Project

General

Profile

Feature #10740 » base64-urlsafe-encode64-search-result.txt

akr (Akira Tanaka), 01/14/2015 12:44 AM

 
active_model-email_confirmation-1.0.1/lib/active_model/email_confirmation.rb:42: Base64.urlsafe_encode64(message_verifier.generate(*args))
active_model-password_reset-1.0.9/lib/active_model/password_reset.rb:51: Base64.urlsafe_encode64(message_verifier.generate(*args))
active_tools-0.0.18/lib/active_tools/active_record/record_id.rb:17: Base64.urlsafe_encode64(Time.now.send(:_dump))
activejob_backport-0.0.2/lib/global_id/global_id.rb:74: Base64.urlsafe_encode64(to_s).sub(/=+$/, '')
assetsio-0.0.2/lib/assetsio/helpers.rb:21: "#{origin_server}/#{Base64.urlsafe_encode64(asset_spec.to_json)}.#{type}"
atpay_ruby-0.0.13/lib/atpay/token/encoder.rb:21: "@#{version_tag}#{Base64.urlsafe_encode64(frames.join)}@"
atpay_ruby-0.0.13/lib/atpay/token/encoder.rb:27: version ? (Base64.urlsafe_encode64([version].pack("Q>")) + '~') : nil
atpay_tokens-4.0.0/lib/atpay/security_key.rb:18: "@#{version}#{Base64.urlsafe_encode64([nonce, partner_frame, body_frame].join)}@"
atpay_tokens-4.0.0/lib/atpay/security_key.rb:25: "@#{version}#{Base64.urlsafe_encode64([nonce, partner_frame, site_frame(remote_addr, headers), body_frame].join)}"
atpay_tokens-4.0.0/lib/atpay/security_key.rb:37: @options[:version] ? (Base64.urlsafe_encode64([@options[:version]].pack("Q>")) + '~') : nil
backup2qiniu-3.5.0/lib/backup/storage/qiniu.rb:92: "/rs-put/#{Base64.urlsafe_encode64("#{bucket}:#{key}")}"
bitballoon-0.2.1/lib/bitballoon/multipass.rb:29: Base64.urlsafe_encode64(ciphertext + sign(ciphertext))
blackbox-1.0.0/lib/blackbox/crypto.rb:83: Base64.urlsafe_encode64(encrypt(plaintext, key, cipher_type, iv))
canery-0.1.4/lib/canery/backend.rb:148: Base64.urlsafe_encode64(Marshal.dump(data))
carrot-facebook-0.9.15/spec/spec_helper.rb:9: encoded_data = Base64.urlsafe_encode64( options.to_json ).tr('=', '')
cell_set-0.2.3/lib/cell_set/cell_set.rb:174: Base64.urlsafe_encode64(value2)
cf-uaa-lib-3.1.0/lib/uaa/util.rb:163: str = Base64.respond_to?(:urlsafe_encode64)? Base64.urlsafe_encode64(obj):
cifrado-0.2.1/lib/cifrado/crypto_services.rb:28: @gpg_extra_args << "--set-filename '#{Base64.urlsafe_encode64(clean_path)}'"
cifrado-0.2.1/lib/cifrado/crypto_services.rb:186: opts[:binary] ? e : Base64.urlsafe_encode64(e)
claim_token-0.0.1/lib/claim_token.rb:14: Base64.urlsafe_encode64(JSON.dump(encrypt(message)))
claim_token-0.0.1/lib/claim_token/encryptor.rb:52: Base64.urlsafe_encode64 raw_string
cloudinary-1.0.77/lib/cloudinary/utils.rb:190: rest = 's--' + Base64.urlsafe_encode64(Digest::SHA1.digest(rest + secret))[0,8] + '--/' + rest
cloulu-1.0.0/lib/uaa/util.rb:163: str = Base64.respond_to?(:urlsafe_encode64)? Base64.urlsafe_encode64(obj):
cryptor-1.1.1/lib/cryptor/encoding.rb:13: Base64.urlsafe_encode64(string).sub(/=*$/, '')
disqussed-0.0.2/lib/disqussed/api.rb:35: data = Base64.urlsafe_encode64(MultiJson.dump(data))
diversion-0.0.1/lib/diversion/url.rb:10: str = Base64.urlsafe_encode64(str) if RUBY_VERSION >= "1.9"
el_finder-1.1.11/lib/el_finder/connector.rb:94: Base64.urlsafe_encode64(pathname.path.to_s).chomp.tr("=\n", "")
el_finder-1.1.11/test/test_el_finder_hash.rb:11: assert_equal Base64.urlsafe_encode64('foo/bar').chomp.tr("=\n", ""), @elfinder.to_hash(ElFinder::Pathname.new(@vroot, 'foo/bar'))
