- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 74 for challenges (0.05 sec)
-
src/main/java/jcifs/smb1/ntlmssp/Type3Message.java
/** * Calculates the LMv2 response for NTLM authentication. * * @param type2 the Type-2 message containing the server challenge * @param domain the domain name * @param user the username * @param password the user's password * @param clientChallenge the client challenge bytes * @return the calculated LMv2 response */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 24.1K bytes - Viewed (0) -
src/main/java/jcifs/http/NtlmServlet.java
} NtlmPasswordAuthentication ntlm; if (msg.startsWith("NTLM ")) { final byte[] challenge = getTransportContext().getTransportPool().getChallenge(getTransportContext(), dc); ntlm = NtlmSsp.authenticate(getTransportContext(), request, response, challenge); if (ntlm == null) { return; } } else {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 8.1K bytes - Viewed (1) -
src/main/java/jcifs/ntlmssp/av/AvSingleHost.java
import jcifs.Configuration; import jcifs.internal.util.SMBUtil; /** * NTLMSSP AV pair representing single host information in NTLM authentication. * Contains host-specific data used during the NTLM challenge-response process. * * @author mbechler */ public class AvSingleHost extends AvPair { /** * Constructs an AvSingleHost from raw byte data *Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 2.3K bytes - Viewed (0) -
src/main/java/jcifs/smb1/http/NetworkExplorer.java
} req.getSession(); /* ensure session id is set for cluster env. */ challenge = SmbSession.getChallenge(dc); if ((ntlm = NtlmSsp.authenticate(req, resp, challenge)) == null) { return; } } else { /* Basic */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 22.6K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/SMB1SigningDigest.java
} /** * This constructor used to instance a SigningDigest object for * signing/verifying SMB using kerberos session key. * The MAC Key = concat(Session Key, Digest of Challenge); * Because of Kerberos Authentication don't have challenge, * The MAC Key = Session Key * * @param macSigningKey * The MAC key used to sign or verify SMB. */Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 11.9K bytes - Viewed (0) -
src/test/java/jcifs/smb/SmbTransportPoolImplTest.java
verify(pooledSpy).disconnect(false, false); verify(nonPooledSpy).disconnect(false, false); } @Test @DisplayName("Should get challenge from server") void testGetChallenge() throws Exception { // Given: Mock transport with server key byte[] expectedKey = { 1, 2, 3, 4 }; SmbTransportPoolImpl poolSpy = spy(pool);
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sun Aug 31 08:00:57 UTC 2025 - 19.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/app/web/sso/SsoAction.java
* * This method handles the primary SSO authentication flow. It checks if a user * is already logged in, attempts SSO authentication, and handles various * authentication scenarios including success, failure, and challenge responses. * * @return ActionResponse directing to the appropriate page based on authentication result */ @Execute public ActionResponse index() {Registered: Sat Dec 20 09:19:18 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 9.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/session/Smb2SessionSetupResponse.java
import jcifs.internal.smb2.ServerMessageBlock2Response; import jcifs.internal.util.SMBUtil; import jcifs.smb.NtStatus; /** * SMB2 Session Setup response message. This response contains the server's authentication * challenge or confirms successful session establishment. * * @author mbechler * */ public class Smb2SessionSetupResponse extends ServerMessageBlock2Response { /**
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 4.8K bytes - Viewed (1) -
src/main/java/jcifs/smb1/smb1/SmbTransport.java
final long expiration = System.currentTimeMillis() + Dfs.TTL * 1000; int di = 0; for (;;) { /* NTLM HTTP Authentication must be re-negotiated * with challenge from 'server' to access DFS vol. */ dr.resolveHashes = auth.hashesExternal; dr.ttl = resp.referrals[di].ttl; dr.expiration = expiration; if (path.equals("")) {
Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 31.8K bytes - Viewed (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/RequestBody.kt
* * * A stale connection. The request was made on a reused connection and that reused connection * has since been closed by the server. * * A client timeout (HTTP 408). * * A authorization challenge (HTTP 401 and 407) that is satisfied by the [Authenticator]. * * A retryable server failure (HTTP 503 with a `Retry-After: 0` response header). * * A misdirected request (HTTP 421) on a coalesced connection. */
Registered: Fri Dec 26 11:42:13 UTC 2025 - Last Modified: Tue Oct 07 14:16:29 UTC 2025 - 9.3K bytes - Viewed (0)