- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 390 for pass_word (0.05 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/test/java/org/codelibs/fess/helper/SystemHelperTest.java
assertEquals("errors.password_no_lowercase", systemHelper.validatePassword("PASSWORD1!")); assertEquals("errors.password_no_digit", systemHelper.validatePassword("Password!")); assertEquals("errors.password_no_special_char", systemHelper.validatePassword("Password1")); assertEquals("", systemHelper.validatePassword("Password1!"));
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Sat Mar 28 06:59:19 GMT 2026 - 44.4K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
byte[] actual = NtlmUtil.getNTHash(password); // Assert assertArrayEquals(expected, actual, "NT hash must match known test vector"); } @Test @DisplayName("getNTHash: verify different passwords produce different hashes") void testGetNTHash_differentPasswords() { // Arrange String password1 = "password"; String password2 = "Password"; // Act
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12K bytes - Click Count (1) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTest.java
NtlmPasswordAuthenticator auth2 = new NtlmPasswordAuthenticator("DOMAIN", "user", password2); NtlmPasswordAuthenticator auth3 = new NtlmPasswordAuthenticator("DOMAIN", "user", password3); // Test equality with same password assertEquals(auth1, auth2); assertEquals(auth1.hashCode(), auth2.hashCode()); // Test inequality with different password
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 23.3K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 8.5K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso). Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords { #password-hashing } "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 10.2K bytes - Click Count (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
# Einfaches OAuth2 mit Password und Bearer { #simple-oauth2-with-password-and-bearer } Lassen Sie uns nun auf dem vorherigen Kapitel aufbauen und die fehlenden Teile hinzufügen, um einen vollständigen Sicherheits-Flow zu erhalten. ## `username` und `password` entgegennehmen { #get-the-username-and-password } Wir werden **FastAPIs** Sicherheits-Werkzeuge verwenden, um den `username` und das `password` entgegenzunehmen.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 11.1K bytes - Click Count (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
If the passwords don't match, we return the same error. #### Password hashing { #password-hashing } "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 9.4K bytes - Click Count (0) -
docs/de/docs/tutorial/extra-models.md
```Python UserInDB( username="john", password="secret", email="******@****.***", full_name=None, ) ``` Oder genauer gesagt, dazu, `user_dict` direkt zu verwenden, mit welchen Inhalten es auch immer in der Zukunft haben mag: ```Python UserInDB( username = user_dict["username"], password = user_dict["password"], email = user_dict["email"],Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 7.7K bytes - Click Count (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java
server = server.clone(); String password = server.getPassword(); if (securityDispatcher.isAnyEncryptedString(password)) { try { if (securityDispatcher.isLegacyEncryptedString(password)) { problems.add(new DefaultSettingsProblem( "Pre-Maven 4 legacy encrypted password detected for server " + server.getId()
Created: Sun Apr 05 03:35:12 GMT 2026 - Last Modified: Sat Nov 16 13:55:43 GMT 2024 - 6K bytes - Click Count (0)