uniqueness
    // in the slices returned.
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 11.7K bytes
    - Viewed (0)
  10. guava/src/com/google/common/net/InetAddresses.java

       *   <li>If the IPv6 address contains an embedded IPv4 address, the function hashes that.
       *   <li>Otherwise, it hashes the upper 64 bits of the IPv6 address.
       * </ul>
       *
       * <p>A "coerced" IPv4 address is equivalent to itself.
       *
       * <p>NOTE: This method is failsafe for security purposes: ALL IPv6 addresses (except localhost
       * (::1)) are hashed to avoid the security risk associated with extracting an embedded IPv4
    Registered: Fri Dec 26 12:43:10 UTC 2025
    - Last Modified: Wed Feb 19 21:24:11 UTC 2025
    - 47.4K bytes
    - Viewed (0)
Back to top