/dports/www/py-flask-oauthlib/Flask-OAuthlib-0.9.5/flask_oauthlib/provider/ |
H A D | oauth1.py | 639 request.client = self._clientgetter(client_key=client_key) 652 if tok and tok.client_key == client_key: 665 client_key=client_key, 678 request.client = self._clientgetter(client_key=client_key) 705 request.client = self._clientgetter(client_key=client_key) 718 request.client = self._clientgetter(client_key=client_key) 728 if tok and tok.client_key == client_key: 738 client_key=client_key, 752 client_key=client_key, timestamp=timestamp, 759 client_key=client_key, timestamp=timestamp, [all …]
|
/dports/security/py-oauthlib/oauthlib-1.1.2/oauthlib/oauth1/rfc5849/ |
H A D | request_validator.py | 156 def check_client_key(self, client_key): argument 161 return (set(client_key) <= self.safe_characters and 162 lower <= len(client_key) <= upper) 256 def get_client_secret(self, client_key, request): argument 291 def get_request_token_secret(self, client_key, token, request): argument 323 def get_access_token_secret(self, client_key, token, request): argument 355 def get_default_realms(self, client_key, request): argument 402 def get_rsa_key(self, client_key, request): argument 451 def validate_client_key(self, client_key, request): argument 487 def validate_request_token(self, client_key, token, request): argument [all …]
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/oauthlib/oauth1/rfc5849/ |
H A D | request_validator.py | 158 def check_client_key(self, client_key): argument 163 return (set(client_key) <= self.safe_characters and 164 lower <= len(client_key) <= upper) 266 def get_client_secret(self, client_key, request): argument 301 def get_request_token_secret(self, client_key, token, request): argument 333 def get_access_token_secret(self, client_key, token, request): argument 365 def get_default_realms(self, client_key, request): argument 412 def get_rsa_key(self, client_key, request): argument 461 def validate_client_key(self, client_key, request): argument 497 def validate_request_token(self, client_key, token, request): argument [all …]
|
/dports/multimedia/tautulli/Tautulli-2.8.0/lib/oauthlib/oauth1/rfc5849/ |
H A D | request_validator.py | 153 def check_client_key(self, client_key): argument 158 return (set(client_key) <= self.safe_characters and 159 lower <= len(client_key) <= upper) 261 def get_client_secret(self, client_key, request): argument 297 def get_request_token_secret(self, client_key, token, request): argument 330 def get_access_token_secret(self, client_key, token, request): argument 363 def get_default_realms(self, client_key, request): argument 413 def get_rsa_key(self, client_key, request): argument 464 def validate_client_key(self, client_key, request): argument 501 def validate_request_token(self, client_key, token, request): argument [all …]
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/oauthlib/oauth1/rfc5849/ |
H A D | request_validator.py | 156 def check_client_key(self, client_key): argument 162 return (set(client_key) <= self.safe_characters and 163 lower <= len(client_key) <= upper) 268 def get_client_secret(self, client_key, request): argument 337 def get_access_token_secret(self, client_key, token, request): argument 370 def get_default_realms(self, client_key, request): argument 422 def get_rsa_key(self, client_key, request): argument 473 def validate_client_key(self, client_key, request): argument 510 def validate_request_token(self, client_key, token, request): argument 545 def validate_access_token(self, client_key, token, request): argument [all …]
|
/dports/devel/pytype/pytype-2021.9.9/pytype/typeshed/stubs/oauthlib/oauthlib/oauth1/rfc5849/ |
H A D | request_validator.pyi | 25 def check_client_key(self, client_key): ... 37 def get_client_secret(self, client_key, request) -> None: ... 38 def get_request_token_secret(self, client_key, token, request) -> None: ... 39 def get_access_token_secret(self, client_key, token, request) -> None: ... 40 def get_default_realms(self, client_key, request) -> None: ... 43 def get_rsa_key(self, client_key, request) -> None: ... 45 def validate_client_key(self, client_key, request) -> None: ... 46 def validate_request_token(self, client_key, token, request) -> None: ... 47 def validate_access_token(self, client_key, token, request) -> None: ... 52 def validate_requested_realms(self, client_key, realms, request) -> None: ... [all …]
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | kexecdhc.c | 59 EC_KEY *client_key = NULL; in kexecdh_client() local 71 if (EC_KEY_generate_key(client_key) != 1) { in kexecdh_client() 75 group = EC_KEY_get0_group(client_key); in kexecdh_client() 86 sshkey_dump_ec_key(client_key); in kexecdh_client() 88 kex->ec_client_key = client_key; in kexecdh_client() 90 client_key = NULL; /* owned by the kex */ in kexecdh_client() 96 if (client_key) in kexecdh_client() 97 EC_KEY_free(client_key); in kexecdh_client() 108 EC_KEY *client_key; in ncrackssh_input_kex_ecdh_reply() local 125 client_key = kex->ec_client_key; in ncrackssh_input_kex_ecdh_reply() [all …]
|
