Hashcode is a result of applying a hash function to data, usually an integer.
10
votes
2answers
820 views
Override equals() and hashCode() using reflection
I wrote a utility method to override equals() using reflection. This works fine, but I wonder if this code will pass all the tests.
...
6
votes
1answer
130 views
Enhancing speed of looping cycle using Freepascal
I use Lazarus 1.2.4 and Freepascal 2.6.4.
I have created a program that reads a disk in buffers of 64Kb (tried various buffer sizes) using a repeat...until loop. Each buffer is hashed using the SHA1 ...
6
votes
1answer
856 views
Merge two linked list
Given two linkedlist, merge them. Looking for code review, optimizations and best practices.
The code is influenced by feedback here.
Changes incorporated were:
Linkedlist is no-longer write-only
...
5
votes
1answer
63 views
Eliminating repetitiveness in code to test hash functions
I usually take my school code as a playground to mess around with things. I was given a bunch of premade hash functions and had to test their output and find when they reach a specific lower range. ...
5
votes
2answers
120 views
Hash Binary Tree Map
I made a map based on a binary tree ordered by hashcodes, with collisions fixed with equals(). Are there any improvements I could make?
...
4
votes
3answers
167 views
Anything wrong with this equals and hashCode implementation?
The below is the domain class called WordType which has Id as its unique DB generated value and Name and Description as other values.
I was going through the 'Effective Java' resource by Joshua ...
4
votes
1answer
74 views
Truncate 160-bit output from SHA-1 to 64-bit uint64_t
I'd like to truncate 160-bit output from SHA-1 to receive a (weaker) 64-bit digest.
It has been a while since I did the type of low-level C pointer arithmetic in the but-last line. Could you please ...
4
votes
1answer
54 views
A PHP Toolkit of some functions
Any major security risks? And please don't get angry over my novice log system.
...
4
votes
2answers
131 views
Pairing anagrams in a string list
The task was to check for pairs of anagrams in a string list.
I first sorted all the words. and looped over the letters.
The interview continues with a follow-up, to do the same with limited memory.
...
4
votes
1answer
311 views
Generating random and secure CSRF tokens
I googled around for secure random number generation and random string generation, combining them with some user data.
Is this good or am I totally off-base? I don't know much about cryptography but ...
4
votes
0answers
56 views
Fowler–Noll–Vo hash function in Lua
I recently coded this FNV-1a hash function in Lua. Are there any apparent performance improvements that could be implemented?
...
3
votes
1answer
70 views
Find files with similar contents
I'm not normally a C programmer but thought I'd take a shot at making something useful. This is a C utility I wrote to judge how similar several files are using the algorithm I think ...
3
votes
1answer
911 views
Implementation of the FNV-1a hash algorithm for 32- and 64-bit
Are there any improvements to these two classes which implement FNV-1a for hashing? Particularly, I'm looking for any reuse opportunities (possibly via a common abstract superclass derived from ...
2
votes
2answers
187 views
Computing hash of string
I want my code to be reviewed and I'd like to hear your opinions.
Sun's code to compute hash of string:
...
2
votes
3answers
230 views
2
votes
1answer
83 views
Is this correct for hashing a password?
Does this look like a good method to hash a user password. I'm not very familiar with how this whole hashing process works and below is a bunch of stuff I've seen on many different posts.
My main ...
1
vote
1answer
120 views
Is this a good practice of password salt/hash? [closed]
Original: http://www.php.net/manual/en/function.crypt.php#114060
I've removed the original author's comments to give you a quick glance at the code. Visit the link for detailed explanations of each ...