Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 3 of 3 for PBKDF2 (0.04 seconds)

  1. src/main/java/jcifs/util/SecureCredentialStorage.java

    /**
     * Secure credential storage with encryption at rest.
     *
     * Provides secure storage of passwords and other sensitive credentials
     * using AES-GCM encryption with PBKDF2 key derivation.
     *
     * Features:
     * - Encrypts credentials at rest using AES-256-GCM
     * - Uses PBKDF2 for key derivation from master password
     * - Secure wiping of sensitive data
     * - Thread-safe operations
     * - Protection against timing attacks
     */
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 12.7K bytes
    - Click Count (0)
  2. api/go1.24.txt

    pkg crypto/mlkem, type DecapsulationKey768 struct #70122
    pkg crypto/mlkem, type EncapsulationKey1024 struct #70122
    pkg crypto/mlkem, type EncapsulationKey768 struct #70122
    pkg crypto/pbkdf2, func Key[$0 hash.Hash](func() $0, string, []uint8, int, int) ([]uint8, error) #69488
    pkg crypto/rand, func Text() string #67057
    pkg crypto/sha3, func New224() *SHA3 #69982
    pkg crypto/sha3, func New256() *SHA3 #69982
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Tue Dec 17 21:28:29 GMT 2024
    - 14.2K bytes
    - Click Count (0)
  3. TESTING.asciidoc

    password hashing algorithm is set to something else than a PBKDF2 based one. You can delegate the choice
    of algorithm to i.e. `SecurityIntegTestCase#getFastStoredHashAlgoForTests` if you don't mind the
    actual algorithm used, or depend on default values for the test cluster nodes.
    
    ==== Password length
    
    While using `pbkdf2` as the password hashing algorithm, FIPS 140-2 imposes a requirement that
    Created: Wed Apr 08 16:19:15 GMT 2026
    - Last Modified: Mon Jun 07 13:55:20 GMT 2021
    - 32.5K bytes
    - Click Count (0)
Back to Top