Search Options

Results per page
Sort
Preferred Languages
Advance

Results 561 - 570 of 1,576 for sample (0.05 sec)

  1. docs/sts/wso2.md

    1. The id_token is an identifier that is hard to guess. For example, a randomly generated string of sufficient length, that the server handling the protected resource can use to lookup the associated authorization information.
    2. The id_token self-contains the authorization information in a manner that can be verified. For example, by encoding authorization information along with a signature into the token.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  2. docs/en/docs/tutorial/body-multiple-params.md

    ## Singular values in body { #singular-values-in-body }
    
    The same way there is a `Query` and `Path` to define extra data for query and path parameters, **FastAPI** provides an equivalent `Body`.
    
    For example, extending the previous model, you could decide that you want to have another key `importance` in the same body, besides the `item` and `user`.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 4.9K bytes
    - Viewed (0)
  3. src/test/java/jcifs/pac/kerberos/KerberosTicketTest.java

        private KerberosKey[] keys;
    
        private static final String SERVER_REALM = "EXAMPLE.COM";
        private static final String SERVER_PRINCIPAL_NAME = "krbtgt/EXAMPLE.COM";
        private static final String USER_PRINCIPAL_NAME = "user@EXAMPLE.COM";
        private static final String USER_REALM = "EXAMPLE.COM";
        private static final int ENCRYPTION_TYPE = 23; // aes128-cts-hmac-sha1-96
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Thu Aug 14 05:31:44 UTC 2025
    - 11.4K bytes
    - Viewed (0)
  4. android/guava-tests/test/com/google/common/util/concurrent/AbstractListeningExecutorServiceTest.java

          run = true;
        }
      }
    
      private static class TestCallable implements Callable<String> {
        @Override
        public String call() {
          return "foo";
        }
      }
    
      /** Simple same thread listening executor service that doesn't handle shutdown. */
      private static class TestListeningExecutorService extends AbstractListeningExecutorService {
    
        @Override
        public void execute(Runnable runnable) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  5. guava-tests/test/com/google/common/util/concurrent/AbstractListeningExecutorServiceTest.java

          run = true;
        }
      }
    
      private static class TestCallable implements Callable<String> {
        @Override
        public String call() {
          return "foo";
        }
      }
    
      /** Simple same thread listening executor service that doesn't handle shutdown. */
      private static class TestListeningExecutorService extends AbstractListeningExecutorService {
    
        @Override
        public void execute(Runnable runnable) {
    Registered: Fri Sep 05 12:43:10 UTC 2025
    - Last Modified: Thu Dec 19 18:03:30 UTC 2024
    - 3.2K bytes
    - Viewed (0)
  6. api/maven-api-core/src/main/java/org/apache/maven/api/services/ModelProblemCollector.java

     * it delegates to other components that potentially encounter problems. Then, the problem reporter can focus on
     * providing a simple error message, leaving the donkey work of creating a nice model problem to this component.
     *
     */
    public interface ModelProblemCollector {
    
        ProblemCollector<ModelProblem> getProblemCollector();
    
    Registered: Sun Sep 07 03:35:12 UTC 2025
    - Last Modified: Thu Dec 19 14:50:21 UTC 2024
    - 2.9K bytes
    - Viewed (0)
  7. docs/em/docs/tutorial/security/first-steps.md

    /// tip
    
    ๐Ÿ“ฅ `tokenUrl="token"` ๐Ÿ”— โš– ๐Ÿ“› `token` ๐Ÿ‘ˆ ๐Ÿ‘ฅ ๐Ÿšซ โœ. โšซ๏ธ โš– ๐Ÿ“›, โšซ๏ธ ๐ŸŒ“ `./token`.
    
    โ†ฉ๏ธ ๐Ÿ‘ฅ โš™๏ธ โš– ๐Ÿ“›, ๐Ÿšฅ ๐Ÿ‘† ๐Ÿ› ๏ธ ๐Ÿ”Ž `https://example.com/`, โคด๏ธ โšซ๏ธ ๐Ÿ”œ ๐Ÿ”— `https://example.com/token`. โœ‹๏ธ ๐Ÿšฅ ๐Ÿ‘† ๐Ÿ› ๏ธ ๐Ÿ”Ž `https://example.com/api/v1/`, โคด๏ธ โšซ๏ธ ๐Ÿ”œ ๐Ÿ”— `https://example.com/api/v1/token`.
    
    โš™๏ธ โš– ๐Ÿ“› โš  โš’ ๐Ÿ’ญ ๐Ÿ‘† ๐Ÿˆธ ๐Ÿšง ๐Ÿ‘ท ๐Ÿง โš™๏ธ ๐Ÿ’ผ ๐Ÿ’– [โ›… ๐Ÿ—ณ](../../advanced/behind-a-proxy.md){.internal-link target=_blank}.
    
    ///
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Mon Nov 18 02:25:44 UTC 2024
    - 6.7K bytes
    - Viewed (0)
  8. samples/guide/src/main/java/okhttp3/guide/GetExample.java

        try (Response response = client.newCall(request).execute()) {
          return response.body().string();
        }
      }
    
      public static void main(String[] args) throws IOException {
        GetExample example = new GetExample();
        String response = example.run("https://raw.github.com/square/okhttp/master/README.md");
        System.out.println(response);
      }
    Registered: Fri Sep 05 11:42:10 UTC 2025
    - Last Modified: Fri Apr 05 03:30:42 UTC 2024
    - 1.3K bytes
    - Viewed (0)
  9. src/cmd/asm/internal/lex/tokenizer.go

    package lex
    
    import (
    	"go/build/constraint"
    	"io"
    	"os"
    	"strings"
    	"text/scanner"
    	"unicode"
    
    	"cmd/asm/internal/flags"
    	"cmd/internal/objabi"
    	"cmd/internal/src"
    )
    
    // A Tokenizer is a simple wrapping of text/scanner.Scanner, configured
    // for our purposes and made a TokenReader. It forms the lowest level,
    // turning text from readers into tokens.
    type Tokenizer struct {
    	tok  ScanToken
    	s    *scanner.Scanner
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Thu Aug 04 20:35:21 UTC 2022
    - 3K bytes
    - Viewed (0)
  10. docs/en/docs/advanced/advanced-dependencies.md

    /// tip
    
    All this might seem contrived. And it might not be very clear how is it useful yet.
    
    These examples are intentionally simple, but show how it all works.
    
    In the chapters about security, there are utility functions that are implemented in this same way.
    
    If you understood all this, you already know how those utility tools for security work underneath.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 2.6K bytes
    - Viewed (0)
Back to top