Home
last modified time | relevance | path

Searched refs:client_key (Results 1 – 25 of 995) sorted by relevance

12345678910>>...40

/dports/www/py-flask-oauthlib/Flask-OAuthlib-0.9.5/flask_oauthlib/provider/
H A Doauth1.py639 request.client = self._clientgetter(client_key=client_key)
652 if tok and tok.client_key == client_key:
665 client_key=client_key,
678 request.client = self._clientgetter(client_key=client_key)
705 request.client = self._clientgetter(client_key=client_key)
718 request.client = self._clientgetter(client_key=client_key)
728 if tok and tok.client_key == client_key:
738 client_key=client_key,
752 client_key=client_key, timestamp=timestamp,
759 client_key=client_key, timestamp=timestamp,
[all …]
/dports/security/py-oauthlib/oauthlib-1.1.2/oauthlib/oauth1/rfc5849/
H A Drequest_validator.py156 def check_client_key(self, client_key): argument
161 return (set(client_key) <= self.safe_characters and
162 lower <= len(client_key) <= upper)
256 def get_client_secret(self, client_key, request): argument
291 def get_request_token_secret(self, client_key, token, request): argument
323 def get_access_token_secret(self, client_key, token, request): argument
355 def get_default_realms(self, client_key, request): argument
402 def get_rsa_key(self, client_key, request): argument
451 def validate_client_key(self, client_key, request): argument
487 def validate_request_token(self, client_key, token, request): argument
[all …]
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/oauthlib/oauth1/rfc5849/
H A Drequest_validator.py158 def check_client_key(self, client_key): argument
163 return (set(client_key) <= self.safe_characters and
164 lower <= len(client_key) <= upper)
266 def get_client_secret(self, client_key, request): argument
301 def get_request_token_secret(self, client_key, token, request): argument
333 def get_access_token_secret(self, client_key, token, request): argument
365 def get_default_realms(self, client_key, request): argument
412 def get_rsa_key(self, client_key, request): argument
461 def validate_client_key(self, client_key, request): argument
497 def validate_request_token(self, client_key, token, request): argument
[all …]
/dports/multimedia/tautulli/Tautulli-2.8.0/lib/oauthlib/oauth1/rfc5849/
H A Drequest_validator.py153 def check_client_key(self, client_key): argument
158 return (set(client_key) <= self.safe_characters and
159 lower <= len(client_key) <= upper)
261 def get_client_secret(self, client_key, request): argument
297 def get_request_token_secret(self, client_key, token, request): argument
330 def get_access_token_secret(self, client_key, token, request): argument
363 def get_default_realms(self, client_key, request): argument
413 def get_rsa_key(self, client_key, request): argument
464 def validate_client_key(self, client_key, request): argument
501 def validate_request_token(self, client_key, token, request): argument
[all …]
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/oauthlib/oauth1/rfc5849/
H A Drequest_validator.py156 def check_client_key(self, client_key): argument
162 return (set(client_key) <= self.safe_characters and
163 lower <= len(client_key) <= upper)
268 def get_client_secret(self, client_key, request): argument
337 def get_access_token_secret(self, client_key, token, request): argument
370 def get_default_realms(self, client_key, request): argument
422 def get_rsa_key(self, client_key, request): argument
473 def validate_client_key(self, client_key, request): argument
510 def validate_request_token(self, client_key, token, request): argument
545 def validate_access_token(self, client_key, token, request): argument
[all …]
/dports/devel/pytype/pytype-2021.9.9/pytype/typeshed/stubs/oauthlib/oauthlib/oauth1/rfc5849/
H A Drequest_validator.pyi25 def check_client_key(self, client_key): ...
37 def get_client_secret(self, client_key, request) -> None: ...
38 def get_request_token_secret(self, client_key, token, request) -> None: ...
39 def get_access_token_secret(self, client_key, token, request) -> None: ...
40 def get_default_realms(self, client_key, request) -> None: ...
43 def get_rsa_key(self, client_key, request) -> None: ...
45 def validate_client_key(self, client_key, request) -> None: ...
46 def validate_request_token(self, client_key, token, request) -> None: ...
47 def validate_access_token(self, client_key, token, request) -> None: ...
52 def validate_requested_realms(self, client_key, realms, request) -> None: ...
