- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 590 for password2 (0.5 sec)
-
src/main/java/jcifs/smb1/smb1/SmbComSessionSetupAndX.java
throw new RuntimeException("Plain text passwords are disabled"); } else if (useUnicode) { // plain text final String password = auth.getPassword(); lmHash = new byte[0]; ntHash = new byte[(password.length() + 1) * 2]; writeString(password, ntHash, 0); } else { // plain text
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 7.1K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 20 15:55:38 UTC 2025 - 6.9K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // GivenRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/srvsvc.java
*/ public int current_uses; /** * The local path of the share. */ public String path; /** * The share password (if any). */ public String password; /** * The size of the security descriptor. */ public int sd_size; /** * The security descriptor bytes. */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.3K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/ServerData.java
/** * Security mode flags. */ public int securityMode; /** * Security settings for the session. */ public int security; /** * Whether the server requires encrypted passwords. */ public boolean encryptedPasswords; /** * Whether message signing is enabled. */ public boolean signaturesEnabled; /** * Whether message signing is required. */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 2.9K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java
throw new RuntimeException("Plain text passwords are disabled"); } else { // plain text final String password = a.getPassword(); this.lmHash = new byte[(password.length() + 1) * 2]; this.ntHash = new byte[0]; writeString(password, this.lmHash, 0); } }
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
* Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like pwdlib and JWT tokens, etc. * Add more granular permission controls with OAuth2 scopes where needed. * ...etc.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Wed Dec 17 20:41:43 UTC 2025 - 2.4K bytes - Viewed (0) -
docs/de/docs/tutorial/security/first-steps.md
Und es kann auch von Ihnen selbst verwendet werden, um dieselbe Anwendung zu debuggen, zu prüfen und zu testen. ## Der `password`-Flow { #the-password-flow } Lassen Sie uns nun etwas zurückgehen und verstehen, was das alles ist. Der `password`-„Flow“ ist eine der in OAuth2 definierten Wege („Flows“) zur Handhabung von Sicherheit und Authentifizierung.Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Sep 20 15:10:09 UTC 2025 - 9.9K bytes - Viewed (0)