/dports/net/gscloud/gscloud-0.11.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net/inlets/inlets-3.0.2/vendor/golang.org/x/net/net-69a78807bb2b/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/security/vault/vault-1.8.2/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/deskutils/pet/pet-0.4.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/dns/prometheus-dnssec-exporter/prometheus-dnssec-exporter-caa7d89/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/workhorse/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/dns/nextdns/nextdns-1.32.2/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/devel/gh/cli-2.4.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net/rclone/rclone-1.57.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/security/lego/lego-4.5.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/www/gitlab-pages/gitlab-pages-f8512edbec4ec83b426c8ca2dda467de424685e4/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/security/snowflake-tor/snowflake-ead5a960d7fa19dc890ccbfc0765c5ab6629eaa9/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/dns/blocky/blocky-0.17/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/sysutils/chezmoi/chezmoi-2.9.3/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/sysutils/chaoskube/chaoskube-0.22.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net/croc/croc-9.5.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net/cloudquery/cloudquery-0.16.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/net/drive/drive-0.4.0/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|
/dports/security/vuls/vuls-0.13.7/vendor/golang.org/x/net/xsrftoken/ |
H A D | xsrf_test.go | 16 actionID = "POST /form" const 25 tok := generateTokenAtTime(key, userID, actionID, now) 26 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, Timeout) { 35 if !validTokenAtTime(tok, key, userID, actionID, oneMinuteFromNow, time.Hour) { 79 name, key, userID, actionID string 83 {"Bad key", "foobar", userID, actionID, oneMinuteFromNow, Timeout}, 84 {"Bad userID", key, "foobar", actionID, oneMinuteFromNow, Timeout}, 91 tok := generateTokenAtTime(key, userID, actionID, now) 93 if validTokenAtTime(tok, itt.key, itt.userID, itt.actionID, itt.t, itt.timeout) { 108 {"Wrong length", "1234" + generateTokenAtTime(key, userID, actionID, now)}, [all …]
|