Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 383 for passwords (0.78 sec)

  1. docs/en/docs/tutorial/extra-models.md

    * The **input model** needs to be able to have a password.
    * The **output model** should not have a password.
    * The **database model** would probably need to have a hashed password.
    
    /// danger
    
    Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
    If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.
    
    ///
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb/NtlmPasswordAuthentication.java

         * @param password the password to authenticate with
         */
        public NtlmPasswordAuthentication(final CIFSContext tc, final String domain, final String username, final String password) {
            super(domain != null ? domain : tc.getConfig().getDefaultDomain(),
                    username != null ? username : tc.getConfig().getDefaultUsername() != null ? tc.getConfig().getDefaultUsername() : "GUEST",
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  3. src/main/java/jcifs/smb1/smb1/SmbComTreeConnectAndX.java

                } else {
                    // plain text
                    password = new byte[(session.auth.password.length() + 1) * 2];
                    passwordLength = writeString(session.auth.password, password, 0);
                }
            } else {
                // no password in tree connect
                passwordLength = 1;
            }
    
            dst[dstIndex] = disconnectTid ? (byte) 0x01 : (byte) 0x00;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 07:14:38 UTC 2025
    - 6.6K bytes
    - Viewed (0)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java

            // Verify it returns a clone, not the original
            password[0] = 'X';
            char[] password2 = authenticator.getPasswordAsCharArray();
            assertNotEquals(password[0], password2[0], "Should return a clone, not the original");
        }
    
        @Test
        public void testPasswordConstructorWithCharArray() {
            char[] passwordChars = "charArrayPassword".toCharArray();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 8.5K bytes
    - Viewed (0)
  5. src/main/java/jcifs/internal/smb1/com/SmbComTreeConnectAndX.java

                } else {
                    // plain text
                    this.password = new byte[(pwAuth.getPassword().length() + 1) * 2];
                    this.passwordLength = writeString(pwAuth.getPassword(), this.password, 0);
                }
            } else {
                // no password in tree connect
                this.passwordLength = 1;
            }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 7.1K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java

                            throw new RuntimeException("Plain text passwords are disabled");
                        } else {
                            // plain text
                            final String password = a.getPassword();
                            this.lmHash = new byte[(password.length() + 1) * 2];
                            this.ntHash = new byte[0];
                            writeString(password, this.lmHash, 0);
                        }
                    }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.9K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/response-model.md

    Now, whenever a browser is creating a user with a password, the API will return the same password in the response.
    
    In this case, it might not be a problem, because it's the same user sending the password.
    
    But if we use the same model for another *path operation*, we could be sending our user's passwords to every client.
    
    /// danger
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 16K bytes
    - Viewed (0)
  8. src/test/java/jcifs/ntlmssp/Type3MessageTest.java

            Type3Message type3 =
                    new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0);
    
            // Then
            assertEquals(mixedCaseDomain, type3.getDomain());
            assertEquals(mixedCaseUser, type3.getUser());
        }
    
        @Test
        @DisplayName("Should handle long passwords")
        void testLongPasswords() throws Exception {
            // Given
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 17.3K bytes
    - Viewed (0)
  9. src/main/java/jcifs/util/SecureCredentialStorage.java

                throw new IllegalArgumentException("Master password cannot be null or empty");
            }
    
            // Generate salt for key derivation
            this.salt = new byte[SALT_SIZE];
            secureRandom.nextBytes(this.salt);
    
            // Derive master key from password
            this.masterKey = deriveKey(masterPassword, salt);
    
            // Clear the master password after use
            Arrays.fill(masterPassword, '\0');
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/sql-databases.md

    /// tip
    
    This is how you would handle **passwords**. Receive them, but don't return them in the API.
    
    You would also **hash** the values of the passwords before storing them, **never store them in plain text**.
    
    ///
    
    The fields of `HeroCreate` are:
    
    * `name`
    * `age`
    * `secret_name`
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 15.4K bytes
    - Viewed (0)
Back to top