el_finder-1.1.11/test/test_el_finder_hash.rb:12: assert_equal Base64.urlsafe_encode64('.').chomp.tr("=\n", ""), @elfinder.to_hash(ElFinder::Pathname.new(@vroot))
el_finder-1.1.11/test/test_el_finder_hash.rb:16: assert_equal File.join(@vroot, 'foo/bar'), @elfinder.from_hash(Base64.urlsafe_encode64('foo/bar').chomp).to_s
el_finder-1.1.11/test/test_el_finder_hash.rb:17: assert_equal @vroot, @elfinder.from_hash(Base64.urlsafe_encode64('.').chomp).to_s
el_finder_ftp-1.0.1/lib/el_finder_ftp/connector.rb:117: Base64.urlsafe_encode64(pathname.path.to_s).chomp.tr("=\n", "")
el_vfs-0.0.1/app/models/el_vfs/entry.rb:88: self.entry_path_hash = "#{root.root_name}_#{Base64.urlsafe_encode64(relative_entry_path).strip.tr('=', '')}"
emailauth-0.0.4/lib/emailauth/authenticator.rb:13: email_token_s = Base64.urlsafe_encode64(email_token)
emailauth-0.0.4/lib/emailauth/authenticator.rb:15: complete_token_s = Base64.urlsafe_encode64(user_token.unpack('C*').zip(email_token.unpack('C*')).map{ |a,b| a ^ b }.pack('C*'))
emailauth-0.0.4/lib/emailauth/authenticator.rb:25: complete_token_s = Base64.urlsafe_encode64(complete_token)
emailauth-0.0.4/lib/emailauth/authenticator.rb:27: email_token_s = Base64.urlsafe_encode64(email_token)
emailauth-0.0.4/lib/emailauth/authenticator.rb:29: user_token_s = Base64.urlsafe_encode64(complete_token.unpack('C*').zip(email_token.unpack('C*')).map{ |a,b| a ^ b }.pack('C*'))
emailauth-0.0.4/lib/emailauth/authenticator.rb:41: calculated_user_token = Base64.urlsafe_encode64(complete_token_e.unpack('C*').zip(email_token_e.unpack('C*')).map{ |a,b| a ^ b }.pack('C*'))
evostream-0.0.5/lib/evostream/client.rb:60: Base64.urlsafe_encode64(params.map {|k, v| "#{k}=#{v}" }.join(' ')).chomp
facebook-signed-request-0.2.7/lib/facebook-signed-request/signed_request.rb:10: encoded_data = Base64.urlsafe_encode64( options.to_json ).tr('=', '')
facebook-signed-request-0.2.7/test/unit/test_signed_request.rb:87: encoded_json = Base64.urlsafe_encode64( request_json )
facebook-signed-request-0.2.7/test/unit/test_signed_request.rb:114: assert Base64.urlsafe_encode64( request.signature ) =~ /\=$/
facebook_session-1.0.0/spec/helper_spec.rb:23: let(:payload) { Base64.urlsafe_encode64(json) }
facebook_session-1.0.0/spec/helper_spec.rb:24: let(:digest) { Base64.urlsafe_encode64(OpenSSL::HMAC.digest(OpenSSL::Digest.new('sha256'), "bar", payload)) }
facebook_session-1.0.0/spec/message_decoder_spec.rb:7: let(:payload) { Base64.urlsafe_encode64(json).gsub(/[=]+$/, '') }
facebook_session-1.0.0/spec/message_decoder_spec.rb:8: let(:digest) { Base64.urlsafe_encode64(OpenSSL::HMAC.digest(OpenSSL::Digest.new('sha256'), secret, payload)).gsub(/[=]+$/, '') }
facebook_session-1.0.0/spec/session_spec.rb:7: let(:payload) { Base64.urlsafe_encode64(json) }
facebook_session-1.0.0/spec/session_spec.rb:8: let(:digest) { Base64.urlsafe_encode64(OpenSSL::HMAC.digest(OpenSSL::Digest.new('sha256'), "bar", payload)) }
facebook_session-1.0.0/spec/signed_request_spec.rb:7: let(:payload) { Base64.urlsafe_encode64(json) }
facebook_session-1.0.0/spec/signed_request_spec.rb:8: let(:digest) { Base64.urlsafe_encode64(OpenSSL::HMAC.digest(OpenSSL::Digest.new('sha256'), "bar", payload)) }
