Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 738 for Tokens (0.08 sec)

  1. src/test/java/org/codelibs/fess/suggest/analysis/SuggestAnalyzerTest.java

            List<AnalyzeToken> tokens1 = analyzer1.analyze(text, field, lang);
            List<AnalyzeToken> tokens2 = analyzer2.analyze(text, field, lang);
    
            assertNotNull(tokens1);
            assertNotNull(tokens2);
            assertEquals(tokens1.size(), tokens2.size());
    
            for (int i = 0; i < tokens1.size(); i++) {
                assertEquals(tokens1.get(i).getTerm(), tokens2.get(i).getTerm());
            }
        }
    
    Registered: Sat Dec 20 13:04:59 UTC 2025
    - Last Modified: Mon Sep 01 13:33:03 UTC 2025
    - 15.7K bytes
    - Viewed (0)
  2. internal/bucket/bandwidth/reader.go

    			tokens = need + hdr
    		} else { // part of header can be accommodated
    			r.opts.HeaderSize -= b - 1
    			need = 1 // to ensure we read at least one byte for every Read
    			tokens = b
    		}
    	} else { // all tokens go towards payload
    		need = int(math.Min(float64(b), float64(need)))
    		tokens = need
    	}
    	// reduce tokens requested according to availability
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 3.3K bytes
    - Viewed (0)
  3. docs/de/docs/tutorial/security/oauth2-jwt.md

    # OAuth2 mit Passwort (und Hashing), Bearer mit JWT-Tokens { #oauth2-with-password-and-hashing-bearer-with-jwt-tokens }
    
    Da wir nun über den gesamten Sicherheitsablauf verfügen, machen wir die Anwendung tatsächlich sicher, indem wir <abbr title="JSON Web Tokens">JWT</abbr>-Tokens und sicheres Passwort-Hashing verwenden.
    
    Diesen Code können Sie tatsächlich in Ihrer Anwendung verwenden, die Passwort-Hashes in Ihrer Datenbank speichern, usw.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Wed Oct 01 15:19:54 UTC 2025
    - 12.7K bytes
    - Viewed (0)
  4. docs/es/docs/tutorial/security/oauth2-jwt.md

    Actualiza `get_current_user` para recibir el mismo token que antes, pero esta vez, usando tokens JWT.
    
    Decodifica el token recibido, verifícalo y devuelve el usuario actual.
    
    Si el token es inválido, devuelve un error HTTP de inmediato.
    
    {* ../../docs_src/security/tutorial004_an_py310.py hl[90:107] *}
    
    ## Actualizar la *path operation* `/token` { #update-the-token-path-operation }
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Tue Dec 16 16:33:45 UTC 2025
    - 11.3K bytes
    - Viewed (0)
  5. internal/event/arn.go

    		return nil, &ErrInvalidARN{s}
    	}
    
    	tokens := strings.Split(s, ":")
    	if len(tokens) != 6 {
    		return nil, &ErrInvalidARN{s}
    	}
    
    	if tokens[4] == "" || tokens[5] == "" {
    		return nil, &ErrInvalidARN{s}
    	}
    
    	return &ARN{
    		region: tokens[3],
    		TargetID: TargetID{
    			ID:   tokens[4],
    			Name: tokens[5],
    		},
    	}, nil
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Mar 30 00:56:02 UTC 2025
    - 2K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    Update `get_current_user` to receive the same token as before, but this time, using JWT tokens.
    
    Decode the received token, verify it, and return the current user.
    
    If the token is invalid, return an HTTP error right away.
    
    {* ../../docs_src/security/tutorial004_an_py310.py hl[90:107] *}
    
    ## Update the `/token` *path operation* { #update-the-token-path-operation }
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Mon Sep 29 02:57:38 UTC 2025
    - 10.6K bytes
    - Viewed (0)
  7. src/cmd/asm/internal/lex/input.go

    	var tokens []Token
    	for _, tok := range macro.tokens {
    		if tok.ScanToken != scanner.Ident {
    			tokens = append(tokens, tok)
    			continue
    		}
    		substitution := actuals[tok.text]
    		if substitution == nil {
    			tokens = append(tokens, tok)
    			continue
    		}
    		tokens = append(tokens, substitution...)
    	}
    	in.Push(NewSlice(in.Base(), in.Line(), tokens))
    }
    
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Wed Nov 12 03:59:40 UTC 2025
    - 12.4K bytes
    - Viewed (0)
  8. internal/event/targetid.go

    	return nil
    }
    
    // parseTargetID - parses string to TargetID.
    func parseTargetID(s string) (*TargetID, error) {
    	tokens := strings.Split(s, ":")
    	if len(tokens) != 2 {
    		return nil, fmt.Errorf("invalid TargetID format '%v'", s)
    	}
    
    	return &TargetID{
    		ID:   tokens[0],
    		Name: tokens[1],
    	}, nil
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Tue Jun 01 21:59:40 UTC 2021
    - 1.8K bytes
    - Viewed (0)
  9. src/cmd/asm/internal/lex/lex.go

    func Tokenize(str string) []Token {
    	t := NewTokenizer("command line", strings.NewReader(str), nil)
    	var tokens []Token
    	for {
    		tok := t.Next()
    		if tok == scanner.EOF {
    			break
    		}
    		tokens = append(tokens, Make(tok, t.Text()))
    	}
    	return tokens
    Registered: Tue Dec 30 11:13:12 UTC 2025
    - Last Modified: Tue Aug 29 18:31:05 UTC 2023
    - 4.1K bytes
    - Viewed (0)
  10. docs/en/docs/tutorial/security/simple-oauth2.md

    ///
    
    ## Return the token { #return-the-token }
    
    The response of the `token` endpoint must be a JSON object.
    
    It should have a `token_type`. In our case, as we are using "Bearer" tokens, the token type should be "`bearer`".
    
    And it should have an `access_token`, with a string containing our access token.
    
    Registered: Sun Dec 28 07:19:09 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
Back to top