[all …]
/dports/security/ncrack/ncrack-0.7/opensshlib/
H A Dkexecdhc.c59 EC_KEY *client_key = NULL; in kexecdh_client() local
71 if (EC_KEY_generate_key(client_key) != 1) { in kexecdh_client()
75 group = EC_KEY_get0_group(client_key); in kexecdh_client()
86 sshkey_dump_ec_key(client_key); in kexecdh_client()
88 kex->ec_client_key = client_key; in kexecdh_client()
90 client_key = NULL; /* owned by the kex */ in kexecdh_client()
96 if (client_key) in kexecdh_client()
97 EC_KEY_free(client_key); in kexecdh_client()
108 EC_KEY *client_key; in ncrackssh_input_kex_ecdh_reply() local
125 client_key = kex->ec_client_key; in ncrackssh_input_kex_ecdh_reply()
[all …]
/dports/security/py-social-auth-core/social-auth-core-4.0.2/social_core/tests/backends/
H A Dopen_id_connect.py48 client_key = 'a-key' variable in OpenIdConnectTestMixin
77 'SOCIAL_AUTH_{0}_KEY'.format(self.name): self.client_key,
84 def get_id_token(self, client_key=None, expiration_datetime=None, argument
92 'aud': client_key,
93 'azp': client_key,
99 def prepare_access_token_body(self, client_key=None, tamper_message=False, argument
113 client_key = client_key or self.client_key
121 client_key,
173 client_key='someone-else')
/dports/security/py-oauthlib/oauthlib-1.1.2/tests/oauth1/rfc5849/endpoints/
H A Dtest_base.py297 def validate_client_key(self, client_key): argument
298 return client_key in self.clients
301 return (self.owners.get(client_key) and
302 access_token in self.owners.get(client_key))
305 return (self.owners.get(client_key) and
306 request_token in self.owners.get(client_key))
313 return (client_key, access_token) in self.assigned_realms
317 return ((client_key, request_token) in self.verifiers and
319 (client_key, request_token))))
324 def get_client_secret(self, client_key, request): argument
[all …]
/dports/security/gnome-ssh-askpass/openssh-6.6p1/
H A Dkexecdhc.c52 EC_KEY *client_key; in kexecdh_client() local
61 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) in kexecdh_client()
63 if (EC_KEY_generate_key(client_key) != 1) in kexecdh_client()
65 group = EC_KEY_get0_group(client_key); in kexecdh_client()
68 packet_put_ecpoint(group, EC_KEY_get0_public_key(client_key)); in kexecdh_client()
74 key_dump_ec_key(client_key); in kexecdh_client()
112 client_key, NULL) != (int)klen) in kexecdh_client()
134 EC_KEY_get0_public_key(client_key), in kexecdh_client()
141 EC_KEY_free(client_key); in kexecdh_client()
/dports/mail/dovecot/dovecot-2.3.17/src/auth/
H A Dpassword-scheme-scram.c111 unsigned char client_key[hmethod->digest_size]; in scram_verify() local
131 hmac_final(&ctx, client_key); in scram_verify()
134 hash_method_get_digest(hmethod, client_key, sizeof(client_key), in scram_verify()
140 safe_memset(client_key, 0, sizeof(client_key)); in scram_verify()
153 unsigned char client_key[hmethod->digest_size]; in scram_generate() local
170 hmac_final(&ctx, client_key); in scram_generate()
173 hash_method_get_digest(hmethod, client_key, sizeof(client_key), in scram_generate()
186 safe_memset(client_key, 0, sizeof(client_key)); in scram_generate()
/dports/security/openvpn/openvpn-2.5.6/src/openvpn/
H A Dtls_crypt.c318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key()
491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key()
503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key()
600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local
602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key()
608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local
650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file()
655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/security/openvpn-devel/openvpn-0033811e0215af76f469d78912c95a2f59813454/src/openvpn/
H A Dtls_crypt.c318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key()
491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key()
503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key()
600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local
602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key()
608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local
650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file()
655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/security/openvpn-mbedtls/openvpn-2.5.6/src/openvpn/
H A Dtls_crypt.c318 *wkc_buf = client_key; in tls_crypt_v2_init_client_key()
491 memcpy(&client_key->keys, BPTR(&plaintext), sizeof(client_key->keys)); in tls_crypt_v2_unwrap_client_key()
503 secure_memzero(client_key, sizeof(*client_key)); in tls_crypt_v2_unwrap_client_key()
600 struct key2 client_key = { 0 }; in tls_crypt_v2_extract_client_key() local
602 if (!tls_crypt_v2_unwrap_client_key(&client_key, in tls_crypt_v2_extract_client_key()
608 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
618 secure_memzero(&client_key, sizeof(client_key)); in tls_crypt_v2_extract_client_key()
648 struct key2 client_key = { 2 }; in tls_crypt_v2_write_client_key_file() local
650 if (!rand_bytes((void *)client_key.keys, sizeof(client_key.keys))) in tls_crypt_v2_write_client_key_file()
655 ASSERT(buf_write(&dst, client_key.keys, sizeof(client_key.keys))); in tls_crypt_v2_write_client_key_file()
[all …]
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/controllers/jira_connect/
H A Devents_controller_spec.rb32 allow(asymmetric_jwt).to receive(:iss_claim).and_return(client_key)
51 clientKey: client_key,
74 installation = JiraConnectInstallation.find_by_client_key(client_key)
83 clientKey: client_key,
95 …let!(:installation) { create(:jira_connect_installation, client_key: client_key, shared_secret: sh…
108 let(:client_key) { installation.client_key }
