Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 490 for ghash (0.02 sec)

  1. android/guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java

    /**
     * Benchmarks for comparing {@link MessageDigest}s and {@link com.google.common.hash.HashFunction}s
     * that wrap {@link MessageDigest}s.
     *
     * <p>Parameters for the benchmark are:
     *
     * <ul>
     *   <li>size: The length of the byte array to hash.
     *   <li>algorithm: the algorithm to hash with (e.g. MD5, SHA1, etc.).
     *   <li>hashMethod: how to hash the data (using the Hashing API or the MessageDigest API).
     * </ul>
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Jul 14 14:44:08 UTC 2025
    - 3.5K bytes
    - Viewed (0)
  2. guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java

    /**
     * Benchmarks for comparing {@link MessageDigest}s and {@link com.google.common.hash.HashFunction}s
     * that wrap {@link MessageDigest}s.
     *
     * <p>Parameters for the benchmark are:
     *
     * <ul>
     *   <li>size: The length of the byte array to hash.
     *   <li>algorithm: the algorithm to hash with (e.g. MD5, SHA1, etc.).
     *   <li>hashMethod: how to hash the data (using the Hashing API or the MessageDigest API).
     * </ul>
     *
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Jul 14 14:44:08 UTC 2025
    - 3.5K bytes
    - Viewed (0)
  3. src/main/java/jcifs/internal/smb2/Smb3KeyDerivation.java

         *
         * @param dialect the SMB dialect version
         * @param sessionKey the base session key
         * @param preauthIntegrity the pre-authentication integrity hash (for SMB 3.1.1) or null
         * @return derived signing key
         */
        public static byte[] deriveSigningKey(final int dialect, final byte[] sessionKey, final byte[] preauthIntegrity) {
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  4. docs/pt/docs/tutorial/security/oauth2-jwt.md

    E ser compatível com todos eles ao mesmo tempo.
    
    ///
    
    Crie uma função utilitária para criar o hash de uma senha fornecida pelo usuário.
    
    E outra função utilitária para verificar se uma senha recebida corresponde ao hash armazenado.
    
    E outra para autenticar e retornar um usuário.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 11K bytes
    - Viewed (0)
  5. android/guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java

              new Sink(4).putUnencodedChars(s).hash(),
              new Sink(4).putBytes(s.getBytes(UTF_16LE)).hash());
          assertEquals(
              new Sink(4).putUnencodedChars(s).hash(), new Sink(4).putString(s, UTF_16LE).hash());
        }
      }
    
      public void testFloat() {
        Sink sink = new Sink(4);
        sink.putFloat(Float.intBitsToFloat(0x04030201));
        HashCode unused = sink.hash();
        sink.assertInvariants(4);
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 17:27:14 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/collect/CompactHashMap.java

      // }
      //
      // The imaginary `hash` and `next` values are combined into a single `int` value in the `entries`
      // array. The top bits of this value are the remaining bits of the hash value that were not used
      // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full
      // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sat Aug 09 01:14:59 UTC 2025
    - 35.7K bytes
    - Viewed (0)
  7. guava-tests/test/com/google/common/hash/HashCodeTest.java

          }
        } else {
          assertEquals(expectedHashCode.asLong.longValue(), hash.asLong());
        }
        assertEquals(expectedHashCode.toString, hash.toString());
        assertSideEffectFree(hash);
        assertReadableBytes(hash);
      }
    
      private static void assertSideEffectFree(HashCode hash) {
        byte[] original = hash.asBytes();
        byte[] mutated = hash.asBytes();
        mutated[0]++;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Dec 22 03:38:46 UTC 2024
    - 13.1K bytes
    - Viewed (0)
  8. android/guava-tests/test/com/google/common/hash/Fingerprint2011Test.java

        assertEquals(hashCode, hasher.hash().asLong());
    
        hasher = HASH_FN.newHasher();
        hasher.putLong(0x0000000001000101L);
        assertEquals(hashCode, hasher.hash().asLong());
    
        hasher = HASH_FN.newHasher();
        hasher
            .putShort((short) 0x0101)
            .putShort((short) 0x0100)
            .putShort((short) 0x0000)
            .putShort((short) 0x0000);
        assertEquals(hashCode, hasher.hash().asLong());
      }
    
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue May 13 18:46:00 UTC 2025
    - 7.8K bytes
    - Viewed (0)
  9. guava/src/com/google/common/collect/CompactHashMap.java

      // }
      //
      // The imaginary `hash` and `next` values are combined into a single `int` value in the `entries`
      // array. The top bits of this value are the remaining bits of the hash value that were not used
      // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full
      // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 39.6K bytes
    - Viewed (0)
  10. android/guava/src/com/google/common/collect/CompactHashSet.java

       *   <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash
       *       collections intelligently fall back to a binary search tree if hash table collisions are
       *       detected. Rather than going to all the trouble of reimplementing this ourselves, we
       *       simply switch over to use the JDK implementation wholesale if probable hash flooding is
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Tue Jul 08 18:32:10 UTC 2025
    - 23.9K bytes
    - Viewed (0)
Back to top