/dports/net-mgmt/cacti/cacti-1.2.19/include/vendor/csrf/ |
H A D | csrf-magic.php | 227 $valid_token = false; 230 $valid_token = true; 235 csrf_log(__FUNCTION__, 'returns: ' . var_export($valid_token, true)); 237 return $valid_token; 244 $valid_token = false; 263 $valid_token = ($value === csrf_hash(session_id(), $time)); 268 $valid_token = ($value === csrf_hash($_COOKIE[$n], $time)); 273 $valid_token = ($value === csrf_hash($GLOBALS['csrf']['key'], $time)); 295 $valid_token = ($value === csrf_hash($client_ip, $time)); 306 csrf_log(__FUNCTION__, 'returns: ' . var_export($valid_token, true)); [all …]
|
/dports/security/elixir-comeonin/comeonin-3.2/test/ |
H A D | otp_test.exs | 26 refute Otp.valid_token("12345", 5) 27 assert Otp.valid_token("123456", 6) 28 refute Otp.valid_token("123456", 8) 29 assert Otp.valid_token("12345678", 8)
|
/dports/net/thcrut/thcrut-1.2.5/Libnet-1.0.2a/src/ |
H A D | libnet_port_list.c | 46 int i, j, valid_token, cur_node; in libnet_plist_chain_new() local 59 for (j = 0, valid_token = 0; libnet_plist_legal_tokens[j]; j++) in libnet_plist_chain_new() 63 valid_token = 1; in libnet_plist_chain_new() 67 if (!valid_token) in libnet_plist_chain_new()
|
/dports/net/libnet/libnet-1.1.6/src/ |
H A D | libnet_port_list.c | 50 int i, j, valid_token, cur_node; in libnet_plist_chain_new() local 69 for (j = 0, valid_token = 0; libnet_plist_legal_tokens[j]; j++) in libnet_plist_chain_new() 73 valid_token = 1; in libnet_plist_chain_new() 77 if (!valid_token) in libnet_plist_chain_new()
|
/dports/www/py-flask-jwt-extended/Flask-JWT-Extended-4.3.1/tests/ |
H A D | test_decode_tokens.py | 254 valid_token = encode_token(app, default_access_token) 256 decoded = decode_token(valid_token) 276 valid_token = encode_token(app, default_access_token) 278 decoded = decode_token(valid_token) 305 valid_token = encode_token(app, default_access_token) 307 decoded = decode_token(valid_token)
|
/dports/security/elixir-comeonin/comeonin-3.2/lib/comeonin/ |
H A D | otp.ex | 57 def valid_token(token, _) when not is_binary(token) do function 60 def valid_token(token, token_length) function 64 def valid_token(_, _), do: false function 112 valid_token(token, Keyword.get(opts, :token_length, 6)) and 131 valid_token(token, Keyword.get(opts, :token_length, 6)) and
|
/dports/devel/py-lazr.restfulclient/lazr.restfulclient-0.14.3/src/lazr/restfulclient/docs/ |
H A D | authorizer.standalone.rst | 123 >>> valid_token = OAuthToken("token", "secret") 138 ... if consumer == valid_consumer and token == valid_token: 163 ... {valid_token.key : valid_token, 203 ... valid_consumer.key, access_token=valid_token) 213 ... valid_consumer.key, access_token=valid_token, 251 ... 'random consumer', access_token=valid_token)
|
/dports/mail/dovecot/dovecot-2.3.17/src/auth/ |
H A D | mech-dovecot-token.c | 52 const char *valid_token = in mech_dovecot_token_auth_continue() local 57 str_equals_timing_almost_safe(auth_token, valid_token)) { in mech_dovecot_token_auth_continue()
|
/dports/graphics/mapserver/mapserver-7.6.4/ |
H A D | mapcrypto.c | 435 int valid_token = MS_FALSE; in msDecryptStringTokens() local 441 valid_token = MS_TRUE; in msDecryptStringTokens() 444 valid_token = MS_FALSE; in msDecryptStringTokens() 450 if (valid_token) { in msDecryptStringTokens()
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/models/error_tracking/ |
H A D | project_error_tracking_setting_spec.rb | 55 valid_token = 'token' 61 true | false | valid_token | nil | false 62 true | false | valid_token | valid_api_url | true 65 false | false | valid_token | nil | true 66 false | false | valid_token | valid_api_url | true
|
/dports/www/py-django-otp/django-otp-1.0.4/src/django_otp/ |
H A D | tests.py | 66 def valid_token(self): member in ThrottlingTestMixin 81 verified2 = self.device.verify_token(self.valid_token()) 90 verified2 = self.device.verify_token(self.valid_token()) 121 self.device.verify_token(self.valid_token())
