- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 56 for encrypted (2.57 sec)
-
src/main/java/org/codelibs/fess/app/web/base/login/FessLoginAssist.java
} } /** * Finds a login user by username and encrypted password. * * @param username the username to search for * @param cipheredPassword the encrypted password to match * @return an optional entity containing the found user, or empty if not found */Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 12.1K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/util/ParameterUtil.java
} } } } return paramMap; } /** * Encrypts sensitive parameter values. * * @param value the parameter string * @return the encrypted parameter string */ public static String encrypt(final String value) { final StringBuilder buf = new StringBuilder();Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 7.5K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/service/WebConfigService.java
} /** * Stores a web configuration. * Configuration parameters are encrypted before storage. * * @param webConfig The web configuration to store */ public void store(final WebConfig webConfig) { webConfig.setConfigParameter(ParameterUtil.encrypt(webConfig.getConfigParameter())); webConfigBhv.insertOrUpdate(webConfig, op -> {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 6.6K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/service/FileAuthenticationService.java
/** * Stores a file authentication configuration. * The parameters are encrypted before storage for security. * * @param fileAuthentication the file authentication configuration to store */ public void store(final FileAuthentication fileAuthentication) { fileAuthentication.setParameters(ParameterUtil.encrypt(fileAuthentication.getParameters()));Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 5.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/ntlmssp/NtlmFlags.java
* should carry a digital signature (message integrity). */ int NTLMSSP_NEGOTIATE_SIGN = 0x00000010; /** * Specifies that communication across the authenticated channel * should be encrypted (message confidentiality). */ int NTLMSSP_NEGOTIATE_SEAL = 0x00000020; /** * Indicates datagram authentication. */ int NTLMSSP_NEGOTIATE_DATAGRAM_STYLE = 0x00000040; /**
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.1K bytes - Viewed (0) -
src/main/java/jcifs/ntlmssp/NtlmFlags.java
* should carry a digital signature (message integrity). */ int NTLMSSP_NEGOTIATE_SIGN = 0x00000010; /** * Specifies that communication across the authenticated channel * should be encrypted (message confidentiality). */ int NTLMSSP_NEGOTIATE_SEAL = 0x00000020; /** * Indicates datagram authentication. */ int NTLMSSP_NEGOTIATE_DATAGRAM_STYLE = 0x00000040; /**
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 5.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComTreeConnectAndX.java
} else if (this.server.encryptedPasswords) { // encrypted try { this.password = pwAuth.getAnsiHash(this.ctx, this.server.encryptionKey); } catch (final GeneralSecurityException e) { throw new RuntimeCIFSException("Failed to encrypt password", e); } this.passwordLength = this.password.length;
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/ntlmssp/Type3Message.java
* The real session key if the regular session key is actually * the encrypted version used for key exchange. * * @return A <code>byte[]</code> containing the session key. */ public byte[] getMasterKey() { return this.masterKey; } /** * Returns the session key. * * This is the encrypted session key included in the message,Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 32.7K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbComTreeConnectAndX.java
if (session.transport.server.security == SECURITY_SHARE && (session.auth.hashesExternal || session.auth.password.length() > 0)) { if (session.transport.server.encryptedPasswords) { // encrypted password = session.auth.getAnsiHash(session.transport.server.encryptionKey); passwordLength = password.length; } else if (DISABLE_PLAIN_TEXT_PASSWORDS) {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 6.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/http/NtlmHttpFilter.java
import jcifs.smb1.util.LogStream; /** * This servlet Filter can be used to negotiate password hashes with * MSIE clients using NTLM SSP. This is similar to {@code Authentication: * BASIC} but weakly encrypted and without requiring the user to re-supply * authentication credentials. * <p> * Read <a href="../../../ntlmhttpauth.html">jCIFS NTLM HTTP Authentication and the Network Explorer Servlet</a> for complete details. */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 11.3K bytes - Viewed (0)