当前位置:网站首页>What should I do when the interface encounters jsonstring
What should I do when the interface encounters jsonstring
2022-07-25 02:40:00 【51CTO】
For test students who have not been exposed to interface testing , It's a new thing , R & D can skip .
Interface test returns jsonString strand , How to parameterize ?
1、 adopt IE or Chrome browser , Intercept the request content .
IE as follows , This Json take + / = And other symbols are encoded into % start %2B(+) %2F(/) %3D(=), So use Base64 Can't decode .Chrome There is no such problem , Recommended non IE Browser .
Base64 Online decoding tools :http://tools.jb51.net/tools/base64_decode-utf8.php

Chrome Json

2. Use the decoding tool to decode Json Decode to get the original

3. Parameterized original
I won't say much about this , Let's talk about it Json Three transmission formats , They are clear text Standards 、 With escape and base64 Code of .
send out , If the server standard takes precedence , If there is verification, it needs to be done first base64 After encoding, it will be sent to the server .
--------------------------------
Tool introduction
Base64 Coding requirements 3 individual 8 Bit byte (3*8=24) Turn into 4 individual 6 Bytes of bits (4*6=24), After the 6 Fill in two in front of the bit 0, formation 8 Bits in the form of a byte . If there are not enough characters left 3 Bytes , Then use 0 fill , Output characters using ‘=’, So the end of the output text after encoding may appear 1 or 2 individual ‘=’.
In order to ensure that the output encoding bit can read characters ,Base64 A coding table was made , For unified transformation . The size of the encoding table is 2^6=64, This is also Base64 The origin of the name .
Base64 Encoding table
Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character |
0 | A | 8 | I | 16 | Q | 24 | Y | 32 | g | 40 | o | 48 | w | 56 | 4 |
1 | B | 9 | J | 17 | R | 25 | Z | 33 | h | 41 | p | 49 | x | 57 | 5 |
2 | C | 10 | K | 18 | S | 26 | a | 34 | i | 42 | q | 50 | y | 58 | 6 |
3 | D | 11 | L | 19 | T | 27 | b | 35 | j | 43 | r | 51 | z | 59 | 7 |
4 | E | 12 | M | 20 | U | 28 | c | 36 | k | 44 | s | 52 | 0 | 60 | 8 |
5 | F | 13 | N | 21 | V | 29 | d | 37 | l | 45 | t | 53 | 1 | 61 | 9 |
6 | G | 14 | O | 22 | W | 30 | e | 38 | m | 46 | u | 54 | 2 | 62 | + |
7 | H | 15 | P | 23 | X | 31 | f | 39 | n | 47 | v | 55 | 3 | 63 | / |
----------------------------------
Unicode code :http://tool.chinaz.com/tools/unicode.aspx

边栏推荐
- ASP. Net core 6 framework unveiling example demonstration [01]: initial programming experience
- Case analysis of building exhibition service management system with low code development platform
- Actual combat in ThreadLocal project
- Flink's study notes
- I was forced to graduate by a big factory and recited the eight part essay in a two-month window. Fortunately, I went ashore, otherwise I wouldn't be able to repay the mortgage
- Detailed explanation of manually writing servlet in idea
- When executing SQL query statements in MySQL database, the underlying implementation principle (ultra detailed)
- Summary thinking caused by the function of a SMS verification code [easy to understand]
- Matlab draws radar chart (four lines of code)
- Do you know about real-time 3D rendering? Real time rendering software and application scenarios are coming
猜你喜欢

Scalar, vector, matrix calculus

6.0 cancellation of member registration verification code

Use SAP ui5 application to consume create and delete operations of OData in business application studio

R language one page and many pictures

Redis unauthorized access vulnerability recurrence (www.hetianlab.com)

【C】 Advanced knowledge of file operation

I was forced to graduate by a big factory and recited the eight part essay in a two-month window. Fortunately, I went ashore, otherwise I wouldn't be able to repay the mortgage

@Retryable @backoff @recover retry the use of annotations

Picgo configuring Alibaba cloud OSS

Custom types in C language
随机推荐
Failed to create data snapshot: lock file [/siyuan/data/assets/image- 2022070216332-jijwccs.png failed: open /siyuan/data/assets/image- 2022070216332-jijwccs.png: permission denied; unable to lock fil
YuQue - a useful tool for document writing and knowledge precipitation
A weird jedisconnectionexception: connection rejected problem
Yunyuanyuan (VIII) | Devops in depth Devops
Please ask a question: how to set the new table of MySQL CDC 2.2.x to only receive increment
Conceptual distinction between Po, Bo, VO, dto and POJO
C language: Structure -- a detailed explanation of memory byte alignment
These 11 chrome artifacts are extremely cool to use
Introduction to web security telent testing and defense
Jedispoolconfig parameter configuration from the perspective of source code
ByteDance confirmation will be self-developed chip: for internal use only; Musk: I have uploaded my brain to the cloud; Go language product head leaves | geek headline
My creation anniversary (3rd Anniversary)
On the economic model of open source ecology
After six years of precipitation, new consumption has found a digital transformation paradigm
Using ODBC to consume SAP ABAP CDs view in Excel
ASP. Net core 6 framework unveiling example demonstration [01]: initial programming experience
Pagoda workman WSS reverse proxy socket legal domain name applet chat remove port
Rolling division, Young's matrix and three-step flip
Automatic backup of Linux server PostgreSQL database
[circular array] JS method collection of circular array