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/browser/webshare/win/ |
H A D | fake_data_transfer_manager_unittest.cc | 133 EventRegistrationToken valid_token; in TEST_F() local 136 test_callback.callback_.Get(), &valid_token)); in TEST_F() 145 fake_data_transfer_manager_->remove_DataRequested(valid_token)); in TEST_F() 148 fake_data_transfer_manager_->remove_DataRequested(valid_token)), in TEST_F()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/webapp2/webapp2_extras/appengine/auth/ |
H A D | models.py | 276 valid_token, user = model.get_multi([token_key, user_key]) 277 if valid_token and user: 278 timestamp = int(time.mktime(valid_token.created.timetuple()))
|
/dports/www/nibbleblog/nibbleblog/admin/ |
H A D | security.php | 28 if( !$login->valid_token($_POST['token']) )
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/requests/api/terraform/modules/v1/ |
H A D | packages_spec.rb | 88 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 144 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 204 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 268 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 346 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' }
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/spec/requests/api/ |
H A D | rubygem_packages_spec.rb | 83 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 165 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 229 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 308 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' } 399 let(:token) { valid_token ? tokens[token_type] : 'invalid-token123' }
|
/dports/security/pam_yubico/pam_yubico-2.26/ |
H A D | pam_yubico.c | 883 int valid_token = 0; in pam_sm_authenticate() local 1022 valid_token = authorize_user_token_ldap (cfg, user, NULL); in pam_sm_authenticate() 1024 valid_token = authorize_user_token (cfg, user, NULL, pamh); in pam_sm_authenticate() 1026 switch(valid_token) in pam_sm_authenticate() 1147 valid_token = authorize_user_token_ldap (cfg, user, otp_id); in pam_sm_authenticate() 1149 valid_token = authorize_user_token (cfg, user, otp_id, pamh); in pam_sm_authenticate() 1151 switch(valid_token) in pam_sm_authenticate()
|
/dports/games/pioneer/pioneer-20210723/src/ |
H A D | Lang.cpp | 26 static bool valid_token(const std::string &token) in valid_token() function 53 if (!valid_token(token)) { in Load()
|
/dports/devel/py-azure-identity/azure-identity-1.5.0/tests/ |
H A D | test_client_secret_credential_async.py | 180 valid_token = AccessToken(access_token, now + 3600) 184 assert token == valid_token
|
/dports/lang/mono/mono-5.10.1.57/mono/metadata/ |
H A D | dynamic-image.c | 289 mono_reflection_lookup_dynamic_token (MonoImage *image, guint32 token, gboolean valid_token, MonoCl… in mono_reflection_lookup_dynamic_token() argument 299 if (valid_token) in mono_reflection_lookup_dynamic_token() 314 mono_reflection_lookup_dynamic_token (MonoImage *image, guint32 token, gboolean valid_token, MonoCl… in mono_reflection_lookup_dynamic_token() argument
|
/dports/databases/twemproxy/twemproxy-0.5.0/src/ |
H A D | nc_conf.h | 112 unsigned valid_token:1; /* valid token? */ member
|
/dports/finance/odoo/odoo-19d77c2a03335eb95a686bd69a1b56b38e87d609/odoo/addons/mail/controllers/ |
H A D | main.py | 33 valid_token = request.env['mail.thread']._notify_encode_link(base_link, params) 34 return consteq(valid_token, str(token))
|
/dports/devel/bugzilla50/bugzilla-5.0.4/ |
H A D | attachment.cgi | 228 my $valid_token = 1; 235 $valid_token = 0; 239 unless ($userid && $valid_token) {
|
/dports/devel/bugzilla44/bugzilla-4.4.13/ |
H A D | attachment.cgi | 251 my $valid_token = 1; 258 $valid_token = 0; 262 unless ($userid && $valid_token) {
|
/dports/x11-fm/librfm/librfm5-5.3.16.4/modules/ |
H A D | completion.c | 77 if (!valid_token(widgets_p, in_token)) return NULL; in rfm_bash_complete()
|