Hashcode is a result of applying a hash function to data, usually an integer.
2
votes
1answer
27 views
Harnessing hashCode as JAXB @XmlID in order to use it with @XmlIDREF
I have a class Fighter in a software for planning boxing events. I implemented its hashCode() and ...
2
votes
2answers
55 views
Java hashCode method in VB.NET
The point of this method is to emulate Java hashCode().
In order for this to work the project must have arithmetic overflow allowed under:
project --> compiler ...
5
votes
1answer
397 views
Checking for differences between two (large) files
I want to write a relatively simple program, that can backup files from my computer to a remote location and encrypt them in the process, while also computing a diff (well not really...I'm content ...
0
votes
1answer
38 views
Hashing an arbitrary object to a sparse array of bits
I have this method in one of the java classes I'm working on (an implementation of a counting bloom filter):
...
6
votes
1answer
91 views
One way encoding a password
I wrote a script that one way encrypts a user's password by generating a key, and multiplies by the ASCII value of the character and the ASCII value of the key character at (the position that the ...
5
votes
1answer
127 views
Implementation of the FNV-1a hash algorithm for 128-, 256-, 512- and 1024-bit
A little over a year ago, I asked this question. Since then, I've implemented the larger bit variations and am looking for any and all feedback - performance is obviously key when talking about ...
3
votes
2answers
992 views
Encrypting and decrypting passwords in PHP
I am wanting to encrypt a password and decrypt a password using PHP. Is this a safe method?
...
4
votes
1answer
112 views
Truncate 160-bit output from SHA-1 to 64-bit uint64_t
I'd like to truncate 160-bit output from SHA-1 to receive a (weaker) 64-bit digest.
It has been a while since I did the type of low-level C pointer arithmetic in the but-last line. Could you please ...
3
votes
1answer
74 views
Find files with similar contents
I'm not normally a C programmer but thought I'd take a shot at making something useful. This is a C utility I wrote to judge how similar several files are using the algorithm I think ...
4
votes
2answers
244 views
Pairing anagrams in a string list
The task was to check for pairs of anagrams in a string list.
I first sorted all the words. and looped over the letters.
The interview continues with a follow-up, to do the same with limited memory.
...
5
votes
2answers
286 views
Hash Binary Tree Map
I made a map based on a binary tree ordered by hashcodes, with collisions fixed with equals(). Are there any improvements I could make?
...
1
vote
0answers
59 views
Using the Bridge pattern in hashCode/equals code generation
We are currently writing a code generation tool to generate hashCode, equals and toString ...
4
votes
0answers
79 views
Fowler–Noll–Vo hash function in Lua
I recently coded this FNV-1a hash function in Lua. Are there any apparent performance improvements that could be implemented?
...
6
votes
1answer
2k views
Merge two linked list
Given two linkedlist, merge them. Looking for code review, optimizations and best practices.
The code is influenced by feedback here.
Changes incorporated were:
Linkedlist is no-longer write-only
...
6
votes
1answer
170 views
Enhancing speed of looping cycle using Freepascal
I use Lazarus 1.2.4 and Freepascal 2.6.4.
I have created a program that reads a disk in buffers of 64Kb (tried various buffer sizes) using a repeat...until loop. Each buffer is hashed using the SHA1 ...
4
votes
1answer
383 views
Generating random and secure CSRF tokens
I googled around for secure random number generation and random string generation, combining them with some user data.
Is this good or am I totally off-base? I don't know much about cryptography but ...
5
votes
1answer
68 views
Eliminating repetitiveness in code to test hash functions
I usually take my school code as a playground to mess around with things. I was given a bunch of premade hash functions and had to test their output and find when they reach a specific lower range. ...
10
votes
2answers
1k views
Override equals() and hashCode() using reflection
I wrote a utility method to override equals() using reflection. This works fine, but I wonder if this code will pass all the tests.
...
1
vote
1answer
141 views
Is this a good practice of password salt/hash? [closed]
Original: http://www.php.net/manual/en/function.crypt.php#114060
I've removed the original author's comments to give you a quick glance at the code. Visit the link for detailed explanations of each ...
2
votes
1answer
120 views
Hashing a password
Does this look like a good method to hash a user password? I'm not very familiar with how this whole hashing process works and below is a bunch of stuff I've seen on many different posts.
My main ...
4
votes
1answer
55 views
A PHP Toolkit of some functions
Any major security risks? And please don't get angry over my novice log system.
...
5
votes
1answer
1k views
Implementation of the FNV-1a hash algorithm for 32- and 64-bit
Are there any improvements to these two classes which implement FNV-1a for hashing? Particularly, I'm looking for any reuse opportunities (possibly via a common abstract superclass derived from ...
4
votes
3answers
227 views
Anything wrong with this equals and hashCode implementation?
The below is the domain class called WordType which has Id as its unique DB generated value and Name and Description as other values.
I was going through the 'Effective Java' resource by Joshua ...
2
votes
2answers
199 views
Computing hash of string
I want my code to be reviewed and I'd like to hear your opinions.
Sun's code to compute hash of string:
...
2
votes
3answers
254 views