- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 334 for Hashing (0.04 sec)
-
src/main/java/jcifs/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 3.6K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw. Wir bauen auf dem vorherigen Kapitel auf. ## Über JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc. Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo. ## Acerca de JWT
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
src/test/java/jcifs/util/CryptoTest.java
} @ParameterizedTest @ValueSource(strings = { "", "a", "short", "medium length text", "very long text that exceeds typical block sizes" }) @DisplayName("Should handle various input sizes for hashing") void testHashVariousInputSizes(String input) { // Given byte[] data = input.getBytes(); // When MessageDigest md4 = Crypto.getMD4();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 7.4K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System. Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück. #### Passwort-Hashing „Hashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.7K bytes - Viewed (0) -
cmd/erasure-sets_test.go
{"a/b/c/", 159}, {"/a/b/c", 96}, {string([]byte{0xff, 0xfe, 0xfd}), 147}, } // Tests hashing order to be consistent. for i, testCase := range testCases { if sipHashElement := hashKey("SIPMOD", testCase.objectName, 200, testUUID); sipHashElement != testCase.sipHash { t.Errorf("Test case %d: Expected \"%v\" but failed \"%v\"", i+1, testCase.sipHash, sipHashElement) } }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6.8K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableBiMap.java
V value = entry.getValue(); checkEntryNotNull(key, value); int keyHash = key.hashCode(); int valueHash = value.hashCode(); int keyBucket = Hashing.smear(keyHash) & mask; int valueBucket = Hashing.smear(valueHash) & mask; ImmutableMapEntry<K, V> nextInKeyBucket = keyTable[keyBucket]; ImmutableMapEntry<K, V> nextInValueBucket = valueTable[valueBucket]; try {
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Thu Aug 07 16:05:33 UTC 2025 - 11.1K bytes - Viewed (0) -
android/guava/src/com/google/common/collect/RegularImmutableMap.java
* double the index of the entry in entrySet.asList.) * * The basic data structure is described in https://en.wikipedia.org/wiki/Open_addressing. * The pointer to a key is stored in hashTable[Hashing.smear(key.hashCode()) % table.length], * save that if that location is already full, we try the next index, and the next, until we * find an empty table position. Since the table has a power-of-two size, we use
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Sat Aug 09 01:14:59 UTC 2025 - 22.5K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso). Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0) -
guava/src/com/google/common/hash/Murmur3_32HashFunction.java
new Murmur3_32HashFunction(0, /* supplementaryPlaneFix= */ true); // We can include the non-BMP fix here because Hashing.goodFastHash stresses that the hash is a // temporary-use one. Therefore it shouldn't be persisted. static final HashFunction GOOD_FAST_HASH_32 = new Murmur3_32HashFunction(Hashing.GOOD_FAST_HASH_SEED, /* supplementaryPlaneFix= */ true); private static final int CHUNK_SIZE = 4;
Registered: Fri Sep 05 12:43:10 UTC 2025 - Last Modified: Mon Apr 14 16:36:11 UTC 2025 - 11.8K bytes - Viewed (0)