Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 293 for pass_word (0.07 seconds)

  1. src/test/java/org/codelibs/fess/helper/SystemHelperTest.java

            assertEquals("errors.password_no_lowercase", systemHelper.validatePassword("PASSWORD1!"));
            assertEquals("errors.password_no_digit", systemHelper.validatePassword("Password!"));
            assertEquals("errors.password_no_special_char", systemHelper.validatePassword("Password1"));
            assertEquals("", systemHelper.validatePassword("Password1!"));
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Sat Mar 28 06:59:19 GMT 2026
    - 44.4K bytes
    - Click Count (0)
  2. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

            // Test the method directly
            char[] password1 = "testpassword".toCharArray();
            char[] password2 = "testpassword".toCharArray();
            char[] password3 = "testpassworX".toCharArray();
    
            Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2);
            Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
    
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sun Aug 31 08:00:57 GMT 2025
    - 11.2K bytes
    - Click Count (0)
  3. src/test/java/jcifs/smb/NtlmUtilTest.java

            byte[] actual = NtlmUtil.getNTHash(password);
    
            // Assert
            assertArrayEquals(expected, actual, "NT hash must match known test vector");
        }
    
        @Test
        @DisplayName("getNTHash: verify different passwords produce different hashes")
        void testGetNTHash_differentPasswords() {
            // Arrange
            String password1 = "password";
            String password2 = "Password";
    
            // Act
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 12K bytes
    - Click Count (1)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java

            NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2);
            NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3);
    
            // Test equality with same password
            assertEquals(auth1, auth2);
            assertEquals(auth1.hashCode(), auth2.hashCode());
    
            // Test inequality with different password
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 23.3K bytes
    - Click Count (0)
  5. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens }
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:58:09 GMT 2026
    - 12.9K bytes
    - Click Count (0)
  6. docs/es/docs/tutorial/security/simple-oauth2.md

    Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso).
    
    Si los passwords no coinciden, devolvemos el mismo error.
    
    #### Hashing de passwords { #password-hashing }
    
    "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:15:55 GMT 2026
    - 10.2K bytes
    - Click Count (0)
  7. docs/de/docs/tutorial/security/simple-oauth2.md

    # Einfaches OAuth2 mit Password und Bearer { #simple-oauth2-with-password-and-bearer }
    
    Lassen Sie uns nun auf dem vorherigen Kapitel aufbauen und die fehlenden Teile hinzufügen, um einen vollständigen Sicherheits-Flow zu erhalten.
    
    ## `username` und `password` entgegennehmen { #get-the-username-and-password }
    
    Wir werden **FastAPIs** Sicherheits-Werkzeuge verwenden, um den `username` und das `password` entgegenzunehmen.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:58:09 GMT 2026
    - 11.1K bytes
    - Click Count (0)
  8. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 10.7K bytes
    - Click Count (0)
  9. src/test/java/org/codelibs/fess/util/ParameterUtilTest.java

            assertTrue("Result should contain password={cipher}, but was: " + result, result.contains("password={cipher}"));
    
            // Test with empty encryption target
            value = "password=";
            result = ParameterUtil.encrypt(value);
            assertTrue(result.contains("password={cipher}"));
    
            // Test with only whitespace value
            value = "password=   ";
            result = ParameterUtil.encrypt(value);
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Wed Jan 14 14:29:07 GMT 2026
    - 22.8K bytes
    - Click Count (0)
  10. src/main/java/jcifs/util/SecureCredentialStorage.java

                throw new IllegalArgumentException("Master password cannot be null or empty");
            }
    
            // Generate salt for key derivation
            this.salt = new byte[SALT_SIZE];
            secureRandom.nextBytes(this.salt);
    
            // Derive master key from password
            this.masterKey = deriveKey(masterPassword, salt);
    
            // Clear the master password after use
            Arrays.fill(masterPassword, '\0');
        }
    
    Created: Sun Apr 05 00:10:12 GMT 2026
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 12.7K bytes
    - Click Count (0)
Back to Top