Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 141 - 150 of 176 for Encrypt (0.04 seconds)

  1. docs/sts/dex.yaml

    # won't look in its underlying storage for passwords.
    #
    # If this option isn't chosen users may be added through the gRPC API.
    staticPasswords:
      - email: "******@****.***"
        # bcrypt hash of the string "password"
        hash: "$2a$10$2b2cU8CPhOTaGrs1HRQuAueS7JTT5ZHsHSzYiFPm1leZck7Mc8T4W"
        username: "admin"
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Jul 15 11:55:55 GMT 2020
    - 2.7K bytes
    - Click Count (0)
  2. internal/config/certs.go

    import (
    	"bytes"
    	"crypto/tls"
    	"crypto/x509"
    	"encoding/pem"
    	"errors"
    	"os"
    
    	"github.com/minio/pkg/v3/env"
    )
    
    // EnvCertPassword is the environment variable which contains the password used
    // to decrypt the TLS private key. It must be set if the TLS private key is
    // password protected.
    const EnvCertPassword = "MINIO_CERT_PASSWD"
    
    // ParsePublicCertFile - parses public cert into its *x509.Certificate equivalent.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Aug 14 17:11:51 GMT 2024
    - 3.8K bytes
    - Click Count (0)
  3. docs/de/docs/tutorial/security/oauth2-jwt.md

    /// tip | Tipp
    
    pwdlib unterstützt auch den bcrypt-Hashing-Algorithmus, enthält jedoch keine Legacy-Algorithmen – für die Arbeit mit veralteten Hashes wird die Verwendung der Bibliothek passlib empfohlen.
    
    Sie könnten sie beispielsweise verwenden, um von einem anderen System (wie Django) generierte Passwörter zu lesen und zu verifizieren, aber alle neuen Passwörter mit einem anderen Algorithmus wie Argon2 oder Bcrypt zu hashen.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:58:09 GMT 2026
    - 12.9K bytes
    - Click Count (0)
  4. docs/es/docs/tutorial/security/oauth2-jwt.md

    /// tip | Consejo
    
    pwdlib también soporta el algoritmo de hashing bcrypt pero no incluye algoritmos legacy; para trabajar con hashes desactualizados, se recomienda usar el paquete passlib.
    
    Por ejemplo, podrías usarlo para leer y verificar contraseñas generadas por otro sistema (como Django) pero hacer hash de cualquier contraseña nueva con un algoritmo diferente como Argon2 o Bcrypt.
    
    Y ser compatible con todos ellos al mismo tiempo.
    
    ///
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:15:55 GMT 2026
    - 11.5K bytes
    - Click Count (0)
  5. docs/debugging/inspect/main.go

    	default:
    		outputFileName = inputFileName + ".decrypted"
    	}
    
    	// Open the input and create the output file
    	input, err := os.Open(inputFileName)
    	fatalErr(err)
    	defer input.Close()
    
    	// Decrypt the inspect data
    	switch {
    	case *keyHex != "":
    		// Backup any already existing output file
    		_, err := os.Stat(outputFileName)
    		if err == nil {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Mon Feb 17 17:09:42 GMT 2025
    - 5.7K bytes
    - Click Count (0)
  6. docs/ru/docs/tutorial/security/oauth2-jwt.md

    /// tip | Подсказка
    
    pwdlib также поддерживает алгоритм хеширования bcrypt, но не включает устаревшие алгоритмы — для работы с устаревшими хэшами рекомендуется использовать библиотеку passlib.
    
    Например, вы можете использовать ее для чтения и проверки паролей, сгенерированных другой системой (например, Django), но хэшировать все новые пароли другим алгоритмом, например Argon2 или Bcrypt.
    
    И при этом быть совместимым со всеми этими системами.
    
    ///
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 17:56:20 GMT 2026
    - 19.7K bytes
    - Click Count (0)
  7. docs/fr/docs/tutorial/security/oauth2-jwt.md

    pwdlib prend également en charge l'algorithme de hachage bcrypt, mais n'inclut pas les algorithmes hérités. Pour travailler avec des hachages obsolètes, il est recommandé d'utiliser la bibliothèque passlib.
    
    Par exemple, vous pourriez l'utiliser pour lire et vérifier des mots de passe générés par un autre système (comme Django), mais hacher tous les nouveaux mots de passe avec un autre algorithme comme Argon2 ou Bcrypt.
    
    Et rester compatible avec tous en même temps.
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:37:13 GMT 2026
    - 12.6K bytes
    - Click Count (0)
  8. docs/pt/docs/tutorial/security/oauth2-jwt.md

    /// tip | Dica
    
    pwdlib também oferece suporte ao algoritmo de hashing bcrypt, mas não inclui algoritmos legados – para trabalhar com hashes antigos, é recomendado usar a biblioteca passlib.
    
    Por exemplo, você poderia usá-lo para ler e verificar senhas geradas por outro sistema (como Django), mas criar o hash de novas senhas com um algoritmo diferente, como o Argon2 ou o Bcrypt.
    
    E ser compatível com todos eles ao mesmo tempo.
    
    ///
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Thu Mar 19 18:20:43 GMT 2026
    - 11.6K bytes
    - Click Count (0)
  9. docs/ko/docs/tutorial/security/index.md

    OAuth 1도 있었는데, 이는 OAuth2와 매우 다르고 통신을 암호화하는 방법까지 직접 명세에 포함했기 때문에 더 복잡했습니다.
    
    요즘에는 그다지 인기 있거나 사용되지는 않습니다.
    
    OAuth2는 통신을 어떻게 암호화할지는 명세하지 않고, 애플리케이션이 HTTPS로 제공될 것을 기대합니다.
    
    /// tip | 팁
    
    **배포**에 대한 섹션에서 Traefik과 Let's Encrypt를 사용해 무료로 HTTPS를 설정하는 방법을 볼 수 있습니다.
    
    ///
    
    ## OpenID Connect { #openid-connect }
    
    OpenID Connect는 **OAuth2**를 기반으로 한 또 다른 명세입니다.
    
    OAuth2에서 비교적 모호한 부분을 일부 구체화하여 상호 운용성을 높이려는 확장입니다.
    
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Fri Jan 16 11:54:01 GMT 2026
    - 5.1K bytes
    - Click Count (0)
  10. internal/crypto/key_test.go

    		if err != nil {
    			t.Errorf("Test %d: failed to decode etag: %s", i, err)
    		}
    		sealedETag := key.SealETag(tag)
    		unsealedETag, err := key.UnsealETag(sealedETag)
    		if err != nil {
    			t.Errorf("Test %d: failed to decrypt etag: %s", i, err)
    		}
    		if !bytes.Equal(unsealedETag, tag) {
    			t.Errorf("Test %d: unsealed etag does not match: got %s - want %s", i, hex.EncodeToString(unsealedETag), etag)
    		}
    	}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Jul 12 20:51:54 GMT 2024
    - 6.7K bytes
    - Click Count (0)
Back to Top