- Sort Score
- Num 10 results
- Language All
Results 91 - 100 of 647 for Decode (0.06 seconds)
-
okhttp-hpacktests/src/test/java/okhttp3/internal/http2/HpackDecodeTestBase.kt
} return result } /** * Checks if `expected` and `observed` are equal when viewed as a set and headers are * deduped. * * TODO: See if duped headers should be preserved on decode and verify. */ private fun assertSetEquals( message: String, expected: List<Header>, observed: List<Header>, ) { assertThat(LinkedHashSet(observed), message)Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Mon Jan 08 01:13:22 GMT 2024 - 2.2K bytes - Click Count (0) -
tests/test_tutorial/test_security/test_tutorial006.py
assert response.json() == {"detail": "Not authenticated"} def test_security_http_basic_non_basic_credentials(client: TestClient): payload = b64encode(b"johnsecret").decode("ascii") auth_header = f"Basic {payload}" response = client.get("/users/me", headers={"Authorization": auth_header}) assert response.status_code == 401, response.text
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 17 20:41:43 GMT 2025 - 2.6K bytes - Click Count (0) -
tests/test_security_http_basic_optional.py
assert response.headers["WWW-Authenticate"] == "Basic" assert response.json() == {"detail": "Not authenticated"} def test_security_http_basic_non_basic_credentials(): payload = b64encode(b"johnsecret").decode("ascii") auth_header = f"Basic {payload}" response = client.get("/users/me", headers={"Authorization": auth_header}) assert response.status_code == 401, response.text
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Nov 24 19:03:06 GMT 2025 - 2.6K bytes - Click Count (0) -
docs_src/security/tutorial004_an_py310.py
detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception token_data = TokenData(username=username) except InvalidTokenError: raise credentials_exception
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4.1K bytes - Click Count (0) -
internal/config/identity/openid/jwks_test.go
} else if len(jk.Keys) != 3 { t.Fatalf("Expected 3 keys, got %d", len(jk.Keys)) } var kids []string for ii, jks := range jk.Keys { _, err := jks.DecodePublicKey() if err != nil { t.Fatalf("Failed to decode key %d: %v", ii, err) } kids = append(kids, jks.Kid) } if len(kids) != 3 { t.Fatalf("Failed to find the expected number of kids: 3, got %d", len(kids)) } } // A.1 - Example public keys
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Jan 02 17:15:06 GMT 2022 - 9.8K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py310.py
status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": authenticate_value}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception scope: str = payload.get("scope", "")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.3K bytes - Click Count (0) -
docs_src/security/tutorial005_an_py39.py
status_code=status.HTTP_401_UNAUTHORIZED, detail="Could not validate credentials", headers={"WWW-Authenticate": authenticate_value}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception scope: str = payload.get("scope", "")Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 5.3K bytes - Click Count (0) -
internal/config/identity/openid/jwt.go
) type publicKeys struct { *sync.RWMutex // map of kid to public key pkMap map[string]any } func (pk *publicKeys) parseAndAdd(b io.Reader) error { var jwk JWKS err := json.NewDecoder(b).Decode(&jwk) if err != nil { return err } for _, key := range jwk.Keys { pkey, err := key.DecodePublicKey() if err != nil { return err } pk.add(key.Kid, pkey) } return nil }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 8.4K bytes - Click Count (0) -
internal/kms/secret-key_test.go
t.Fatalf("Failed to initialize KMS: %v", err) } for i, test := range decryptKeyTests { dataKey, err := base64.StdEncoding.DecodeString(test.Plaintext) if err != nil { t.Fatalf("Test %d: failed to decode plaintext key: %v", i, err) } plaintext, err := KMS.Decrypt(t.Context(), &DecryptRequest{ Name: test.KeyID, Ciphertext: []byte(test.Ciphertext), AssociatedData: test.Context, })
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Apr 09 14:28:39 GMT 2025 - 2.9K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
detail="Could not validate credentials", headers={"WWW-Authenticate": "Bearer"}, ) try: payload = jwt.decode(token, SECRET_KEY, algorithms=[ALGORITHM]) username = payload.get("sub") if username is None: raise credentials_exception token_data = TokenData(username=username) except InvalidTokenError: raise credentials_exception
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4K bytes - Click Count (0)