/dports/security/py-social-auth-core/social-auth-core-4.0.2/social_core/tests/backends/ |
H A D | open_id_connect.py | 48 client_key = 'a-key' variable in OpenIdConnectTestMixin 77 'SOCIAL_AUTH_{0}_KEY'.format(self.name): self.client_key, 84 def get_id_token(self, client_key=None, expiration_datetime=None, argument 92 'aud': client_key, 93 'azp': client_key, 99 def prepare_access_token_body(self, client_key=None, tamper_message=False, argument 113 client_key = client_key or self.client_key 121 client_key, 173 client_key='someone-else')
|
/dports/security/py-oauthlib/oauthlib-1.1.2/tests/oauth1/rfc5849/endpoints/ |
H A D | test_base.py | 297 def validate_client_key(self, client_key): argument 298 return client_key in self.clients 301 return (self.owners.get(client_key) and 302 access_token in self.owners.get(client_key)) 305 return (self.owners.get(client_key) and 306 request_token in self.owners.get(client_key)) 313 return (client_key, access_token) in self.assigned_realms 317 return ((client_key, request_token) in self.verifiers and 319 (client_key, request_token)))) 324 def get_client_secret(self, client_key, request): argument [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | kexecdhc.c | 52 EC_KEY *client_key; in kexecdh_client() local 61 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) in kexecdh_client() 63 if (EC_KEY_generate_key(client_key) != 1) in kexecdh_client() 65 group = EC_KEY_get0_group(client_key); in kexecdh_client() 68 packet_put_ecpoint(group, EC_KEY_get0_public_key(client_key)); in kexecdh_client() 74 key_dump_ec_key(client_key); in kexecdh_client() 112 client_key, NULL) != (int)klen) in kexecdh_client() 134 EC_KEY_get0_public_key(client_key), in kexecdh_client() 141 EC_KEY_free(client_key); in kexecdh_client()
|
/dports/mail/dovecot/dovecot-2.3.17/src/auth/ |
H A D | password-scheme-scram.c | 111 unsigned char client_key[hmethod->digest_size]; in scram_verify() local 131 hmac_final(&ctx, client_key); in scram_verify() 134 hash_method_get_digest(hmethod, client_key, sizeof(client_key), in scram_verify() 140 safe_memset(client_key, 0, sizeof(client_key)); in scram_verify() 153 unsigned char client_key[hmethod->digest_size]; in scram_generate() local 170 hmac_final(&ctx, client_key); in scram_generate() 173 hash_method_get_digest(hmethod, client_key, sizeof(client_key), in scram_generate() 186 safe_memset(client_key, 0, sizeof(client_key)); in scram_generate()
|
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/ |
H A D | tls_crypt.c | 318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key() 491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key() 503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key() 600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local 602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key() 608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local 650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file() 655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/ |
H A D | tls_crypt.c | 318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key() 491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key() 503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key() 600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local 602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key() 608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local 650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file() 655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/ |
H A D | tls_crypt.c | 318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key() 491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key() 503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key() 600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local 602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key() 608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key() 648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local 650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file() 655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file() [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/controllers/jira_connect/ |
H A D | events_controller_spec.rb | 32 allow(asymmetric_jwt).to receive(:iss_claim).and_return(client_key) 51 clientKey: client_key, 74 installation = JiraConnectInstallation.find_by_client_key(client_key) 83 clientKey: client_key, 95 …let!(:installation) { create(:jira_connect_installation, client_key: client_key, shared_secret: sh… 108 let(:client_key) { installation.client_key } 111 clientKey: client_key,
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | kexecdh.c | 52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local 58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair() 62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair() 66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair() 67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair() 80 kex->ec_client_key = client_key; in kex_ecdh_keypair() 82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair() 86 EC_KEY_free(client_key); in kex_ecdh_keypair()
