/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/google.golang.org/grpc/grpc-go-1.34.0/interop/server/ |
H A D | server.go | 41 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 62 if *keyFile == "" { 63 *keyFile = testdata.Path("server1.key") 65 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/net/storj/storj-1.45.3/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 40 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 59 if *keyFile == "" { 60 *keyFile = testdata.Path("server1.key") 62 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/databases/litestream/litestream-0.3.6/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 42 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 63 if *keyFile == "" { 64 *keyFile = testdata.Path("server1.key") 66 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/textproc/gitlab-elasticsearch-indexer/gitlab-elasticsearch-indexer-ef1440548effec15831eda2d246dacc43233cefb/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 42 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 63 if *keyFile == "" { 64 *keyFile = testdata.Path("server1.key") 66 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/www/tusd/tusd-1.8.0/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 42 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 63 if *keyFile == "" { 64 *keyFile = testdata.Path("server1.key") 66 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/devel/mutagen/mutagen-0.11.8/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 40 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 59 if *keyFile == "" { 60 *keyFile = testdata.Path("server1.key") 62 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/www/grafana8/grafana-8.3.6/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 42 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 63 if *keyFile == "" { 64 *keyFile = testdata.Path("server1.key") 66 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/sysutils/istio/istio-1.6.7/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 40 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 59 if *keyFile == "" { 60 *keyFile = testdata.Path("server1.key") 62 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/sysutils/terraform-docs/terraform-docs-0.16.0/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 42 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 63 if *keyFile == "" { 64 *keyFile = testdata.Path("server1.key") 66 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 40 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 59 if *keyFile == "" { 60 *keyFile = testdata.Path("server1.key") 62 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/net/grpcox/grpcox-1.0.0/vendor/google.golang.org/grpc/interop/server/ |
H A D | server.go | 40 keyFile = flag.String("tls_key_file", "", "The TLS key file") var 59 if *keyFile == "" { 60 *keyFile = testdata.Path("server1.key") 62 creds, err := credentials.NewServerTLSFromFile(*certFile, *keyFile)
|
/dports/devel/hs-git-annex/git-annex-8.20210903/ |
H A D | Logs.hs | 162 branchHashDir config key P.</> keyFile key <> ".log" 167 branchHashDir config key P.</> keyFile key <> urlLogExt 173 , "remote/web" P.</> hdir P.</> keyFile key <> ".log" 188 (branchHashDir config key P.</> keyFile key) 200 (branchHashDir config key P.</> keyFile key) 209 (branchHashDir config key P.</> keyFile key) 221 (branchHashDir config key P.</> keyFile key) 233 (branchHashDir config key P.</> keyFile key)
|
/dports/security/lego/lego-4.5.3/vendor/github.com/oracle/oci-go-sdk/common/ |
H A D | client_test.go | 501 data := fmt.Sprintf(dataTpl, keyFile) 505 defer removeFileFn(keyFile) 523 data := fmt.Sprintf(dataTpl, keyFile) 527 defer removeFileFn(keyFile) 548 data := fmt.Sprintf(dataTpl, keyFile) 552 defer removeFileFn(keyFile) 569 data := fmt.Sprintf(dataTpl, keyFile) 573 defer removeFileFn(keyFile) 594 data := fmt.Sprintf(dataTpl, keyFile) 598 defer removeFileFn(keyFile) [all …]
|
/dports/mail/archiveopteryx/archiveopteryx-3.2.0/server/ |
H A D | tlsthread.cpp | 106 EString keyFile( Configuration::text( Configuration::TlsCertFile ) ); in setup() local 107 if ( keyFile.isEmpty() ) { in setup() 108 keyFile = Configuration::compiledIn( Configuration::LibDir ); in setup() 109 keyFile.append( "/automatic-key.pem" ); in setup() 111 keyFile = File::chrooted( keyFile ); in setup() 112 if ( !SSL_CTX_use_certificate_chain_file( ctx, keyFile.cstr() ) || in setup() 113 !SSL_CTX_use_RSAPrivateKey_file( ctx, keyFile.cstr(), in setup() 116 "private key in this file: " + keyFile, in setup()
|
/dports/mail/archiveopteryx-devel/aox-96ab17e/server/ |
H A D | tlsthread.cpp | 108 EString keyFile( Configuration::text( Configuration::TlsCertFile ) ); in setup() local 109 if ( keyFile.isEmpty() ) { in setup() 110 keyFile = Configuration::compiledIn( Configuration::LibDir ); in setup() 111 keyFile.append( "/automatic-key.pem" ); in setup() 113 keyFile = File::chrooted( keyFile ); in setup() 114 if ( !SSL_CTX_use_certificate_chain_file( ctx, keyFile.cstr() ) || in setup() 115 !SSL_CTX_use_RSAPrivateKey_file( ctx, keyFile.cstr(), in setup() 118 "private key in this file: " + keyFile, in setup()
|
/dports/net-p2p/bitmark-recorder/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/net-p2p/bitmark-cli/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/net-p2p/bitmark/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/net-p2p/bitmark-daemon/bitmarkd-0.13.3/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/btcsuite/btcd/integration/rpctest/ |
H A D | node.go | 39 keyFile string member 44 func newConfig(prefix, certFile, keyFile string, extra []string) (*nodeConfig, error) { 60 keyFile: keyFile, 117 args = append(args, fmt.Sprintf("--rpckey=%s", n.keyFile)) 269 func genCertPair(certFile, keyFile string) error { 281 if err = ioutil.WriteFile(keyFile, key, 0600); err != nil {
|
/dports/ftp/filezilla/filezilla-3.55.1/src/interface/settings/ |
H A D | optionspage_connection_sftp.cpp | 154 bool COptionsPageConnectionSFTP::AddKey(std::wstring keyFile, bool silent) in AddKey() argument 157 if (!impl_->fzpg_->LoadKeyFile(keyFile, silent, comment, data)) { in AddKey() 159 int index = impl_->keys_->InsertItem(impl_->keys_->GetItemCount(), keyFile); in AddKey() 166 if (KeyFileExists(keyFile)) { in AddKey() 173 int index = impl_->keys_->InsertItem(impl_->keys_->GetItemCount(), keyFile); in AddKey() 180 bool COptionsPageConnectionSFTP::KeyFileExists(std::wstring const& keyFile) in KeyFileExists() argument 183 if (impl_->keys_->GetItemText(i) == keyFile) { in KeyFileExists()
|
/dports/security/monkeysphere/monkeysphere-0.42/src/share/mh/ |
H A D | import_key | 16 local keyFile="$1" 20 if [ -z "$keyFile" ] ; then 41 if [ "$keyFile" = '-' ] ; then 46 log verbose "importing key from file '$keyFile'..." 48 <"$keyFile" \
|
/dports/net/traefik/traefik-2.6.1/pkg/provider/file/fixtures/toml/ |
H A D | simple_file_02.toml | 42 keyFile = "integration/fixtures/https/snitest1.com.key" 46 keyFile = "integration/fixtures/https/snitest2.com.key" 50 keyFile = "integration/fixtures/https/snitest3.com.key" 54 keyFile = "integration/fixtures/https/snitest4.com.key" 58 keyFile = "integration/fixtures/https/snitest5.com.key"
|
/dports/games/hedgewars-server/hedgewars-src-1.0.0/QTfrontend/util/ |
H A D | KeyMap.cpp | 33 QFile keyFile(":keys.csv"); in getKeyMap() local 34 if (!keyFile.open(QIODevice::ReadOnly)) in getKeyMap() 39 QString keyString = keyFile.readAll(); in getKeyMap() 75 keyFile.close(); in getKeyMap()
|