Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 276 for password1 (0.06 seconds)

  1. samples/guide/src/main/java/okhttp3/recipes/kt/Authenticate.kt

                }
    
                println("Authenticating for response: $response")
                println("Challenges: ${response.challenges()}")
                val credential = Credentials.basic("jesse", "password1")
                return response.request
                  .newBuilder()
                  .header("Authorization", credential)
                  .build()
              }
            },
          ).build()
    
      fun run() {
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Mar 19 19:25:20 GMT 2025
    - 2K bytes
    - Click Count (0)
  2. samples/guide/src/main/java/okhttp3/recipes/PreemptiveAuth.java

        private final String credentials;
        private final String host;
    
        BasicAuthInterceptor(String host, String username, String password) {
          this.credentials = Credentials.basic(username, password);
          this.host = host;
        }
    
        @Override public Response intercept(Chain chain) throws IOException {
          Request request = chain.request();
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Mon Nov 05 07:46:46 GMT 2018
    - 2.1K bytes
    - Click Count (0)
  3. samples/guide/src/main/java/okhttp3/recipes/Authenticate.java

              }
    
              System.out.println("Authenticating for response: " + response);
              System.out.println("Challenges: " + response.challenges());
              String credential = Credentials.basic("jesse", "password1");
              return response.request().newBuilder()
                  .header("Authorization", credential)
                  .build();
            })
            .build();
      }
    
      public void run() throws Exception {
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Thu Aug 12 07:26:27 GMT 2021
    - 1.9K bytes
    - Click Count (0)
  4. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorSecurityTest.java

            // Verify it returns a clone, not the original
            password[0] = 'X';
            char[] password2 = authenticator.getPasswordAsCharArray();
            assertNotEquals(password[0], password2[0], "Should return a clone, not the original");
        }
    
        @Test
        public void testPasswordConstructorWithCharArray() {
            char[] passwordChars = "charArrayPassword".toCharArray();
    Created: Sat Dec 20 13:44:44 GMT 2025
    - Last Modified: Sat Aug 30 05:58:03 GMT 2025
    - 8.5K bytes
    - Click Count (0)
  5. fess-crawler/src/main/java/org/codelibs/fess/crawler/extractor/impl/PasswordBasedExtractor.java

     * It provides functionality to manage passwords for different file patterns using regular expressions.
     *
     * <p>The extractor supports two types of password management:
     * <ul>
     *   <li>Static passwords configured via {@link #addPassword(String, String)}</li>
     *   <li>Dynamic passwords provided through extraction parameters</li>
     * </ul>
     *
    Created: Sat Dec 20 11:21:39 GMT 2025
    - Last Modified: Thu Aug 07 02:55:08 GMT 2025
    - 5.1K bytes
    - Click Count (0)
  6. docs/en/docs/tutorial/security/simple-oauth2.md

    If the passwords don't match, we return the same error.
    
    #### Password hashing { #password-hashing }
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sun Aug 31 09:15:41 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  7. docs/de/docs/advanced/security/http-basic-auth.md

    Um dies zu lösen, konvertieren wir zunächst den `username` und das `password` in UTF-8-codierte `bytes`.
    
    Dann können wir `secrets.compare_digest()` verwenden, um sicherzustellen, dass `credentials.username` `"stanleyjobson"` und `credentials.password` `"swordfish"` ist.
    
    {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *}
    
    Dies wäre das gleiche wie:
    
    ```Python
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Sep 20 15:10:09 GMT 2025
    - 6.2K bytes
    - Click Count (0)
  8. docs/sts/dex.yaml

    # Let dex keep a list of passwords which can be used to login to dex.
    enablePasswordDB: true
    
    # A static list of passwords to login the end user. By identifying here, dex
    # won't look in its underlying storage for passwords.
    #
    # If this option isn't chosen users may be added through the gRPC API.
    staticPasswords:
      - email: "******@****.***"
        # bcrypt hash of the string "password"
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Jul 15 11:55:55 GMT 2020
    - 2.7K bytes
    - Click Count (0)
  9. docs/de/docs/tutorial/extra-models.md

    ```Python
    UserInDB(
        username="john",
        password="secret",
        email="******@****.***",
        full_name=None,
    )
    ```
    
    Oder genauer gesagt, dazu, `user_dict` direkt zu verwenden, mit welchen Inhalten es auch immer in der Zukunft haben mag:
    
    ```Python
    UserInDB(
        username = user_dict["username"],
        password = user_dict["password"],
        email = user_dict["email"],
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 24 10:28:19 GMT 2025
    - 8K bytes
    - Click Count (0)
  10. compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java

                server = server.clone();
    
                String password = server.getPassword();
                if (securityDispatcher.isAnyEncryptedString(password)) {
                    try {
                        if (securityDispatcher.isLegacyEncryptedString(password)) {
                            problems.add(new DefaultSettingsProblem(
                                    "Pre-Maven 4 legacy encrypted password detected for server " + server.getId()
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Sat Nov 16 13:55:43 GMT 2024
    - 6K bytes
    - Click Count (0)
Back to Top