- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 249 for passWord (0.07 seconds)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
// Test the method directly char[] password1 = "testpassword".toCharArray(); char[] password2 = "testpassword".toCharArray(); char[] password3 = "testpassworX".toCharArray(); Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12K bytes - Click Count (1) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java
NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2); NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3); // Test equality with same password assertEquals(auth1, auth2); assertEquals(auth1.hashCode(), auth2.hashCode()); // Test inequality with different password
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 23.3K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 8.5K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 9.4K bytes - Click Count (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso). Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords { #password-hashing } "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 10.3K bytes - Click Count (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
# Einfaches OAuth2 mit Password und Bearer { #simple-oauth2-with-password-and-bearer } Lassen Sie uns nun auf dem vorherigen Kapitel aufbauen und die fehlenden Teile hinzufügen, um einen vollständigen Sicherheits-Flow zu erhalten. ## `username` und `password` entgegennehmen { #get-the-username-and-password } Wir werden **FastAPIs** Sicherheits-Werkzeuge verwenden, um den `username` und das `password` entgegenzunehmen.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Sep 20 15:10:09 GMT 2025 - 11.2K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 10.6K bytes - Click Count (0) -
src/main/java/jcifs/smb/NtlmUtil.java
return hmac.digest(); } /** * Generates the NT password hash for the given password. * * @param password the password to hash * @return nt password hash */ public static byte[] getNTHash(final String password) { if (password == null) { throw new NullPointerException("Password parameter is required"); }
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 15.1K bytes - Click Count (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
* @param password the password to authenticate with */ public NtlmPasswordAuthentication(final CIFSContext tc, final String domain, final String username, final String password) { super(domain != null ? domain : tc.getConfig().getDefaultDomain(), username != null ? username : tc.getConfig().getDefaultUsername() != null ? tc.getConfig().getDefaultUsername() : "GUEST",Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 9.3K bytes - Click Count (0)