Skip to main content
Code Review

Questions tagged [hashcode]

Hashcode is a result of applying a hash function to data, usually an integer.

Filter by
Sorted by
Tagged with
6 votes
4 answers
786 views

First C++ project: write a hash set for a specific scenario where I only need inserts and containment checks. This is not AI slop, everything except for the avalanche function is hand written. Please ...
8 votes
5 answers
458 views

I'm looking for a (possibly cryptographic strong) hash function in Bash with the following properties: The input is only a string with 4 lower-case characters: aaaa to zzzz The output should be a ...
4 votes
2 answers
159 views

This is the implementation of a function hash_dir_contents that walks through a directory and for every file calculates the hash of its content in a memory-...
1 vote
1 answer
53 views

I've implemented a separate chaining hash table in C++ and would appreciate any feedback or suggestions for improvement. Code: ...
1 vote
3 answers
179 views

I am writing code in C, and I need to do various operations with Bitcoin, from generating key pairs, to sign messages to post transactions. I found libraries for C++, but nothing in C that does all ...
1 vote
1 answer
147 views

I have a Job class that represents jobs in a manufacturing system. The idea is that a job requires some quantity of certain materials, and it outputs some quantity ...
J.K.'s user avatar
  • 21
1 vote
1 answer
72 views

Can you review the following Python code? ...
1 vote
1 answer
321 views

What I am doing here is iterating through all the files in the parentFolder and its subfolders collecting all the hashes of all the files and putting them into a ...
5 votes
1 answer
335 views

I'm trying to build a format that can represent the user's cart on my website in the most compact way. The website is related to computer parts and there are 23 product categories. Each product has an ...
12 votes
2 answers
6k views

I devised a tiny pseudo-random engine and I wondered if it would be considered decent or even good. It is based on a SHA256 implementation and uses a single 32-bytes state variable. On seeding, the ...
PinkTurtle's user avatar
2 votes
2 answers
455 views

Application: replacing enum type / description tags in modular software, allowing adding new enum values without updating one definition. Say we have a video processing pipeline not unlike gstreamer. ...
Stefan's user avatar
  • 813
3 votes
1 answer
476 views

I need to compute a deterministic hash for a JSON-serializable dictionary. This answer almost does the job, but there are a few problems. If dict1 == dict2 then I ...
2 votes
1 answer
532 views

This code snippet implements password hashing for safe storage. It uses Argon2 as hashing algorithm. The method hash_password() is used to hash and salt a password. ...
1 vote
2 answers
1k views

I have written a program in C, which encrypts and decrypts a c-styled string (const char *) and print the result to stdout. It ...
0 votes
3 answers
247 views

I'm trying to create a hash function for my own custom class. It uses a string value of 4 chars as a key, which is unique to every object, which I then encode using getBytes(), the part actually used ...
EddyDantes's user avatar

15 30 50 per page
1
2 3 4 5
...
10

AltStyle によって変換されたページ (->オリジナル) /