pythondecode_Python decoder.decode方法代码示例
本文整理汇总了Python中pyasn1.codec.der.decoder.decode方法的典型用法代码示例。如果您正苦于以下问题:Python decoder.decode方法的具体用法?Python decoder.decode怎么用?Python decoder.decode使用的例子?那么恭喜您, 这里精选的方法代码示例或许可以为您提供帮助。您也可以进一步了解该方法所在模块pyasn1.codec.der.decoder的用法示例。
在下文中一共展示了decoder.decode方法的21个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于我们的系统推荐出更棒的Python代码示例。
示例1: parse_cert
点赞 6
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def parse_cert(raw_bytes):
result = CertInfo()
certType = rfc2459.Certificate();
cert, rest = decoder.decode(raw_bytes, asn1Spec=certType)
subj_pub_key_bytes = frombits(cert.getComponentByName('tbsCertificate').getComponentByName('subjectPublicKeyInfo').getComponentByName('subjectPublicKey'))
SUBJECT = cert.getComponentByName('tbsCertificate').getComponentByName('subject')
for rdn in SUBJECT[0]:
for nv in rdn:
name = nv.getComponentByName('type')
value = nv.getComponentByName('value')
# could pick up regular OUs too
if name == rfc2459.id_at_organizationalUnitName:
#print 'name: %s' % name
#print 'value: [%s] (%s)' % (str(value).strip(), type(value))
result.control_fields.append(str(value).strip())
rsaType = rfc2437.RSAPublicKey();
rsadata,rsadata_rest = decoder.decode(subj_pub_key_bytes, asn1Spec=rsaType)
mod = rsadata.getComponentByName("modulus")
pub_exp = rsadata.getComponentByName("publicExponent")
result.pub_key = rsa.PublicKey(long(mod), long(pub_exp))
return result
开发者ID:nelenkov,项目名称:aboot-parser,代码行数:26,
示例2: _split_x509s
点赞 6
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _split_x509s(xstr):
"""Split the input string into individual x509 text blocks
:param xstr: A large multi x509 certificate blcok
:returns: A list of strings where each string represents an
X509 pem block surrounded by BEGIN CERTIFICATE,
END CERTIFICATE block tags
"""
curr_pem_block = []
inside_x509 = False
if isinstance(xstr, bytes):
xstr = xstr.decode('utf-8')
for line in xstr.replace("\r", "").split("\n"):
if inside_x509:
curr_pem_block.append(line)
if line == X509_END.decode('utf-8'):
yield octavia_utils.b("\n".join(curr_pem_block))
curr_pem_block = []
inside_x509 = False
continue
if line == X509_BEG.decode('utf-8'):
curr_pem_block.append(line)
inside_x509 = True
开发者ID:openstack,项目名称:octavia,代码行数:25,
示例3: _parse_pkcs7_bundle
点赞 6
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _parse_pkcs7_bundle(pkcs7):
"""Parse a PKCS7 certificate bundle in DER or PEM format
:param pkcs7: A pkcs7 bundle in DER or PEM format
:returns: A list of individual DER-encoded certificates
"""
# Look for PEM encoding
if PKCS7_BEG in pkcs7:
try:
for substrate in _read_pem_blocks(pkcs7):
for cert in _get_certs_from_pkcs7_substrate(substrate):
yield cert
except Exception:
LOG.exception('Unreadable Certificate.')
raise exceptions.UnreadableCert
# If no PEM encoding, assume this is DER encoded and try to decode
else:
for cert in _get_certs_from_pkcs7_substrate(pkcs7):
yield cert
开发者ID:openstack,项目名称:octavia,代码行数:22,
示例4: _split_x509s
点赞 6
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _split_x509s(xstr):
"""Split the input string into individual x509 text blocks
:param xstr: A large multi x509 certificate blcok
:returns: A list of strings where each string represents an
X509 pem block surrounded by BEGIN CERTIFICATE,
END CERTIFICATE block tags
"""
curr_pem_block = []
inside_x509 = False
if type(xstr) == six.binary_type:
xstr = xstr.decode('utf-8')
for line in xstr.replace("\r", "").split("\n"):
if inside_x509:
curr_pem_block.append(line)
if line == X509_END.decode('utf-8'):
yield six.b("\n".join(curr_pem_block))
curr_pem_block = []
inside_x509 = False
continue
else:
if line == X509_BEG.decode('utf-8'):
curr_pem_block.append(line)
inside_x509 = True
开发者ID:F5Networks,项目名称:f5-openstack-agent,代码行数:26,
示例5: _parse_pkcs7_bundle
点赞 6
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _parse_pkcs7_bundle(pkcs7):
"""Parse a PKCS7 certificate bundle in DER or PEM format
:param pkcs7: A pkcs7 bundle in DER or PEM format
:returns: A list of individual DER-encoded certificates
"""
# Look for PEM encoding
if PKCS7_BEG in pkcs7:
try:
for substrate in _read_pem_blocks(pkcs7):
for cert in _get_certs_from_pkcs7_substrate(substrate):
yield cert
except Exception:
LOG.exception('Unreadable Certificate.')
