Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 563 for password (0.07 sec)

  1. docs/en/docs/tutorial/security/simple-oauth2.md

    ```
    
    ////
    
    ### Check the password
    
    At this point we have the user data from our database, but we haven't checked the password.
    
    Let's put that data in the Pydantic `UserInDB` model first.
    
    You should never save plaintext passwords, so, we'll use the (fake) password hashing system.
    
    If the passwords don't match, we return the same error.
    
    #### Password hashing
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 12.3K bytes
    - Viewed (0)
  2. compat/maven-settings-builder/src/main/java/org/apache/maven/settings/crypto/DefaultSettingsDecrypter.java

                server = server.clone();
    
                String password = server.getPassword();
                if (securityDispatcher.isAnyEncryptedString(password)) {
                    try {
                        if (securityDispatcher.isLegacyEncryptedString(password)) {
                            problems.add(new DefaultSettingsProblem(
                                    "Legacy/insecurely encrypted password detected for server " + server.getId(),
    Registered: Sun Nov 03 03:35:11 UTC 2024
    - Last Modified: Fri Oct 25 12:31:46 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/security/simple-oauth2.md

    #### Passwort-Hashing
    
    „Hashing“ bedeutet: Konvertieren eines Inhalts (in diesem Fall eines Passworts) in eine Folge von Bytes (ein schlichter String), die wie Kauderwelsch aussieht.
    
    Immer wenn Sie genau den gleichen Inhalt (genau das gleiche Passwort) übergeben, erhalten Sie genau den gleichen Kauderwelsch.
    
    Sie können jedoch nicht vom Kauderwelsch zurück zum Passwort konvertieren.
    
    ##### Warum Passwort-Hashing verwenden?
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  4. src/main/java/jcifs/smb1/smb1/SmbComTreeConnectAndX.java

                } else {
                    // plain text
                    password = new byte[(session.auth.password.length() + 1) * 2];
                    passwordLength = writeString( session.auth.password, password, 0 );
                }
            } else {
                // no password in tree connect
                passwordLength = 1;
            }
    
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 6.8K bytes
    - Viewed (0)
  5. src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java

            this.username = username;
            this.password = password;
    
            initDefaults();
    
            if( domain == null ) this.domain = DEFAULT_DOMAIN;
            if( username == null ) this.username = DEFAULT_USERNAME;
            if( password == null ) this.password = DEFAULT_PASSWORD;
        }
    /**
     * Create an <tt>NtlmPasswordAuthentication</tt> object with raw password
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 21:10:40 UTC 2019
    - 22.5K bytes
    - Viewed (0)
  6. src/main/java/jcifs/internal/smb1/com/SmbComTreeConnectAndX.java

                    throw new RuntimeCIFSException("Plain text passwords are disabled");
                }
                else {
                    // plain text
                    this.password = new byte[ ( pwAuth.getPassword().length() + 1 ) * 2];
                    this.passwordLength = writeString(pwAuth.getPassword(), this.password, 0);
                }
            }
            else {
                // no password in tree connect
                this.passwordLength = 1;
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Jul 01 13:12:10 UTC 2018
    - 6.6K bytes
    - Viewed (0)
  7. tests/test_tutorial/test_request_form_models/test_tutorial002_an.py

        response = client.post("/login/", data={"username": "Foo", "password": "secret"})
        assert response.status_code == 200
        assert response.json() == {"username": "Foo", "password": "secret"}
    
    
    @needs_pydanticv2
    def test_post_body_extra_form(client: TestClient):
        response = client.post(
            "/login/", data={"username": "Foo", "password": "secret", "extra": "extra"}
        )
        assert response.status_code == 422
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Sep 06 17:31:18 UTC 2024
    - 6.2K bytes
    - Viewed (0)
  8. fastapi/security/oauth2.py

    class OAuth2PasswordRequestForm:
        """
        This is a dependency class to collect the `username` and `password` as form data
        for an OAuth2 password flow.
    
        The OAuth2 specification dictates that for a password flow the data should be
        collected using form data (instead of JSON) and that it should have the specific
        fields `username` and `password`.
    
        All the initialization parameters are extracted from the request.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Oct 23 18:30:18 UTC 2024
    - 21.1K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_request_form_models/test_tutorial002_pv1.py

        response = client.post("/login/", data={"username": "Foo", "password": "secret"})
        assert response.status_code == 200
        assert response.json() == {"username": "Foo", "password": "secret"}
    
    
    @needs_pydanticv1
    def test_post_body_extra_form(client: TestClient):
        response = client.post(
            "/login/", data={"username": "Foo", "password": "secret", "extra": "extra"}
        )
        assert response.status_code == 422
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Fri Sep 06 17:31:18 UTC 2024
    - 6K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/oauth2-jwt.md

    ///
    
    ## Password hashing
    
    "Hashing" means converting some content (a password in this case) into a sequence of bytes (just a string) that looks like gibberish.
    
    Whenever you pass exactly the same content (exactly the same password) you get exactly the same gibberish.
    
    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sat Oct 26 11:45:10 UTC 2024
    - 12.8K bytes
    - Viewed (0)
Back to top