Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 428 for incorect (0.06 sec)

  1. docs/de/docs/advanced/security/http-basic-auth.md

    #### Die Zeit zum Antworten hilft den Angreifern
    
    Wenn die Angreifer zu diesem Zeitpunkt feststellen, dass der Server einige Mikrosekunden länger braucht, um die Antwort „Incorrect username or password“ zu senden, wissen sie, dass sie _etwas_ richtig gemacht haben, einige der Anfangsbuchstaben waren richtig.
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 27 15:25:54 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  2. tests/test_tutorial/test_security/test_tutorial005_an_py39.py

    
    @needs_py39
    def test_login_incorrect_password(client: TestClient):
        response = client.post(
            "/token", data={"username": "johndoe", "password": "incorrect"}
        )
        assert response.status_code == 400, response.text
        assert response.json() == {"detail": "Incorrect username or password"}
    
    
    @needs_py39
    def test_login_incorrect_username(client: TestClient):
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  3. docs_src/security/tutorial003_an.py

        if not user_dict:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
        user = UserInDB(**user_dict)
        hashed_password = fake_hash_password(form_data.password)
        if not hashed_password == user.hashed_password:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
    
        return {"access_token": user.username, "token_type": "bearer"}
    
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Mar 26 16:56:53 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  4. docs_src/security/tutorial003_an_py39.py

        if not user_dict:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
        user = UserInDB(**user_dict)
        hashed_password = fake_hash_password(form_data.password)
        if not hashed_password == user.hashed_password:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
    
        return {"access_token": user.username, "token_type": "bearer"}
    
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Mar 26 16:56:53 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  5. utils/tests/utils.go

    	"go/ast"
    	"reflect"
    	"testing"
    	"time"
    
    	"gorm.io/gorm/utils"
    )
    
    func AssertObjEqual(t *testing.T, r, e interface{}, names ...string) {
    	for _, name := range names {
    		rv := reflect.Indirect(reflect.ValueOf(r))
    		ev := reflect.Indirect(reflect.ValueOf(e))
    		if rv.IsValid() != ev.IsValid() {
    			t.Errorf("%v: expect: %+v, got %+v", utils.FileWithLineNum(), r, e)
    			return
    		}
    		got := rv.FieldByName(name).Interface()
    Registered: Sun Nov 03 09:35:10 UTC 2024
    - Last Modified: Fri Mar 10 09:21:56 UTC 2023
    - 3.9K bytes
    - Viewed (0)
  6. internal/config/config_test.go

    				`comment="really long comment"`:                {},
    			},
    		},
    		// Incorrect delimiter, expected fields should be empty.
    		{
    			input:          `comment:"really long comment" connection_string:"host=localhost port=2832"`,
    			keys:           []string{"connection_string", "comment"},
    			expectedFields: map[string]struct{}{},
    		},
    		// Incorrect type of input v/s required keys.
    		{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 18 22:55:17 UTC 2022
    - 4.2K bytes
    - Viewed (0)
  7. src/cmd/api/testdata/src/issue21181/p/p_amd64.go

    package p
    
    import "indirect"
    
    var in = []algo{
    	{indirect.F},
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Fri Oct 05 17:53:43 UTC 2018
    - 64 bytes
    - Viewed (0)
  8. tests/test_tutorial/test_security/test_tutorial005_an.py

    
    def test_login_incorrect_password():
        response = client.post(
            "/token", data={"username": "johndoe", "password": "incorrect"}
        )
        assert response.status_code == 400, response.text
        assert response.json() == {"detail": "Incorrect username or password"}
    
    
    def test_login_incorrect_username():
        response = client.post("/token", data={"username": "foo", "password": "secret"})
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 15.4K bytes
    - Viewed (0)
  9. tests/test_tutorial/test_security/test_tutorial005_an_py310.py

    
    @needs_py310
    def test_login_incorrect_password(client: TestClient):
        response = client.post(
            "/token", data={"username": "johndoe", "password": "incorrect"}
        )
        assert response.status_code == 400, response.text
        assert response.json() == {"detail": "Incorrect username or password"}
    
    
    @needs_py310
    def test_login_incorrect_username(client: TestClient):
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Wed Mar 13 19:07:10 UTC 2024
    - 16.3K bytes
    - Viewed (0)
  10. docs_src/security/tutorial007_an_py39.py

            current_password_bytes, correct_password_bytes
        )
        if not (is_correct_username and is_correct_password):
            raise HTTPException(
                status_code=status.HTTP_401_UNAUTHORIZED,
                detail="Incorrect username or password",
                headers={"WWW-Authenticate": "Basic"},
            )
        return credentials.username
    
    
    @app.get("/users/me")
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Tue Mar 26 16:56:53 UTC 2024
    - 1.1K bytes
    - Viewed (0)
Back to top