raise f5_ex.UnreadableCert
# If no PEM encoding, assume this is DER encoded and try to decode
else:
for cert in _get_certs_from_pkcs7_substrate(pkcs7):
yield cert
开发者ID:F5Networks,项目名称:f5-openstack-agent,代码行数:22,
示例6: get_subj_alt_name
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def get_subj_alt_name(peer_cert):
# Search through extensions
dns_name = []
if not SUBJ_ALT_NAME_SUPPORT:
return dns_name
general_names = SubjectAltName()
for i in range(peer_cert.get_extension_count()):
ext = peer_cert.get_extension(i)
ext_name = ext.get_short_name()
if ext_name != b'subjectAltName':
continue
# PyOpenSSL returns extension data in ASN.1 encoded form
ext_dat = ext.get_data()
decoded_dat = der_decoder.decode(ext_dat,
asn1Spec=general_names)
for name in decoded_dat:
if not isinstance(name, SubjectAltName):
continue
for entry in range(len(name)):
component = name.getComponentByPosition(entry)
if component.getName() != 'dNSName':
continue
dns_name.append(str(component.getComponent()))
return dns_name
开发者ID:deis,项目名称:controller,代码行数:30,
示例7: get_subj_alt_name
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def get_subj_alt_name(peer_cert):
# Search through extensions
dns_name = []
if not SUBJ_ALT_NAME_SUPPORT:
return dns_name
general_names = SubjectAltName()
for i in range(peer_cert.get_extension_count()):
ext = peer_cert.get_extension(i)
ext_name = ext.get_short_name()
if ext_name != 'subjectAltName':
continue
# PyOpenSSL returns extension data in ASN.1 encoded form
ext_dat = ext.get_data()
decoded_dat = der_decoder.decode(ext_dat,
asn1Spec=general_names)
for name in decoded_dat:
if not isinstance(name, SubjectAltName):
continue
for entry in range(len(name)):
component = name.getComponentByPosition(entry)
if component.getName() != 'dNSName':
continue
dns_name.append(str(component.getComponent()))
return dns_name
开发者ID:war-and-code,项目名称:jawfish,代码行数:30,
示例8: extractSecretKey
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def extractSecretKey(self, globalSalt, masterPassword, entrySalt):
(globalSalt, masterPassword, entrySalt) = self.is_masterpassword_correct(masterPassword)
if unhexlify('f8000000000000000000000000000001') not in self.key3:
return None
privKeyEntry = self.key3[unhexlify('f8000000000000000000000000000001')]
saltLen = ord(privKeyEntry[1])
nameLen = ord(privKeyEntry[2])
privKeyEntryASN1 = decoder.decode(privKeyEntry[3 + saltLen + nameLen:])
data = privKeyEntry[3 + saltLen + nameLen:]
self.printASN1(data, len(data), 0)
# see https://github.com/philsmd/pswRecovery4Moz/blob/master/pswRecovery4Moz.txt
entrySalt = privKeyEntryASN1[0][0][1][0].asOctets()
privKeyData = privKeyEntryASN1[0][1].asOctets()
privKey = self.decrypt3DES(globalSalt, masterPassword, entrySalt, privKeyData)
self.printASN1(privKey, len(privKey), 0)
privKeyASN1 = decoder.decode(privKey)
prKey = privKeyASN1[0][2].asOctets()
self.printASN1(prKey, len(prKey), 0)
prKeyASN1 = decoder.decode(prKey)
id = prKeyASN1[0][1]
key = long_to_bytes(prKeyASN1[0][3])
return key
# --------------------------------------------
# Get the path list of the firefox profiles
开发者ID:mehulj94,项目名称:Radium,代码行数:33,
示例9: parse_cert_from_der
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def parse_cert_from_der(der):
cert, rest_of_input = der_decode(der, asn1Spec=rfc5280.Certificate())
assert not rest_of_input # assert no left over input
return cert
开发者ID:mozilla,项目名称:normandy,代码行数:6,
示例10: _decode_octet_string
