- Sort Score
- Num 10 results
- Language All
Results 101 - 110 of 647 for Decode (0.35 seconds)
-
docs_src/security/tutorial004_py39.py
detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception token_data = TokenData(username=username) except InvalidTokenError: raise credentials_exception
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 4.1K bytes - Click Count (0) -
docs/sts/client-grants.go
if err != nil { return nil, err } defer resp.Body.Close() if resp.StatusCode != http.StatusOK { return nil, fmt.Errorf("%s", resp.Status) } var idpToken JWTToken if err = json.NewDecoder(resp.Body).Decode(&idpToken); err != nil { return nil, err } return &credentials.ClientGrantsToken{Token: idpToken.AccessToken, Expiry: idpToken.Expiry}, nil } func main() { flag.Parse()Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 19 01:35:22 GMT 2021 - 3.3K bytes - Click Count (0) -
internal/bucket/encryption/bucket-sse-config.go
XMLName xml.Name `xml:"ServerSideEncryptionConfiguration"` Rules []Rule `xml:"Rule"` } // ParseBucketSSEConfig - Decodes given XML to a valid default bucket encryption config func ParseBucketSSEConfig(r io.Reader) (*BucketSSEConfig, error) { var config BucketSSEConfig err := xml.NewDecoder(r).Decode(&config) if err != nil { return nil, err } // Validates server-side encryption config rules
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Click Count (0) -
cmd/peer-rest-client.go
respBody, err := client.callWithContext(ctx, peerRESTMethodDownloadProfilingData, nil, nil, -1) if err != nil { return data, err } defer xhttp.DrainBody(respBody) err = gob.NewDecoder(respBody).Decode(&data) return data, err } // GetBucketStats - load bucket statistics func (client *peerRESTClient) GetBucketStats(ctx context.Context, bucket string) (BucketStats, error) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 26.1K bytes - Click Count (0) -
android/guava/src/com/google/common/escape/UnicodeEscaper.java
* thrown. * </ol> * * @param seq the sequence of characters from which to decode the code point * @param index the index of the first character to decode * @param end the index beyond the last valid character to decode * @return the Unicode code point for the given index or the negated value of the trailing high * surrogate character at the end of the sequence */
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Thu Feb 13 15:45:16 GMT 2025 - 13.2K bytes - Click Count (0) -
docs_src/security/tutorial005_py39.py
status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": authenticate_value}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None: raise credentials_exception scope: str = payload.get("scope", "")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.3K bytes - Click Count (0) -
cmd/admin-handlers_test.go
} rec := httptest.NewRecorder() adminTestBed.router.ServeHTTP(rec, req) if rec.Code != http.StatusOK { t.Errorf("Expected to succeed but failed with %d", rec.Code) } results := madmin.InfoMessage{} err = json.NewDecoder(rec.Body).Decode(&results) if err != nil { t.Fatalf("Failed to decode set config result json %v", err) } if results.Region != globalMinioDefaultRegion {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 13.9K bytes - Click Count (1) -
samples/guide/src/main/java/okhttp3/recipes/kt/WiresharkExample.kt
* an existing external tool is required. * * See https://stackoverflow.com/questions/61929216/how-to-log-tlsv1-3-keys-in-jsse-for-wireshark-to-decode-traffic * * Steps to run in your own code * * 1. In your main method `WireSharkListenerFactory.register()` * 2. Create Listener factory `val eventListenerFactory = WireSharkListenerFactory( logFile = File("/tmp/key.log"), tlsVersions = tlsVersions, launch = launch)`
Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Sat May 10 11:15:14 GMT 2025 - 10.9K bytes - Click Count (0) -
docs_src/security/tutorial005_py310.py
status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": authenticate_value}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username: str = payload.get("sub") if username is None: raise credentials_exception scope: str = payload.get("scope", "")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.2K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/hash/MacHashFunctionTest.java
byte[] data = fillByteArray(50, 0xdd); checkSha1("125d7342b9ac11cd91a39af48aa17b4f63f175d3", key, data); } public void testRfc2202_hmacSha1_case4() { byte[] key = base16().lowerCase().decode("0102030405060708090a0b0c0d0e0f10111213141516171819"); byte[] data = fillByteArray(50, 0xcd); checkSha1("4c9007f4026250c6bc8414f9bf50c86c2d7235da", key, data); }
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Dec 27 16:19:35 GMT 2024 - 13.8K bytes - Click Count (0)