fare-0.1.3/lib/fare/event.rb:14: Base64.urlsafe_encode64(attributes.to_json)
fernet-2.1/lib/fernet/token.rb:89: new(Base64.urlsafe_encode64(payload + mac), secret: opts.fetch(:secret))
fernet-2.1/spec/secret_spec.rb:6: resolves_input(Base64.urlsafe_encode64("A"*16 + "B"*16))
fernet-2.1/spec/secret_spec.rb:18: secret = Base64.urlsafe_encode64("bad")
fernet-2.1/spec/token_spec.rb:49: token = Fernet::Token.new(Base64.urlsafe_encode64("xxxxxx"), secret: secret)
fernet_multi_json-1.6/lib/fernet/generator.rb:55: Base64.urlsafe_encode64(chars)
filepicker-rails-1.2.0/lib/filepicker_rails/policy.rb:15: Base64.urlsafe_encode64(json_policy)
findi-0.1.0/lib/findi/client.rb:73: auth = Base64.urlsafe_encode64("#{@username}:#{@password}").chomp
firebase_token_generator-2.0.0/lib/firebase_token_generator.rb:102: Base64.urlsafe_encode64(s).gsub('=', '')
globalid-0.3.0/lib/global_id/global_id.rb:74: Base64.urlsafe_encode64(to_s).sub(/=+$/, '')
gnouch-0.0.4/lib/gnouch/attachment.rb:8: :data => Base64.urlsafe_encode64(data)
goinstant-auth-1.0.3/lib/goinstant/auth.rb:26: return Base64.urlsafe_encode64(str).sub(/=+$/,'')
google-jwt-0.0.5/lib/google-jwt.rb:13: Base64.urlsafe_encode64(self).gsub('=', '')
google_business_api_url_signer-0.1.1/lib/google_business_api_url_signer/signer.rb:35: Base64.urlsafe_encode64 signature_digest
gretel-trails-0.0.5/lib/gretel/trails/stores/url_store.rb:37: Base64.urlsafe_encode64(array.to_json)
guillotine-1.4.0/lib/guillotine.rb:37: Base64.urlsafe_encode64([Digest::MD5.hexdigest(url).to_i(16)].pack("N")).sub(/==\n?$/, '')
hawk-auth-0.2.4/lib/hawk/crypto.rb:178: @encoded ||= Base64.urlsafe_encode64(normalized_string).chomp.sub(/=+\Z/, '')
hullio-0.4.0/lib/hull/entity.rb:41: "~#{Base64.urlsafe_encode64(uid)}"
ink_file_picker-0.0.2/lib/ink_file_picker/policy.rb:19: Base64.urlsafe_encode64 policy_json
inkfilepicker-rails-0.0.2/lib/inkfilepicker/policy.rb:15: Base64.urlsafe_encode64(json_policy)
itsdangerousr-1.0.0/lib/itsdangerousr.rb:13: Base64.urlsafe_encode64(string).gsub(/=+$/, '')
jackal-copperegg-0.1.0/lib/jackal-copperegg/resources/probe.rb:102: args[:response]['PhysicalResourceId'] = Base64.urlsafe_encode64(
jr-0.1.3/lib/jr.rb:144: Base64.urlsafe_encode64(@random_instance.bytes(12))
jsign-0.0.1/lib/jsign.rb:43: enc_sig = Base64.urlsafe_encode64(sig).strip
keystok-1.3.0/spec/functional/client_spec.rb:258: access_token: Base64.urlsafe_encode64(config_hash.to_json)
keystok-1.3.0/spec/functional/client_spec.rb:266: connection_string: Base64.urlsafe_encode64(config_hash.to_json)
keystok-1.3.0/spec/functional/client_spec.rb:274: access_token: Base64.urlsafe_encode64(config_hash.to_json)
keystok-1.3.0/spec/functional/client_spec.rb:286: encoded_hash = Base64.urlsafe_encode64(config_hash.to_json)
keystok-1.3.0/spec/functional/client_spec.rb:318: encoded_hash = Base64.urlsafe_encode64(config_hash.to_json)
legacy-fernet-1.6.3/lib/fernet/legacy/generator.rb:55: Base64.urlsafe_encode64(chars)
lenc-1.2.2/lib/lenc/aes.rb:560: s = Base64.urlsafe_encode64(s)
lenc-1.2.2/lib/lenc/repo.rb:217: vs2 = Base64.urlsafe_encode64(verifier_string)
lenc-1.2.2/lib/lenc/repo.rb:660: s3 = Base64.urlsafe_encode64(b)
mach-0.0.3/lib/mach/nonce.rb:9: Base64.urlsafe_encode64("#{SecureRandom.random_bytes(17)}#{timestamp}")
