Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 236 for password (0.24 sec)

  1. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

            // Test the method directly
            char[] password1 = "testpassword".toCharArray();
            char[] password2 = "testpassword".toCharArray();
            char[] password3 = "testpassworX".toCharArray();
    
            Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2);
            Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  2. src/test/java/jcifs/smb/NtlmUtilTest.java

            byte[] actual = NtlmUtil.getNTHash(password);
    
            // Assert
            assertArrayEquals(expected, actual, "NT hash must match known test vector");
        }
    
        @Test
        @DisplayName("getNTHash: verify different passwords produce different hashes")
        void testGetNTHash_differentPasswords() {
            // Arrange
            String password1 = "password";
            String password2 = "Password";
    
            // Act
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (0)
  3. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java

            NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2);
            NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3);
    
            // Test equality with same password
            assertEquals(auth1, auth2);
            assertEquals(auth1.hashCode(), auth2.hashCode());
    
            // Test inequality with different password
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 23.3K bytes
    - Viewed (0)
  4. docs/en/docs/tutorial/extra-models.md

    * The **input model** needs to be able to have a password.
    * The **output model** should not have a password.
    * The **database model** would probably need to have a hashed password.
    
    /// danger
    
    Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
    If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.
    
    ///
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/security/simple-oauth2.md

    If the passwords don't match, we return the same error.
    
    #### Password hashing { #password-hashing }
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java

         * from memory.
         *
         * @return the password as a char array
         */
        public char[] getPasswordAsCharArray() {
            checkNotClosed();
            return this.password != null && this.password.length > 0 ? this.password.clone() : this.password == null ? null : new char[0];
        }
    
        /**
         * Securely wipes the password from memory
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 30.3K bytes
    - Viewed (0)
  7. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java

            // Verify it returns a clone, not the original
            password[0] = 'X';
            char[] password2 = authenticator.getPasswordAsCharArray();
            assertNotEquals(password[0], password2[0], "Should return a clone, not the original");
        }
    
        @Test
        public void testPasswordConstructorWithCharArray() {
            char[] passwordChars = "charArrayPassword".toCharArray();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  8. src/main/java/org/codelibs/fess/app/web/login/LoginAction.java

            }
            return redirect(getClass());
        }
    
        /**
         * Handles password change for the current user.
         *
         * @param form the password form containing new password and confirmation
         * @return the HTML response after password change attempt
         */
        @Execute
        public HtmlResponse changePassword(final PasswordForm form) {
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Jul 17 08:28:31 UTC 2025
    - 6.8K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            return ntResponse;
        }
    
        /**
         * Generates the NTOWFv1 hash for the given password.
         *
         * @param password the password to hash
         * @return the NTOWFv1 hash bytes
         */
        public static byte[] nTOWFv1(final String password) {
            if (password == null) {
                throw new RuntimeException("Password parameter is required");
            }
            try {
                final MD4 md4 = new MD4();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
Back to top