/dports/devel/gwenhywfar-qt5/gwenhywfar-5.6.0/tools/gsa/ |
H A D | sign.c | 28 const char *keyFile; in signArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive() 107 assert(keyFile); in signArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
|
H A D | verify.c | 28 const char *keyFile; in verifyArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive() 107 assert(keyFile); in verifyArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
|
/dports/devel/gwenhywfar-gtk3/gwenhywfar-5.6.0/tools/gsa/ |
H A D | verify.c | 28 const char *keyFile; in verifyArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive() 107 assert(keyFile); in verifyArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
|
H A D | sign.c | 28 const char *keyFile; in signArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive() 107 assert(keyFile); in signArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
|
/dports/devel/gwenhywfar-gtk2/gwenhywfar-5.6.0/tools/gsa/ |
H A D | sign.c | 28 const char *keyFile; in signArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive() 107 assert(keyFile); in signArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
|
/dports/devel/gwenhywfar-fox16/gwenhywfar-5.6.0/tools/gsa/ |
H A D | verify.c | 28 const char *keyFile; in verifyArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive() 107 assert(keyFile); in verifyArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
|
H A D | sign.c | 28 const char *keyFile; in signArchive() local 106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive() 107 assert(keyFile); in signArchive() 112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive() 114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive() 119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
|
/dports/databases/mongodb36/mongodb-src-r3.6.23/buildscripts/resmokeconfig/suites/ |
H A D | gle_auth.yml | 3 - &keyFile jstests/libs/authTestsKey anchor 22 keyFile: *keyFile 37 keyFile: *keyFile
|
H A D | aggregation_auth.yml | 3 - &keyFile jstests/libs/authTestsKey anchor 25 keyFile: *keyFile 40 keyFile: *keyFile
|
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/google/auth/tests/Credentials/ |
H A D | ServiceAccountCredentialsTest.php | 139 $keyFile = __DIR__ . '/../fixtures' . '/does-not-exist-private.json'; 140 new ServiceAccountCredentials('scope/1', $keyFile); 145 $keyFile = __DIR__ . '/../fixtures' . '/private.json'; 147 new ServiceAccountCredentials('scope/1', $keyFile) 187 $keyFile = __DIR__ . '/../fixtures' . '/does-not-exist-private.json'; 188 putenv(ServiceAccountCredentials::ENV_VAR . '=' . $keyFile); 194 $keyFile = __DIR__ . '/../fixtures' . '/private.json'; 195 putenv(ServiceAccountCredentials::ENV_VAR . '=' . $keyFile); 365 new ServiceAccountJwtAccessCredentials($keyFile); 370 $keyFile = __DIR__ . '/../fixtures' . '/private.json'; [all …]
|
/dports/www/gitea/gitea-1.16.5/integrations/ |
H A D | ssh_key_test.go | 60 withKeyFile(t, keyname, func(keyFile string) { 61 t.Run("CreatePushDeployKey", doAPICreateDeployKey(ctx, keyname, keyFile, false)) 107 withKeyFile(t, keyname, func(keyFile string) { 118 …t.Run("CreateUserKey", doAPICreateUserKey(ctx, keyname, keyFile, func(t *testing.T, publicKey api.… 122 t.Run("FailToAddReadOnlyDeployKey", doAPICreateDeployKey(failCtx, keyname, keyFile, true)) 124 t.Run("FailToAddDeployKey", doAPICreateDeployKey(failCtx, keyname, keyFile, false)) 145 t.Run("AddReadOnlyDeployKey", doAPICreateDeployKey(ctx, keyname, keyFile, true)) 158 t.Run("AddWriterDeployKeyToOther", doAPICreateDeployKey(otherCtx, keyname, keyFile, false)) 166 t.Run("FailToCreateUserKey", doAPICreateUserKey(failCtx, keyname, keyFile)) 177 t.Run("FailToCreateUserKeyAsStillDeploy", doAPICreateUserKey(failCtx, keyname, keyFile)) [all …]
|
/dports/devel/msbuild/msbuild-0.06/src/Tasks/ |
H A D | StrongNameUtils.cs | 36 …internal static void ReadKeyFile(TaskLoggingHelper log, string keyFile, out StrongNameKeyPair keyP… in ReadKeyFile() argument 47 … using (FileStream fs = new FileStream(keyFile, FileMode.Open, FileAccess.Read, FileShare.Read)) in ReadKeyFile() 55 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile() 61 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile() 67 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile() 99 …internal static void GetStrongNameKey(TaskLoggingHelper log, string keyFile, string keyContainer, … in GetStrongNameKey() argument 126 else if (keyFile != null && keyFile.Length != 0) in GetStrongNameKey() 128 ReadKeyFile(log, keyFile, out keyPair, out publicKey); in GetStrongNameKey()
|
/dports/sysutils/helm/helm-3.5.2/vendor/k8s.io/apiserver/pkg/server/dynamiccertificates/ |
H A D | dynamic_serving_content.go | 39 keyFile string member 55 func NewDynamicServingContentFromFiles(purpose, certFile, keyFile string) (*DynamicCertKeyPairConte… 56 if len(certFile) == 0 || len(keyFile) == 0 { 59 name := fmt.Sprintf("%s::%s::%s", purpose, certFile, keyFile) 64 keyFile: keyFile, 85 key, err := ioutil.ReadFile(c.keyFile)
|
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/ |
H A D | dynamic_serving_content.go | 39 keyFile string member 54 func NewDynamicServingContentFromFiles(purpose, certFile, keyFile string) (*DynamicCertKeyPairConte… 55 if len(certFile) == 0 || len(keyFile) == 0 { 58 name := fmt.Sprintf("%s::%s::%s", purpose, certFile, keyFile) 63 keyFile: keyFile, 84 key, err := ioutil.ReadFile(c.keyFile)
|
/dports/sysutils/helmfile/vault-f6547fa8e820/internalshared/reloadutil/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/go-secure-stdlib/reloadutil/ |
H A D | reload.go | 25 keyFile string member 29 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 32 keyFile: keyFile, 42 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/misc/concourse/vault-bdd38fca2cff/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/security/vault/vault-1.8.2/internalshared/reloadutil/ |
H A D | reload.go | 25 keyFile string member 29 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 32 keyFile: keyFile, 42 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/github.com/hashicorp/vault/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/helper/reload/ |
H A D | reload.go | 27 keyFile string member 31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument 34 keyFile: keyFile, 44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
|