magickly-2.0.1/spec/requests/magickly_app_spec.rb:136: # This is just Base64.urlsafe_encode64 which is not available in ruby 1.8.7
majoun-0.0.1/lib/cookie.rb:40: Base64 = ->(string) { ::Base64.urlsafe_encode64(string) }
majoun-0.0.1/spec/integration/public_api_spec.rb:62: expect(encoded).to eql(Cookie.new(name, Base64.urlsafe_encode64(cookie.value)))
megar-0.0.4/lib/megar/crypto/support.rb:157: Base64.urlsafe_encode64(data).gsub(/=*$/,'')
mobile-pass-0.0.1/lib/rails/generators/passbook/pkpass/templates/model.rb:25: self.authentication_token = Base64.urlsafe_encode64(SecureRandom.base64(36))
mobile-pass-0.0.1/lib/rails/generators/passbook/pkpass/templates/model.rb:26: self.serial_number||= Base64.urlsafe_encode64(SecureRandom.base64(36))
mortal-token-1.0.0/lib/mortal-token/token.rb:27: Base64.urlsafe_encode64(self.digest)
net-http-auth-hmac-0.0.1/lib/net/http/auth/hmac.rb:35: Base64.urlsafe_encode64(string)
net-http-auth-hmac-0.0.1/test/net-http-auth-hmac_test.rb:46: one = Base64.urlsafe_encode64('one')
net-http-auth-hmac-0.0.1/test/net-http-auth-hmac_test.rb:47: two = Base64.urlsafe_encode64('two')
net-http-oauth-1.0.0/lib/net/http/oauth.rb:85: Base64.urlsafe_encode64(OpenSSL::Random.random_bytes(32))
nexus_cli-4.1.0/lib/nexus_cli/n3_metadata.rb:25: return Base64.urlsafe_encode64("urn:maven/artifact##{artifact.group_id}:#{artifact.artifact_id}:#{artifact.version}::#{artifact.extension}")
nobi-0.0.1/lib/nobi.rb:12: Base64.urlsafe_encode64(string).gsub(/=+$/, '')
nucleon-0.2.2/lib/core/util/cli.rb:19: Base64.urlsafe_encode64(Util::Data.to_json(data, false))
obfuscate-0.0.7/lib/obfuscate/crypt.rb:51: obfuscated = Base64.urlsafe_encode64(obfuscated).strip
owasp-esapi-ruby-0.30.0/lib/codec/encoder.rb:166: Base64.urlsafe_encode64(input)
passbook-ruby-0.1.1/lib/rails/generators/passbook/pkpass/templates/model.rb:25: self.authentication_token = Base64.urlsafe_encode64(SecureRandom.base64(36))
passbook-ruby-0.1.1/lib/rails/generators/passbook/pkpass/templates/model.rb:26: self.serial_number||= Base64.urlsafe_encode64(SecureRandom.base64(36))
permalinkable-1.0.1/lib/permalinkable/permalinkable.rb:52: @fpe ||= Base64.urlsafe_encode64(self.class.permalink_cipher.update('%11s' % self.id))
ph_authenticator-1.1.0/lib/ph_authenticator/oauth/state_encoder.rb:8: Base64.urlsafe_encode64 MultiJson.dump(object)
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:103: salmon.content = Base64.urlsafe_encode64(cypher('encrypt', Base64.urlsafe_encode64(content), @content_key, @content_iv))
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:113: Base64.urlsafe_encode64(
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:114: {:aes_key => Base64.urlsafe_encode64(public_key.public_encrypt(
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:115: {'key' => Base64.urlsafe_encode64(@header_key),
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:116: 'iv' => Base64.urlsafe_encode64(@header_iv)}.to_json)),
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:117: :ciphertext => Base64.urlsafe_encode64(cypher('encrypt', header, @header_key, @header_iv))
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:143: xml.iv(Base64.urlsafe_encode64(@content_iv))
proudhon-0.3.7/lib/proudhon/salmon/diaspora.rb:144: xml.aes_key(Base64.urlsafe_encode64(@content_key))
