- Sort Score
- Num 10 results
- Language All
Results 71 - 80 of 578 for PassworD (0.06 seconds)
-
docs/es/docs/tutorial/security/first-steps.md
Puede ser utilizada por aplicaciones y sistemas de terceros. Y también puede ser utilizada por ti mismo, para depurar, revisar y probar la misma aplicación. ## El flujo `password` { #the-password-flow } Ahora retrocedamos un poco y entendamos qué es todo eso. El "flujo" `password` es una de las formas ("flujos") definidas en OAuth2, para manejar la seguridad y la autenticación.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 8.9K bytes - Click Count (0) -
docs_src/security/tutorial003_py39.py
if not user_dict: raise HTTPException(status_code=400, detail="Incorrect username or password") user = UserInDB(**user_dict) hashed_password = fake_hash_password(form_data.password) if not hashed_password == user.hashed_password: raise HTTPException(status_code=400, detail="Incorrect username or password") return {"access_token": user.username, "token_type": "bearer"} @app.get("/users/me")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 2.4K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4K bytes - Click Count (0) -
docs_src/security/tutorial004_py39.py
return password_hash.verify(plain_password, hashed_password) def get_password_hash(password): return password_hash.hash(password) def get_user(db, username: str): if username in db: user_dict = db[username] return UserInDB(**user_dict) def authenticate_user(fake_db, username: str, password: str): user = get_user(fake_db, username) if not user: return False
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.1K bytes - Click Count (0) -
samples/static-server/src/main/java/okhttp3/sample/SampleServer.java
if (args.length != 4) { System.out.println("Usage: SampleServer <keystore> <password> <root file> <port>"); return; } String keystoreFile = args[0]; String password = args[1]; String root = args[2]; int port = Integer.parseInt(args[3]); SSLContext sslContext = sslContext(keystoreFile, password); SampleServer server = new SampleServer(sslContext, root, port); server.run();
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Jan 02 02:50:44 GMT 2019 - 4.7K bytes - Click Count (0) -
docs/pt/docs/tutorial/extra-models.md
Resultaria em algo equivalente a: ```Python UserInDB( username="john", password="secret", email="******@****.***", full_name=None, ) ``` Ou mais exatamente, usando `user_dict` diretamente, com qualquer conteúdo que ele possa ter no futuro: ```Python UserInDB( username = user_dict["username"], password = user_dict["password"], email = user_dict["email"], full_name = user_dict["full_name"],Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 7.5K bytes - Click Count (0) -
src/test/java/jcifs/smb/NtlmPasswordAuthenticatorTimingAttackTest.java
auth1.close(); auth2.close(); } } /** * Test concurrent password comparisons to ensure thread safety and consistent timing. */ @Test public void testConcurrentTimingConsistency() throws Exception { final char[] password = "concurrenttestpassword".toCharArray(); final char[] wrongPassword = "concurrenttestpassworX".toCharArray(); // Different at end
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sun Aug 31 08:00:57 GMT 2025 - 11.2K bytes - Click Count (0) -
tests/test_tutorial/test_response_model/test_tutorial003_01.py
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 18:19:10 GMT 2025 - 5.9K bytes - Click Count (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
throw new IllegalArgumentException("Master password cannot be null or empty"); } // Generate salt for key derivation this.salt = new byte[SALT_SIZE]; secureRandom.nextBytes(this.salt); // Derive master key from password this.masterKey = deriveKey(masterPassword, salt); // Clear the master password after use Arrays.fill(masterPassword, '\0'); }
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 12.7K bytes - Click Count (0) -
impl/maven-cli/src/main/java/org/apache/maven/cling/invoker/mvnenc/ConsolePasswordPrompt.java
return "Secure console password prompt"; } @Override public Optional<String> configTemplate() { return Optional.empty(); } @Override public String handle(String config) throws SecDispatcherException { if (NAME.equals(config)) { try { return prompter.promptForPassword("Enter the master password: "); } catch (PrompterException e) {
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Sat Nov 16 13:55:43 GMT 2024 - 2.7K bytes - Click Count (0)