Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 12 for plaintext (0.22 sec)

  1. internal/kms/kes.go

    	c.lock.RLock()
    	defer c.lock.RUnlock()
    
    	plaintexts := make([][]byte, 0, len(ciphertexts))
    	for i := range ciphertexts {
    		ctxBytes, err := contexts[i].MarshalText()
    		if err != nil {
    			return nil, err
    		}
    		plaintext, err := c.client.Decrypt(ctx, keyID, ciphertexts[i], ctxBytes)
    		if err != nil {
    			return nil, err
    		}
    		plaintexts = append(plaintexts, plaintext)
    	}
    	return plaintexts, nil
    }
    
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Tue Apr 16 15:43:39 GMT 2024
    - 14.9K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/extra-models.md

    * The **input model** needs to be able to have a password.
    * The **output model** should not have a password.
    * The **database model** would probably need to have a hashed password.
    
    !!! danger
        Never store user's plaintext passwords. Always store a "secure hash" that you can then verify.
    
        If you don't know, you will learn what a "password hash" is in the [security chapters](security/simple-oauth2.md#password-hashing){.internal-link target=_blank}.
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 7.7K bytes
    - Viewed (1)
  3. okhttp/src/main/kotlin/okhttp3/Protocol.kt

     *
     * [ietf_alpn]: http://tools.ietf.org/html/draft-ietf-tls-applayerprotoneg
     */
    enum class Protocol(private val protocol: String) {
      /**
       * An obsolete plaintext framing that does not use persistent sockets by default.
       */
      HTTP_1_0("http/1.0"),
    
      /**
       * A plaintext framing that includes persistent connections.
       *
       * This version of OkHttp implements [RFC 7230][rfc_7230], and tracks revisions to that spec.
       *
    Plain Text
    - Registered: Fri Apr 26 11:42:10 GMT 2024
    - Last Modified: Sat Apr 06 04:17:33 GMT 2024
    - 4.4K bytes
    - Viewed (0)
  4. cmd/encryption-v1.go

    		key, err := GlobalKMS.GenerateKey(ctx, "", kms.Context{bucket: path.Join(bucket, object)})
    		if err != nil {
    			return crypto.ObjectKey{}, err
    		}
    
    		objectKey := crypto.GenerateKey(key.Plaintext, rand.Reader)
    		sealedKey = objectKey.Seal(key.Plaintext, crypto.GenerateIV(rand.Reader), crypto.S3.String(), bucket, object)
    		crypto.S3.CreateMetadata(metadata, key.KeyID, key.Ciphertext, sealedKey)
    		return objectKey, nil
    	case crypto.S3KMS:
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 36.5K bytes
    - Viewed (0)
  5. cmd/bucket-metadata.go

    	key, err := GlobalKMS.GenerateKey(ctx, "", kmsContext)
    	if err != nil {
    		return
    	}
    
    	outbuf := bytes.NewBuffer(nil)
    	objectKey := crypto.GenerateKey(key.Plaintext, rand.Reader)
    	sealedKey := objectKey.Seal(key.Plaintext, crypto.GenerateIV(rand.Reader), crypto.S3.String(), bucket, "")
    	crypto.S3.CreateMetadata(metadata, key.KeyID, key.Ciphertext, sealedKey)
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 16.5K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/simple-oauth2.md

    ### Check the password
    
    At this point we have the user data from our database, but we haven't checked the password.
    
    Let's put that data in the Pydantic `UserInDB` model first.
    
    You should never save plaintext passwords, so, we'll use the (fake) password hashing system.
    
    If the passwords don't match, we return the same error.
    
    #### Password hashing
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 12.5K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/oauth2-jwt.md

    But you cannot convert from the gibberish back to the password.
    
    ### Why use password hashing
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous).
    
    ## Install `passlib`
    
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 13K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/response-model.md

    ## Return the same input data
    
    Here we are declaring a `UserIn` model, it will contain a plaintext password:
    
    === "Python 3.10+"
    
        ```Python hl_lines="7  9"
        {!> ../../../docs_src/response_model/tutorial002_py310.py!}
        ```
    
    === "Python 3.8+"
    
        ```Python hl_lines="9  11"
    Plain Text
    - Registered: Sun Apr 28 07:19:10 GMT 2024
    - Last Modified: Thu Apr 18 19:53:19 GMT 2024
    - 17.9K bytes
    - Viewed (0)
  9. cni/pkg/iptables/iptables.go

    	//
    	// DESC: Anything that is not bound for localhost and does not have the mark, TPROXY to ztunnel inbound plaintext port <INPLAINPORT>
    	iptablesBuilder.AppendVersionedRule("127.0.0.1/32", "::1/128",
    		iptableslog.UndefinedCommand, ChainInpodPrerouting, iptablesconstants.MANGLE,
    		"!", "-d", iptablesconstants.IPVersionSpecific,
    Go
    - Registered: Wed Apr 24 22:53:08 GMT 2024
    - Last Modified: Fri Apr 12 01:42:30 GMT 2024
    - 19.2K bytes
    - Viewed (0)
  10. cmd/admin-handlers.go

    			return
    		}
    		writeSuccessResponseJSON(w, resp)
    		return
    	}
    
    	// 3. Compare generated key with decrypted key
    	if subtle.ConstantTimeCompare(key.Plaintext, decryptedKey) != 1 {
    		response.DecryptionErr = "The generated and the decrypted data key do not match"
    		resp, err := json.Marshal(response)
    		if err != nil {
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Sun Apr 21 11:43:18 GMT 2024
    - 97.3K bytes
    - Viewed (2)
Back to top