Hashcode is a result of applying a hash function to data, usually an integer.

learn more… | top users | synonyms

2
votes
1answer
27 views

Harnessing hashCode as JAXB @XmlID in order to use it with @XmlIDREF

I have a class Fighter in a software for planning boxing events. I implemented its hashCode() and ...
2
votes
2answers
55 views

Java hashCode method in VB.NET

The point of this method is to emulate Java hashCode(). In order for this to work the project must have arithmetic overflow allowed under: project --> compiler ...
5
votes
1answer
397 views

Checking for differences between two (large) files

I want to write a relatively simple program, that can backup files from my computer to a remote location and encrypt them in the process, while also computing a diff (well not really...I'm content ...
0
votes
1answer
38 views

Hashing an arbitrary object to a sparse array of bits

I have this method in one of the java classes I'm working on (an implementation of a counting bloom filter): ...
6
votes
1answer
91 views

One way encoding a password

I wrote a script that one way encrypts a user's password by generating a key, and multiplies by the ASCII value of the character and the ASCII value of the key character at (the position that the ...
5
votes
1answer
127 views

Implementation of the FNV-1a hash algorithm for 128-, 256-, 512- and 1024-bit

A little over a year ago, I asked this question. Since then, I've implemented the larger bit variations and am looking for any and all feedback - performance is obviously key when talking about ...
3
votes
2answers
992 views

Encrypting and decrypting passwords in PHP

I am wanting to encrypt a password and decrypt a password using PHP. Is this a safe method? ...
4
votes
1answer
112 views

Truncate 160-bit output from SHA-1 to 64-bit uint64_t

I'd like to truncate 160-bit output from SHA-1 to receive a (weaker) 64-bit digest. It has been a while since I did the type of low-level C pointer arithmetic in the but-last line. Could you please ...
3
votes
1answer
74 views

Find files with similar contents

I'm not normally a C programmer but thought I'd take a shot at making something useful. This is a C utility I wrote to judge how similar several files are using the algorithm I think ...
4
votes
2answers
244 views

Pairing anagrams in a string list

The task was to check for pairs of anagrams in a string list. I first sorted all the words. and looped over the letters. The interview continues with a follow-up, to do the same with limited memory. ...
5
votes
2answers
286 views

Hash Binary Tree Map

I made a map based on a binary tree ordered by hashcodes, with collisions fixed with equals(). Are there any improvements I could make? ...
1
vote
0answers
59 views

Using the Bridge pattern in hashCode/equals code generation

We are currently writing a code generation tool to generate hashCode, equals and toString ...
4
votes
0answers
79 views

Fowler–Noll–Vo hash function in Lua

I recently coded this FNV-1a hash function in Lua. Are there any apparent performance improvements that could be implemented? ...
6
votes
1answer
2k views

Merge two linked list

Given two linkedlist, merge them. Looking for code review, optimizations and best practices. The code is influenced by feedback here. Changes incorporated were: Linkedlist is no-longer write-only ...
6
votes
1answer
170 views

Enhancing speed of looping cycle using Freepascal

I use Lazarus 1.2.4 and Freepascal 2.6.4. I have created a program that reads a disk in buffers of 64Kb (tried various buffer sizes) using a repeat...until loop. Each buffer is hashed using the SHA1 ...
4
votes
1answer
383 views

Generating random and secure CSRF tokens

I googled around for secure random number generation and random string generation, combining them with some user data. Is this good or am I totally off-base? I don't know much about cryptography but ...
5
votes
1answer
68 views

Eliminating repetitiveness in code to test hash functions

I usually take my school code as a playground to mess around with things. I was given a bunch of premade hash functions and had to test their output and find when they reach a specific lower range. ...
10
votes
2answers
1k views

Override equals() and hashCode() using reflection

I wrote a utility method to override equals() using reflection. This works fine, but I wonder if this code will pass all the tests. ...
1
vote
1answer
141 views

Is this a good practice of password salt/hash? [closed]

Original: http://www.php.net/manual/en/function.crypt.php#114060 I've removed the original author's comments to give you a quick glance at the code. Visit the link for detailed explanations of each ...
2
votes
1answer
120 views

Hashing a password

Does this look like a good method to hash a user password? I'm not very familiar with how this whole hashing process works and below is a bunch of stuff I've seen on many different posts. My main ...
4
votes
1answer
55 views

A PHP Toolkit of some functions

Any major security risks? And please don't get angry over my novice log system. ...
5
votes
1answer
1k views

Implementation of the FNV-1a hash algorithm for 32- and 64-bit

Are there any improvements to these two classes which implement FNV-1a for hashing? Particularly, I'm looking for any reuse opportunities (possibly via a common abstract superclass derived from ...
4
votes
3answers
227 views

Anything wrong with this equals and hashCode implementation?

The below is the domain class called WordType which has Id as its unique DB generated value and Name and Description as other values. I was going through the 'Effective Java' resource by Joshua ...
2
votes
2answers
199 views

Computing hash of string

I want my code to be reviewed and I'd like to hear your opinions. Sun's code to compute hash of string: ...
2
votes
3answers
254 views

Retrieving current time and computing a hash value

Can someone critique this Java code? ...