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/python_anticaptcha/ |
H A D | base.py | 55 client_key = None variable in AnticaptchaClient 63 def __init__(self, client_key, language_pool="en", host="api.anti-captcha.com", use_ssl=True): argument 64 self.client_key = client_key 86 request = {"clientKey": self.client_key, 96 request = {"clientKey": self.client_key, 103 request = {"clientKey": self.client_key} 109 request = {"clientKey": self.client_key,
|
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/bshaffer/oauth2-server-php/test/OAuth2/Encryption/ |
H A D | FirebaseJwtTest.php | 34 public function testJwtUtil($client_id, $client_key) argument 86 $tampered = $jwtUtil->encode($params, $client_key, 'HS256'); 88 $payload = $jwtUtil->decode($tampered, $client_key, array('RS256')); 97 $client_key = $storage->getClientKey($client_id, "testuser@ourdomain.com"); 100 array($client_id, $client_key),
|
H A D | JwtTest.php | 34 public function testJwtUtil($client_id, $client_key) argument 86 $tampered = $jwtUtil->encode($params, $client_key, 'HS256'); 88 $payload = $jwtUtil->decode($tampered, $client_key, array('RS256')); 97 $client_key = $storage->getClientKey($client_id, "testuser@ourdomain.com"); 100 array($client_id, $client_key),
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | kexecdh.c | 52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local 58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair() 62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair() 66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair() 67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair() 78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair() 80 kex->ec_client_key = client_key; in kex_ecdh_keypair() 82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair() 86 EC_KEY_free(client_key); in kex_ecdh_keypair()
|
/dports/devel/py-oslo.config/oslo.config-8.7.1/oslo_config/sources/ |
H A D | _uri.py | 122 conf[group_name].client_key) 142 def __init__(self, uri, ca_path=None, client_cert=None, client_key=None): argument 146 data = self._fetch_uri(uri, ca_path, client_cert, client_key) 154 def _fetch_uri(self, uri, ca_path, client_cert, client_key): argument 156 cert = (client_cert, client_key) if client_cert and client_key else \
|
/dports/mail/claws-mail-pgp/claws-mail-3.18.0/src/common/ |
H A D | ssl.c | 103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb() 108 sockinfo->client_key = key; in gnutls_client_cert_cb() 119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb() 173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb() 179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb() 188 *privkey = sockinfo->client_key; in gnutls_cert_cb() 509 if (sockinfo->client_key) in ssl_done_socket() 510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket() 511 sockinfo->client_key = NULL; in ssl_done_socket() 515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket() [all …]
|
/dports/mail/claws-mail-vcalendar/claws-mail-3.18.0/src/common/ |
H A D | ssl.c | 103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb() 108 sockinfo->client_key = key; in gnutls_client_cert_cb() 119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb() 173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb() 179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb() 188 *privkey = sockinfo->client_key; in gnutls_cert_cb() 509 if (sockinfo->client_key) in ssl_done_socket() 510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket() 511 sockinfo->client_key = NULL; in ssl_done_socket() 515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket() [all …]
|
/dports/mail/claws-mail-spamassassin/claws-mail-3.18.0/src/common/ |
H A D | ssl.c | 103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb() 108 sockinfo->client_key = key; in gnutls_client_cert_cb() 119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb() 173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb() 179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb() 188 *privkey = sockinfo->client_key; in gnutls_cert_cb() 509 if (sockinfo->client_key) in ssl_done_socket() 510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket() 511 sockinfo->client_key = NULL; in ssl_done_socket() 515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket() [all …]
|
/dports/mail/claws-mail-rssyl/claws-mail-3.18.0/src/common/ |
H A D | ssl.c | 103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb() 108 sockinfo->client_key = key; in gnutls_client_cert_cb() 119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb() 173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb() 179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb() 188 *privkey = sockinfo->client_key; in gnutls_cert_cb() 509 if (sockinfo->client_key) in ssl_done_socket() 510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket() 511 sockinfo->client_key = NULL; in ssl_done_socket() 515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket() [all …]
|