proudhon-0.3.7/lib/proudhon/salmon/magic_key.rb:11: modulus = Base64.urlsafe_encode64(key.n.to_s(2)).gsub(/\n/,'')
proudhon-0.3.7/lib/proudhon/salmon/magic_key.rb:12: expoent = Base64.urlsafe_encode64(key.e.to_s(2)).gsub(/\n/,'')
proudhon-0.3.7/lib/proudhon/salmon/magic_key.rb:13: privmod = Base64.urlsafe_encode64(key.d.to_s(2)).gsub(/\n/,'')
proudhon-0.3.7/lib/proudhon/salmon/magic_key.rb:18: modulus = Base64.urlsafe_encode64(key.n.to_s(2)).gsub(/\n/,'')
proudhon-0.3.7/lib/proudhon/salmon/magic_key.rb:19: expoent = Base64.urlsafe_encode64(key.e.to_s(2)).gsub(/\n/,'')
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:47: xml.send(:'me:data', Base64.urlsafe_encode64(@content), :type => @data_type || TYPE)
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:62: Base64.urlsafe_encode64(key.sign(OpenSSL::Digest::SHA256.new, signable))
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:64: Base64.urlsafe_encode64(key.sign(OpenSSL::Digest::SHA256.new, @content))
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:70: Proudhon::Base64.urlsafe_encode64(to_b(s).map(&:chr).join(''))
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:105: [ Base64.urlsafe_encode64(@content),
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:106: Base64.urlsafe_encode64(@data_type || TYPE),
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:107: Base64.urlsafe_encode64(ENCODING),
proudhon-0.3.7/lib/proudhon/salmon/salmon.rb:108: Base64.urlsafe_encode64(ALGORITHM)
pubnub-3.5.8/lib/pubnub/pam.rb:11: Base64.urlsafe_encode64(OpenSSL::HMAC.digest(OpenSSL::Digest::Digest.new('sha256'), @secret_key.to_s, message)).strip
pwkeep-0.0.4/lib/pwkeep/storage.rb:64: "system-#{Base64.urlsafe_encode64(system_h)}"
qiniu2upyun-0.0.5/lib/qiniu2upyun/qiniu.rb:111: encoding_sign = Base64.urlsafe_encode64(sign)
rack-superfeedr-0.3.0/lib/rack-superfeedr.rb:190: feed_id = "#{id ? id : Base64.urlsafe_encode64(url)}"
rcore-ext-0.2.0/lib/rcore_ext/string/format.rb:88: Base64.urlsafe_encode64(self)
reaction-0.1.2/lib/reaction/client/client.rb:36: @faye.publish BROADCAST, Base64.urlsafe_encode64(Marshal.dump(encap))
resty-0.5.0/lib/resty.rb:119: s && Base64.urlsafe_encode64(s.to_s)
ronin-support-0.5.1/lib/ronin/formatting/extensions/binary/string.rb:228: when :url, :urlsafe then Base64.urlsafe_encode64(self)
ruby_jwt-2.0.5/lib/ruby_jwt.rb:138: return Base64.urlsafe_encode64(val).gsub("=","")
sandal-0.6.0/lib/sandal/util.rb:31: Base64.urlsafe_encode64(s).gsub(/=+$/, "")
secure_string-1.3.3/lib/securize_string/base64_methods.rb:54: return Base64.urlsafe_encode64(str)
secure_string-1.3.3/spec/base64_methods_spec.rb:24: urlsafe_string = (Base64.respond_to?(:urlsafe_encode64)) ? Base64.urlsafe_encode64(message[:string]) : message[:urlsafe_base64]
secure_token-0.0.2/lib/secure_token.rb:70: Base64.urlsafe_encode64(signed)
serf-0.15.0/lib/serf/util/uuidable.rb:35: Base64.urlsafe_encode64(uuid_tool.timestamp_create.raw).chomp('==')
sidekiq-encryptor-0.2.0/spec/sidekiq/encryptor_spec.rb:36: Fernet.generate(Base64.urlsafe_encode64(raw_key), JSON.dump(data))
sigmund-0.0.2/lib/sigmund/base.rb:65: Base64.urlsafe_encode64(data).gsub('=','')
signing-0.0.1/lib/signing.rb:7: Base64.urlsafe_encode64(string).gsub(/(=*$)/, "")
simple-secrets-1.0.0/lib/simple_secrets/primitives.rb:270: Base64.urlsafe_encode64(binary).gsub('=','')
