Home
last modified time | relevance | path

Searched refs:keyFile (Results 101 – 125 of 2216) sorted by relevance

12345678910>>...89

/dports/devel/gwenhywfar-qt5/gwenhywfar-5.6.0/tools/gsa/
H A Dsign.c28 const char *keyFile; in signArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive()
107 assert(keyFile); in signArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
H A Dverify.c28 const char *keyFile; in verifyArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive()
107 assert(keyFile); in verifyArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
/dports/devel/gwenhywfar-gtk3/gwenhywfar-5.6.0/tools/gsa/
H A Dverify.c28 const char *keyFile; in verifyArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive()
107 assert(keyFile); in verifyArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
H A Dsign.c28 const char *keyFile; in signArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive()
107 assert(keyFile); in signArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
/dports/devel/gwenhywfar-gtk2/gwenhywfar-5.6.0/tools/gsa/
H A Dsign.c28 const char *keyFile; in signArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive()
107 assert(keyFile); in signArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
/dports/devel/gwenhywfar-fox16/gwenhywfar-5.6.0/tools/gsa/
H A Dverify.c28 const char *keyFile; in verifyArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in verifyArchive()
107 assert(keyFile); in verifyArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in verifyArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in verifyArchive()
H A Dsign.c28 const char *keyFile; in signArchive() local
106 keyFile=GWEN_DB_GetCharValue(db, "keyFile", 0, NULL); in signArchive()
107 assert(keyFile); in signArchive()
112 rv=GWEN_DB_ReadFile(dbKey, keyFile, GWEN_DB_FLAGS_DEFAULT); in signArchive()
114 fprintf(stderr, "ERROR: Error reading keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
119 fprintf(stderr, "ERROR: Error decoding keyfile [%s] (%d)\n", keyFile, rv); in signArchive()
/dports/databases/mongodb36/mongodb-src-r3.6.23/buildscripts/resmokeconfig/suites/
H A Dgle_auth.yml3 - &keyFile jstests/libs/authTestsKey anchor
22 keyFile: *keyFile
37 keyFile: *keyFile
H A Daggregation_auth.yml3 - &keyFile jstests/libs/authTestsKey anchor
25 keyFile: *keyFile
40 keyFile: *keyFile
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/google/auth/tests/Credentials/
H A DServiceAccountCredentialsTest.php139 $keyFile = __DIR__ . '/../fixtures' . '/does-not-exist-private.json';
140 new ServiceAccountCredentials('scope/1', $keyFile);
145 $keyFile = __DIR__ . '/../fixtures' . '/private.json';
147 new ServiceAccountCredentials('scope/1', $keyFile)
187 $keyFile = __DIR__ . '/../fixtures' . '/does-not-exist-private.json';
188 putenv(ServiceAccountCredentials::ENV_VAR . '=' . $keyFile);
194 $keyFile = __DIR__ . '/../fixtures' . '/private.json';
195 putenv(ServiceAccountCredentials::ENV_VAR . '=' . $keyFile);
365 new ServiceAccountJwtAccessCredentials($keyFile);
370 $keyFile = __DIR__ . '/../fixtures' . '/private.json';
[all …]
/dports/www/gitea/gitea-1.16.5/integrations/
H A Dssh_key_test.go60 withKeyFile(t, keyname, func(keyFile string) {
61 t.Run("CreatePushDeployKey", doAPICreateDeployKey(ctx, keyname, keyFile, false))
107 withKeyFile(t, keyname, func(keyFile string) {
118 …t.Run("CreateUserKey", doAPICreateUserKey(ctx, keyname, keyFile, func(t *testing.T, publicKey api.…
122 t.Run("FailToAddReadOnlyDeployKey", doAPICreateDeployKey(failCtx, keyname, keyFile, true))
124 t.Run("FailToAddDeployKey", doAPICreateDeployKey(failCtx, keyname, keyFile, false))
145 t.Run("AddReadOnlyDeployKey", doAPICreateDeployKey(ctx, keyname, keyFile, true))
158 t.Run("AddWriterDeployKeyToOther", doAPICreateDeployKey(otherCtx, keyname, keyFile, false))
166 t.Run("FailToCreateUserKey", doAPICreateUserKey(failCtx, keyname, keyFile))
177 t.Run("FailToCreateUserKeyAsStillDeploy", doAPICreateUserKey(failCtx, keyname, keyFile))
[all …]
/dports/devel/msbuild/msbuild-0.06/src/Tasks/
H A DStrongNameUtils.cs36 …internal static void ReadKeyFile(TaskLoggingHelper log, string keyFile, out StrongNameKeyPair keyP… in ReadKeyFile() argument
47 … using (FileStream fs = new FileStream(keyFile, FileMode.Open, FileAccess.Read, FileShare.Read)) in ReadKeyFile()
55 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile()
61 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile()
67 log.LogErrorWithCodeFromResources("StrongNameUtils.KeyFileReadFailure", keyFile); in ReadKeyFile()
99 …internal static void GetStrongNameKey(TaskLoggingHelper log, string keyFile, string keyContainer, … in GetStrongNameKey() argument
126 else if (keyFile != null && keyFile.Length != 0) in GetStrongNameKey()
128 ReadKeyFile(log, keyFile, out keyPair, out publicKey); in GetStrongNameKey()
/dports/sysutils/helm/helm-3.5.2/vendor/k8s.io/apiserver/pkg/server/dynamiccertificates/
H A Ddynamic_serving_content.go39 keyFile string member
55 func NewDynamicServingContentFromFiles(purpose, certFile, keyFile string) (*DynamicCertKeyPairConte…
56 if len(certFile) == 0 || len(keyFile) == 0 {
59 name := fmt.Sprintf("%s::%s::%s", purpose, certFile, keyFile)
64 keyFile: keyFile,
85 key, err := ioutil.ReadFile(c.keyFile)
/dports/sysutils/kubectl/kubernetes-1.22.2/staging/src/k8s.io/apiserver/pkg/server/dynamiccertificates/
H A Ddynamic_serving_content.go39 keyFile string member
54 func NewDynamicServingContentFromFiles(purpose, certFile, keyFile string) (*DynamicCertKeyPairConte…
55 if len(certFile) == 0 || len(keyFile) == 0 {
58 name := fmt.Sprintf("%s::%s::%s", purpose, certFile, keyFile)
63 keyFile: keyFile,
84 key, err := ioutil.ReadFile(c.keyFile)
/dports/sysutils/helmfile/vault-f6547fa8e820/internalshared/reloadutil/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/go-secure-stdlib/reloadutil/
H A Dreload.go25 keyFile string member
29 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
32 keyFile: keyFile,
42 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/misc/concourse/vault-bdd38fca2cff/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/security/vault/vault-1.8.2/internalshared/reloadutil/
H A Dreload.go25 keyFile string member
29 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
32 keyFile: keyFile,
42 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/github.com/hashicorp/vault/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/sysutils/gomplate/vault-sdk-v0.1.13/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/helper/reload/
H A Dreload.go27 keyFile string member
31 func NewCertificateGetter(certFile, keyFile, passphrase string) *CertificateGetter { argument
34 keyFile: keyFile,
44 keyPEMBlock, err := ioutil.ReadFile(cg.keyFile)

12345678910>>...89