当前位置:网站首页>What should I do when the interface encounters jsonstring
What should I do when the interface encounters jsonstring
2022-07-25 02:40:00 【51CTO】
For test students who have not been exposed to interface testing , It's a new thing , R & D can skip .
Interface test returns jsonString strand , How to parameterize ?
1、 adopt IE or Chrome browser , Intercept the request content .
IE as follows , This Json take + / = And other symbols are encoded into % start %2B(+) %2F(/) %3D(=), So use Base64 Can't decode .Chrome There is no such problem , Recommended non IE Browser .
Base64 Online decoding tools :http://tools.jb51.net/tools/base64_decode-utf8.php

Chrome Json

2. Use the decoding tool to decode Json Decode to get the original

3. Parameterized original
I won't say much about this , Let's talk about it Json Three transmission formats , They are clear text Standards 、 With escape and base64 Code of .
send out , If the server standard takes precedence , If there is verification, it needs to be done first base64 After encoding, it will be sent to the server .
--------------------------------
Tool introduction
Base64 Coding requirements 3 individual 8 Bit byte (3*8=24) Turn into 4 individual 6 Bytes of bits (4*6=24), After the 6 Fill in two in front of the bit 0, formation 8 Bits in the form of a byte . If there are not enough characters left 3 Bytes , Then use 0 fill , Output characters using ‘=’, So the end of the output text after encoding may appear 1 or 2 individual ‘=’.
In order to ensure that the output encoding bit can read characters ,Base64 A coding table was made , For unified transformation . The size of the encoding table is 2^6=64, This is also Base64 The origin of the name .
Base64 Encoding table
Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character | Code value | character |
0 | A | 8 | I | 16 | Q | 24 | Y | 32 | g | 40 | o | 48 | w | 56 | 4 |
1 | B | 9 | J | 17 | R | 25 | Z | 33 | h | 41 | p | 49 | x | 57 | 5 |
2 | C | 10 | K | 18 | S | 26 | a | 34 | i | 42 | q | 50 | y | 58 | 6 |
3 | D | 11 | L | 19 | T | 27 | b | 35 | j | 43 | r | 51 | z | 59 | 7 |
4 | E | 12 | M | 20 | U | 28 | c | 36 | k | 44 | s | 52 | 0 | 60 | 8 |
5 | F | 13 | N | 21 | V | 29 | d | 37 | l | 45 | t | 53 | 1 | 61 | 9 |
6 | G | 14 | O | 22 | W | 30 | e | 38 | m | 46 | u | 54 | 2 | 62 | + |
7 | H | 15 | P | 23 | X | 31 | f | 39 | n | 47 | v | 55 | 3 | 63 | / |
----------------------------------
Unicode code :http://tool.chinaz.com/tools/unicode.aspx

边栏推荐
- Please ask a question: how to set the new table of MySQL CDC 2.2.x to only receive increment
- Use SAP ui5 application to consume create and delete operations of OData in business application studio
- Arthas case: dynamic update application logger level
- Yunyuanyuan (VIII) | Devops in depth Devops
- Anacona has too many environments?? How to view your current environment in jupyter
- How to use blender to make 360 degree panorama and panoramic video?
- Consul cluster deployment
- Query the thread information of MySQL server (detailed explanation)
- Pagoda workman WSS reverse proxy socket legal domain name applet chat remove port
- Creating elements of DOM series
猜你喜欢

Ogg data extraction delay is large

Detailed explanation of manually writing servlet in idea

Project management tool Zen

A bit of knowledge - websites about scripts

UDP message structure and precautions

When executing SQL query statements in MySQL database, the underlying implementation principle (ultra detailed)

Digital commerce cloud fine chemical industry management platform integrated informatization solution

Genesis, the world's first "consumption investment" public chain, was invited to participate in consensus 2022

Rotating frame target detection mmrotate v0.3.1 training hrsc2016 data set (II)

Scalar, vector, matrix calculus
随机推荐
Win10 configuring CUDA and cudnn
High performance memory recovery technology for decrypting ark -- HPP GC
Jedispoolconfig parameter configuration from the perspective of source code
TS uses a third-party library, and there is no type declaration file error handling
Simulation Implementation of [STL] string class
Tp5.1 initialize initialization method (not \u initialize)
Actual combat in ThreadLocal project
Js a simple way to store several objects in an array
Several dpdk control frameworks
Apk packaging process
Arthas case: dynamic update application logger level
UDP message structure and precautions
Flink's study notes
"Ask the sky" is in place! Yu Jingchuan's "China Space Station" in 2013 is about to set sail in the sea of stars
Detailed explanation of manually writing servlet in idea
Industrial control safety PLC firmware reverse II
YouTube Download and (batch) Download
"Introduction to interface testing" punch in day08: can you save all parameters to excel for test data?
Remote sensing image classification tool and visualization application of WebGIS
Summary and sorting of XSS (cross site script attack) related content