- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 387 for securely (0.06 seconds)
-
src/main/java/jcifs/util/SecureKeyManager.java
*/ package jcifs.util; import java.security.GeneralSecurityException; import java.security.KeyStore; import java.security.SecureRandom; import java.util.Arrays; import java.util.HashMap; import java.util.Map; import java.util.concurrent.ConcurrentHashMap; import javax.crypto.SecretKey; import javax.crypto.spec.SecretKeySpec; import javax.security.auth.DestroyFailedException;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 21.5K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
public void secureWipeKeys() { if (this.encryptionKey != null) { // Multi-pass secure wipe for enhanced security SecureKeyManager.secureWipe(this.encryptionKey); this.encryptionKey = null; } if (this.decryptionKey != null) { // Multi-pass secure wipe for enhanced security SecureKeyManager.secureWipe(this.decryptionKey); this.decryptionKey = null;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 35.5K bytes - Click Count (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.SecretKeySpec; import javax.security.auth.DestroyFailedException; import javax.security.auth.Destroyable; import org.slf4j.Logger; import org.slf4j.LoggerFactory; /** * Secure credential storage with encryption at rest. * * Provides secure storage of passwords and other sensitive credentials * using AES-GCM encryption with PBKDF2 key derivation. *
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
android/guava/src/com/google/common/io/TempFileCreator.java
private static final String MESSAGE = "Guava cannot securely create temporary files or directories under SDK versions before" + " Jelly Bean. You can create one yourself, either in the insecure default directory" + " or in a more secure directory, such as context.getCacheDir(). For more information," + " see the Javadoc for Files.createTempDir().";Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Mon Sep 29 18:50:14 GMT 2025 - 11.8K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2SigningDigest.java
* License along with this library; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ package jcifs.internal.smb2; import java.security.GeneralSecurityException; import java.security.MessageDigest; import java.util.concurrent.locks.ReentrantLock; import javax.crypto.Mac; import javax.crypto.spec.SecretKeySpec; import org.slf4j.Logger; import org.slf4j.LoggerFactory;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 9.9K bytes - Click Count (0) -
src/test/java/jcifs/internal/smb2/Smb2EncryptionContextTest.java
// Then assertNotNull(nonce1, "First secure nonce should not be null"); assertNotNull(nonce2, "Second secure nonce should not be null"); assertFalse(Arrays.equals(nonce1, nonce2), "Secure nonces should be different"); assertTrue(nonce1.length > 0, "Secure nonce should have proper length"); } @Test @DisplayName("Should handle concurrent secure nonce generation safely")Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 44.1K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
} } finally { correctAuth.close(); wrongAuth.close(); } } /** * Test that null and empty password comparisons are handled securely. */ @Test public void testNullAndEmptyPasswordSecurity() { NtlmPasswordAuthenticator auth1 = new NtlmPasswordAuthenticator("domain", "user", (String) null);Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
src/main/java/jcifs/smb/NtlmContext.java
* Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ package jcifs.smb; import java.nio.charset.StandardCharsets; import java.security.GeneralSecurityException; import java.security.MessageDigest; import java.util.concurrent.atomic.AtomicInteger; import javax.crypto.Cipher; import org.bouncycastle.asn1.ASN1ObjectIdentifier; import org.bouncycastle.util.Arrays;
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 17.3K bytes - Click Count (1) -
src/main/java/org/codelibs/core/crypto/CachedCipher.java
* </ul> * <p> * <strong>Security Considerations:</strong> * </p> * <ul> * <li>Default Blowfish algorithm is suitable for general-purpose encryption</li> * <li>For high-security applications, consider using AES with GCM mode via {@link #setAlgorithm(String)} and {@link #setTransformation(String)}</li> * <li>Ensure keys are securely generated and stored</li>
Created: Sat Dec 20 08:55:33 GMT 2025 - Last Modified: Sat Nov 22 11:21:59 GMT 2025 - 15.9K bytes - Click Count (0) -
docs/en/docs/deployment/https.md
The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates. The idea is to automate the acquisition and renewal of these certificates so that you can have **secure HTTPS, for free, forever**.
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 19:34:08 GMT 2025 - 14.3K bytes - Click Count (0)