- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 271 for hashing (0.05 sec)
-
android/guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java
} private enum Algorithm { MD5("MD5", Hashing.md5()), SHA_1("SHA-1", Hashing.sha1()), SHA_256("SHA-256", Hashing.sha256()), SHA_384("SHA-384", Hashing.sha384()), SHA_512("SHA-512", Hashing.sha512()); private final String algorithmName; private final HashFunction hashFn; Algorithm(String algorithmName, HashFunction hashFn) { this.algorithmName = algorithmName;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Jul 14 14:44:08 UTC 2025 - 3.5K bytes - Viewed (0) -
guava-tests/benchmark/com/google/common/hash/MessageDigestAlgorithmBenchmark.java
} private enum Algorithm { MD5("MD5", Hashing.md5()), SHA_1("SHA-1", Hashing.sha1()), SHA_256("SHA-256", Hashing.sha256()), SHA_384("SHA-384", Hashing.sha384()), SHA_512("SHA-512", Hashing.sha512()); private final String algorithmName; private final HashFunction hashFn; Algorithm(String algorithmName, HashFunction hashFn) { this.algorithmName = algorithmName;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Jul 14 14:44:08 UTC 2025 - 3.5K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/HashBiMap.java
} if (hashTableKToV.length < minCapacity) { int newTableSize = Hashing.closedTableSize(minCapacity, 1.0); hashTableKToV = createFilledWithAbsent(newTableSize); hashTableVToK = createFilledWithAbsent(newTableSize); for (int entryToRehash = 0; entryToRehash < size; entryToRehash++) { int keyHash = Hashing.smearedHash(keys[entryToRehash]); int keyBucket = bucket(keyHash);
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Aug 11 19:31:30 UTC 2025 - 36.2K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/SipHashFunctionTest.java
assertEquals(3, hashCodes.size()); } public void testToString() { assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITH_KEY.toString()); assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITHOUT_KEY.toString()); assertEquals("Hashing.sipHash24(20, 13)", Hashing.sipHash24(20, 13).toString()); } private static void assertSip(String input, long expected) {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 6.7K bytes - Viewed (0) -
docs/pt/docs/tutorial/security/simple-oauth2.md
Vamos colocar esses dados primeiro no modelo `UserInDB` do Pydantic. Você nunca deve salvar senhas em texto simples, portanto, usaremos o sistema de hashing de senhas (falsas). Se as senhas não corresponderem, retornaremos o mesmo erro. #### Hashing de senha "Hashing" significa: converter algum conteúdo (uma senha neste caso) em uma sequência de bytes (apenas uma string) que parece algo sem sentido.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/HashingOutputStreamTest.java
} public void testHash_hashesCorrectly() throws Exception { byte[] buf = new byte[] {'y', 'a', 'm', 's'}; HashCode expectedHash = Hashing.md5().hashBytes(buf); HashingOutputStream out = new HashingOutputStream(Hashing.md5(), buffer); out.write(buf); assertEquals(expectedHash, out.hash()); } public void testChecksForNull() throws Exception {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 3.1K bytes - Viewed (0) -
android/guava/src/com/google/common/hash/BloomFilterStrategies.java
} if (!bits.get(combinedHash % bitSize)) { return false; } } return true; } }, /** * This strategy uses all 128 bits of {@link Hashing#murmur3_128} when hashing. It looks different * from the implementation in MURMUR128_MITZ_32 because we're avoiding the multiplication in the * loop and doing a (much simpler) += hash2. We're also changing the index to a positive number by
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sun Dec 22 03:38:46 UTC 2024 - 10.6K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Let's put that data in the Pydantic `UserInDB` model first. You should never save plaintext passwords, so, we'll use the (fake) password hashing system. If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 3.6K bytes - Viewed (0)