- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 651 for password1 (0.14 seconds)
-
docs/tr/docs/tutorial/response-model.md
Bunun yerine, plaintext password içeren bir input modeli ve password’ü içermeyen bir output modeli oluşturabiliriz: {* ../../docs_src/response_model/tutorial003_py310.py hl[9,11,16] *} Burada *path operation function* password içeren aynı input user’ı döndürüyor olsa bile: {* ../../docs_src/response_model/tutorial003_py310.py hl[24] *} ...`response_model` olarak, password’ü içermeyen `UserOut` modelimizi declare ettik:Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Fri Mar 20 07:53:17 GMT 2026 - 17K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/com/SmbComSessionSetupAndX.java
throw new RuntimeException("Plain text passwords are disabled"); } else { // plain text final String password = a.getPassword(); this.lmHash = new byte[(password.length() + 1) * 2]; this.ntHash = new byte[0]; writeString(password, this.lmHash, 0); } }
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 8.9K bytes - Click Count (0) -
docs/en/docs/how-to/conditional-openapi.md
* Make sure you have well defined Pydantic models for your request bodies and responses. * Configure any required permissions and roles using dependencies. * Never store plaintext passwords, only password hashes. * Implement and use well-known cryptographic tools, like pwdlib and JWT tokens, etc. * Add more granular permission controls with OAuth2 scopes where needed. * ...etc.
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 2.4K bytes - Click Count (0) -
src/main/java/jcifs/smb1/dcerpc/msrpc/srvsvc.java
*/ public int current_uses; /** * The local path of the share. */ public String path; /** * The share password (if any). */ public String password; /** * The size of the security descriptor. */ public int sd_size; /** * The security descriptor bytes. */Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 26.3K bytes - Click Count (0) -
CLAUDE.md
Created: Tue Mar 31 13:07:34 GMT 2026 - Last Modified: Thu Mar 19 09:48:10 GMT 2026 - 7.8K bytes - Click Count (0) -
src/test/java/jcifs/ntlmssp/Type3MessageTest.java
Type3Message type3 = new Type3Message(createMockContext(), type2, null, "password", mixedCaseDomain, mixedCaseUser, "WORKSTATION", 0); // Then assertEquals(mixedCaseDomain, type3.getDomain()); assertEquals(mixedCaseUser, type3.getUser()); } @Test @DisplayName("Should handle long passwords") void testLongPasswords() throws Exception { // GivenCreated: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Thu Aug 14 05:31:44 GMT 2025 - 17.3K bytes - Click Count (0) -
src/main/java/jcifs/smb1/smb1/NtlmPasswordAuthentication.java
return ntResponse; } /** * Generates the NTOWFv1 hash for the given password. * * @param password the password to hash * @return the NTOWFv1 hash bytes */ public static byte[] nTOWFv1(final String password) { if (password == null) { throw new RuntimeException("Password parameter is required"); } try { final MD4 md4 = new MD4();Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 26.7K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/com/ServerData.java
/** * Security mode flags. */ public int securityMode; /** * Security settings for the session. */ public int security; /** * Whether the server requires encrypted passwords. */ public boolean encryptedPasswords; /** * Whether message signing is enabled. */ public boolean signaturesEnabled; /** * Whether message signing is required. */Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 2.9K bytes - Click Count (0) -
docs/en/docs/tutorial/response-model.md
Now, whenever a browser is creating a user with a password, the API will return the same password in the response. In this case, it might not be a problem, because it's the same user sending the password. But if we use the same model for another *path operation*, we could be sending our user's passwords to every client. /// danger
Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 05 18:13:19 GMT 2026 - 15.5K bytes - Click Count (0) -
docs/es/docs/tutorial/security/oauth2-jwt.md
# OAuth2 con Password (y hashing), Bearer con tokens JWT { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Ahora que tenemos todo el flujo de seguridad, hagamos que la aplicación sea realmente segura, usando tokens <abbr title="JSON Web Tokens">JWT</abbr> y hashing de contraseñas seguras. Este código es algo que puedes usar realmente en tu aplicación, guardar los hashes de las contraseñas en tu base de datos, etc.Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 11.5K bytes - Click Count (0)