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _decode_octet_string(self, remains=None):
if remains:
buff = remains
else:
buff = self._raw[8:]
octet_string, remains = der_decode(buff, OctetString())
return octet_string, remains
开发者ID:fireeye,项目名称:ADFSpoof,代码行数:10,
示例11: _decode_authencrypt
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _decode_authencrypt(self, buff):
_, remains = der_decode(buff, ObjectIdentifier())
mac_oid, remains = der_decode(remains, ObjectIdentifier())
encryption_oid, remains = der_decode(remains, ObjectIdentifier())
if self.DEBUG:
sys.stderr.write("Decoded Algorithm OIDS\n Encryption Algorithm OID: {0}\n MAC Algorithm OID: {1}\n".format(encryption_oid, mac_oid))
return encryption_oid, mac_oid, remains
开发者ID:fireeye,项目名称:ADFSpoof,代码行数:10,
示例12: generate_certificate
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def generate_certificate(self, is_test_cert=False):
self.log.info('running certbot')
domain_args = apps_to_certbot_domain_args(self.snap.list(), self.info.domain())
test_cert = ''
if is_test_cert:
test_cert = '--test-cert --break-my-certs'
plugin = '--webroot --webroot-path {0}/certbot/www'.format(self.platform_config.data_dir())
try:
cmd = '{0} --logs-dir={1} --max-log-backups 5 --config-dir={2} --agree-tos --email {3} certonly --force-renewal --cert-name {4} {5} {6} {7} '.format(
self.certbot_bin, self.log_dir, self.certbot_config_dir,
self.user_platform_config.get_user_email(), self.info.domain(),
test_cert, plugin, domain_args
)
self.log.info(cmd)
output = check_output(cmd, stderr=subprocess.STDOUT, shell=True).decode()
self.log.info(output)
archive_dir = join(self.certbot_config_dir, 'archive')
if path.exists(archive_dir):
check_output('chmod 755 {0}'.format(archive_dir), shell=True)
live_dir = join(self.certbot_config_dir, 'live')
if path.exists(live_dir):
check_output('chmod 755 {0}'.format(live_dir), shell=True)
if not path.exists(self.certbot_certificate_file()):
raise Exception("certificate does not exist: {0}".format(self.certbot_certificate_file()))
return CertbotResult(self.certbot_certificate_file(), self.certbot_key_file())
except subprocess.CalledProcessError as e:
self.log.warn(e.output.decode())
raise e
开发者ID:syncloud,项目名称:platform,代码行数:35,
示例13: days_until_expiry
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def days_until_expiry(self):
self.log.info('getting expiry date of {}'.format(self.certbot_certificate_file()))
if not path.exists(self.certbot_certificate_file()):
self.log.info('certificate does not exist yet, {0}'.format(self.certbot_certificate_file()))
return 0
cert = crypto.load_certificate(crypto.FILETYPE_PEM, open(self.certbot_certificate_file()).read())
days = expiry_date_string_to_days(cert.get_notAfter().decode())
return days
开发者ID:syncloud,项目名称:platform,代码行数:12,
示例14: get_subj_alt_name
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def get_subj_alt_name(peer_cert):
# Search through extensions
dns_name = []
if not SUBJ_ALT_NAME_SUPPORT:
return dns_name
general_names = SubjectAltName()
for i in range(peer_cert.get_extension_count()):
ext = peer_cert.get_extension(i)
ext_name = ext.get_short_name()
if ext_name.decode() != 'subjectAltName':
continue
# PyOpenSSL returns extension data in ASN.1 encoded form
ext_dat = ext.get_data()
decoded_dat = der_decoder.decode(ext_dat,
asn1Spec=general_names)
for name in decoded_dat:
if not isinstance(name, SubjectAltName):
continue
for entry in range(len(name)):
component = name.getComponentByPosition(entry)
