- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 598 for password (0.06 sec)
-
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
// Test the method directly char[] password1 = "testpassword".toCharArray(); char[] password2 = "testpassword".toCharArray(); char[] password3 = "testpassworX".toCharArray(); Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2); Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);Registered: 2025-12-20 13:44 - Last Modified: 2025-08-31 08:00 - 11.2K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Registered: 2025-12-20 13:44 - Last Modified: 2025-08-30 05:58 - 12K bytes - Viewed (1) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java
NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2); NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3); // Test equality with same password assertEquals(auth1, auth2); assertEquals(auth1.hashCode(), auth2.hashCode()); // Test inequality with different password
Registered: 2025-12-20 13:44 - Last Modified: 2025-08-30 05:58 - 23.3K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();Registered: 2025-12-20 13:44 - Last Modified: 2025-08-30 05:58 - 8.5K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
# Einfaches OAuth2 mit Password und Bearer { #simple-oauth2-with-password-and-bearer } Lassen Sie uns nun auf dem vorherigen Kapitel aufbauen und die fehlenden Teile hinzufügen, um einen vollständigen Sicherheits-Flow zu erhalten. ## `username` und `password` entgegennehmen { #get-the-username-and-password } Wir werden **FastAPIs** Sicherheits-Werkzeuge verwenden, um den `username` und das `password` entgegenzunehmen.Registered: 2025-12-28 07:19 - Last Modified: 2025-09-20 15:10 - 11.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Registered: 2025-12-28 07:19 - Last Modified: 2025-08-31 09:15 - 9.4K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso). Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords { #password-hashing } "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.Registered: 2025-12-28 07:19 - Last Modified: 2025-12-16 16:33 - 10.3K bytes - Viewed (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java
server = server.clone(); String password = server.getPassword(); if (securityDispatcher.isAnyEncryptedString(password)) { try { if (securityDispatcher.isLegacyEncryptedString(password)) { problems.add(new DefaultSettingsProblem( "Pre-Maven 4 legacy encrypted password detected for server " + server.getId()
Registered: 2025-12-28 03:35 - Last Modified: 2024-11-16 13:55 - 6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();Registered: 2025-12-20 13:44 - Last Modified: 2025-08-16 01:32 - 26.7K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }Registered: 2025-12-28 07:19 - Last Modified: 2025-09-29 02:57 - 10.6K bytes - Viewed (0)