- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 385 for password2 (0.06 sec)
-
src/test/java/org/codelibs/fess/util/ParameterUtilTest.java
assertTrue("Result should contain password={cipher}, but was: " + result, result.contains("password={cipher}")); // Test with empty encryption target value = "password="; result = ParameterUtil.encrypt(value); assertTrue(result.contains("password={cipher}")); // Test with only whitespace value value = "password= "; result = ParameterUtil.encrypt(value);
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 12 07:34:10 UTC 2025 - 22.6K bytes - Viewed (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/srvsvc.java
*/ public int current_uses; /** * The local path of the share. */ public String path; /** * The share password (if any). */ public String password; /** * The size of the security descriptor. */ public int sd_size; /** * The security descriptor bytes. */
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.3K bytes - Viewed (0) -
docs/de/docs/tutorial/security/first-steps.md
Betrachten wir es also aus dieser vereinfachten Sicht: * Der Benutzer gibt den `username` und das `password` im Frontend ein und drückt `Enter`. * Das Frontend (das im Browser des Benutzers läuft) sendet diesen `username` und das `password` an eine bestimmte URL in unserer API (deklariert mit `tokenUrl="token"`). * Die API überprüft den `username` und das `password` und antwortet mit einem „Token“ (wir haben davon noch nichts implementiert).
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 9.2K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
docs/de/docs/tutorial/request-forms.md
Zum Beispiel stellt eine der Möglichkeiten, die OAuth2 Spezifikation zu verwenden (genannt <abbr title='„Passwort-Fluss“'>„password flow“</abbr>), die Bedingung, einen `username` und ein `password` als Formularfelder zu senden. Die <abbr title="Specification – Spezifikation">Spec</abbr> erfordert, dass die Felder exakt `username` und `password` genannt werden und als Formularfelder, nicht JSON, gesendet werden.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 2.9K bytes - Viewed (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 26.7K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java
throw new RuntimeException("Plain text passwords are disabled"); } else { // plain text final String password = a.getPassword(); this.lmHash = new byte[(password.length() + 1) * 2]; this.ntHash = new byte[0]; writeString(password, this.lmHash, 0); } }
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.9K bytes - Viewed (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 16K bytes - Viewed (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // Given
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 17.3K bytes - Viewed (0) -
docs/en/docs/how-to/conditional-openapi.md
* Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc. * Add more granular permission controls with OAuth2 scopes where needed. * ...etc.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 2.4K bytes - Viewed (0)