if component.getName() != 'dNSName':
continue
dns_name.append(str(component.getComponent()))
return dns_name
开发者ID:syncloud,项目名称:platform,代码行数:30,
示例15: printReplies
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def printReplies(self):
for keys in self.replies.keys():
for i, key in enumerate(self.replies[keys]):
if key['TokenType'] == TDS_ERROR_TOKEN:
error = "ERROR(%s): Line %d: %s" % (key['ServerName'].decode('utf-16le'), key['LineNumber'], key['MsgText'].decode('utf-16le'))
self.lastError = SQLErrorException("ERROR: Line %d: %s" % (key['LineNumber'], key['MsgText'].decode('utf-16le')))
LOG.error(error)
elif key['TokenType'] == TDS_INFO_TOKEN:
LOG.info("INFO(%s): Line %d: %s" % (key['ServerName'].decode('utf-16le'), key['LineNumber'], key['MsgText'].decode('utf-16le')))
elif key['TokenType'] == TDS_LOGINACK_TOKEN:
LOG.info("ACK: Result: %s - %s (%d%d %d%d) " % (key['Interface'], key['ProgName'].decode('utf-16le'), key['MajorVer'], key['MinorVer'], key['BuildNumHi'], key['BuildNumLow']))
elif key['TokenType'] == TDS_ENVCHANGE_TOKEN:
if key['Type'] in (TDS_ENVCHANGE_DATABASE, TDS_ENVCHANGE_LANGUAGE, TDS_ENVCHANGE_CHARSET, TDS_ENVCHANGE_PACKETSIZE):
record = TDS_ENVCHANGE_VARCHAR(key['Data'])
if record['OldValue'] == '':
record['OldValue'] = 'None'.encode('utf-16le')
elif record['NewValue'] == '':
record['NewValue'] = 'None'.encode('utf-16le')
if key['Type'] == TDS_ENVCHANGE_DATABASE:
_type = 'DATABASE'
elif key['Type'] == TDS_ENVCHANGE_LANGUAGE:
_type = 'LANGUAGE'
elif key['Type'] == TDS_ENVCHANGE_CHARSET:
_type = 'CHARSET'
elif key['Type'] == TDS_ENVCHANGE_PACKETSIZE:
_type = 'PACKETSIZE'
else:
_type = "%d" % key['Type']
LOG.info("ENVCHANGE(%s): Old Value: %s, New Value: %s" % (_type,record['OldValue'].decode('utf-16le'), record['NewValue'].decode('utf-16le')))
开发者ID:joxeankoret,项目名称:CVE-2017-7494,代码行数:34,
示例16: listPath
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def listPath(self, shareName, path, password = None):
# ToDo: Handle situations where share is password protected
path = string.replace(path,'/', '\\')
path = ntpath.normpath(path)
if len(path) > 0 and path[0] == '\\':
path = path[1:]
treeId = self.connectTree(shareName)
fileId = None
try:
# ToDo, we're assuming it's a directory, we should check what the file type is
fileId = self.create(treeId, ntpath.dirname(path), FILE_READ_ATTRIBUTES | FILE_READ_DATA ,FILE_SHARE_READ | FILE_SHARE_WRITE |FILE_SHARE_DELETE, FILE_DIRECTORY_FILE | FILE_SYNCHRONOUS_IO_NONALERT, FILE_OPEN, 0)
res = ''
files = []
from impacket import smb
while True:
try:
res = self.queryDirectory( treeId, fileId, ntpath.basename(path), maxBufferSize = 65535, informationClass = FILE_FULL_DIRECTORY_INFORMATION )
nextOffset = 1
while nextOffset != 0:
fileInfo = smb.SMBFindFileFullDirectoryInfo(smb.SMB.FLAGS2_UNICODE)
fileInfo.fromString(res)
files.append(smb.SharedFile(fileInfo['CreationTime'],fileInfo['LastAccessTime'],fileInfo['LastChangeTime'],fileInfo['EndOfFile'],fileInfo['AllocationSize'],fileInfo['ExtFileAttributes'],fileInfo['FileName'].decode('utf-16le'), fileInfo['FileName'].decode('utf-16le')))
nextOffset = fileInfo['NextEntryOffset']
res = res[nextOffset:]
except SessionError, e:
if (e.get_error_code()) != STATUS_NO_MORE_FILES:
raise
break
finally:
if fileId is not None:
self.close(treeId, fileId)
self.disconnectTree(treeId)
return files
开发者ID:joxeankoret,项目名称:CVE-2017-7494,代码行数:38,
示例17: getKerberosType3
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def getKerberosType3(cipher, sessionKey, auth_data):
