- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 658 for passwords (0.21 seconds)
-
docs/en/docs/tutorial/sql-databases.md
/// tip This is how you would handle **passwords**. Receive them, but don't return them in the API. You would also **hash** the values of the passwords before storing them, **never store them in plain text**. /// The fields of `HeroCreate` are: * `name` * `age` * `secret_name`
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Sat Mar 07 09:29:03 GMT 2026 - 15.3K bytes - Click Count (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // GivenCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 17.3K bytes - Click Count (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 15.5K bytes - Click Count (0) -
TESTING.asciidoc
actual algorithm used, or depend on default values for the test cluster nodes. ==== Password length While using `pbkdf2` as the password hashing algorithm, FIPS 140-2 imposes a requirement that passwords are longer than 14 characters. You can either ensure that all test user passwords in your test are longer than 14 characters and use i.e. `SecurityIntegTestCase#getFastStoredHashAlgoForTests`
Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Mon Jun 07 13:55:20 GMT 2021 - 32.5K bytes - Click Count (0) -
src/main/java/jcifs/audit/SecurityAuditLogger.java
if (!lowerData.contains("password") && !lowerData.contains("secret") && !lowerData.contains("token") && !lowerData.contains("key") && !lowerData.contains("credential") && !lowerData.contains("auth")) { return data; // No sensitive patterns detected, skip regex } } // Mask passwords and secrets using cached pattern
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 26.6K bytes - Click Count (0) -
docs/zh-hant/docs/tutorial/security/oauth2-jwt.md
更多內容可參考 [PyJWT 安裝文件](https://pyjwt.readthedocs.io/en/latest/installation.html)。 /// ## 密碼雜湊 { #password-hashing } 「雜湊」是指把某些內容(此處為密碼)轉換成一串看起來像亂碼的位元組序列(其實就是字串)。 每當你輸入完全相同的內容(完全相同的密碼),就會得到完全相同的亂碼。 但你無法從這串亂碼再反推回原本的密碼。 ### 為什麼要用密碼雜湊 { #why-use-password-hashing } 如果你的資料庫被偷了,竊賊拿到的不是使用者的明文密碼,而只是雜湊值。 因此,竊賊無法直接拿該密碼去嘗試登入其他系統(由於許多使用者在各處都用同一組密碼,這會很危險)。Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/oauth2-jwt.md
可以在 [PyJWT 安装文档](https://pyjwt.readthedocs.io/en/latest/installation.html)中了解更多。 /// ## 密码哈希 { #password-hashing } “哈希”是指把一些内容(这里是密码)转换成看起来像乱码的一串字节(其实就是字符串)。 当你每次传入完全相同的内容(完全相同的密码)时,都会得到完全相同的“乱码”。 但你无法从这个“乱码”反向还原出密码。 ### 为什么使用密码哈希 { #why-use-password-hashing } 如果你的数据库被盗,窃贼拿到的不会是用户的明文密码,而只是哈希值。 因此,窃贼无法把该密码拿去尝试登录另一个系统(很多用户在各处都用相同的密码,这将非常危险)。 ## 安装 `pwdlib` { #install-pwdlib }Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Nunca deberías guardar passwords en texto plano, así que, usaremos el sistema de hash de passwords (falso). Si los passwords no coinciden, devolvemos el mismo error. #### Hashing de passwords { #password-hashing } "Hacer hash" significa: convertir algún contenido (un password en este caso) en una secuencia de bytes (solo un string) que parece un galimatías.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 10.2K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 26.7K bytes - Click Count (0)