- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 58 for openjsse (0.06 sec)
-
src/packaging/rpm/init.d/fess
### END INIT INFO # # init.d / servicectl compatibility (openSUSE) # if [ -f /etc/rc.status ]; then . /etc/rc.status rc_reset fi # # Source function library. # if [ -f /etc/rc.d/init.d/functions ]; then . /etc/rc.d/init.d/functions fi
Registered: Thu Oct 31 13:40:30 UTC 2024 - Last Modified: Sun Jan 15 06:32:15 UTC 2023 - 3.7K bytes - Viewed (0) -
.github/workflows/scorecard.yml
# repo_token: ${{ secrets.SCORECARD_TOKEN }} # Public repositories: # - Publish results to OpenSSF REST API for easy access by consumers # - Allows the repository to include the Scorecard badge. # - See https://github.com/ossf/scorecard-action#publishing-results. # For private repositories:
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue Oct 29 18:53:45 UTC 2024 - 2.9K bytes - Viewed (0) -
docs_src/security/tutorial004_an.py
from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel from typing_extensions import Annotated # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4.2K bytes - Viewed (0) -
docs_src/security/tutorial004_py310.py
from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4K bytes - Viewed (0) -
okhttp/src/test/java/okhttp3/SessionReuseTest.kt
// // Report https://bugs.java.com/bugdatabase/view_bug.do?bug_id=JDK-8264944 // Sessions improvement https://bugs.java.com/bugdatabase/view_bug.do?bug_id=JDK-8245576 if (!platform.isJdk9() && !platform.isOpenJsse() && !platform.isJdk8Alpn()) { reuseSession = true } client.newCall(request).execute().use { response -> assertEquals(200, response.code) } assertEquals(2, sessionIds.size)
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Sat Jan 20 10:30:28 UTC 2024 - 6K bytes - Viewed (0) -
internal/config/certsinfo.go
buf.WriteString(", " + values[i]) } buf.WriteString("\n") } return values } // CertificateText returns a human-readable string representation // of the certificate cert. The format is similar to the OpenSSL // way of printing certificates (not identical). func CertificateText(cert *x509.Certificate) string { var buf strings.Builder buf.WriteString(color.Blue("\nCertificate:\n"))
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Nov 16 17:28:29 UTC 2021 - 3.1K bytes - Viewed (0) -
okhttp-tls/src/test/java/okhttp3/tls/HeldCertificateTest.kt
.isEqualTo("CN=cash.app,OU=engineering") } @Test fun decodeRsa512() { // The certificate + private key below was generated with OpenSSL. Never generate certificates // with MD5 or 512-bit RSA; that's insecure! // // openssl req \ // -x509 \ // -md5 \ // -nodes \ // -days 1 \ // -newkey rsa:512 \ // -keyout privateKey.key \
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 22.5K bytes - Viewed (0) -
docs_src/security/tutorial005.py
SecurityScopes, ) from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel, ValidationError # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.2K bytes - Viewed (0) -
docs_src/security/tutorial005_an.py
) from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel, ValidationError from typing_extensions import Annotated # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.3K bytes - Viewed (0) -
docs_src/security/tutorial005_py310.py
SecurityScopes, ) from jwt.exceptions import InvalidTokenError from passlib.context import CryptContext from pydantic import BaseModel, ValidationError # to get a string like this run: # openssl rand -hex 32 SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7" ALGORITHM = "HS256" ACCESS_TOKEN_EXPIRE_MINUTES = 30 fake_users_db = { "johndoe": { "username": "johndoe",
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.1K bytes - Viewed (0)