- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 490 for ghash (0.02 sec)
-
android/guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java
/** * Benchmarks for comparing {@link MessageDigest}s and {@link com.google.common.hash.HashFunction}s * that wrap {@link MessageDigest}s. * * <p>Parameters for the benchmark are: * * <ul> * <li>size: The length of the byte array to hash. * <li>algorithm: the algorithm to hash with (e.g. MD5, SHA1, etc.). * <li>hashMethod: how to hash the data (using the Hashing API or the MessageDigest API). * </ul> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Jul 14 14:44:08 UTC 2025 - 3.5K bytes - Viewed (0) -
guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java
/** * Benchmarks for comparing {@link MessageDigest}s and {@link com.google.common.hash.HashFunction}s * that wrap {@link MessageDigest}s. * * <p>Parameters for the benchmark are: * * <ul> * <li>size: The length of the byte array to hash. * <li>algorithm: the algorithm to hash with (e.g. MD5, SHA1, etc.). * <li>hashMethod: how to hash the data (using the Hashing API or the MessageDigest API). * </ul> *
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Jul 14 14:44:08 UTC 2025 - 3.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb3KeyDerivation.java
* * @param dialect the SMB dialect version * @param sessionKey the base session key * @param preauthIntegrity the pre-authentication integrity hash (for SMB 3.1.1) or null * @return derived signing key */ public static byte[] deriveSigningKey(final int dialect, final byte[] sessionKey, final byte[] preauthIntegrity) {
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 6.5K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/oauth2-jwt.md
E ser compatível com todos eles ao mesmo tempo. /// Crie uma função utilitária para criar o hash de uma senha fornecida pelo usuário. E outra função utilitária para verificar se uma senha recebida corresponde ao hash armazenado. E outra para autenticar e retornar um usuário.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 11K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
new Sink(4).putUnencodedChars(s).hash(), new Sink(4).putBytes(s.getBytes(UTF_16LE)).hash()); assertEquals( new Sink(4).putUnencodedChars(s).hash(), new Sink(4).putString(s, UTF_16LE).hash()); } } public void testFloat() { Sink sink = new Sink(4); sink.putFloat(Float.intBitsToFloat(0x04030201)); HashCode unused = sink.hash(); sink.assertInvariants(4);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 17:27:14 UTC 2025 - 8.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
// } // // The imaginary `hash` and `next` values are combined into a single `int` value in the `entries` // array. The top bits of this value are the remaining bits of the hash value that were not used // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 35.7K bytes - Viewed (0) -
guava-tests/test/com/google/common/hash/HashCodeTest.java
} } else { assertEquals(expectedHashCode.asLong.longValue(), hash.asLong()); } assertEquals(expectedHashCode.toString, hash.toString()); assertSideEffectFree(hash); assertReadableBytes(hash); } private static void assertSideEffectFree(HashCode hash) { byte[] original = hash.asBytes(); byte[] mutated = hash.asBytes(); mutated[0]++;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 13.1K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/Fingerprint2011Test.java
assertEquals(hashCode, hasher.hash().asLong()); hasher = HASH_FN.newHasher(); hasher.putLong(0x0000000001000101L); assertEquals(hashCode, hasher.hash().asLong()); hasher = HASH_FN.newHasher(); hasher .putShort((short) 0x0101) .putShort((short) 0x0100) .putShort((short) 0x0000) .putShort((short) 0x0000); assertEquals(hashCode, hasher.hash().asLong()); }
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue May 13 18:46:00 UTC 2025 - 7.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/CompactHashMap.java
// } // // The imaginary `hash` and `next` values are combined into a single `int` value in the `entries` // array. The top bits of this value are the remaining bits of the hash value that were not used // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 39.6K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/CompactHashSet.java
* <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Tue Jul 08 18:32:10 UTC 2025 - 23.9K bytes - Viewed (0)