Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 41 - 50 of 386 for Passwort (0.05 seconds)

  1. docs/pt/docs/tutorial/extra-models.md

    Resultaria em algo equivalente a:
    
    ```Python
    UserInDB(
        username="john",
        password="secret",
        email="******@****.***",
        full_name=None,
    )
    ```
    
    Ou mais exatamente, usando `user_dict` diretamente, com qualquer conteúdo que ele possa ter no futuro:
    
    ```Python
    UserInDB(
        username = user_dict["username"],
        password = user_dict["password"],
        email = user_dict["email"],
        full_name = user_dict["full_name"],
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Nov 12 16:23:57 GMT 2025
    - 7.5K bytes
    - Click Count (0)
  2. docs_src/security/tutorial005_an_py310.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  3. docs_src/security/tutorial005_an_py39.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  4. samples/static-server/src/main/java/okhttp3/sample/SampleServer.java

        if (args.length != 4) {
          System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>");
          return;
        }
    
        String keystoreFile = args[0];
        String password = args[1];
        String root = args[2];
        int port = Integer.parseInt(args[3]);
    
        SSLContext sslContext = sslContext(keystoreFile, password);
        SampleServer server = new SampleServer(sslContext, root, port);
        server.run();
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Jan 02 02:50:44 GMT 2019
    - 4.7K bytes
    - Click Count (0)
  5. tests/test_tutorial/test_response_model/test_tutorial003_01.py

                                    "title": "Full Name",
                                    "anyOf": [{"type": "string"}, {"type": "null"}],
                                },
                                "password": {"title": "Password", "type": "string"},
                            },
                        },
                        "ValidationError": {
                            "title": "ValidationError",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Sat Dec 27 18:19:10 GMT 2025
    - 5.9K bytes
    - Click Count (0)
  6. api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/package-info.java

     */
    
    /**
     * Provides the API for the Maven Password Encryption tool ({@code mvnenc}).
     *
     * <p>This package contains interfaces and classes for the password encryption tool,
     * which helps secure sensitive information in Maven settings and configuration files.</p>
     *
     * <p>Key features include:</p>
     * <ul>
     *   <li>Password encryption and decryption</li>
     *   <li>Master password management</li>
    Created: Sun Dec 28 03:35:09 GMT 2025
    - Last Modified: Tue Mar 04 14:17:18 GMT 2025
    - 1.4K bytes
    - Click Count (0)
  7. docs_src/security/tutorial003_py39.py

        if not user_dict:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
        user = UserInDB(**user_dict)
        hashed_password = fake_hash_password(form_data.password)
        if not hashed_password == user.hashed_password:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
    
        return {"access_token": user.username, "token_type": "bearer"}
    
    
    @app.get("/users/me")
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 2.4K bytes
    - Click Count (0)
  8. docs_src/security/tutorial004_py310.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4K bytes
    - Click Count (0)
  9. docs_src/security/tutorial004_py39.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 4.1K bytes
    - Click Count (0)
  10. docs_src/security/tutorial003_an_py310.py

        if not user_dict:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
        user = UserInDB(**user_dict)
        hashed_password = fake_hash_password(form_data.password)
        if not hashed_password == user.hashed_password:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
    
        return {"access_token": user.username, "token_type": "bearer"}
    
    
    @app.get("/users/me")
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Nov 24 19:03:06 GMT 2025
    - 2.5K bytes
    - Click Count (0)
Back to Top