- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 123 for hashLong (0.06 sec)
-
android/guava/src/com/google/common/collect/RegularImmutableMap.java
* double the index of the entry in entrySet.asList.) * * The basic data structure is described in https://en.wikipedia.org/wiki/Open_addressing. * The pointer to a key is stored in hashTable[Hashing.smear(key.hashCode()) % table.length], * save that if that location is already full, we try the next index, and the next, until we * find an empty table position. Since the table has a power-of-two size, we use
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Mon Apr 15 22:32:14 UTC 2024 - 22.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Fri Mar 22 20:39:42 UTC 2019 - 3.4K bytes - Viewed (0) -
src/main/java/jcifs/util/HMACT64.java
/* HMACT64 keyed hashing algorithm * Copyright (C) 2003 "Eric Glass" <jcifs at samba dot org> * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful,
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 3.5K bytes - Viewed (0) -
cmd/erasure-sets_test.go
{"SHØRT", 49}, {"There are far too many object names, and far too few bucket names!", 8}, {"a/b/c/", 159}, {"/a/b/c", 96}, {string([]byte{0xff, 0xfe, 0xfd}), 147}, } // Tests hashing order to be consistent. for i, testCase := range testCases { if sipHashElement := hashKey("SIPMOD", testCase.objectName, 200, testUUID); sipHashElement != testCase.sipHash {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Feb 12 07:21:56 UTC 2024 - 6.9K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw. Wir bauen auf dem vorherigen Kapitel auf. ## Über JWT
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 15K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
Let's put that data in the Pydantic `UserInDB` model first. You should never save plaintext passwords, so, we'll use the (fake) password hashing system. If the passwords don't match, we return the same error. #### Password hashing "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.3K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
Sie sollten niemals Klartext-Passwörter speichern, daher verwenden wir ein (gefaktes) Passwort-Hashing-System. Wenn die Passwörter nicht übereinstimmen, geben wir denselben Fehler zurück. #### Passwort-Hashing „Hashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 14.1K bytes - Viewed (0) -
guava/src/com/google/common/collect/RegularImmutableBiMap.java
V value = entry.getValue(); checkEntryNotNull(key, value); int keyHash = key.hashCode(); int valueHash = value.hashCode(); int keyBucket = Hashing.smear(keyHash) & mask; int valueBucket = Hashing.smear(valueHash) & mask; ImmutableMapEntry<K, V> nextInKeyBucket = keyTable[keyBucket]; ImmutableMapEntry<K, V> nextInValueBucket = valueTable[valueBucket]; try {
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Sat Oct 19 00:05:46 UTC 2024 - 11.3K bytes - Viewed (0) -
android/guava-tests/test/com/google/common/hash/ChecksumHashFunctionTest.java
* the License. */ package com.google.common.hash; import static com.google.common.hash.Hashing.ChecksumType.ADLER_32; import static com.google.common.hash.Hashing.ChecksumType.CRC_32; import java.util.zip.Checksum; import junit.framework.TestCase; /** * Tests for ChecksumHashFunction. * * @author Colin Decker */
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Jan 30 14:33:12 UTC 2018 - 3.1K bytes - Viewed (0)