111 clientKey: client_key,
/dports/security/pam_ssh/pam_ssh-8.0/openssh/
H A Dkexecdh.c52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local
58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair()
62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair()
66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair()
67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair()
78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair()
80 kex->ec_client_key = client_key; in kex_ecdh_keypair()
82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair()
86 EC_KEY_free(client_key); in kex_ecdh_keypair()
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/python_anticaptcha/
H A Dbase.py55 client_key = None variable in AnticaptchaClient
63 def __init__(self, client_key, language_pool="en", host="api.anti-captcha.com", use_ssl=True): argument
64 self.client_key = client_key
86 request = {"clientKey": self.client_key,
96 request = {"clientKey": self.client_key,
103 request = {"clientKey": self.client_key}
109 request = {"clientKey": self.client_key,
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/bshaffer/oauth2-server-php/test/OAuth2/Encryption/
H A DFirebaseJwtTest.php34 public function testJwtUtil($client_id, $client_key) argument
86 $tampered = $jwtUtil->encode($params, $client_key, 'HS256');
88 $payload = $jwtUtil->decode($tampered, $client_key, array('RS256'));
97 $client_key = $storage->getClientKey($client_id, "testuser@ourdomain.com");
100 array($client_id, $client_key),
H A DJwtTest.php34 public function testJwtUtil($client_id, $client_key) argument
86 $tampered = $jwtUtil->encode($params, $client_key, 'HS256');
88 $payload = $jwtUtil->decode($tampered, $client_key, array('RS256'));
97 $client_key = $storage->getClientKey($client_id, "testuser@ourdomain.com");
100 array($client_id, $client_key),
/dports/security/openssh-portable/openssh-8.8p1/
H A Dkexecdh.c52 EC_KEY *client_key = NULL; in kex_ecdh_keypair() local
58 if ((client_key = EC_KEY_new_by_curve_name(kex->ec_nid)) == NULL) { in kex_ecdh_keypair()
62 if (EC_KEY_generate_key(client_key) != 1) { in kex_ecdh_keypair()
66 group = EC_KEY_get0_group(client_key); in kex_ecdh_keypair()
67 public_key = EC_KEY_get0_public_key(client_key); in kex_ecdh_keypair()
78 sshkey_dump_ec_key(client_key); in kex_ecdh_keypair()
80 kex->ec_client_key = client_key; in kex_ecdh_keypair()
82 client_key = NULL; /* owned by the kex */ in kex_ecdh_keypair()
86 EC_KEY_free(client_key); in kex_ecdh_keypair()
/dports/devel/py-oslo.config/oslo.config-8.7.1/oslo_config/sources/
H A D_uri.py122 conf[group_name].client_key)
142 def __init__(self, uri, ca_path=None, client_cert=None, client_key=None): argument
146 data = self._fetch_uri(uri, ca_path, client_cert, client_key)
154 def _fetch_uri(self, uri, ca_path, client_cert, client_key): argument
156 cert = (client_cert, client_key) if client_cert and client_key else \
/dports/mail/claws-mail-pgp/claws-mail-3.18.0/src/common/
H A Dssl.c103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb()
108 sockinfo->client_key = key; in gnutls_client_cert_cb()
119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb()
173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb()
179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb()
188 *privkey = sockinfo->client_key; in gnutls_cert_cb()
509 if (sockinfo->client_key) in ssl_done_socket()
510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
511 sockinfo->client_key = NULL; in ssl_done_socket()
515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
[all …]
/dports/mail/claws-mail-vcalendar/claws-mail-3.18.0/src/common/
H A Dssl.c103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb()
108 sockinfo->client_key = key; in gnutls_client_cert_cb()
119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb()
173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb()
179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb()
188 *privkey = sockinfo->client_key; in gnutls_cert_cb()
509 if (sockinfo->client_key) in ssl_done_socket()
510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
511 sockinfo->client_key = NULL; in ssl_done_socket()
515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
[all …]
/dports/mail/claws-mail-spamassassin/claws-mail-3.18.0/src/common/
H A Dssl.c103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb()
108 sockinfo->client_key = key; in gnutls_client_cert_cb()
119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb()
173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb()
179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb()
188 *privkey = sockinfo->client_key; in gnutls_cert_cb()
509 if (sockinfo->client_key) in ssl_done_socket()
510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
511 sockinfo->client_key = NULL; in ssl_done_socket()
515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
[all …]
/dports/mail/claws-mail-rssyl/claws-mail-3.18.0/src/common/
H A Dssl.c103 if (!(sockinfo->client_crt && sockinfo->client_key)) { in gnutls_client_cert_cb()
108 sockinfo->client_key = key; in gnutls_client_cert_cb()
119 st->key.x509 = sockinfo->client_key; in gnutls_client_cert_cb()
173 gnutls_privkey_init(&sockinfo->client_key); in gnutls_cert_cb()
179 gnutls_privkey_deinit(sockinfo->client_key); in gnutls_cert_cb()
188 *privkey = sockinfo->client_key; in gnutls_cert_cb()
509 if (sockinfo->client_key) in ssl_done_socket()
510 gnutls_x509_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
511 sockinfo->client_key = NULL; in ssl_done_socket()
515 gnutls_privkey_deinit(sockinfo->client_key); in ssl_done_socket()
[all …]

12345678910>>...40