- Sort Score
- Num 10 results
- Language All
Results 291 - 300 of 700 for Bash (0.12 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
guava-tests/test/com/google/common/hash/HashTestUtils.java
key[i] = (byte) i; int seed = 256 - i; byte[] hash = hashFunction.hash(Arrays.copyOf(key, i), seed); System.arraycopy(hash, 0, hashes, i * hashBytes, hash.length); } // Then hash the result array byte[] result = hashFunction.hash(hashes, 0); // interpreted in little-endian order. int verification = Integer.reverseBytes(Ints.fromByteArray(result)); if (expected != verification) {
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Oct 28 18:19:59 GMT 2025 - 25.6K bytes - Click Count (0) -
guava-tests/test/com/google/common/hash/AbstractStreamingHasherTest.java
new Sink(4).putUnencodedChars(s).hash(), new Sink(4).putBytes(s.getBytes(UTF_16LE)).hash()); assertEquals( new Sink(4).putUnencodedChars(s).hash(), new Sink(4).putString(s, UTF_16LE).hash()); } } public void testFloat() { Sink sink = new Sink(4); sink.putFloat(Float.intBitsToFloat(0x04030201)); HashCode unused = sink.hash(); sink.assertInvariants(4);
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Oct 28 18:19:59 GMT 2025 - 8.6K bytes - Click Count (0) -
src/test/java/jcifs/smb/PreauthIntegrityServiceTest.java
byte[] expectedHash = preauthService.getCurrentPreauthHash(sessionId); // Validation should pass with correct hash assertTrue(preauthService.validatePreauthIntegrity(sessionId, expectedHash)); // Validation should fail with incorrect hash byte[] incorrectHash = new byte[expectedHash.length]; secureRandom.nextBytes(incorrectHash);Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.1K bytes - Click Count (0) -
internal/hash/crc.go
// // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. package hash import ( "encoding/base64" "encoding/binary" "fmt" "hash/crc32" "hash/crc64" "math/bits" ) // AddPart will merge a part checksum into the current, // as if the content of each was appended.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jan 20 14:49:07 GMT 2025 - 5.8K bytes - Click Count (0) -
src/test/java/jcifs/smb1/smb1/NtlmPasswordAuthenticationTest.java
void testNTOWFv1() { byte[] hash = NtlmPasswordAuthentication.nTOWFv1("password"); assertNotNull(hash); assertEquals(16, hash.length); } // Test nTOWFv2 @Test void testNTOWFv2() { byte[] hash = NtlmPasswordAuthentication.nTOWFv2("DOMAIN", "user", "password"); assertNotNull(hash); assertEquals(16, hash.length); } // Test unescape method
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 9.7K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/artifact/resolver/filter/ExclusionSetFilter.java
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Jun 06 14:28:57 GMT 2025 - 2K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/artifact/resolver/filter/IncludesArtifactFilter.java
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Jun 06 14:28:57 GMT 2025 - 2.4K bytes - Click Count (0) -
impl/maven-core/src/main/java/org/apache/maven/artifact/resolver/filter/CumulativeScopeArtifactFilter.java
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Fri Jan 10 08:42:00 GMT 2025 - 3K bytes - Click Count (0) -
android/guava/src/com/google/common/collect/CompactHashMap.java
// } // // The imaginary `hash` and `next` values are combined into a single `int` value in the `entries` // array. The top bits of this value are the remaining bits of the hash value that were not used // in the short hash. We saw that a mask of 0x7f would keep the 7-bit value 0x6f from a full // hashcode of 0x89abcdef. The imaginary `hash` value would then be the remaining top 25 bits,
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Sat Aug 09 01:14:59 GMT 2025 - 35.7K bytes - Click Count (0) -
guava/src/com/google/common/collect/CompactHashSet.java
* <li>another java.util.Set delegate implementation. In most modern JDKs, normal java.util hash * collections intelligently fall back to a binary search tree if hash table collisions are * detected. Rather than going to all the trouble of reimplementing this ourselves, we * simply switch over to use the JDK implementation wholesale if probable hash flooding is
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Jul 08 18:32:10 GMT 2025 - 24.7K bytes - Click Count (0)