- Sort Score
- Num 10 results
- Language All
Results 1 - 3 of 3 for PBKDF2 (0.04 seconds)
-
src/main/java/jcifs/util/SecureCredentialStorage.java
/** * Secure credential storage with encryption at rest. * * Provides secure storage of passwords and other sensitive credentials * using AES-GCM encryption with PBKDF2 key derivation. * * Features: * - Encrypts credentials at rest using AES-256-GCM * - Uses PBKDF2 for key derivation from master password * - Secure wiping of sensitive data * - Thread-safe operations * - Protection against timing attacks */
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
api/go1.24.txt
pkg crypto/mlkem, type DecapsulationKey768 struct #70122 pkg crypto/mlkem, type EncapsulationKey1024 struct #70122 pkg crypto/mlkem, type EncapsulationKey768 struct #70122 pkg crypto/pbkdf2, func Key[$0 hash.Hash](func() $0, string, []uint8, int, int) ([]uint8, error) #69488 pkg crypto/rand, func Text() string #67057 pkg crypto/sha3, func New224() *SHA3 #69982 pkg crypto/sha3, func New256() *SHA3 #69982
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Dec 17 21:28:29 GMT 2024 - 14.2K bytes - Click Count (0) -
TESTING.asciidoc
password hashing algorithm is set to something else than a PBKDF2 based one. You can delegate the choice of algorithm to i.e. `SecurityIntegTestCase#getFastStoredHashAlgoForTests` if you don't mind the actual algorithm used, or depend on default values for the test cluster nodes. ==== Password length While using `pbkdf2` as the password hashing algorithm, FIPS 140-2 imposes a requirement that
Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Mon Jun 07 13:55:20 GMT 2021 - 32.5K bytes - Click Count (0)