- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 162 for passwords (0.31 sec)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
// Test the method directly char[] password1 = "testpassword".toCharArray(); char[] password2 = "testpassword".toCharArray(); char[] password3 = "testpassworX".toCharArray(); Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías. Siempre que pases exactamente el mismo contenido (exactamente el mismo password) obtienes exactamente el mismo galimatías.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 16K bytes - Viewed (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // Given
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.3K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/en/docs/tutorial/sql-databases.md
/// tip This is how you would handle **passwords**. Receive them, but don't return them in the API. You would also **hash** the values of the passwords before storing them, **never store them in plain text**. /// The fields of `HeroCreate` are: * `name` * `age` * `secret_name`
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 15.4K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb1/com/ServerDataTest.java
serverData.sessKey = 0x12345678; serverData.scapabilities = 0x8000F3FD; // Various capabilities serverData.oemDomainName = "WORKGROUP"; serverData.securityMode = 0x0F; // User + encrypt passwords + signatures serverData.security = 1; // User level serverData.encryptedPasswords = true; serverData.signaturesEnabled = true; serverData.signaturesRequired = false;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17K bytes - Viewed (0) -
src/main/java/jcifs/audit/SecurityAuditLogger.java
if (!lowerData.contains("password") && !lowerData.contains("secret") && !lowerData.contains("token") && !lowerData.contains("key") && !lowerData.contains("credential") && !lowerData.contains("auth")) { return data; // No sensitive patterns detected, skip regex } } // Mask passwords and secrets using cached pattern
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 26.6K bytes - Viewed (0)