Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 102 for hashes (0.04 sec)

  1. docs/de/docs/tutorial/security/oauth2-jwt.md

    Und mit allen gleichzeitig kompatibel sein.
    
    ///
    
    Erstellen Sie eine Hilfsfunktion, um ein vom Benutzer stammendes Passwort zu hashen.
    
    Und eine weitere, um zu überprüfen, ob ein empfangenes Passwort mit dem gespeicherten Hash übereinstimmt.
    
    Und noch eine, um einen Benutzer zu authentifizieren und zurückzugeben.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  2. src/main/java/jcifs/smb/NtlmPasswordAuthentication.java

                     * hashes and the other does then they will not be considered equal even
                     * though they may be.
                     */
                }
                return true;
            }
            return false;
        }
    
        /**
         * Check whether the password hashes are externally supplied.
         *
         * @return whether the hashes are externally supplied
         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  3. src/main/java/org/codelibs/core/security/MessageDigestUtil.java

            }
        }
    
        /**
         * Hashes the specified text using the given algorithm and converts it to a string.
         *
         * @param algorithm
         *            The algorithm. Must not be {@literal null} or an empty string.
         * @param text
         *            The string to be hashed.
         * @return The hashed string.
         */
    Registered: Fri Sep 05 20:58:11 UTC 2025
    - Last Modified: Thu Jul 31 08:16:49 UTC 2025
    - 3.1K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/security/oauth2-jwt.md

    Siempre que pases exactamente el mismo contenido (exactamente la misma contraseña) obtienes exactamente el mismo galimatías.
    
    Pero no puedes convertir del galimatías de nuevo a la contraseña.
    
    ### Por qué usar hashing de contraseñas
    
    Si tu base de datos es robada, el ladrón no tendrá las contraseñas en texto claro de tus usuarios, solo los hashes.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

         */
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 26.7K bytes
    - Viewed (0)
  6. src/main/java/jcifs/smb1/smb1/DfsReferral.java

        public String link;
        /** Path relative to tree from which this referral was thrown */
        public String path; // Path relative to tree from which this referral was thrown
        /** Whether to resolve hashes in the path */
        public boolean resolveHashes;
        /** Expiration time for this referral entry */
        public long expiration;
    
        /** The next DFS referral in the chain */
        DfsReferral next;
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 16 01:32:48 UTC 2025
    - 2.5K bytes
    - Viewed (0)
  7. docs/pt/docs/tutorial/security/oauth2-jwt.md

    Se o seu banco de dados for roubado, o invasor não terá as senhas em texto puro dos seus usuários, apenas os hashes.
    
    Então, o invasor não poderá tentar usar essas senhas em outro sistema (como muitos usuários utilizam a mesma senha em vários lugares, isso seria perigoso).
    
    ## Instalar o `passlib`
    
    O PassLib é uma excelente biblioteca Python para lidar com hashes de senhas.
    
    Ele suporta muitos algoritmos de hashing seguros e utilitários para trabalhar com eles.
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 11K bytes
    - Viewed (0)
  8. guava-tests/test/com/google/common/hash/HashTestUtils.java

            int key2 = key1 ^ (1 << i);
            // get hashes
            int hash1 = function.hashInt(key1).asInt();
            int hash2 = function.hashInt(key2).asInt();
            // test whether the hash values have same output bits
            same |= ~(hash1 ^ hash2);
            // test whether the hash values have different output bits
            diff |= hash1 ^ hash2;
    
            count++;
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Mon Aug 11 19:31:30 UTC 2025
    - 25.6K bytes
    - Viewed (0)
  9. src/test/java/jcifs/smb/NtlmUtilTest.java

        void testGetNTHash_differentPasswords() {
            // Arrange
            String password1 = "password";
            String password2 = "Password";
    
            // Act
            byte[] hash1 = NtlmUtil.getNTHash(password1);
            byte[] hash2 = NtlmUtil.getNTHash(password2);
    
            // Assert
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (0)
  10. docs/en/docs/how-to/conditional-openapi.md

    * Make sure you have well defined Pydantic models for your request bodies and responses.
    * Configure any required permissions and roles using dependencies.
    * Never store plaintext passwords, only password hashes.
    * Implement and use well-known cryptographic tools, like Passlib and JWT tokens, etc.
    * Add more granular permission controls with OAuth2 scopes where needed.
    * ...etc.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.4K bytes
    - Viewed (0)
Back to top