- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 410 for Password (0.05 sec)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
// Test the method directly char[] password1 = "testpassword".toCharArray(); char[] password2 = "testpassword".toCharArray(); char[] password3 = "testpassworX".toCharArray(); Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 11.2K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java
NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2); NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3); // Test equality with same password assertEquals(auth1, auth2); assertEquals(auth1.hashCode(), auth2.hashCode()); // Test inequality with different password
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 23.3K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.2K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java
* from memory. * * @return the password as a char array */ public char[] getPasswordAsCharArray() { checkNotClosed(); return this.password != null && this.password.length > 0 ? this.password.clone() : this.password == null ? null : new char[0]; } /** * Securely wipes the password from memory */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 30.3K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 9.4K bytes - Viewed (0) -
docs/de/docs/advanced/security/http-basic-auth.md
Um dies zu lösen, konvertieren wir zunächst den `username` und das `password` in UTF-8-codierte `bytes`. Dann können wir `secrets.compare_digest()` verwenden, um sicherzustellen, dass `credentials.username` `"stanleyjobson"` und `credentials.password` `"swordfish"` ist. {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *} Dies wäre das gleiche wie: ```Python
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Oct 27 15:25:54 UTC 2024 - 5.8K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 8.5K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías. Siempre que pases exactamente el mismo contenido (exactamente el mismo password) obtienes exactamente el mismo galimatías.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/login/LoginAction.java
} return redirect(getClass()); } /** * Handles password change for the current user. * * @param form the password form containing new password and confirmation * @return the HTML response after password change attempt */ @Execute public HtmlResponse changePassword(final PasswordForm form) {
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 6.8K bytes - Viewed (0)