Skip to main content

Questions tagged [hashcode]

Hashcode is a result of applying a hash function to data, usually an integer.

6 votes
4 answers
774 views

First C++ project: write a hash set for a specific scenario where I only need inserts and containment checks. This is not AI slop, everything except for the avalanche function is hand written. Please ...
Bananach's user avatar
  • 191
8 votes
5 answers
450 views

I'm looking for a (possibly cryptographic strong) hash function in Bash with the following properties: The input is only a string with 4 lower-case characters: aaaa to zzzz The output should be a ...
Tobias Grothe's user avatar
4 votes
2 answers
155 views

This is the implementation of a function hash_dir_contents that walks through a directory and for every file calculates the hash of its content in a memory-...
viuser's user avatar
  • 629
1 vote
1 answer
53 views

I've implemented a separate chaining hash table in C++ and would appreciate any feedback or suggestions for improvement. Code: ...
Nafees Madni's user avatar
1 vote
3 answers
178 views

I am writing code in C, and I need to do various operations with Bitcoin, from generating key pairs, to sign messages to post transactions. I found libraries for C++, but nothing in C that does all ...
capodieci's user avatar
1 vote
1 answer
145 views

I have a Job class that represents jobs in a manufacturing system. The idea is that a job requires some quantity of certain materials, and it outputs some quantity ...
J.K.'s user avatar
  • 21
1 vote
1 answer
72 views

Can you review the following Python code? ...
user366312's user avatar
1 vote
1 answer
321 views

What I am doing here is iterating through all the files in the parentFolder and its subfolders collecting all the hashes of all the files and putting them into a ...
lungimiranza's user avatar
5 votes
1 answer
333 views

I'm trying to build a format that can represent the user's cart on my website in the most compact way. The website is related to computer parts and there are 23 product categories. Each product has an ...
Raees Iqbal's user avatar
12 votes
2 answers
6k views

I devised a tiny pseudo-random engine and I wondered if it would be considered decent or even good. It is based on a SHA256 implementation and uses a single 32-bytes state variable. On seeding, the ...
PinkTurtle's user avatar
2 votes
2 answers
453 views

Application: replacing enum type / description tags in modular software, allowing adding new enum values without updating one definition. Say we have a video processing pipeline not unlike gstreamer. ...
Stefan's user avatar
  • 813
3 votes
1 answer
474 views

I need to compute a deterministic hash for a JSON-serializable dictionary. This answer almost does the job, but there are a few problems. If dict1 == dict2 then I ...
actual_panda's user avatar
2 votes
1 answer
532 views

This code snippet implements password hashing for safe storage. It uses Argon2 as hashing algorithm. The method hash_password() is used to hash and salt a password. ...
questıoner's user avatar
1 vote
2 answers
1k views

I have written a program in C, which encrypts and decrypts a c-styled string (const char *) and print the result to stdout. It ...
Darth-CodeX's user avatar
0 votes
3 answers
247 views

I'm trying to create a hash function for my own custom class. It uses a string value of 4 chars as a key, which is unique to every object, which I then encode using getBytes(), the part actually used ...
EddyDantes's user avatar

15 30 50 per page
1
2 3 4 5
10