- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 346 for PassworD (0.14 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
src/main/java/org/codelibs/fess/app/web/base/login/LocalUserCredential.java
/** * Creates a new LocalUserCredential with the specified user and password. * * @param user the username * @param password the password */ public LocalUserCredential(final String user, final String password) { super(user, password); } @Override public String getUserId() { return getUser(); }Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Thu Jul 17 08:28:31 GMT 2025 - 1.2K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py310.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.3K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py39.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.3K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb1/com/SmbComTreeConnectAndX.java
// encrypted try { this.password = pwAuth.getAnsiHash(this.ctx, this.server.encryptionKey); } catch (final GeneralSecurityException e) { throw new RuntimeCIFSException("Failed to encrypt password", e); } this.passwordLength = this.password.length; } else if (this.ctx.getConfig().isDisablePlainTextPasswords()) {Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 7.1K bytes - Click Count (0) -
api/maven-api-cli/src/main/java/org/apache/maven/api/cli/mvnenc/package-info.java
*/ /** * Provides the API for the Maven Password Encryption tool ({@code mvnenc}). * * <p>This package contains interfaces and classes for the password encryption tool, * which helps secure sensitive information in Maven settings and configuration files.</p> * * <p>Key features include:</p> * <ul> * <li>Password encryption and decryption</li> * <li>Master password management</li>
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Mar 04 14:17:18 GMT 2025 - 1.4K bytes - Click Count (0) -
src/main/java/jcifs/smb/JAASAuthenticator.java
* @param domain the domain for authentication * @param username the username for authentication * @param password the password for authentication */ public JAASAuthenticator(String serviceName, String domain, String username, String password) { super(null, domain, username, password); this.serviceName = serviceName; } /** * Create an authenticator using the given credentialsCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 8.3K bytes - Click Count (1) -
src/main/java/org/codelibs/fess/opensearch/config/exentity/DataConfig.java
credentials = new NTCredentials(username, password == null ? StringUtil.EMPTY : password, workstation == null ? StringUtil.EMPTY : workstation, domain == null ? StringUtil.EMPTY : domain); } else { credentials = new UsernamePasswordCredentials(username, password == null ? StringUtil.EMPTY : password); } return credentials; }
Created: Sat Dec 20 09:19:18 GMT 2025 - Last Modified: Mon Nov 24 02:07:40 GMT 2025 - 18.8K bytes - Click Count (0) -
docs_src/security/tutorial003_py39.py
if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"} @app.get("/users/me")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 2.4K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4K bytes - Click Count (0) -
docs_src/security/tutorial004_py39.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.1K bytes - Click Count (0)