negTokenResp = SPNEGO_NegTokenResp(auth_data)
# If DCE_STYLE = FALSE
#ap_rep = decoder.decode(negTokenResp['ResponseToken'][16:], asn1Spec=AP_REP())[0]
try:
krbError = KerberosError(packet = decoder.decode(negTokenResp['ResponseToken'][15:], asn1Spec = KRB_ERROR())[0])
except Exception, e:
pass
开发者ID:joxeankoret,项目名称:CVE-2017-7494,代码行数:10,
示例18: __str__
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def __str__( self ):
retString = 'Kerberos SessionError: %s(%s)' % (constants.ERROR_MESSAGES[self.error])
try:
# Let's try to get the NT ERROR, if not, we quit and give the general one
if self.error == constants.ErrorCodes.KRB_ERR_GENERIC.value:
eData = decoder.decode(str(self.packet['e-data']), asn1Spec = KERB_ERROR_DATA())[0]
nt_error = struct.unpack('
retString += '\nNT ERROR: %s(%s)' % (nt_errors.ERROR_MESSAGES[nt_error])
except:
pass
return retString
开发者ID:joxeankoret,项目名称:CVE-2017-7494,代码行数:14,
示例19: _get_subject_alt_names
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _get_subject_alt_names(self, cert):
alt_names = []
for i in range(cert.get_extension_count()):
e = cert.get_extension(i)
e_name = bytes_to_str(e.get_short_name())
if e_name == "subjectAltName":
e_data = e.get_data()
decoded_data = der_decoder.decode(
e_data, SubjectAltGeneralNames())
for name in decoded_data:
if isinstance(name, SubjectAltGeneralNames):
for entry in range(len(name)):
component = name.getComponentByPosition(entry)
alt_names.append(str(component.getComponent()))
return alt_names
开发者ID:aerospike,项目名称:aerospike-admin,代码行数:17,
示例20: _read_pem_blocks
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _read_pem_blocks(data):
"""Parse a series of PEM-encoded blocks
This method is based on pyasn1-modules.pem.readPemBlocksFromFile, but
eliminates the need to operate on a file handle and is a generator.
:param data: A long text string containing one or more PEM-encoded blocks
:param markers: A tuple containing the test strings that indicate the
start and end of the PEM-encoded blocks
:returns: An ASN1 substrate suitable for DER decoding.
"""
stSpam, stHam, stDump = 0, 1, 2
startMarkers = {PKCS7_BEG.decode('utf-8'): 0}
stopMarkers = {PKCS7_END.decode('utf-8'): 0}
idx = -1
state = stSpam
if isinstance(data, bytes):
data = data.decode('utf-8')
for certLine in data.replace('\r', '').split('\n'):
if not certLine:
continue
certLine = certLine.strip()
if state == stSpam:
if certLine in startMarkers:
certLines = []
idx = startMarkers[certLine]
state = stHam
continue
if state == stHam:
if certLine in stopMarkers and stopMarkers[certLine] == idx:
state = stDump
else:
certLines.append(certLine)
if state == stDump:
yield b''.join([base64.b64decode(x) for x in certLines])
state = stSpam
开发者ID:openstack,项目名称:octavia,代码行数:39,
示例21: _get_certs_from_pkcs7_substrate
点赞 5
# 需要导入模块: from pyasn1.codec.der import decoder [as 别名]
# 或者: from pyasn1.codec.der.decoder import decode [as 别名]
def _get_certs_from_pkcs7_substrate(substrate):
"""Extracts DER-encoded X509 certificates from a PKCS7 ASN1 DER substrate
:param substrate: The substrate to be processed
:returns: A list of DER-encoded X509 certificates
"""
try:
contentInfo, _ = der_decoder.decode(substrate,
asn1Spec=rfc2315.ContentInfo())
contentType = contentInfo.getComponentByName('contentType')
except Exception:
LOG.exception('Unreadable Certificate.')
raise exceptions.UnreadableCert
if contentType != rfc2315.signedData:
LOG.exception('Unreadable Certificate.')
