- Sort Score
- Result 10 results
- Languages All
Results 101 - 110 of 120 for sha256 (0.08 sec)
-
src/main/resources/fess_config.properties
# Cipher algorithm used for encryption. app.cipher.algorism=aes # Secret key for encryption (change this value for production). app.cipher.key=___change__me___ # Algorithm for digest calculation. app.digest.algorism=sha256 # Regex pattern for properties to encrypt. app.encrypt.property.pattern=.*password|.*key|.*token|.*secret # Extension names for application customization. app.extension.names= # Audit log format.
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Sat Jul 05 14:45:37 UTC 2025 - 54.7K bytes - Viewed (0) -
go.sum
github.com/minio/selfupdate v0.6.0 h1:i76PgT0K5xO9+hjzKcacQtO7+MjJ4JKA8Ak8XQ9DDwU= github.com/minio/selfupdate v0.6.0/go.mod h1:bO02GTIPCMQFTEvE5h4DjYB58bCoZ35XLeBf0buTDdM= github.com/minio/sha256-simd v0.1.1/go.mod h1:B5e1o+1/KgNmWrSQK08Y6Z1Vb5pwIktudl0J58iy0KM= github.com/minio/simdjson-go v0.4.5 h1:r4IQwjRGmWCQ2VeMc7fGiilu1z5du0gJ/I/FsKwgo5A=
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:33:19 UTC 2025 - 79.9K bytes - Viewed (0) -
docs/bucket/notifications/README.md
MINIO_NOTIFY_KAFKA_SASL_PASSWORD (string) password for SASL/PLAIN or SASL/SCRAM authentication MINIO_NOTIFY_KAFKA_SASL_MECHANISM (plain*|sha256|sha512) sasl authentication mechanism, default 'plain' MINIO_NOTIFY_KAFKA_TLS_CLIENT_AUTH (string) clientAuth determines the Kafka server's policy for TLS client auth
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 84.2K bytes - Viewed (0) -
src/main/java/org/codelibs/fess/mylasta/direction/FessConfig.java
String APP_CIPHER_ALGORISM = "app.cipher.algorism"; /** The key of the configuration. e.g. ___change__me___ */ String APP_CIPHER_KEY = "app.cipher.key"; /** The key of the configuration. e.g. sha256 */ String APP_DIGEST_ALGORISM = "app.digest.algorism"; /** The key of the configuration. e.g. .*password|.*key|.*token|.*secret */ String APP_ENCRYPT_PROPERTY_PATTERN = "app.encrypt.property.pattern";
Registered: Thu Sep 04 12:52:25 UTC 2025 - Last Modified: Thu Jul 17 08:28:31 UTC 2025 - 525.6K bytes - Viewed (2) -
api/go1.txt
pkg crypto/sha1, const BlockSize ideal-int pkg crypto/sha1, const Size ideal-int pkg crypto/sha1, func New() hash.Hash pkg crypto/sha256, const BlockSize ideal-int pkg crypto/sha256, const Size ideal-int pkg crypto/sha256, const Size224 ideal-int pkg crypto/sha256, func New() hash.Hash pkg crypto/sha256, func New224() hash.Hash pkg crypto/sha512, const BlockSize ideal-int pkg crypto/sha512, const Size ideal-int
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed Aug 14 18:58:28 UTC 2013 - 1.7M bytes - Viewed (0) -
src/cmd/asm/internal/asm/testdata/arm64enc.s
SHA1SU0 V17.S4, V13.S4, V16.S4 // b031115e SHA1SU1 V24.S4, V23.S4 // 171b285e SHA256H2 V6.S4, V16, V11 // 0b52065e SHA256H V4.S4, V2, V11 // 4b40045e SHA256SU0 V0.S4, V16.S4 // 1028285e
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Mon Jul 24 01:11:41 UTC 2023 - 43.9K bytes - Viewed (0) -
docs/em/docs/tutorial/security/oauth2-jwt.md
```console $ openssl rand -hex 32 09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7 ``` </div> & 📁 🔢 🔢 `SECRET_KEY` (🚫 ⚙️ 1️⃣ 🖼). ✍ 🔢 `ALGORITHM` ⏮️ 📊 ⚙️ 🛑 🥙 🤝 & ⚒ ⚫️ `"HS256"`. ✍ 🔢 👔 🤝. 🔬 Pydantic 🏷 👈 🔜 ⚙️ 🤝 🔗 📨. ✍ 🚙 🔢 🏗 🆕 🔐 🤝. {* ../../docs_src/security/tutorial004.py hl[6,12:14,28:30,78:86] *} ## ℹ 🔗Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 8.6K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel). Erstellen Sie eine Variable `ALGORITHM` für den Algorithmus, der zum Signieren des JWT-Tokens verwendet wird, und setzen Sie sie auf `"HS256"`. Erstellen Sie eine Variable für das Ablaufdatum des Tokens. Definieren Sie ein Pydantic-Modell, das im Token-Endpunkt für die Response verwendet wird.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
``` </div> Y copia el resultado a la variable `SECRET_KEY` (no uses la del ejemplo). Crea una variable `ALGORITHM` con el algoritmo usado para firmar el token JWT y configúralo a `"HS256"`. Crea una variable para la expiración del token. Define un Modelo de Pydantic que se usará en el endpoint de token para el response. Crea una función de utilidad para generar un nuevo token de acceso.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
api/go1.4.txt
# CL 138800043 crypto: Add SHA3 functions in go.crypto/sha3 to the Hash enum., David Leon Gil <******@****.***> pkg crypto, const SHA3_224 = 10 pkg crypto, const SHA3_224 Hash pkg crypto, const SHA3_256 = 11 pkg crypto, const SHA3_256 Hash pkg crypto, const SHA3_384 = 12 pkg crypto, const SHA3_384 Hash pkg crypto, const SHA3_512 = 13 pkg crypto, const SHA3_512 Hash # CL 114680043 crypto: add Signer, Adam Langley <******@****.***>
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Fri Dec 12 03:01:01 UTC 2014 - 34K bytes - Viewed (0)