/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vendor/github.com/hashicorp/vault-plugin-secrets-gcp/plugin/ |
H A D | backend.go | 28 type backend struct { struct 29 *framework.Backend 33 cache *cache.Cache 35 iamResources iamutil.IamResourceParser 37 rolesetLock sync.Mutex 89 func (b *backend) IAMClient(s logical.Storage) (*iam.Service, error) { 113 func (b *backend) HTTPClient(s logical.Storage) (*http.Client, error) { 136 func (b *backend) credentials(s logical.Storage) (*google.Credentials, error) { 176 func (b *backend) ClearCaches() { 182 func (b *backend) invalidate(ctx context.Context, key string) {
|
/dports/security/py-cryptography/cryptography-3.3.2/tests/hazmat/primitives/ |
H A D | test_dsa.py | 45 def test_skip_if_dsa_not_supported(backend): argument 52 def test_generate_dsa_parameters(self, backend): argument 355 def test_large_p(self, backend): argument 424 def test_signature_not_bytes(self, backend): argument 431 def test_use_after_finalize(self, backend): argument 443 def test_verify(self, backend): argument 451 def test_prehashed_verify(self, backend): argument 505 def test_dsa_signing(self, vector, backend): argument 527 def test_use_after_finalize(self, backend): argument 538 def test_sign(self, backend): argument [all …]
|
H A D | test_ed448.py | 30 def test_ed448_unsupported(backend): argument 59 def test_sign_input(self, vector, backend): argument 79 def test_invalid_signature(self, backend): argument 88 def test_generate(self, backend): argument 100 def test_pub_priv_bytes_raw(self, vector, backend): argument 167 def test_invalid_type_public_bytes(self, backend): argument 171 def test_invalid_type_private_bytes(self, backend): argument 187 def test_invalid_private_bytes(self, backend): argument 210 def test_invalid_public_bytes(self, backend): argument 228 def test_buffer_protocol(self, backend): argument [all …]
|
H A D | test_pkcs12.py | 78 def test_load_pkcs12_cert_only(self, backend): argument 97 def test_load_pkcs12_key_only(self, backend): argument 116 def test_non_bytes(self, backend): argument 120 def test_not_a_pkcs12(self, backend): argument 124 def test_invalid_password(self, backend): argument 134 def test_buffer_protocol(self, backend): argument 149 def _load_cert(backend, path): argument 159 def _load_ca(backend): argument 191 def test_generate_with_cert_key_ca(self, backend): argument 209 def test_generate_wrong_types(self, backend): argument [all …]
|
H A D | test_aes_gcm.py | 42 def test_gcm_tag_with_only_aad(self, backend): argument 56 def test_gcm_ciphertext_with_no_aad(self, backend): argument 71 def test_gcm_ciphertext_limit(self, backend): argument 83 def test_gcm_aad_limit(self, backend): argument 95 def test_gcm_ciphertext_increments(self, backend): argument 108 def test_gcm_aad_increments(self, backend): argument 119 def test_gcm_tag_decrypt_none(self, backend): argument 137 def test_gcm_tag_decrypt_mode(self, backend): argument 155 def test_gcm_tag_decrypt_finalize(self, backend): argument 181 def test_buffer_protocol(self, backend): argument [all …]
|
H A D | test_x25519.py | 30 def test_x25519_unsupported(backend): argument 53 def test_rfc7748(self, vector, backend): argument 62 def test_rfc7748_1000_iteration(self, backend): argument 83 def test_null_shared_key_raises_error(self, backend): argument 98 def test_public_bytes_bad_args(self, backend): argument 156 def test_generate(self, backend): argument 161 def test_invalid_type_exchange(self, backend): argument 166 def test_invalid_length_from_public_bytes(self, backend): argument 180 def test_invalid_private_bytes(self, backend): argument 203 def test_invalid_public_bytes(self, backend): argument [all …]
|
/dports/security/vault/vault-1.8.2/builtin/logical/aws/ |
H A D | backend.go | 64 type backend struct { struct 65 *framework.Backend 68 roleMutex sync.RWMutex 71 clientMutex sync.RWMutex 75 iamClient iamiface.IAMAPI 76 stsClient stsiface.STSAPI 89 func (b *backend) invalidate(ctx context.Context, key string) { 97 func (b *backend) clearClients() { 106 func (b *backend) clientIAM(ctx context.Context, s logical.Storage) (iamiface.IAMAPI, error) { 133 func (b *backend) clientSTS(ctx context.Context, s logical.Storage) (stsiface.STSAPI, error) {
|
/dports/audio/libmatemixer/libmatemixer-1.26.0/libmatemixer/ |
H A D | matemixer-backend.c | 202 MateMixerBackend *backend; in mate_mixer_backend_get_property() local 229 MateMixerBackend *backend; in mate_mixer_backend_set_property() local 248 mate_mixer_backend_init (MateMixerBackend *backend) in mate_mixer_backend_init() 271 MateMixerBackend *backend; in mate_mixer_backend_dispose() local 286 MateMixerBackend *backend; in mate_mixer_backend_finalize() local 322 mate_mixer_backend_open (MateMixerBackend *backend) in mate_mixer_backend_open() 331 mate_mixer_backend_close (MateMixerBackend *backend) in mate_mixer_backend_close() 344 mate_mixer_backend_get_state (MateMixerBackend *backend) in mate_mixer_backend_get_state() 412 mate_mixer_backend_list_devices (MateMixerBackend *backend) in mate_mixer_backend_list_devices() 427 mate_mixer_backend_list_streams (MateMixerBackend *backend) in mate_mixer_backend_list_streams() [all …]
|
/dports/security/py-cryptography/cryptography-3.3.2/tests/x509/ |
H A D | test_x509_crlbuilder.py | 51 def test_aware_last_update(self, backend): argument 95 def test_aware_next_update(self, backend): argument 173 def test_no_issuer_name(self, backend): argument 186 def test_no_last_update(self, backend): argument 201 def test_no_next_update(self, backend): argument 216 def test_sign_empty_list(self, backend): argument 506 def test_sign_dsa_key(self, backend): argument 556 def test_sign_ec_key(self, backend): argument 610 def test_sign_ed25519_key(self, backend): argument 665 def test_sign_ed448_key(self, backend): argument [all …]
|
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/misc/concourse/vault-bdd38fca2cff/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/security/vault/vault-1.8.2/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/sysutils/istio/vault-sdk-v0.1.12/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/logical/mssql/ |
H A D | backend.go | 54 type backend struct { struct 55 *framework.Backend 57 db *sql.DB 58 defaultDb string 59 lock sync.Mutex 63 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) { 117 func (b *backend) ResetDB(_ context.Context) { 128 func (b *backend) invalidate(ctx context.Context, key string) { 136 func (b *backend) LeaseConfig(ctx context.Context, s logical.Storage) (*configLease, error) {
|