- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 19 for secretKey (0.07 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
guava-tests/test/com/google/common/hash/MacHashFunctionTest.java
private static final SecretKey MD5_KEY = new SecretKeySpec("secret key".getBytes(UTF_8), "HmacMD5"); private static final SecretKey SHA1_KEY = new SecretKeySpec("secret key".getBytes(UTF_8), "HmacSHA1"); private static final SecretKey SHA256_KEY = new SecretKeySpec("secret key".getBytes(UTF_8), "HmacSHA256"); private static final SecretKey SHA512_KEY =Created: Fri Apr 03 12:43:13 GMT 2026 - Last Modified: Thu Mar 19 18:53:45 GMT 2026 - 14.2K bytes - Click Count (0) -
src/test/java/org/codelibs/fess/mylasta/direction/sponsor/FessSecurityResourceProviderTest.java
// Test with different cipher types @Test public void test_withBlowfishCipher() { // Test with Blowfish cipher InvertibleCryptographer blowfish = InvertibleCryptographer.createBlowfishCipher("secretkey"); FessSecurityResourceProvider provider = new FessSecurityResourceProvider(blowfish, oneWayCryptographer); assertNotNull(provider);Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Fri Mar 13 23:01:26 GMT 2026 - 13.2K bytes - Click Count (0) -
CLAUDE.md
- `ftp:.*`, `ftps:.*` → FtpClient - `storage:.*` → StorageClient, `s3:.*` → S3Client, `gcs:.*` → GcsClient ### Cloud Storage Clients - **S3Client**: AWS SDK v2, `s3://bucket/path`, properties: `endpoint`, `accessKey`, `secretKey`, `region` - **GcsClient**: Google Cloud SDK, `gcs://bucket/path`, properties: `projectId`, `credentialsFile`, `endpoint` - **StorageClient**: MinIO SDK, `storage://bucket/path` ### Services
Created: Sun Apr 12 03:50:13 GMT 2026 - Last Modified: Thu Mar 12 03:39:20 GMT 2026 - 8.1K bytes - Click Count (0) -
docs/fr/docs/tutorial/security/oauth2-jwt.md
Importez les modules installés. Créez une clé secrète aléatoire qui sera utilisée pour signer les jetons JWT. Pour générer une clé secrète aléatoire sécurisée, utilisez la commande : <div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Et copiez la sortie dans la variable `SECRET_KEY` (n'utilisez pas celle de l'exemple).
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:37:13 GMT 2026 - 12.6K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py310.py
SecurityScopes, ) from jwt.exceptions import InvalidTokenError from pwdlib import PasswordHash from pydantic import BaseModel, ValidationError # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 5.4K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
from jwt.exceptions import InvalidTokenError from pwdlib import PasswordHash from pydantic import BaseModel # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 4.1K bytes - Click Count (0) -
docs_src/security/tutorial005_py310.py
SecurityScopes, ) from jwt.exceptions import InvalidTokenError from pwdlib import PasswordHash from pydantic import BaseModel, ValidationError # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Feb 12 18:10:35 GMT 2026 - 5.3K bytes - Click Count (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
<div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel). Erstellen Sie eine Variable `ALGORITHM` für den Algorithmus, der zum Signieren des JWT-Tokens verwendet wird, und setzen Sie sie auf `"HS256"`.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 17:58:09 GMT 2026 - 12.9K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
<div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo). Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`. Crea una variable para la expiración del token.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0) -
docs/tr/docs/tutorial/security/oauth2-jwt.md
<div class="termy"> ```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> Çıktıyı `SECRET_KEY` değişkenine kopyalayın (örnektekini kullanmayın). JWT token'ını imzalamak için kullanılan algoritmayı tutacak `ALGORITHM` adlı bir değişken oluşturup değerini `"HS256"` yapın.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 12.1K bytes - Click Count (0)