Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 113 for hasLink (0.07 sec)

  1. guava-tests/test/com/google/common/hash/SipHashFunctionTest.java

        assertEquals(3, hashCodes.size());
      }
    
      public void testToString() {
        assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITH_KEY.toString());
        assertEquals("Hashing.sipHash24(" + K0 + ", " + K1 + ")", SIP_WITHOUT_KEY.toString());
        assertEquals("Hashing.sipHash24(20, 13)", Hashing.sipHash24(20, 13).toString());
      }
    
      private static void assertSip(String input, long expected) {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 6.6K bytes
    - Viewed (0)
  2. android/guava/src/com/google/common/collect/HashBiMap.java

        }
    
        if (hashTableKToV.length < minCapacity) {
          int newTableSize = Hashing.closedTableSize(minCapacity, 1.0);
          hashTableKToV = createFilledWithAbsent(newTableSize);
          hashTableVToK = createFilledWithAbsent(newTableSize);
    
          for (int entryToRehash = 0; entryToRehash < size; entryToRehash++) {
            int keyHash = Hashing.smearedHash(keys[entryToRehash]);
            int keyBucket = bucket(keyHash);
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Mar 06 16:06:58 UTC 2023
    - 36.4K bytes
    - Viewed (0)
  3. android/guava/src/com/google/common/collect/RegularImmutableMap.java

       * double the index of the entry in entrySet.asList.)
       *
       * The basic data structure is described in https://en.wikipedia.org/wiki/Open_addressing.
       * The pointer to a key is stored in hashTable[Hashing.smear(key.hashCode()) % table.length],
       * save that if that location is already full, we try the next index, and the next, until we
       * find an empty table position.  Since the table has a power-of-two size, we use
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Apr 15 22:32:14 UTC 2024
    - 22.7K bytes
    - Viewed (0)
  4. guava/src/com/google/common/hash/BloomFilterStrategies.java

            }
            if (!bits.get(combinedHash % bitSize)) {
              return false;
            }
          }
          return true;
        }
      },
      /**
       * This strategy uses all 128 bits of {@link Hashing#murmur3_128} when hashing. It looks different
       * from the implementation in MURMUR128_MITZ_32 because we're avoiding the multiplication in the
       * loop and doing a (much simpler) += hash2. We're also changing the index to a positive number by
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Mon Oct 10 19:45:10 UTC 2022
    - 10.7K bytes
    - Viewed (0)
  5. cmd/erasure-sets_test.go

    		{"SHØRT", 49},
    		{"There are far too many object names, and far too few bucket names!", 8},
    		{"a/b/c/", 159},
    		{"/a/b/c", 96},
    		{string([]byte{0xff, 0xfe, 0xfd}), 147},
    	}
    
    	// Tests hashing order to be consistent.
    	for i, testCase := range testCases {
    		if sipHashElement := hashKey("SIPMOD", testCase.objectName, 200, testUUID); sipHashElement != testCase.sipHash {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Feb 12 07:21:56 UTC 2024
    - 6.9K bytes
    - Viewed (0)
  6. android/guava-tests/test/com/google/common/hash/HashingOutputStreamTest.java

      }
    
      public void testHash_hashesCorrectly() throws Exception {
        byte[] buf = new byte[] {'y', 'a', 'm', 's'};
        HashCode expectedHash = Hashing.md5().hashBytes(buf);
        HashingOutputStream out = new HashingOutputStream(Hashing.md5(), buffer);
    
        out.write(buf);
    
        assertEquals(expectedHash, out.hash());
      }
    
      public void testChecksForNull() throws Exception {
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Fri Oct 11 22:00:03 UTC 2024
    - 3.1K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 20:39:42 UTC 2019
    - 3.4K bytes
    - Viewed (0)
  8. src/main/java/jcifs/util/HMACT64.java

    /* HMACT64 keyed hashing algorithm
     * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org>
     *
     * This library is free software; you can redistribute it and/or
     * modify it under the terms of the GNU Lesser General Public
     * License as published by the Free Software Foundation; either
     * version 2.1 of the License, or (at your option) any later version.
     *
     * This library is distributed in the hope that it will be useful,
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 3.5K bytes
    - Viewed (0)
  9. guava-tests/test/com/google/common/hash/HashTestUtils.java

            int key1 = rand.nextInt();
            // flip input bit for key2
            int key2 = key1 ^ (1 << i);
            // get hashes
            int hash1 = function.hashInt(key1).asInt();
            int hash2 = function.hashInt(key2).asInt();
            // test whether the hash values have same output bits
            same |= ~(hash1 ^ hash2);
            // test whether the hash values have different output bits
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue Jul 23 14:22:54 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Wir bauen auf dem vorherigen Kapitel auf.
    
    ## Über JWT
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 15K bytes
    - Viewed (0)
Back to top