/external/grpc-grpc/test/core/security/ |
create_jwt.cc | 23 #include "src/core/lib/security/credentials/jwt/jwt_credentials.h" 34 char* jwt; local 46 jwt = grpc_jwt_encode_and_sign( 50 if (jwt == nullptr) { 51 fprintf(stderr, "Could not create JWT.\n"); 55 fprintf(stdout, "%s\n", jwt); 56 gpr_free(jwt);
|
verify_jwt.cc | 29 #include "src/core/lib/security/credentials/jwt/jwt_verifier.h" 79 const char* jwt = nullptr; local 84 cl = gpr_cmdline_create("JWT verifier tool"); 85 gpr_cmdline_add_string(cl, "jwt", "JSON web token to verify", &jwt); 86 gpr_cmdline_add_string(cl, "aud", "Audience for the JWT", &aud); 88 if (jwt == nullptr || aud == nullptr) { 100 grpc_jwt_verifier_verify(verifier, sync.pollset, jwt, aud,
|
json_token_test.cc | 19 #include "src/core/lib/security/credentials/jwt/json_token.h" 253 GPR_ASSERT(strcmp(typ->value, "JWT") == 0); 385 char* jwt = jwt_encode_and_sign_func(&json_key); local 386 const char* dot = strchr(jwt, '.'); 388 parsed_header = parse_json_part_from_jwt(jwt, static_cast<size_t>(dot - jwt), 392 offset = static_cast<size_t>(dot - jwt) + 1; 396 dot = strchr(jwt + offset, '.'); 399 jwt + offset, static_cast<size_t>(dot - (jwt + offset)), &scratchpad) [all...] |
jwt_verifier_test.cc | 19 #include "src/core/lib/security/credentials/jwt/jwt_verifier.h" 31 #include "src/core/lib/security/credentials/jwt/json_token.h" 68 /* Trick our JWT library into issuing a JWT with iss=accounts.google.com. */ 355 char* jwt = nullptr; local 362 jwt = grpc_jwt_encode_and_sign(&key, expected_audience, expected_lifetime, 365 GPR_ASSERT(jwt != nullptr); 366 grpc_jwt_verifier_verify(verifier, nullptr, jwt, expected_audience, 370 gpr_free(jwt); 388 char* jwt = nullptr local 435 char* jwt = nullptr; local 474 char* jwt = nullptr; local 497 char* jwt = nullptr; local 548 char* jwt = nullptr; local [all...] |
credentials_test.cc | 41 #include "src/core/lib/security/credentials/jwt/jwt_credentials.h" 877 grpc_service_account_jwt_access_credentials* jwt; local [all...] |
/external/syzkaller/vendor/golang.org/x/oauth2/jwt/ |
jwt.go | 5 // Package jwt implements the OAuth 2.0 JSON Web Token flow, commonly 8 // See: https://tools.ietf.org/html/draft-ietf-oauth-jwt-bearer-12 9 package jwt package 28 defaultGrantType = "urn:ietf:params:oauth:grant-type:jwt-bearer" 29 defaultHeader = &jws.Header{Algorithm: "RS256", Typ: "JWT"} 32 // Config is the configuration for using JWT to fetch tokens, 41 // private key is used to sign JWT payloads. 59 // TokenURL is the endpoint required to complete the 2-legged JWT flow. 66 // TokenSource returns a JWT TokenSource using the configuration 81 // jwtSource is a source that always does a signed JWT request for a token [all...] |
/external/grpc-grpc/src/core/lib/security/credentials/jwt/ |
jwt_credentials.cc | 21 #include "src/core/lib/security/credentials/jwt/jwt_credentials.h" 62 /* See if we can return a cached jwt. */ 78 char* jwt = nullptr; local 79 /* Generate a new jwt. */ 82 jwt = grpc_jwt_encode_and_sign(&c->key, context.service_url, 84 if (jwt != nullptr) { 86 gpr_asprintf(&md_value, "Bearer %s", jwt); 87 gpr_free(jwt); 104 *error = GRPC_ERROR_CREATE_FROM_STATIC_STRING("Could not generate JWT."); 123 gpr_log(GPR_ERROR, "Invalid input for jwt credentials creation") [all...] |
/external/tensorflow/tensorflow/core/platform/cloud/ |
oauth_client.cc | 45 constexpr char kJwtType[] = "JWT"; 131 /// Encodes a claim for a JSON web token (JWT) to make an OAuth request. 154 /// Encodes a header for a JSON web token (JWT) to make an OAuth request. 216 const string jwt = to_sign + "." + signature; local 218 strings::StrCat("grant_type=", kGrantType, "&assertion=", jwt);
|