- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 213 for token (0.04 sec)
-
docs/es/docs/tutorial/security/oauth2-jwt.md
Actualiza `get_current_user` para recibir el mismo token que antes, pero esta vez, usando tokens JWT. Decodifica el token recibido, verifícalo y devuelve el usuario actual. Si el token es inválido, devuelve un error HTTP de inmediato. {* ../../docs_src/security/tutorial004_an_py310.py hl[90:107] *} ## Actualizar la *path operation* `/token` Crea un `timedelta` con el tiempo de expiración del token.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.9K bytes - Viewed (0) -
docs/de/docs/tutorial/security/oauth2-jwt.md
Aktualisieren Sie `get_current_user`, um den gleichen Token wie zuvor zu erhalten, dieses Mal jedoch unter Verwendung von JWT-Tokens. Dekodieren Sie den empfangenen Token, validieren Sie ihn und geben Sie den aktuellen Benutzer zurück. Wenn der Token ungültig ist, geben Sie sofort einen HTTP-Fehler zurück. {* ../../docs_src/security/tutorial004_an_py310.py hl[89:106] *} ## Die *Pfadoperation* `/token` aktualisierenRegistered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 12.1K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
That way, you can create a token with an expiration of, let's say, 1 week. And then when the user comes back the next day with the token, you know that user is still logged in to your system.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
src/main/java/jcifs/spnego/NegTokenInit.java
} /** * Constructs a NegTokenInit by parsing the provided token bytes * @param token the SPNEGO token bytes to parse * @throws IOException if parsing fails */ public NegTokenInit(final byte[] token) throws IOException { parse(token); } /** * Gets the context flags indicating security capabilitiesRegistered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 16 01:32:48 UTC 2025 - 10.3K bytes - Viewed (0) -
fess-crawler/src/main/java/org/codelibs/fess/crawler/client/http/form/FormScheme.java
* <li>TOKEN_NAME - The name of the token parameter.</li> * <li>TOKEN_METHOD - The HTTP method to use for the token request (GET or POST).</li> * <li>TOKEN_PARAMTERS - The parameters to include in the token request.</li> * <li>LOGIN_METHOD - The HTTP method to use for the login request (GET or POST).</li> * <li>LOGIN_URL - The URL to send the login request to.</li>
Registered: Sun Sep 21 03:50:09 UTC 2025 - Last Modified: Sun Jul 06 02:13:03 UTC 2025 - 14.3K bytes - Viewed (1) -
src/bufio/scan.go
if s.end > s.start || s.err != nil { advance, token, err := s.split(s.buf[s.start:s.end], s.err != nil) if err != nil { if err == ErrFinalToken { s.token = token s.done = true // When token is not nil, it means the scanning stops // with a trailing token, and thus the return value // should be true to indicate the existence of the token. return token != nil
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Wed May 21 18:05:26 UTC 2025 - 14.2K bytes - Viewed (0) -
docs/de/docs/tutorial/security/simple-oauth2.md
/// ## Den Token zurückgeben Die Response des `token`-Endpunkts muss ein JSON-Objekt sein. Es sollte einen `token_type` haben. Da wir in unserem Fall „Bearer“-Token verwenden, sollte der Token-Typ "`bearer`" sein. Und es sollte einen `access_token` haben, mit einem String, der unseren Zugriffstoken enthält.
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Nov 18 02:25:44 UTC 2024 - 10.7K bytes - Viewed (0) -
src/test/java/jcifs/spnego/NegTokenInitTest.java
void testParseRejectsUnknownField() throws Exception { ASN1TaggedObject unknown = new DERTaggedObject(true, 7, new DEROctetString(new byte[] { 0x01 })); byte[] token = buildInitToken(new ASN1ObjectIdentifier[] { OID_KRB }, 0, null, null, false, null, null, unknown); IOException ex = assertThrows(IOException.class, () -> new NegTokenInit(token));
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 21K bytes - Viewed (0) -
src/test/java/jcifs/internal/smb2/session/Smb2SessionSetupRequestTest.java
// Security Buffer Length assertEquals(token.length, SMBUtil.readInt2(buffer, bodyOffset + 14)); // Previous Session ID assertEquals(previousSessionId, SMBUtil.readInt8(buffer, bodyOffset + 16)); // Token content byte[] actualToken = new byte[token.length]; System.arraycopy(buffer, securityBufferOffset, actualToken, 0, token.length); assertArrayEquals(token, actualToken);Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 21.2K bytes - Viewed (0) -
docs/es/docs/tutorial/security/simple-oauth2.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Mon Dec 30 18:26:57 UTC 2024 - 9.9K bytes - Viewed (0)