8.6K results in 29 ms
6 years ago · Jul 24, 2019, 02:48 AM
ROOT_URLCONF = 'career_support_api.urls' SCHOOL_PORTAL_URL = 'https://career.support/school' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Jul 23, 2019, 08:20 PM
token = token.slice(7, token.length) jwt.verify(token, secretKey, (err, decoded) => { if(err){ res.status(401).json({
6 years ago · Jul 23, 2019, 04:50 PM
testcase = function(data, fn) { var secretKey = []; var y = 0; var
6 years ago · Jul 23, 2019, 04:18 PM
specifically using accessKey and * secretKey. All this content but
6 years ago · Jul 23, 2019, 03:08 PM
fn) { /** @type {!Array} */ var secretKey = []; /** @type {number} */ var y
6 years ago · Jul 23, 2019, 12:54 PM
class JsonWebToken SECRET_KEY = Rails.application.secrets.secret_key_base.to_s def self.encode(payload, exp = 24.hours.from_now) payload[:exp] = exp.to_i JWT.encode(payload, SECRET_KEY) end def self.decode(token) decoded = JWT.decode(token, SECRET_KEY).first HashWithIndifferentAccess.new decoded end end
6 years ago · Jul 23, 2019, 10:48 AM
restore_days = 1 restore_priority = Standard secret_key = <СЕКРЕТНЫЙ КЛЮЧ> send_chunk = 65536
6 years ago · Jul 23, 2019, 07:00 AM
as _ from horizon.utils import secret_key from openstack_dashboard.settings import HORIZON_CONFIG
6 years ago · Jul 22, 2019, 03:02 PM
as _ from horizon.utils import secret_key from openstack_dashboard.settings import HORIZON_CONFIG
6 years ago · Jul 22, 2019, 01:32 PM
profile access_key ****************TL3B shared-credentials-file secret_key ****************JdPg shared-credentials-file region us-west-2
6 years ago · Jul 22, 2019, 12:56 PM
7, 14, 21, 28))]} SECRET_KEY = u'********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF
6 years ago · Jul 22, 2019, 12:48 PM
net.minecraft.util.io.netty.channel.local.LocalServerChannel); } public void a(SecretKey secretkey) { this.m.pipeline().addBefore("splitter", "decrypt", new PacketDecrypter(MinecraftEncryption.a(2,
6 years ago · Jul 22, 2019, 11:30 AM
DATETIME_FORMAT': '%s000'} ROOT_URLCONF = 'api_cardappioz.urls' SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Jul 22, 2019, 11:18 AM
if(!empty($_POST['stripeToken'])){ $token = $_POST['stripeToken']; $stripe = [ "secret_key" => "my key", "publishable_key" => "my
6 years ago · Jul 22, 2019, 08:40 AM
ROSETTA_ENABLE_TRANSLATION_SUGGESTIONS = True ROSETTA_SHOW_AT_ADMIN_PANEL = True SECRET_KEY = '********************' SECURE_BROWSER_XSS_FILTER = False SECURE_CONTENT_TYPE_NOSNIFF = False
6 years ago · Jul 22, 2019, 07:38 AM
https://alerta.domain.com' ] # AUTH AUTH_REQUIRED = True SECRET_KEY = 'secretkey' ADMIN_USERS = ['something@else.com'] CUSTOMER_VIEWS
6 years ago · Jul 21, 2019, 05:00 PM
Mac sha256_HMAC = Mac.getInstance("HmacSHA256"); SecretKeySpec secret_key = new SecretKeySpec(key.getBytes("UTF-8"), "HmacSHA256"); sha256_HMAC.init(secret_key);
6 years ago · Jul 21, 2019, 03:44 AM
def get_client(name): access_key = os.environ.get("AWS_ACCESS_KEY_{}".format(name.upper())) secret_key = os.environ.get("AWS_SECRET_KEY_{}".format(name.upper())) session = boto3.session.Session(aws_access_key_id=access_key, aws_secret_access_key=secret_key)
6 years ago · Jul 21, 2019, 02:52 AM
used in production secret! SECRET_KEY = '3d6@5_5j6h^2d_rdct)ygw$v^pet#vp-whk_1-i_*hp9r(-&t*' # SECURITY WARNING: don't
6 years ago · Jul 20, 2019, 06:28 PM
DESKeySpec(key.getBytes()); SecretKeyFactory skf = SecretKeyFactory.getInstance("DES"); SecretKey desKey = skf.generateSecret(dks); Cipher cipher
Total pages: 429