- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 364 for Bcrypt (0.03 sec)
-
src/main/java/jcifs/util/Crypto.java
import java.security.InvalidKeyException; import java.security.MessageDigest; import java.security.NoSuchAlgorithmException; import java.security.Provider; import javax.crypto.Cipher; import javax.crypto.NoSuchPaddingException; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.jce.provider.BouncyCastleProvider; import jcifs.CIFSUnsupportedCryptoException; /**
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.7K bytes - Viewed (0) -
src/main/java/org/codelibs/core/crypto/CachedCipher.java
*/ package org.codelibs.core.crypto; import java.io.UnsupportedEncodingException; import java.security.InvalidKeyException; import java.security.Key; import java.security.NoSuchAlgorithmException; import java.util.Queue; import java.util.concurrent.ConcurrentLinkedQueue; import javax.crypto.BadPaddingException; import javax.crypto.Cipher; import javax.crypto.IllegalBlockSizeException;
Registered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 15.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2EncryptionContext.java
import java.util.concurrent.atomic.AtomicLong; import javax.crypto.Cipher; import javax.crypto.spec.GCMParameterSpec; import javax.crypto.spec.SecretKeySpec; import org.bouncycastle.crypto.engines.AESEngine; import org.bouncycastle.crypto.modes.AEADBlockCipher; import org.bouncycastle.crypto.modes.CCMBlockCipher; import org.bouncycastle.crypto.params.AEADParameters; import org.bouncycastle.crypto.params.KeyParameter; import org.slf4j.Logger;
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 35.5K bytes - Viewed (0) -
src/test/java/org/codelibs/core/crypto/CachedCipherTest.java
// Encrypt with new method, decrypt with old method @SuppressWarnings("deprecation") final String encrypted1 = cipher.encryptText(original); @SuppressWarnings("deprecation") final String decrypted1 = cipher.decryptoText(encrypted1); assertThat(decrypted1, is(original)); // Encrypt with old method, decrypt with new methodRegistered: Sat Dec 20 08:55:33 UTC 2025 - Last Modified: Sat Nov 22 11:21:59 UTC 2025 - 5.3K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmContext.java
this.sealClientKey = deriveKey(mk, C2S_SEAL_CONSTANT); this.sealClientHandle = Crypto.getArcfour(this.sealClientKey); if (log.isDebugEnabled()) { log.debug("Seal key is " + Hexdump.toHexString(this.sealClientKey)); } this.sealServerKey = deriveKey(mk, S2C_SEAL_CONSTANT); this.sealServerHandle = Crypto.getArcfour(this.sealServerKey); if (log.isDebugEnabled()) {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 17.3K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/util/ParameterUtil.java
protected static final String META_PREFIX = "field.meta."; /** The value field prefix. */ protected static final String VALUE_PREFIX = "field.value."; /** The script field prefix. */ protected static final String SCRIPT_PREFIX = "field.script."; /** The client prefix. */ protected static final String CLIENT_PREFIX = "client."; /** The config prefix. */Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 7.5K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
import java.security.SecureRandom; import java.security.spec.KeySpec; import java.util.Arrays; import java.util.Base64; import javax.crypto.Cipher; import javax.crypto.SecretKey; import javax.crypto.SecretKeyFactory; import javax.crypto.spec.GCMParameterSpec; import javax.crypto.spec.PBEKeySpec; import javax.crypto.spec.SecretKeySpec; import javax.security.auth.DestroyFailedException; import javax.security.auth.Destroyable;
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/util/DES.java
} /// Encrypt a block of bytes. /** * Encrypts an 8-byte block using DES * @param clearText the 8-byte plaintext block * @param cipherText the output 8-byte ciphertext block */ public void encrypt(final byte[] clearText, final byte[] cipherText) { encrypt(clearText, 0, cipherText, 0); } /// Decrypt a block of bytes. /**Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 22.7K bytes - Viewed (0) -
docs/en/docs/deployment/https.md
* Nginx * HAProxy ## Let's Encrypt { #lets-encrypt } Before Let's Encrypt, these **HTTPS certificates** were sold by trusted third parties. The process to acquire one of these certificates used to be cumbersome, require quite some paperwork and the certificates were quite expensive. But then **<a href="https://letsencrypt.org/" class="external-link" target="_blank">Let's Encrypt</a>** was created.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java
null)); } server.setPassword(securityDispatcher.decrypt(password)); } catch (SecDispatcherException | IOException e) { problems.add(new DefaultSettingsProblem( "Failed to decrypt password for server " + server.getId() + ": " + e.getMessage(), Severity.ERROR,Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Sat Nov 16 13:55:43 UTC 2024 - 6K bytes - Viewed (0)