simplify-1.1.2/lib/simplify/paymentsapi.rb:526: # Base64.urlsafe_encode64()/urlsafe_decode64() is not available in ruby 1.8
sparkle_formation-0.2.0/lib/sparkle_formation/translation/rackspace.rb:85: files["/etc/sprkl/#{i}.cfg"] = Base64.urlsafe_encode64(
sparkle_formation-0.2.0/lib/sparkle_formation/translation/rackspace.rb:90: parts['/etc/cloud/cloud.cfg.d/99_s.cfg'] = Base64.urlsafe_encode64(RUNNER)
sphere-cli-0.7.2/lib/sphere-cli/client.rb:135: encoded = Base64.urlsafe_encode64 "#{client_id}:#{client_secret}"
stackmate-0.2.0/lib/stackmate/participants/cloudstack.rb:229: Base64.urlsafe_encode64(data.join(delim))
stormmq-client-0.0.7/lib/stormmq/url.rb:74: Base64.urlsafe_encode64(hmac.digest).chomp
stormmq-client-0.0.7/spec/stormmq/base64_extensions_spec.rb:25: Base64.urlsafe_encode64(Base64.decode64(@unsafe_encoded)).gsub(/\n/,'').should == @safe_encoded
strdes-0.0.1/lib/strdes.rb:23: Base64.urlsafe_encode64 cipher
streams-0.1.2/lib/streams/activitystreams.rb:835: self[:data] = Base64.urlsafe_encode64(d)
sumo-search-2.0.2/lib/sumo/client.rb:73: @encoded_creds ||= Base64.urlsafe_encode64(creds).strip
super_queue-0.3.4/lib/super_queue.rb:380: Base64.urlsafe_encode64(Marshal.dump(p))
the_encrypted_string-0.0.3/lib/the_encrypted_string.rb:17: Base64.urlsafe_encode64 encrypted_str
the_subscribers-0.0.1/app/models/concerns/subscribers_crypt.rb:6: Base64.urlsafe_encode64(data)
tinypass-1.0.1/lib/tinypass/builder/security_utils.rb:44: base64 = Base64.urlsafe_encode64(data)
tokenify-0.0.1/lib/tokenify/token.rb:32: Base64.urlsafe_encode64(@encrypted)
tokenify-0.0.1/spec/tokenify/token_spec.rb:44: expect(encoded_token).to eq(Base64.urlsafe_encode64(encrypted_token.encrypted))
toolong-dontread-0.0.4/lib/tldr/token_generator.rb:22: @token = Base64.urlsafe_encode64 "#{@subscriber_id}|#{@email_name}"
tui-0.0.1/lib/tui/authorization/request.rb:19: login = Base64.urlsafe_encode64("#{Tui::Config.username}:#{Tui::Config.password}")
u2u-api-http-0.6.0/lib/u2u-api-http.rb:34: Base64.urlsafe_encode64(self.auth_token.to_s + ":") # http-basic with username as token
u2u-api-http-0.6.0/spec/u2u-api-http_spec.rb:15: Base64.urlsafe_encode64(auth_token.to_s + ":")
vagrant-cloudstack-0.10.0/lib/vagrant-cloudstack/action/run_instance.rb:142: options['user_data'] = Base64.urlsafe_encode64(user_data)
visa_net_uy-0.0.2/lib/visa_net_uy/encoder.rb:7: Base64.urlsafe_encode64(data).gsub('=','.')
with_cred-0.0.3/lib/with_cred.rb:31: Base64.urlsafe_encode64(encrypted_binary)
with_cred-0.0.3/spec/env_credentials_spec.rb:21: Base64.urlsafe_encode64(Encryptor.encrypt(credentials, :key => password, :algorithm => 'aes-256-cbc'))
wix-0.0.5/lib/wix/instance.rb:29: my_signature = Base64.urlsafe_encode64(hmac).gsub('=','')
wix-apps-0.0.3/lib/wix-apps/signed_instance.rb:30: my_signature = Base64.urlsafe_encode64(hmac_digest).gsub('=','')
wix-hive-ruby-0.9.1/lib/hive/connect/request/wix_api_request.rb:78: Base64.urlsafe_encode64(hmac).gsub(/\+/, '-').gsub(/\//, '_').gsub('=', '')
wix-hive-ruby-0.9.1/lib/hive/connect/wix_client.rb:80: my_signature = Base64.urlsafe_encode64(hmac).gsub('=', '')
zendesk_api-1.4.3/spec/core/spec_helper.rb:56: :authorization => "Basic #{Base64.urlsafe_encode64(authorization)}"
(1-1/2)