- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 398 for password (0.07 seconds)
-
docs/de/docs/tutorial/security/oauth2-jwt.md
# OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens } Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden. Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Oct 01 15:19:54 GMT 2025 - 12.7K bytes - Click Count (0) -
okhttp/src/commonJvmAndroid/kotlin/okhttp3/Credentials.kt
object Credentials { /** Returns an auth credential for the Basic scheme. */ @JvmStatic @JvmOverloads fun basic( username: String, password: String, charset: Charset = ISO_8859_1, ): String { val usernameAndPassword = "$username:$password" val encoded = usernameAndPassword.encode(charset).base64() return "Basic $encoded" }Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Fri Dec 27 13:39:56 GMT 2024 - 1.1K bytes - Click Count (0) -
internal/config/notify/legacy.go
Value: config.FormatBool(cfg.SASL.Enable), }, config.KV{ Key: target.KafkaSASLUsername, Value: cfg.SASL.User, }, config.KV{ Key: target.KafkaSASLPassword, Value: cfg.SASL.Password, }, config.KV{ Key: target.KafkaCompressionCodec, Value: cfg.Producer.Compression, }, config.KV{ Key: target.KafkaCompressionLevel, Value: strconv.Itoa(cfg.Producer.CompressionLevel),
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Apr 27 04:30:57 GMT 2025 - 13.3K bytes - Click Count (0) -
docs/ru/docs/advanced/security/http-basic-auth.md
Чтобы это обработать, сначала преобразуем `username` и `password` в `bytes`, закодировав их в UTF-8. Затем можно использовать `secrets.compare_digest()`, чтобы убедиться, что `credentials.username` равен `"stanleyjobson"`, а `credentials.password` — `"swordfish"`. {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *} Это было бы похоже на: ```Python
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Sep 30 11:37:11 GMT 2025 - 7.4K bytes - Click Count (0) -
internal/logger/target/kafka/kafka_scram_client_contrib.go
// factory receiver. This constructor will normalize the username, password // and authzID via the SASLprep algorithm, as recommended by RFC-5802. If // SASLprep fails, the method returns an error. func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) { x.Client, err = x.NewClient(userName, password, authzID) if err != nil { return err } x.ClientConversation = x.NewConversation()
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 3.3K bytes - Click Count (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
Para lidar com isso, primeiramente nós convertemos o `username` e o `password` para `bytes`, codificando-os com UTF-8. Então nós podemos utilizar o `secrets.compare_digest()` para garantir que o `credentials.username` é `"stanleyjobson"`, e que o `credentials.password` é `"swordfish"`. {* ../../docs_src/security/tutorial007_an_py39.py hl[1,12:24] *} Isso seria parecido com: ```Python
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 5.3K bytes - Click Count (0) -
tests/tests_test.go
) var DB *gorm.DB var ( mysqlDSN = "gorm:gorm@tcp(localhost:9910)/gorm?charset=utf8&parseTime=True&loc=Local" postgresDSN = "user=gorm password=gorm dbname=gorm host=localhost port=9920 sslmode=disable TimeZone=Asia/Shanghai" gaussdbDSN = "user=gaussdb password=Gaussdb@123 dbname=gorm host=localhost port=9950 sslmode=disable TimeZone=Asia/Shanghai" sqlserverDSN = "sqlserver://sa:LoremIpsum86@localhost:9930?database=master"
Created: Sun Dec 28 09:35:17 GMT 2025 - Last Modified: Mon Jul 21 02:46:58 GMT 2025 - 3.7K bytes - Click Count (0) -
docs_src/extra_models/tutorial002_py310.py
class UserIn(UserBase): password: str class UserOut(UserBase): pass class UserInDB(UserBase): hashed_password: str def fake_password_hasher(raw_password: str): return "supersecret" + raw_password def fake_save_user(user_in: UserIn): hashed_password = fake_password_hasher(user_in.password)
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 20 15:55:38 GMT 2025 - 798 bytes - Click Count (0) -
docs_src/security/tutorial007_an_py39.py
current_password_bytes = credentials.password.encode("utf8") correct_password_bytes = b"swordfish" is_correct_password = secrets.compare_digest( current_password_bytes, correct_password_bytes ) if not (is_correct_username and is_correct_password): raise HTTPException( status_code=status.HTTP_401_UNAUTHORIZED, detail="Incorrect username or password",
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Mar 26 16:56:53 GMT 2024 - 1.1K bytes - Click Count (0) -
tests/test_filter_pydantic_sub_model_pv2.py
if not name.endswith("A"): raise ValueError("name must end in A") return name async def get_model_c() -> ModelC: return ModelC(username="test-user", password="test-password") @app.get("/model/{name}", response_model=ModelA) async def get_model_a(name: str, model_c=Depends(get_model_c)): return { "name": name, "description": "model-a-desc",
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 18:19:10 GMT 2025 - 6.6K bytes - Click Count (0)