 DBeaver Lite User Guide v24.2.eaea. Page 140 of 1010. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 288 of 1010. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1010 页 | 79.48 MB | 1 年前3 DBeaver Lite User Guide v24.2.eaea. Page 140 of 1010. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 288 of 1010. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1010 页 | 79.48 MB | 1 年前3
 DBeaver Lite User Guide v.24.11. Page 140 of 1008. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 288 of 1008. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1008 页 | 79.40 MB | 1 年前3 DBeaver Lite User Guide v.24.11. Page 140 of 1008. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 288 of 1008. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1008 页 | 79.40 MB | 1 年前3
 DBeaver User Guide v.24.00. Page 125 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 0. Page 294 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1099 页 | 83.12 MB | 1 年前3 DBeaver User Guide v.24.00. Page 125 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 0. Page 294 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1099 页 | 83.12 MB | 1 年前3
 DBeaver User Guide v.24.1.eaea. Page 125 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 294 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1099 页 | 83.13 MB | 1 年前3 DBeaver User Guide v.24.1.eaea. Page 125 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 294 of 1099. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1099 页 | 83.13 MB | 1 年前3
 DBeaver Ultimate User Guide v.24.11. Page 143 of 1169. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 315 of 1169. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1169 页 | 94.41 MB | 1 年前3 DBeaver Ultimate User Guide v.24.11. Page 143 of 1169. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 315 of 1169. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1169 页 | 94.41 MB | 1 年前3
 DBeaver Ultimate User Guide v24.2.eaea. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.65 MB | 1 年前3 DBeaver Ultimate User Guide v24.2.eaea. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.65 MB | 1 年前3
 DBeaver User Guide v24.2.eaea. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.79 MB | 1 年前3 DBeaver User Guide v24.2.eaea. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- ea. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.79 MB | 1 年前3
 DBeaver User Guide v.24.11. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.79 MB | 1 年前3 DBeaver User Guide v.24.11. Page 143 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM- 1. Page 315 of 1171. 3. 4. 5. Mechanism Description SCRAM- SHA-1 A password-based authentication mechanism using SHA-1 hashing algorithm. Suitable for securing data transmissions. SCRAM-0 码力 | 1171 页 | 94.79 MB | 1 年前3
 TiDB中文技术文档MD5 校验和 PASSWORD() (在 MySQL 5.7.6 中已弃用) 计算并返回密码字符串 RANDOM_BYTES() 返回随机字节向量 SHA1() , SHA() 计算 SHA-1 160 位校验和 SHA2() 计算 SHA-2 校验和 AES_DECRYPT() 使用 AES 解密 AES_ENCRYPT() 使用 AES 加密 COMPRESS() 返回经过压缩的二进制字符串0 码力 | 444 页 | 4.89 MB | 6 月前3 TiDB中文技术文档MD5 校验和 PASSWORD() (在 MySQL 5.7.6 中已弃用) 计算并返回密码字符串 RANDOM_BYTES() 返回随机字节向量 SHA1() , SHA() 计算 SHA-1 160 位校验和 SHA2() 计算 SHA-2 校验和 AES_DECRYPT() 使用 AES 解密 AES_ENCRYPT() 使用 AES 加密 COMPRESS() 返回经过压缩的二进制字符串0 码力 | 444 页 | 4.89 MB | 6 月前3
 PostgreSQL 8.3 Documentationuse this option is to achieve compatibility with ancient PGP products, predating the addition of SHA-1 protected packets to RFC 4880. Recent gnupg.org and pgp.com software supports it fine. Values: 0 5 UUID, which works like a version 3 UUID except that SHA-1 is used as a hashing method. Version 5 should be preferred over version 3 because SHA-1 is thought to be more secure than MD5. For example:0 码力 | 2143 页 | 4.58 MB | 1 年前3 PostgreSQL 8.3 Documentationuse this option is to achieve compatibility with ancient PGP products, predating the addition of SHA-1 protected packets to RFC 4880. Recent gnupg.org and pgp.com software supports it fine. Values: 0 5 UUID, which works like a version 3 UUID except that SHA-1 is used as a hashing method. Version 5 should be preferred over version 3 because SHA-1 is thought to be more secure than MD5. For example:0 码力 | 2143 页 | 4.58 MB | 1 年前3
共 73 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8













