Search Options

Results per page
Sort
Preferred Languages
Advance

Results 141 - 150 of 156 for sha256 (0.03 sec)

  1. docs/de/docs/tutorial/security/oauth2-jwt.md

    Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel).
    
    Erstellen Sie eine Variable `ALGORITHM` für den Algorithmus, der zum Signieren des JWT-Tokens verwendet wird, und setzen Sie sie auf `"HS256"`.
    
    Erstellen Sie eine Variable für das Ablaufdatum des Tokens.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Oct 01 15:19:54 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  2. docs/es/docs/tutorial/security/oauth2-jwt.md

    ```
    
    </div>
    
    Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo).
    
    Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`.
    
    Crea una variable para la expiración del token.
    
    Define un Modelo de Pydantic que se usará en el endpoint de token para el response.
    
    Crea una función de utilidad para generar un nuevo token de acceso.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 11.3K bytes
    - Viewed (0)
  3. internal/config/identity/openid/jwt.go

    	jp := new(jwtgo.Parser)
    	jp.ValidMethods = []string{
    		"RS256", "RS384", "RS512",
    		"ES256", "ES384", "ES512",
    		"HS256", "HS384", "HS512",
    		"RS3256", "RS3384", "RS3512",
    		"ES3256", "ES3384", "ES3512",
    	}
    
    	keyFuncCallback := func(jwtToken *jwtgo.Token) (any, error) {
    		kid, ok := jwtToken.Header["kid"].(string)
    		if !ok {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  4. api/go1.26.txt

    pkg crypto/hpke, func Open(PrivateKey, KDF, AEAD, []uint8, []uint8) ([]uint8, error) #75300
    pkg crypto/hpke, func SHAKE128() KDF #75300
    pkg crypto/hpke, func SHAKE256() KDF #75300
    pkg crypto/hpke, func Seal(PublicKey, KDF, AEAD, []uint8, []uint8) ([]uint8, error) #75300
    pkg crypto/hpke, method (*Recipient) Export(string, int) ([]uint8, error) #75300
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Thu Dec 11 19:57:52 UTC 2025
    - 11.5K bytes
    - Viewed (0)
  5. api/go1.24.txt

    pkg crypto/sha3, func NewSHAKE128() *SHAKE #69982
    pkg crypto/sha3, func NewSHAKE256() *SHAKE #69982
    pkg crypto/sha3, func Sum224([]uint8) [28]uint8 #69982
    pkg crypto/sha3, func Sum256([]uint8) [32]uint8 #69982
    pkg crypto/sha3, func Sum384([]uint8) [48]uint8 #69982
    pkg crypto/sha3, func Sum512([]uint8) [64]uint8 #69982
    pkg crypto/sha3, func SumSHAKE128([]uint8, int) []uint8 #69982
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Dec 17 21:28:29 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  6. api/go1.4.txt

    # CL 138800043 crypto: Add SHA3 functions in go.crypto/sha3 to the Hash enum., David Leon Gil <******@****.***>
    pkg crypto, const SHA3_224 = 10
    pkg crypto, const SHA3_224 Hash
    pkg crypto, const SHA3_256 = 11
    pkg crypto, const SHA3_256 Hash
    pkg crypto, const SHA3_384 = 12
    pkg crypto, const SHA3_384 Hash
    pkg crypto, const SHA3_512 = 13
    pkg crypto, const SHA3_512 Hash
    
    # CL 114680043 crypto: add Signer, Adam Langley <******@****.***>
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Fri Dec 12 03:01:01 UTC 2014
    - 34K bytes
    - Viewed (0)
  7. docs/en/docs/tutorial/security/oauth2-jwt.md

    ```
    
    </div>
    
    And copy the output to the variable `SECRET_KEY` (don't use the one in the example).
    
    Create a variable `ALGORITHM` with the algorithm used to sign the JWT token and set it to `"HS256"`.
    
    Create a variable for the expiration of the token.
    
    Define a Pydantic Model that will be used in the token endpoint for the response.
    
    Create a utility function to generate a new access token.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 10.6K bytes
    - Viewed (0)
  8. docs/ru/docs/tutorial/security/oauth2-jwt.md

    </div>
    
    И скопируйте полученный результат в переменную `SECRET_KEY` (не используйте тот, что в примере).
    
    Создайте переменную `ALGORITHM` с алгоритмом, используемым для подписи JWT-токена, и установите для нее значение `"HS256"`.
    
    Создайте переменную для срока действия токена.
    
    Определите Pydantic-модель, которая будет использоваться для формирования ответа на запрос на получение токена.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Sep 30 11:24:39 UTC 2025
    - 19.1K bytes
    - Viewed (0)
  9. docs/zh/docs/tutorial/security/oauth2-jwt.md

    ```console
    $ openssl rand -hex 32
    
    09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7
    ```
    
    </div>
    
    然后,把生成的密钥复制到变量**SECRET_KEY**,注意,不要使用本例所示的密钥。
    
    创建指定 JWT 令牌签名算法的变量 **ALGORITHM**,本例中的值为 `"HS256"`。
    
    创建设置令牌过期时间的变量。
    
    定义令牌端点响应的 Pydantic 模型。
    
    创建生成新的访问令牌的工具函数。
    
    {* ../../docs_src/security/tutorial004.py hl[6,12:14,28:30,78:86] *}
    
    ## 更新依赖项
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 8.9K bytes
    - Viewed (0)
  10. docs/pt/docs/tutorial/security/oauth2-jwt.md

    ```
    
    </div>
    
    E copie a saída para a variável `SECRET_KEY` (não use a do exemplo).
    
    Crie uma variável `ALGORITHM` com o algoritmo usado para assinar o token JWT e defina como `"HS256"`.
    
    Crie uma variável para a expiração do token.
    
    Defina um modelo Pydantic que será usado no endpoint de token para a resposta.
    
    Crie uma função utilitária para gerar um novo token de acesso.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 11.4K bytes
    - Viewed (0)
Back to top