- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 236 for password (0.24 sec)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
// Test the method directly char[] password1 = "testpassword".toCharArray(); char[] password2 = "testpassword".toCharArray(); char[] password3 = "testpassworX".toCharArray(); Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java
NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2); NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3); // Test equality with same password assertEquals(auth1, auth2); assertEquals(auth1.hashCode(), auth2.hashCode()); // Test inequality with different password
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 23.3K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java
* from memory. * * @return the password as a char array */ public char[] getPasswordAsCharArray() { checkNotClosed(); return this.password != null && this.password.length > 0 ? this.password.clone() : this.password == null ? null : new char[0]; } /** * Securely wipes the password from memory */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 30.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 8.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/login/LoginAction.java
} return redirect(getClass()); } /** * Handles password change for the current user. * * @param form the password form containing new password and confirmation * @return the HTML response after password change attempt */ @Execute public HtmlResponse changePassword(final PasswordForm form) {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 6.8K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0)