Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 385 for password2 (0.04 sec)

  1. src/test/java/org/codelibs/fess/util/ParameterUtilTest.java

            assertTrue("Result should contain password={cipher}, but was: " + result, result.contains("password={cipher}"));
    
            // Test with empty encryption target
            value = "password=";
            result = ParameterUtil.encrypt(value);
            assertTrue(result.contains("password={cipher}"));
    
            // Test with only whitespace value
            value = "password=   ";
            result = ParameterUtil.encrypt(value);
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Sat Jul 12 07:34:10 UTC 2025
    - 22.6K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb1/dcerpc/msrpc/srvsvc.java

             */
            public int current_uses;
            /**
             * The local path of the share.
             */
            public String path;
            /**
             * The share password (if any).
             */
            public String password;
            /**
             * The size of the security descriptor.
             */
            public int sd_size;
            /**
             * The security descriptor bytes.
             */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.3K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/security/first-steps.md

    Betrachten wir es also aus dieser vereinfachten Sicht:
    
    * Der Benutzer gibt den `username` und das `password` im Frontend ein und drückt `Enter`.
    * Das Frontend (das im Browser des Benutzers läuft) sendet diesen `username` und das `password` an eine bestimmte URL in unserer API (deklariert mit `tokenUrl="token"`).
    * Die API überprüft den `username` und das `password` und antwortet mit einem „Token“ (wir haben davon noch nichts implementiert).
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 9.2K bytes
    - Viewed (0)
  4. src/main/java/jcifs/util/SecureCredentialStorage.java

                throw new IllegalArgumentException("Master password cannot be null or empty");
            }
    
            // Generate salt for key derivation
            this.salt = new byte[SALT_SIZE];
            secureRandom.nextBytes(this.salt);
    
            // Derive master key from password
            this.masterKey = deriveKey(masterPassword, salt);
    
            // Clear the master password after use
            Arrays.fill(masterPassword, '\0');
        }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  5. docs/de/docs/tutorial/request-forms.md

    Zum Beispiel stellt eine der Möglichkeiten, die OAuth2 Spezifikation zu verwenden (genannt <abbr title='„Passwort-Fluss“'>„password flow“</abbr>), die Bedingung, einen `username` und ein `password` als Formularfelder zu senden.
    
    Die <abbr title="Specification – Spezifikation">Spec</abbr> erfordert, dass die Felder exakt `username` und `password` genannt werden und als Formularfelder, nicht JSON, gesendet werden.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            return ntResponse;
        }
    
        /**
         * Generates the NTOWFv1 hash for the given password.
         *
         * @param password the password to hash
         * @return the NTOWFv1 hash bytes
         */
        public static byte[] nTOWFv1(final String password) {
            if (password == null) {
                throw new RuntimeException("Password parameter is required");
            }
            try {
                final MD4 md4 = new MD4();
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  7. src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java

                            throw new RuntimeException("Plain text passwords are disabled");
                        } else {
                            // plain text
                            final String password = a.getPassword();
                            this.lmHash = new byte[(password.length() + 1) * 2];
                            this.ntHash = new byte[0];
                            writeString(password, this.lmHash, 0);
                        }
                    }
    
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 8.9K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/response-model.md

    Now, whenever a browser is creating a user with a password, the API will return the same password in the response.
    
    In this case, it might not be a problem, because it's the same user sending the password.
    
    But if we use the same model for another *path operation*, we could be sending our user's passwords to every client.
    
    /// danger
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 16K bytes
    - Viewed (0)
  9. src/test/java/jcifs/ntlmssp/Type3MessageTest.java

            Type3Message type3 =
                    new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0);
    
            // Then
            assertEquals(mixedCaseDomain, type3.getDomain());
            assertEquals(mixedCaseUser, type3.getUser());
        }
    
        @Test
        @DisplayName("Should handle long passwords")
        void testLongPasswords() throws Exception {
            // Given
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 17.3K bytes
    - Viewed (0)
  10. docs/en/docs/how-to/conditional-openapi.md

    * Make sure you have well defined Pydantic models for your request bodies and responses.
    * Configure any required permissions and roles using dependencies.
    * Never store plaintext passwords, only password hashes.
    * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc.
    * Add more granular permission controls with OAuth2 scopes where needed.
    * ...etc.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.4K bytes
    - Viewed (0)
Back to top