Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 251 for password (0.05 sec)

  1. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

            // Test the method directly
            char[] password1 = "testpassword".toCharArray();
            char[] password2 = "testpassword".toCharArray();
            char[] password3 = "testpassworX".toCharArray();
    
            Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2);
            Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  2. src/test/java/jcifs/smb/NtlmUtilTest.java

            byte[] actual = NtlmUtil.getNTHash(password);
    
            // Assert
            assertArrayEquals(expected, actual, "NT hash must match known test vector");
        }
    
        @Test
        @DisplayName("getNTHash: verify different passwords produce different hashes")
        void testGetNTHash_differentPasswords() {
            // Arrange
            String password1 = "password";
            String password2 = "Password";
    
            // Act
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (1)
  3. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java

            NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2);
            NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3);
    
            // Test equality with same password
            assertEquals(auth1, auth2);
            assertEquals(auth1.hashCode(), auth2.hashCode());
    
            // Test inequality with different password
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 23.3K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java

            // Verify it returns a clone, not the original
            password[0] = 'X';
            char[] password2 = authenticator.getPasswordAsCharArray();
            assertNotEquals(password[0], password2[0], "Should return a clone, not the original");
        }
    
        @Test
        public void testPasswordConstructorWithCharArray() {
            char[] passwordChars = "charArrayPassword".toCharArray();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/extra-models.md

    * The **input model** needs to be able to have a password.
    * The **output model** should not have a password.
    * The **database model** would probably need to have a hashed password.
    
    /// danger
    
    Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
    If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.
    
    ///
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb/NtlmPasswordAuthenticator.java

         * from memory.
         *
         * @return the password as a char array
         */
        public char[] getPasswordAsCharArray() {
            checkNotClosed();
            return this.password != null && this.password.length > 0 ? this.password.clone() : this.password == null ? null : new char[0];
        }
    
        /**
         * Securely wipes the password from memory
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 30.3K bytes
    - Viewed (0)
  7. docs/de/docs/advanced/security/http-basic-auth.md

    Um dies zu lösen, konvertieren wir zunächst den `username` und das `password` in UTF-8-codierte `bytes`.
    
    Dann können wir `secrets.compare_digest()` verwenden, um sicherzustellen, dass `credentials.username` `"stanleyjobson"` und `credentials.password` `"swordfish"` ist.
    
    {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *}
    
    Dies wäre das gleiche wie:
    
    ```Python
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Oct 27 15:25:54 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  8. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/PasswordBasedExtractor.java

            super();
        }
    
        /**
         * Adds a password for files matching the given regular expression pattern.
         * @param regex the regular expression pattern to match against URLs or resource names
         * @param password the password to use for matching files
         */
        public void addPassword(final String regex, final String password) {
            passwordMap.put(Pattern.compile(regex), password);
        }
    
        /**
    Registered: Sun Sep 21 03:50:09 UTC 2025
    - Last Modified: Thu Aug 07 02:55:08 UTC 2025
    - 5.1K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb1/smb1/SmbComTreeConnectAndX.java

                } else {
                    // plain text
                    password = new byte[(session.auth.password.length() + 1) * 2];
                    passwordLength = writeString(session.auth.password, password, 0);
                }
            } else {
                // no password in tree connect
                passwordLength = 1;
            }
    
            dst[dstIndex] = disconnectTid ? (byte) 0x01 : (byte) 0x00;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 6.6K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/simple-oauth2.md

    If the passwords don't match, we return the same error.
    
    #### Password hashing { #password-hashing }
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
Back to top