Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 15 for hashLong (0.12 sec)

  1. docs/pt/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 com Senha (e hashing), Bearer com tokens JWT
    
    Agora que temos todo o fluxo de segurança, vamos tornar a aplicação realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> e hashing de senhas seguras.
    
    Este código é algo que você pode realmente usar na sua aplicação, salvar os hashes das senhas no seu banco de dados, etc.
    
    Vamos começar de onde paramos no capítulo anterior e incrementá-lo.
    
    ## Sobre o JWT
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 11K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing { #password-hashing }
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing { #why-use-password-hashing }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/simple-oauth2.md

    Let's put that data in the Pydantic `UserInDB` model first.
    
    You should never save plaintext passwords, so, we'll use the (fake) password hashing system.
    
    If the passwords don't match, we return the same error.
    
    #### Password hashing { #password-hashing }
    
    "Hashing" means: converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  4. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Password (und Hashing), Bearer mit JWT-Tokens
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Wir bauen auf dem vorherigen Kapitel auf.
    
    ## Über JWT
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  5. docs/es/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 con Password (y hashing), Bearer con tokens JWT
    
    Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras.
    
    Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.
    
    Vamos a empezar desde donde lo dejamos en el capítulo anterior e incrementarlo.
    
    ## Acerca de JWT
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  6. docs/en/docs/project-generation.md

        - 🧪 [Playwright](https://playwright.dev) for End-to-End testing.
        - 🦇 Dark mode support.
    - 🐋 [Docker Compose](https://www.docker.com) for development and production.
    - 🔒 Secure password hashing by default.
    - 🔑 JWT token authentication.
    - 📫 Email based password recovery.
    - ✅ Tests with [Pytest](https://pytest.org).
    - 📞 [Traefik](https://traefik.io) as a reverse proxy / load balancer.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/extra-models.md

    /// danger
    
    Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
    If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.
    
    ///
    
    ## Multiple models { #multiple-models }
    
    Here's a general idea of how the models could look like with their password fields and the places where they are used:
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  8. docs/en/docs/advanced/security/oauth2-scopes.md

    For OAuth2 they are just strings.
    
    ///
    
    ## Global view { #global-view }
    
    First, let's quickly see the parts that change from the examples in the main **Tutorial - User Guide** for [OAuth2 with Password (and hashing), Bearer with JWT tokens](../../tutorial/security/oauth2-jwt.md){.internal-link target=_blank}. Now using OAuth2 scopes:
    
    {* ../../docs_src/security/tutorial005_an_py310.py hl[5,9,13,47,65,106,108:116,122:126,130:136,141,157] *}
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  9. android/guava/src/com/google/common/hash/BloomFilter.java

       * <p>Implementations should be collections of pure functions (i.e. stateless).
       */
      interface Strategy extends java.io.Serializable {
    
        /**
         * Sets {@code numHashFunctions} bits of the given bit array, by hashing a user element.
         *
         * <p>Returns whether any bits changed as a result of this operation.
         */
        <T extends @Nullable Object> boolean put(
            @ParametricNullness T object,
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Sun Aug 31 13:15:26 UTC 2025
    - 26.9K bytes
    - Viewed (0)
  10. docs/ko/docs/tutorial/security/oauth2-jwt.md

    더 자세한 내용은 <a href="https://pyjwt.readthedocs.io/en/latest/installation.html" class="external-link" target="_blank">PyJWT 설치</a> 에서 확인할 수 있습니다.
    
    ///
    
    ## 패스워드 해싱
    
    "해싱(Hashing)"은 어떤 내용(여기서는 패스워드)을 해석할 수 없는 일련의 바이트 집합(단순 문자열)으로 변환하는 것을 의미합니다.
    
    동일한 내용(똑같은 패스워드)을 해싱하면 동일한 문자열을 얻습니다.
    
    하지만 그 문자열을 다시 패스워드로 되돌릴 수는 없습니다.
    
    ### 패스워드를 해싱하는 이유
    
    데이터베이스를 탈취당하더라도, 침입자는 사용자의 평문 패스워드 대신 해시 값만 얻을 수 있습니다.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.2K bytes
    - Viewed (0)
Back to top