raise exceptions.UnreadableCert
try:
content, _ = der_decoder.decode(
contentInfo.getComponentByName('content'),
asn1Spec=rfc2315.SignedData())
except Exception:
LOG.exception('Unreadable Certificate.')
raise exceptions.UnreadableCert
for cert in content.getComponentByName('certificates'):
yield der_encoder.encode(cert)
开发者ID:openstack,项目名称:octavia,代码行数:29,
注:本文中的pyasn1.codec.der.decoder.decode方法示例整理自Github/MSDocs等源码及文档管理平台,相关代码片段筛选自各路编程大神贡献的开源项目,源码版权归原作者所有,传播和使用请参考对应项目的License;未经允许,请勿转载。
pythondecode_Python decoder.decode方法代码示例相关推荐
- python3版本800行的代码_Python number.long_to_bytes方法代码示例
本文整理汇总了Python中Crypto.Util.number.long_to_bytes方法的典型用法代码示例.如果您正苦于以下问题:Python number.long_to_bytes方法的具 ...
- python codecs_Python codecs.register方法代码示例
本文整理汇总了Python中codecs.register方法的典型用法代码示例.如果您正苦于以下问题:Python codecs.register方法的具体用法?Python codecs.regi ...
- doc python 颜色_Python wordcloud.ImageColorGenerator方法代码示例
本文整理汇总了Python中wordcloud.ImageColorGenerator方法的典型用法代码示例.如果您正苦于以下问题:Python wordcloud.ImageColorGenerat ...
- python fonttool_Python wx.Font方法代码示例
本文整理汇总了Python中wx.Font方法的典型用法代码示例.如果您正苦于以下问题:Python wx.Font方法的具体用法?Python wx.Font怎么用?Python wx.Font使用 ...
- python os path isfile_Python path.isfile方法代码示例
本文整理汇总了Python中os.path.isfile方法的典型用法代码示例.如果您正苦于以下问题:Python path.isfile方法的具体用法?Python path.isfile怎么用?P ...
- python程序异常实例_Python werkzeug.exceptions方法代码示例
本文整理汇总了Python中werkzeug.exceptions方法的典型用法代码示例.如果您正苦于以下问题:Python werkzeug.exceptions方法的具体用法?Python wer ...
- python get score gain_Python functional.linear方法代码示例
本文整理汇总了Python中torch.nn.functional.linear方法的典型用法代码示例.如果您正苦于以下问题:Python functional.linear方法的具体用法?Pytho ...
- python中string.digits_Python string.hexdigits方法代码示例
本文整理汇总了Python中string.hexdigits方法的典型用法代码示例.如果您正苦于以下问题:Python string.hexdigits方法的具体用法?Python string.he ...
- python batch_size_Python config.batch_size方法代码示例
本文整理汇总了Python中config.batch_size方法的典型用法代码示例.如果您正苦于以下问题:Python config.batch_size方法的具体用法?Python config. ...
- java secretkey用法_Java SecretKeyFactory.generateSecret方法代码示例
本文整理汇总了Java中javax.crypto.SecretKeyFactory.generateSecret方法的典型用法代码示例.如果您正苦于以下问题:Java SecretKeyFactory ...
最新文章
- thinkphp实现登录后返回原界面
- suse软件管理程序zypper
- 【C++ Priemr | 15】构造函数与拷贝控制
- 3530: [Sdoi2014]数数
- LeetCode65——Valid Number(使用DFA)来判断字符串是否为数字
- 【spring】通过GZIP压缩提高网络传输效率(可以实现任何资源的gzip压缩、包括AJAX)
- 安装和卸载mysql
- [51nod1116]K进制下的大数
- 利用爬虫编译翻译器 (包含防御反爬虫)
- 双系统如何卸载linux
- 浅谈12306核心模型设计思路和架构设计
- RTCP丢包重传策略之NACK
- 第一行代码中过时的通知写法更正;
- 003.原生数据类型使用陷阱 Pitfall of Primitive Data Type
- Base64编码理解
- 【参赛时间延长】InterSystems技术写作大赛:Python
- xp系统如何开启索引服务器,windows xp 索引服务器
- 国家数据字典mysql_数据字典 · MySQL DBA · 看云
- 夏天到了,蚊子多了,下面给大家几个防蚊子的建议
- 软件体系结构---基础知识点(2)