Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 11 - 20 of 45 for openjsse (0.07 seconds)

The search processing time has exceeded the limit. The displayed results may be partial.

  1. docs/tls/README.md

    ```sh
    openssl ecparam -genkey -name prime256v1 | openssl ec -out private.key
    ```
    
    A response similar to this one should be displayed:
    
    ```
    read EC key
    writing EC key
    ```
    
    Alternatively, use the following command to generate a private ECDSA key protected by a password:
    
    ```sh
    openssl ecparam -genkey -name prime256v1 | openssl ec -aes256 -out private.key -passout pass:PASSWORD
    ```
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 8.6K bytes
    - Click Count (0)
  2. docs/ftp/README.md

    `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. 
    If unspecified then a sensible default is used.
    
    Valid values: 
    ```
    aes128-ctr
    aes192-ctr
    aes256-ctr
    aes128-gcm@openssh.com
    aes256-gcm@openssh.com
    chacha20-poly1305@openssh.com
    arcfour256
    arcfour128
    arcfour
    aes128-cbc
    3des-cbc
    ```
    
    `--sftp=mac-algos=...` specifies a default set of MAC algorithms in preference order.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue May 07 06:41:25 GMT 2024
    - 7.8K bytes
    - Click Count (0)
  3. okhttp/src/jvmTest/kotlin/okhttp3/internal/tls/HostnameVerifierTest.kt

        // x509_extensions=x509_extensions
        // [distinguished_name]
        // [req_extensions]
        // [x509_extensions]
        // subjectAltName=DNS:localhost.localdomain,DNS:localhost,IP:127.0.0.1
        //
        // $ openssl req -x509 -nodes -days 36500 -subj '/CN=localhost' -config ./cert.cnf \
        //     -newkey rsa:512 -out cert.pem
        val certificate =
          certificate(
            """
            -----BEGIN CERTIFICATE-----
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Mar 19 19:25:20 GMT 2025
    - 40.4K bytes
    - Click Count (0)
  4. docs/features/https.md

     * **Connectivity** to as many hosts as possible. That includes advanced hosts that run the latest versions of [boringssl](https://boringssl.googlesource.com/boringssl/) and less out of date hosts running older versions of [OpenSSL](https://www.openssl.org/).
     * **Security** of the connection. This includes verification of the remote webserver with certificates and the privacy of data exchanged with strong ciphers.
    
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Sat Dec 24 00:16:30 GMT 2022
    - 10.5K bytes
    - Click Count (0)
  5. docs_src/security/tutorial005_an_py310.py

        OAuth2PasswordRequestForm,
        SecurityScopes,
    )
    from jwt.exceptions import InvalidTokenError
    from pwdlib import PasswordHash
    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  6. docs_src/security/tutorial005_an_py39.py

        OAuth2PasswordRequestForm,
        SecurityScopes,
    )
    from jwt.exceptions import InvalidTokenError
    from pwdlib import PasswordHash
    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  7. docs_src/security/tutorial004_an_py39.py

    from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
    from jwt.exceptions import InvalidTokenError
    from pwdlib import PasswordHash
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  8. .github/workflows/scorecard.yml

              # repo_token: ${{ secrets.SCORECARD_TOKEN }}
    
              # Public repositories:
              #   - Publish results to OpenSSF REST API for easy access by consumers
              #   - Allows the repository to include the Scorecard badge.
              #   - See https://github.com/ossf/scorecard-action#publishing-results.
              # For private repositories:
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Mon Dec 01 19:32:55 GMT 2025
    - 2.9K bytes
    - Click Count (0)
  9. docs_src/security/tutorial004_py310.py

    from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
    from jwt.exceptions import InvalidTokenError
    from pwdlib import PasswordHash
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4K bytes
    - Click Count (0)
  10. docs_src/security/tutorial004_py39.py

    from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
    from jwt.exceptions import InvalidTokenError
    from pwdlib import PasswordHash
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 4.1K bytes
    - Click Count (0)
Back to Top