Search Options

Results per page
Sort
Preferred Languages
Advance

Results 71 - 80 of 574 for PASSWORD (0.12 sec)

  1. docs_src/security/tutorial003_py39.py

        if not user_dict:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
        user = UserInDB(**user_dict)
        hashed_password = fake_hash_password(form_data.password)
        if not hashed_password == user.hashed_password:
            raise HTTPException(status_code=400, detail="Incorrect username or password")
    
        return {"access_token": user.username, "token_type": "bearer"}
    
    
    @app.get("/users/me")
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 2.4K bytes
    - Viewed (0)
  2. docs_src/security/tutorial004_py310.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 4K bytes
    - Viewed (0)
  3. docs_src/security/tutorial004_py39.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Dec 17 20:41:43 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  4. samples/static-server/src/main/java/okhttp3/sample/SampleServer.java

        if (args.length != 4) {
          System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>");
          return;
        }
    
        String keystoreFile = args[0];
        String password = args[1];
        String root = args[2];
        int port = Integer.parseInt(args[3]);
    
        SSLContext sslContext = sslContext(keystoreFile, password);
        SampleServer server = new SampleServer(sslContext, root, port);
        server.run();
    Registered: Fri Dec 26 11:42:13 UTC 2025
    - Last Modified: Wed Jan 02 02:50:44 UTC 2019
    - 4.7K bytes
    - Viewed (0)
  5. docs/pt/docs/tutorial/extra-models.md

    Resultaria em algo equivalente a:
    
    ```Python
    UserInDB(
        username="john",
        password="secret",
        email="******@****.***",
        full_name=None,
    )
    ```
    
    Ou mais exatamente, usando `user_dict` diretamente, com qualquer conteúdo que ele possa ter no futuro:
    
    ```Python
    UserInDB(
        username = user_dict["username"],
        password = user_dict["password"],
        email = user_dict["email"],
        full_name = user_dict["full_name"],
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Nov 12 16:23:57 UTC 2025
    - 7.5K bytes
    - Viewed (0)
  6. src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java

                auth1.close();
                auth2.close();
            }
        }
    
        /**
         * Test concurrent password comparisons to ensure thread safety and consistent timing.
         */
        @Test
        public void testConcurrentTimingConsistency() throws Exception {
            final char[] password = "concurrenttestpassword".toCharArray();
            final char[] wrongPassword = "concurrenttestpassworX".toCharArray(); // Different at end
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sun Aug 31 08:00:57 UTC 2025
    - 11.2K bytes
    - Viewed (0)
  7. tests/test_tutorial/test_response_model/test_tutorial003_01.py

                                    "title": "Full Name",
                                    "anyOf": [{"type": "string"}, {"type": "null"}],
                                },
                                "password": {"title": "Password", "type": "string"},
                            },
                        },
                        "ValidationError": {
                            "title": "ValidationError",
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sat Dec 27 18:19:10 UTC 2025
    - 5.9K bytes
    - Viewed (0)
  8. src/main/java/jcifs/util/SecureCredentialStorage.java

                throw new IllegalArgumentException("Master password cannot be null or empty");
            }
    
            // Generate salt for key derivation
            this.salt = new byte[SALT_SIZE];
            secureRandom.nextBytes(this.salt);
    
            // Derive master key from password
            this.masterKey = deriveKey(masterPassword, salt);
    
            // Clear the master password after use
            Arrays.fill(masterPassword, '\0');
        }
    
    Registered: Sat Dec 20 13:44:44 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  9. impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/mvnenc/ConsolePasswordPrompt.java

            return "Secure console password prompt";
        }
    
        @Override
        public Optional<String> configTemplate() {
            return Optional.empty();
        }
    
        @Override
        public String handle(String config) throws SecDispatcherException {
            if (NAME.equals(config)) {
                try {
                    return prompter.promptForPassword("Enter the master password: ");
                } catch (PrompterException e) {
    Registered: Sun Dec 28 03:35:09 UTC 2025
    - Last Modified: Sat Nov 16 13:55:43 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  10. docs_src/security/tutorial005_py310.py

        return password_hash.verify(plain_password, hashed_password)
    
    
    def get_password_hash(password):
        return password_hash.hash(password)
    
    
    def get_user(db, username: str):
        if username in db:
            user_dict = db[username]
            return UserInDB(**user_dict)
    
    
    def authenticate_user(fake_db, username: str, password: str):
        user = get_user(fake_db, username)
        if not user:
            return False
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 5.2K bytes
    - Viewed (0)
Back to top