- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 36 for vu (0.02 seconds)
-
docs_src/security/tutorial004_an_py310.py
fake_users_db = { "johndoe": { "username": "johndoe", "full_name": "John Doe", "email": "******@****.***", "hashed_password": "$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc", "disabled": False, } } class Token(BaseModel): access_token: str token_type: str class TokenData(BaseModel): username: str | None = NoneCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 4.2K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py310.py
fake_users_db = { "johndoe": { "username": "johndoe", "full_name": "John Doe", "email": "******@****.***", "hashed_password": "$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc", "disabled": False, }, "alice": { "username": "alice", "full_name": "Alice Chains", "email": "******@****.***",Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 5.4K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
fake_users_db = { "johndoe": { "username": "johndoe", "full_name": "John Doe", "email": "******@****.***", "hashed_password": "$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc", "disabled": False, } } class Token(BaseModel): access_token: str token_type: str class TokenData(BaseModel): username: str | None = NoneCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 4.1K bytes - Click Count (0) -
src/cmd/asm/internal/arch/loong64.go
var loong64ElemExtMap = map[string]int16{ "B": loong64.ARNG_B, "H": loong64.ARNG_H, "W": loong64.ARNG_W, "V": loong64.ARNG_V, "BU": loong64.ARNG_BU, "HU": loong64.ARNG_HU, "WU": loong64.ARNG_WU, "VU": loong64.ARNG_VU, } var loong64LsxArngExtMap = map[string]int16{ "B16": loong64.ARNG_16B, "H8": loong64.ARNG_8H, "W4": loong64.ARNG_4W, "V2": loong64.ARNG_2V, }
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Sat Feb 14 15:17:33 GMT 2026 - 3.9K bytes - Click Count (0) -
docs_src/security/tutorial005_py310.py
fake_users_db = { "johndoe": { "username": "johndoe", "full_name": "John Doe", "email": "******@****.***", "hashed_password": "$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc", "disabled": False, }, "alice": { "username": "alice", "full_name": "Alice Chains", "email": "******@****.***",Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 5.3K bytes - Click Count (0) -
src/main/java/org/codelibs/fess/suggest/converter/KatakanaToAlphabetConverter.java
map.put("ペ", new String[] { "pe" }); map.put("ポ", new String[] { "po" }); map.put("ヴァ", new String[] { "va" }); map.put("ヴィ", new String[] { "vi" }); map.put("ヴ", new String[] { "vu" }); map.put("ヴェ", new String[] { "ve" }); map.put("ヴォ", new String[] { "vo" }); map.put("ギャ", new String[] { "gya" }); map.put("ギュ", new String[] { "gyu" });
Created: Fri Apr 17 09:08:13 GMT 2026 - Last Modified: Mon Nov 17 14:28:21 GMT 2025 - 11.4K bytes - Click Count (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
/// note If you check the new (fake) database `fake_users_db`, you will see how the hashed password looks like now: `"$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc"`. /// ## Handle JWT tokens { #handle-jwt-tokens } Import the modules installed. Create a random secret key that will be used to sign the JWT tokens.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 10.7K bytes - Click Count (0) -
docs/zh-hant/docs/tutorial/security/oauth2-jwt.md
這可確保無論使用者名稱是否有效,端點的回應時間都大致相同,避免可用來枚舉既有使用者名稱的「計時攻擊」(timing attacks)。 /// note | 注意 如果你查看新的(假)資料庫 `fake_users_db`,你會看到雜湊後的密碼現在長這樣:`"$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc"`。 /// ## 處理 JWT 權杖 { #handle-jwt-tokens } 匯入剛安裝的模組。 建立一把隨機的密鑰(secret key)用於簽署 JWT 權杖。 要產生安全的隨機密鑰可使用以下指令: <div class="termy"> ```consoleCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:05:38 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/zh/docs/tutorial/security/oauth2-jwt.md
这可以确保无论用户名是否有效,端点的响应时间大致相同,从而防止可用于枚举已存在用户名的“时间攻击”(timing attacks)。 /// note | 注意 如果你查看新的(伪)数据库 `fake_users_db`,现在你会看到哈希后的密码类似这样:`"$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc"`。 /// ## 处理 JWT 令牌 { #handle-jwt-tokens } 导入已安装的模块。 创建一个用于对 JWT 令牌进行签名的随机密钥。 使用下列命令生成一个安全的随机密钥: <div class="termy"> ```consoleCreated: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 17:06:37 GMT 2026 - 10.1K bytes - Click Count (0) -
docs/ja/docs/tutorial/security/oauth2-jwt.md
これにより、ユーザー名が有効かどうかに関わらずエンドポイントの応答時間がおおよそ同じになり、既存のユーザー名を列挙するために悪用されうる「タイミング攻撃」を防止できます。 /// note | 備考 新しい(偽の)データベース`fake_users_db`を確認すると、ハッシュ化されたパスワードが次のようになっていることがわかります:`"$argon2id$v=19$m=65536,t=3,p=4$wagCPXjifgvUFBzq4hqe3w$CYaIb8sB+wtD+Vu/P4uod1+Qof8h+1g7bbDlBID48Rc"`。 /// ## JWTトークンの取り扱い { #handle-jwt-tokens } インストールした複数のモジュールをインポートします。 JWTトークンの署名に使用されるランダムな秘密鍵を生成します。 安全なランダム秘密鍵を生成するには、次のコマンドを使用します:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 14:07:17 GMT 2026 - 14.6K bytes - Click Count (1)