- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 578 for Passwort (0.06 sec)
-
fess-crawler/src/test/java/org/codelibs/fess/crawler/client/ftp/FtpClientTest.java
try { String username = "testuser"; String password = "testpass"; server = startFtpServer(FTP_PORT, username, password); Map<String, Object> params = new HashMap<String, Object>(); FtpAuthentication auth = new FtpAuthentication(); auth.setUsername(username); auth.setPassword(password);Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Mon Nov 24 03:59:47 UTC 2025 - 21.5K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmUtilTest.java
} return out; } @Test @DisplayName("getNTHash: known vector for 'password'") void testGetNTHash_knownVector() { // Arrange String password = "password"; // Known NT hash for "password" (UTF-16LE MD4) // This is a well-known test vector: password -> 8846F7EAEE8FB117AD06BDD830B7586C byte[] expected = hex("8846F7EAEE8FB117AD06BDD830B7586C"); // ActRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12K bytes - Viewed (1) -
src/main/java/org/codelibs/fess/auth/chain/AuthenticationChain.java
*/ void delete(User user); /** * Changes the password for the specified user. * @param username The username for which to change the password. * @param password The new password. * @return True if the password was successfully changed, false otherwise. */ boolean changePassword(String username, String password); /** * Loads user information from the authentication chain.Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 1.7K bytes - Viewed (0) -
compat/maven-artifact/src/main/java/org/apache/maven/artifact/repository/Authentication.java
*/ public String getPassword() { return password; } /** * Set the user's password which is used when connecting to the repository. * * @param password password of the user */ public void setPassword(String password) { this.password = password; } /** * Get the username used to access the repository. *Registered: Sun Dec 28 03:35:09 UTC 2025 - Last Modified: Fri Oct 25 12:31:46 UTC 2024 - 3.1K bytes - Viewed (0) -
tests/test_security_oauth2.py
"msg": "String should match pattern '^password$'", "input": grant_type, "ctx": {"pattern": "^password$"}, } ] } def test_strict_login_correct_grant_type(): response = client.post( "/login", data={"username": "johndoe", "password": "secret", "grant_type": "password"}, ) assert response.status_code == 200
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 18:19:10 UTC 2025 - 9K bytes - Viewed (0) -
tests/test_security_oauth2_optional_description.py
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 27 18:19:10 UTC 2025 - 9.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// ## Password hashing { #password-hashing } "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish. Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish. But you cannot convert from the gibberish back to the password. ### Why use password hashing { #why-use-password-hashing }Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Mon Sep 29 02:57:38 UTC 2025 - 10.6K bytes - Viewed (0) -
fess-crawler/src/test/java/org/codelibs/fess/crawler/extractor/impl/PdfExtractorTest.java
params.put(ExtractData.RESOURCE_NAME_KEY, resourceName); assertEquals("PASSWORD", pdfExtractor.getPassword(params)); } public void test_getPassword_json() { String url; Map<String, String> params = new HashMap<>(); params.put(ExtractData.FILE_PASSWORDS, "{\".*hoge1.pdf\":\"password\",\"fuga.pdf\":\"PASSWORD\"}"); url = null; params.put(ExtractData.URL, url);
Registered: Sat Dec 20 11:21:39 UTC 2025 - Last Modified: Sat Mar 15 06:52:00 UTC 2025 - 7.6K bytes - Viewed (0) -
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sat Dec 20 15:55:38 UTC 2025 - 6.9K bytes - Viewed (0) -
docs/en/docs/advanced/security/http-basic-auth.md
If it doesn't receive it, it returns an HTTP 401 "Unauthorized" error. And returns a header `WWW-Authenticate` with a value of `Basic`, and an optional `realm` parameter. That tells the browser to show the integrated prompt for a username and password. Then, when you type that username and password, the browser sends them in the header automatically.
Registered: Sun Dec 28 07:19:09 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 5K bytes - Viewed (0)