Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 598 for password (0.19 sec)

  1. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

            // Test the method directly
            char[] password1 = "testpassword".toCharArray();
            char[] password2 = "testpassword".toCharArray();
            char[] password3 = "testpassworX".toCharArray();
    
            Boolean result1 = (Boolean) constantTimeMethod.invoke(null, password1, password2);
            Boolean result2 = (Boolean) constantTimeMethod.invoke(null, password1, password3);
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  2. src/test/java/jcifs/smb/NtlmUtilTest.java

            byte[] actual = NtlmUtil.getNTHash(password);
    
            // Assert
            assertArrayEquals(expected, actual, "NT hash must match known test vector");
        }
    
        @Test
        @DisplayName("getNTHash: verify different passwords produce different hashes")
        void testGetNTHash_differentPasswords() {
            // Arrange
            String password1 = "password";
            String password2 = "Password";
    
            // Act
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (1)
  3. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java

            NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2);
            NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3);
    
            // Test equality with same password
            assertEquals(auth1, auth2);
            assertEquals(auth1.hashCode(), auth2.hashCode());
    
            // Test inequality with different password
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 23.3K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java

            // Verify it returns a clone, not the original
            password[0] = 'X';
            char[] password2 = authenticator.getPasswordAsCharArray();
            assertNotEquals(password[0], password2[0], "Should return a clone, not the original");
        }
    
        @Test
        public void testPasswordConstructorWithCharArray() {
            char[] passwordChars = "charArrayPassword".toCharArray();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  5. docs/de/docs/tutorial/security/simple-oauth2.md

    # Einfaches OAuth2 mit Password und Bearer { #simple-oauth2-with-password-and-bearer }
    
    Lassen Sie uns nun auf dem vorherigen Kapitel aufbauen und die fehlenden Teile hinzufügen, um einen vollständigen Sicherheits-Flow zu erhalten.
    
    ## `username` und `password` entgegennehmen { #get-the-username-and-password }
    
    Wir werden **FastAPIs** Sicherheits-Werkzeuge verwenden, um den `username` und das `password` entgegenzunehmen.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Sep 20 15:10:09 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/simple-oauth2.md

    If the passwords don't match, we return the same error.
    
    #### Password hashing { #password-hashing }
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  7. docs/es/docs/tutorial/security/simple-oauth2.md

    Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso).
    
    Si los passwords no coinciden, devolvemos el mismo error.
    
    #### Hashing de passwords { #password-hashing }
    
    "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 10.3K bytes
    - Viewed (0)
  8. compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java

                server = server.clone();
    
                String password = server.getPassword();
                if (securityDispatcher.isAnyEncryptedString(password)) {
                    try {
                        if (securityDispatcher.isLegacyEncryptedString(password)) {
                            problems.add(new DefaultSettingsProblem(
                                    "Pre-Maven 4 legacy encrypted password detected for server " + server.getId()
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Sat Nov 16 13:55:43 UTC 2024
    - 6K bytes
    - Viewed (0)
  9. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            return ntResponse;
        }
    
        /**
         * Generates the NTOWFv1 hash for the given password.
         *
         * @param password the password to hash
         * @return the NTOWFv1 hash bytes
         */
        public static byte[] nTOWFv1(final String password) {
            if (password == null) {
                throw new RuntimeException("Password parameter is required");
            }
            try {
                final MD4 md4 = new MD4();
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 10.6K bytes
    - Viewed (0)
Back to top