Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 13 for verifyPassword (0.23 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. src/main/java/org/codelibs/fess/app/web/admin/user/AdminUserAction.java

            validate(form, messages -> {}, this::asEditHtml);
            validateAttributes(form.attributes, v -> throwValidationError(v, this::asEditHtml));
            verifyPassword(form, this::asEditHtml);
            verifyToken(this::asEditHtml);
            getUser(form).ifPresent(entity -> {
                try {
                    userService.store(entity);
    Created: Tue Mar 31 13:07:34 GMT 2026
    - Last Modified: Fri Jan 02 06:18:24 GMT 2026
    - 21K bytes
    - Click Count (0)
  2. docs_src/security/tutorial004_an_py310.py

            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            verify_password(password, DUMMY_HASH)
            return False
        if not verify_password(password, user.hashed_password):
            return False
        return user
    
    
    def create_access_token(data: dict, expires_delta: timedelta | None = None):
        to_encode = data.copy()
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 18:10:35 GMT 2026
    - 4.2K bytes
    - Click Count (0)
  3. docs_src/security/tutorial004_py310.py

            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            verify_password(password, DUMMY_HASH)
            return False
        if not verify_password(password, user.hashed_password):
            return False
        return user
    
    
    def create_access_token(data: dict, expires_delta: timedelta | None = None):
        to_encode = data.copy()
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 18:10:35 GMT 2026
    - 4.1K bytes
    - Click Count (0)
  4. docs_src/security/tutorial005_py310.py

            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            verify_password(password, DUMMY_HASH)
            return False
        if not verify_password(password, user.hashed_password):
            return False
        return user
    
    
    def create_access_token(data: dict, expires_delta: timedelta | None = None):
        to_encode = data.copy()
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Feb 12 18:10:35 GMT 2026
    - 5.3K bytes
    - Click Count (0)
  5. docs/tr/docs/tutorial/security/oauth2-jwt.md

    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    `authenticate_user`, veritabanında var olmayan bir username ile çağrıldığında, yine de sahte (dummy) bir hash'e karşı `verify_password` çalıştırıyoruz.
    
    Bu, username geçerli olsun ya da olmasın endpoint'in yaklaşık aynı sürede yanıt vermesini sağlar; böylece mevcut username'leri saymaya yarayabilecek zamanlama saldırılarını (timing attacks) engeller.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 07:53:17 GMT 2026
    - 12.1K bytes
    - Click Count (0)
  6. docs/uk/docs/tutorial/security/oauth2-jwt.md

    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    Коли `authenticate_user` викликається з ім'ям користувача, якого немає в базі даних, ми все одно запускаємо `verify_password` для «підставного» хешу.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:27:41 GMT 2026
    - 17.9K bytes
    - Click Count (0)
  7. docs/ru/docs/tutorial/security/oauth2-jwt.md

    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    Когда `authenticate_user` вызывается с именем пользователя, которого нет в базе данных, мы все равно запускаем `verify_password` с использованием фиктивного хэша.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 19.7K bytes
    - Click Count (0)
  8. docs/en/docs/tutorial/security/oauth2-jwt.md

    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    When `authenticate_user` is called with a username that doesn't exist in the database, we still run `verify_password` against a dummy hash.
    
    This ensures the endpoint takes roughly the same amount of time to respond whether the username is valid or not, preventing **timing attacks** that could be used to enumerate existing usernames.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 05 18:13:19 GMT 2026
    - 10.7K bytes
    - Click Count (0)
  9. docs/pt/docs/tutorial/security/oauth2-jwt.md

    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    Quando `authenticate_user` é chamado com um nome de usuário que não existe no banco de dados, ainda executamos `verify_password` contra um hash fictício.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 11.6K bytes
    - Click Count (0)
  10. docs/zh-hant/docs/tutorial/security/oauth2-jwt.md

    建立一個工具函式來雜湊使用者送來的密碼。
    
    再建立另一個工具來驗證收到的密碼是否符合已儲存的雜湊。
    
    以及另一個用於驗證並回傳使用者的工具。
    
    {* ../../docs_src/security/tutorial004_an_py310.py hl[8,49,51,58:59,62:63,72:79] *}
    
    當以不存在於資料庫的使用者名稱呼叫 `authenticate_user` 時,我們仍然會拿一個假的雜湊去跑一次 `verify_password`。
    
    這可確保無論使用者名稱是否有效,端點的回應時間都大致相同,避免可用來枚舉既有使用者名稱的「計時攻擊」(timing attacks)。
    
    /// note | 注意
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Mar 20 17:05:38 GMT 2026
    - 10.1K bytes
    - Click Count (0)
Back to Top