Unit Instance
Units API.
See the Weblate's Web API documentation for detailed description of the API.
GET /api/units/35302/?format=api
https://weblate.info.ucl.ac.be/api/translations/cnp3-ebook/principlessecurity/en/?format=api", "source": [ "To authenticate herself, Alice sends her user identifier to Bob. Bob replies with a random number as a challenge to verify that Alice knows the shared secret (i.e. her password). Alice replies with the result of the computation of a hash function (e.g. SHA-1) over a string that is the concatenation between the random number chosen by Bob and Alice's password. The random number chosen by Bob is often called a `nonce` since this is a number that should only be used once. Bob performs the same computation locally and can check the message returned by Alice. This type of authentication scheme has been used in various protocols. It prevents replay attacks. If Eve captures the messages exchanged by Alice and Bob, she cannot recover Alice's password from the messages exchanged since hash functions are non-invertible. Furthermore, she cannot replay the hashed value since Bob will always send a different nonce." ], "previous_source": "", "target": [ "To authenticate herself, Alice sends her user identifier to Bob. Bob replies with a random number as a challenge to verify that Alice knows the shared secret (i.e. her password). Alice replies with the result of the computation of a hash function (e.g. SHA-1) over a string that is the concatenation between the random number chosen by Bob and Alice's password. The random number chosen by Bob is often called a `nonce` since this is a number that should only be used once. Bob performs the same computation locally and can check the message returned by Alice. This type of authentication scheme has been used in various protocols. It prevents replay attacks. If Eve captures the messages exchanged by Alice and Bob, she cannot recover Alice's password from the messages exchanged since hash functions are non-invertible. Furthermore, she cannot replay the hashed value since Bob will always send a different nonce." ], "id_hash": 4770185959285746986, "content_hash": 4770185959285746986, "location": "../../principles/security.rst:545", "context": "", "note": "", "flags": "", "state": 100, "fuzzy": false, "translated": true, "approved": false, "position": 53, "has_suggestion": false, "has_comment": false, "has_failing_check": false, "num_words": 151, "source_unit": "https://weblate.info.ucl.ac.be/api/units/35302/?format=api", "priority": 100, "id": 35302, "web_url": "https://weblate.info.ucl.ac.be/translate/cnp3-ebook/principlessecurity/en/?checksum=c2331adb3fc86d2a", "url": "https://weblate.info.ucl.ac.be/api/units/35302/?format=api", "explanation": "", "extra_flags": "", "pending": false, "timestamp": "2021-08-27T14:43:08.029816+02:00" }{ "translation": "