Search Options

Results per page
Sort
Preferred Languages
Advance

Results 131 - 140 of 149 for sha256 (0.11 sec)

  1. docs_src/security/tutorial004_py310.py

    from passlib.context import CryptContext
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
            "full_name": "John Doe",
            "email": "******@****.***",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4K bytes
    - Viewed (0)
  2. api/go1.txt

    pkg crypto/sha1, const BlockSize ideal-int
    pkg crypto/sha1, const Size ideal-int
    pkg crypto/sha1, func New() hash.Hash
    pkg crypto/sha256, const BlockSize ideal-int
    pkg crypto/sha256, const Size ideal-int
    pkg crypto/sha256, const Size224 ideal-int
    pkg crypto/sha256, func New() hash.Hash
    pkg crypto/sha256, func New224() hash.Hash
    pkg crypto/sha512, const BlockSize ideal-int
    pkg crypto/sha512, const Size ideal-int
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Wed Aug 14 18:58:28 UTC 2013
    - 1.7M bytes
    - Viewed (0)
  3. docs_src/security/tutorial005_py310.py

    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
            "full_name": "John Doe",
            "email": "******@****.***",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.1K bytes
    - Viewed (0)
  4. docs_src/security/tutorial004_an.py

    from pydantic import BaseModel
    from typing_extensions import Annotated
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
            "full_name": "John Doe",
            "email": "******@****.***",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  5. docs_src/security/tutorial005.py

    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
            "full_name": "John Doe",
            "email": "******@****.***",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  6. docs_src/security/tutorial005_an.py

    from typing_extensions import Annotated
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
            "full_name": "John Doe",
            "email": "******@****.***",
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  7. docs/em/docs/tutorial/security/oauth2-jwt.md

    ```console
    $ openssl rand -hex 32
    
    09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7
    ```
    
    </div>
    
    &amp; 📁 🔢 🔢 `SECRET_KEY` (🚫 ⚙️ 1️⃣ 🖼).
    
    ✍ 🔢 `ALGORITHM` ⏮️ 📊 ⚙️ 🛑 🥙 🤝 &amp; ⚒ ⚫️ `"HS256"`.
    
    ✍ 🔢 👔 🤝.
    
    🔬 Pydantic 🏷 👈 🔜 ⚙️ 🤝 🔗 📨.
    
    ✍ 🚙 🔢 🏗 🆕 🔐 🤝.
    
    //// tab | 🐍 3️⃣.6️⃣ &amp; 🔛
    
    ```Python hl_lines="6  12-14  28-30  78-86"
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 9.5K bytes
    - Viewed (0)
  8. internal/event/target/mysql.go

    	// Some MySQL has a 3072 byte limit on key sizes.
    	mysqlCreateNamespaceTable = `CREATE TABLE %s (
                 key_name VARCHAR(3072) NOT NULL,
                 key_hash CHAR(64) GENERATED ALWAYS AS (SHA2(key_name, 256)) STORED NOT NULL PRIMARY KEY,
                 value JSON)
               CHARACTER SET = utf8mb4 COLLATE = utf8mb4_bin ROW_FORMAT = Dynamic;`
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 23:06:30 UTC 2024
    - 11.6K bytes
    - Viewed (0)
  9. src/cmd/asm/internal/asm/testdata/arm64enc.s

    	SHA1SU0 V17.S4, V13.S4, V16.S4                              // b031115e
    	SHA1SU1 V24.S4, V23.S4                                      // 171b285e
    	SHA256H2 V6.S4, V16, V11                                    // 0b52065e
    	SHA256H V4.S4, V2, V11                                      // 4b40045e
    	SHA256SU0 V0.S4, V16.S4                                     // 1028285e
    Registered: Tue Nov 05 11:13:11 UTC 2024
    - Last Modified: Mon Jul 24 01:11:41 UTC 2023
    - 43.9K bytes
    - Viewed (0)
  10. docs/de/docs/tutorial/security/oauth2-jwt.md

    Und kopieren Sie die Ausgabe in die Variable `SECRET_KEY` (verwenden Sie nicht die im Beispiel).
    
    Erstellen Sie eine Variable `ALGORITHM` fĂźr den Algorithmus, der zum Signieren des JWT-Tokens verwendet wird, und setzen Sie sie auf `"HS256"`.
    
    Erstellen Sie eine Variable fĂźr das Ablaufdatum des Tokens.
    
    Definieren Sie ein Pydantic-Modell, das im Token-Endpunkt fĂźr die Response verwendet wird.
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Sun Oct 06 20:36:54 UTC 2024
    - 15K bytes
    - Viewed (0)
Back to top