- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 383 for passwords (0.83 sec)
-
docs/en/docs/tutorial/extra-models.md
* The **input model** needs to be able to have a password. * The **output model** should not have a password. * The **database model** would probably need to have a hashed password. /// danger Never store user's plaintext passwords. Always store a "secure hash" that you can then verify. If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}. ///
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 7.2K bytes - Viewed (0) -
src/main/java/jcifs/smb/NtlmPasswordAuthentication.java
* @param password the password to authenticate with */ public NtlmPasswordAuthentication(final CIFSContext tc, final String domain, final String username, final String password) { super(domain != null ? domain : tc.getConfig().getDefaultDomain(), username != null ? username : tc.getConfig().getDefaultUsername() != null ? tc.getConfig().getDefaultUsername() : "GUEST",
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/SmbComTreeConnectAndX.java
} else { // plain text password = new byte[(session.auth.password.length() + 1) * 2]; passwordLength = writeString(session.auth.password, password, 0); } } else { // no password in tree connect passwordLength = 1; } dst[dstIndex] = disconnectTid ? (byte) 0x01 : (byte) 0x00;
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 07:14:38 UTC 2025 - 6.6K bytes - Viewed (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java
// Verify it returns a clone, not the original password[0] = 'X'; char[] password2 = authenticator.getPasswordAsCharArray(); assertNotEquals(password[0], password2[0], "Should return a clone, not the original"); } @Test public void testPasswordConstructorWithCharArray() { char[] passwordChars = "charArrayPassword".toCharArray();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 8.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComTreeConnectAndX.java
} else { // plain text this.password = new byte[(pwAuth.getPassword().length() + 1) * 2]; this.passwordLength = writeString(pwAuth.getPassword(), this.password, 0); } } else { // no password in tree connect this.passwordLength = 1; }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 7.1K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java
throw new RuntimeException("Plain text passwords are disabled"); } else { // plain text final String password = a.getPassword(); this.lmHash = new byte[(password.length() + 1) * 2]; this.ntHash = new byte[0]; writeString(password, this.lmHash, 0); } }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.9K bytes - Viewed (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 16K bytes - Viewed (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // Given
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.3K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/en/docs/tutorial/sql-databases.md
/// tip This is how you would handle **passwords**. Receive them, but don't return them in the API. You would also **hash** the values of the passwords before storing them, **never store them in plain text**. /// The fields of `HeroCreate` are: * `name` * `age` * `secret_name`
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 15.4K bytes - Viewed (0)