Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 165 for PASSWORD (0.04 sec)

  1. src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java

         * from memory.
         *
         * @return the password as a char array
         */
        public char[] getPasswordAsCharArray() {
            checkNotClosed();
            return this.password != null && this.password.length > 0 ? this.password.clone() : this.password == null ? null : new char[0];
        }
    
        /**
         * Securely wipes the password from memory
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 30.3K bytes
    - Viewed (0)
  2. src/main/java/org/codelibs/fess/opensearch/config/exentity/DataConfig.java

                credentials = new NTCredentials(username, password == null ? StringUtil.EMPTY : password,
                        workstation == null ? StringUtil.EMPTY : workstation, domain == null ? StringUtil.EMPTY : domain);
            } else {
                credentials = new UsernamePasswordCredentials(username, password == null ? StringUtil.EMPTY : password);
            }
            return credentials;
        }
    
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 18.6K bytes
    - Viewed (0)
  3. src/main/java/jcifs/smb/NtlmUtil.java

            return hmac.digest();
        }
    
        /**
         * Generates the NT password hash for the given password.
         *
         * @param password the password to hash
         * @return nt password hash
         */
        public static byte[] getNTHash(final String password) {
            if (password == null) {
                throw new NullPointerException("Password parameter is required");
            }
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 15.1K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

                auth1.close();
                auth2.close();
            }
        }
    
        /**
         * Test concurrent password comparisons to ensure thread safety and consistent timing.
         */
        @Test
        public void testConcurrentTimingConsistency() throws Exception {
            final char[] password = "concurrenttestpassword".toCharArray();
            final char[] wrongPassword = "concurrenttestpassworX".toCharArray(); // Different at end
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            return ntResponse;
        }
    
        /**
         * Generates the NTOWFv1 hash for the given password.
         *
         * @param password the password to hash
         * @return the NTOWFv1 hash bytes
         */
        public static byte[] nTOWFv1(final String password) {
            if (password == null) {
                throw new RuntimeException("Password parameter is required");
            }
            try {
                final MD4 md4 = new MD4();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  6. src/main/java/org/codelibs/fess/app/web/admin/user/AdminUserAction.java

                if (form.crudMode.intValue() == CrudMode.CREATE || StringUtil.isNotBlank(form.password)) {
                    final String encodedPassword = ComponentUtil.getComponent(FessLoginAssist.class).encryptPassword(form.password);
                    entity.setOriginalPassword(form.password);
                    entity.setPassword(encodedPassword);
                }
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 19.5K bytes
    - Viewed (0)
  7. src/main/java/jcifs/smb1/ntlmssp/Type3Message.java

         * the supplied password.
         *
         * @param type2 The Type-2 message.
         * @param password The password.
         * @return A <code>byte[]</code> containing the LanManager response.
         */
        public static byte[] getLMResponse(final Type2Message type2, final String password) {
            if (type2 == null || password == null) {
                return null;
            }
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 24.1K bytes
    - Viewed (0)
  8. docs/es/docs/tutorial/security/simple-oauth2.md

    # Simple OAuth2 con Password y Bearer
    
    Ahora vamos a construir a partir del capĂ­tulo anterior y agregar las partes faltantes para tener un flujo de seguridad completo.
    
    ## Obtener el `username` y `password`
    
    Vamos a usar las utilidades de seguridad de **FastAPI** para obtener el `username` y `password`.
    
    OAuth2 especifica que cuando se utiliza el "password flow" (que estamos usando), el cliente/usuario debe enviar campos `username` y `password` como form data.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Dec 30 18:26:57 UTC 2024
    - 9.9K bytes
    - Viewed (0)
  9. src/main/java/jcifs/ntlmssp/Type3Message.java

         * @param targetName
         *            SPN of the target system, optional
         * @param passwordHash
         *            The NT password hash, takes precedence over password (which is no longer required unless legacy LM
         *            authentication is needed)
         * @param password
         *            The password to use when constructing the response.
         * @param domain
         *            The domain in which the user has an account.
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 32.7K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
Back to top