/dports/net-mgmt/zabbix5-java/zabbix-5.0.19/src/go/pkg/tlsconfig/ |
H A D | tlsconfig.go | 55 func CreateDetails(session, dbConnect, caFile, certFile, keyFile, uri string) (Details, error) { argument 57 if err := validateSetTLSFiles(caFile, certFile, keyFile); err != nil { 61 if err := validateUnsetTLSFiles(caFile, certFile, keyFile); err != nil { 66 return Details{session, dbConnect, caFile, certFile, keyFile, uri}, nil 69 func validateSetTLSFiles(caFile, certFile, keyFile string) error { 78 if keyFile == "" { 85 func validateUnsetTLSFiles(caFile, certFile, keyFile string) error { 96 if keyFile != "" {
|
/dports/net-mgmt/zabbix5-frontend/zabbix-5.0.19/src/go/pkg/tlsconfig/ |
H A D | tlsconfig.go | 55 func CreateDetails(session, dbConnect, caFile, certFile, keyFile, uri string) (Details, error) { argument 57 if err := validateSetTLSFiles(caFile, certFile, keyFile); err != nil { 61 if err := validateUnsetTLSFiles(caFile, certFile, keyFile); err != nil { 66 return Details{session, dbConnect, caFile, certFile, keyFile, uri}, nil 69 func validateSetTLSFiles(caFile, certFile, keyFile string) error { 78 if keyFile == "" { 85 func validateUnsetTLSFiles(caFile, certFile, keyFile string) error { 96 if keyFile != "" {
|
/dports/net-mgmt/zabbix54-java/zabbix-5.4.9/src/go/pkg/tlsconfig/ |
H A D | tlsconfig.go | 55 func CreateDetails(session, dbConnect, caFile, certFile, keyFile, uri string) (Details, error) { argument 57 if err := validateSetTLSFiles(caFile, certFile, keyFile); err != nil { 61 if err := validateUnsetTLSFiles(caFile, certFile, keyFile); err != nil { 66 return Details{session, dbConnect, caFile, certFile, keyFile, uri}, nil 69 func validateSetTLSFiles(caFile, certFile, keyFile string) error { 78 if keyFile == "" { 85 func validateUnsetTLSFiles(caFile, certFile, keyFile string) error { 96 if keyFile != "" {
|
/dports/net-mgmt/zabbix54-frontend/zabbix-5.4.9/src/go/pkg/tlsconfig/ |
H A D | tlsconfig.go | 55 func CreateDetails(session, dbConnect, caFile, certFile, keyFile, uri string) (Details, error) { argument 57 if err := validateSetTLSFiles(caFile, certFile, keyFile); err != nil { 61 if err := validateUnsetTLSFiles(caFile, certFile, keyFile); err != nil { 66 return Details{session, dbConnect, caFile, certFile, keyFile, uri}, nil 69 func validateSetTLSFiles(caFile, certFile, keyFile string) error { 78 if keyFile == "" { 85 func validateUnsetTLSFiles(caFile, certFile, keyFile string) error { 96 if keyFile != "" {
|
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/caddyserver/certmagic/ |
H A D | storage_test.go | 28 in, folder, certFile, keyFile, metaFile string 34 keyFile: path.Join(base, "example.com", "example.com.key"), 41 keyFile: path.Join(base, "wildcard_.example.com", "wildcard_.example.com.key"), 50 keyFile: path.Join(base, "afoo", "afoo.key"), 57 keyFile: path.Join(base, "bfoo", "bfoo.key"), 64 keyFile: path.Join(base, "cfoo", "cfoo.key"), 71 if actual := StorageKeys.SitePrivateKey(am.IssuerKey(), testcase.in); actual != testcase.keyFile { 72 t.Errorf("Test %d: site key file: Expected '%s' but got '%s'", i, testcase.keyFile, actual)
|
/dports/net-im/nextcloud-spreed-signaling/nextcloud-spreed-signaling-0.2.0/vendor/src/github.com/nats-io/nkeys/nk/ |
H A D | main.go | 94 sign(*signFile, *keyFile) 105 if *keyFile != "" && *pubout { 106 printPublicFromSeed(*keyFile) 113 func printPublicFromSeed(keyFile string) { 114 seed := readKeyFile(keyFile) 123 func sign(fname, keyFile string) { 124 if keyFile == "" { 127 seed := readKeyFile(keyFile) 146 if keyFile == "" && pubFile == "" { 154 if keyFile != "" { [all …]
|
/dports/sysutils/istio/istio-1.6.7/pkg/test/cert/ |
H A D | cert.go | 23 func GenerateKey(keyFile string) error { 24 return openssl("genrsa", "-out", keyFile, "4096") 28 func GenerateCSR(confFile, keyFile, csrFile string) error { argument 31 "-key", keyFile, 36 func GenerateCert(confFile, csrFile, keyFile, certFile string) error { argument 39 "-signkey", keyFile,
|
/dports/devel/gh/cli-2.4.0/pkg/cmd/auth/shared/ |
H A D | ssh_keys.go | 89 keyFile := filepath.Join(sshDir, "id_ed25519") 90 if _, err := os.Stat(keyFile); err == nil { 91 return "", fmt.Errorf("refusing to overwrite file %s", keyFile) 94 if err := os.MkdirAll(filepath.Dir(keyFile), 0711); err != nil { 107 …Cmd := exec.Command(keygenExe, "-t", "ed25519", "-C", sshLabel, "-N", sshPassphrase, "-f", keyFile) 108 return keyFile + ".pub", run.PrepareCmd(keygenCmd).Run() 111 func sshKeyUpload(httpClient *http.Client, hostname, keyFile string) error { 112 f, err := os.Open(keyFile)
|
/dports/databases/mongodb36/mongodb-src-r3.6.23/buildscripts/resmokeconfig/suites/ |
H A D | sharding_gle_auth_basics_passthrough.yml | 3 - &keyFile jstests/libs/authTestsKey anchor 31 keyFile: *keyFile 46 keyFile: *keyFile 52 keyFile: *keyFile
|
/dports/security/lego/lego-4.5.3/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/www/gitlab-workhorse/gitlab-foss-0a901d60f8ae4a60c04ae82e6e9c3a03e9321417/workhorse/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/net/cloudquery/cloudquery-0.16.0/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/net/rclone/rclone-1.57.0/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/www/gohugo/hugo-0.91.2/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/devel/gitlab-shell/gitlab-shell-65b8ec55bebd0aea64ac52b9878bafcc2ad992d3/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/www/tusd/tusd-1.8.0/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/textproc/gitlab-elasticsearch-indexer/gitlab-elasticsearch-indexer-ef1440548effec15831eda2d246dacc43233cefb/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/security/vault/vault-1.8.2/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 61 keyFile, err := os.Open(keyFilename) 68 ClientTLSKey: keyFile, 71 keyFile.Close() 81 keyFile, err := os.Open(keyFilename) 89 ClientTLSKey: keyFile, 92 keyFile.Close() 103 keyFile, err := os.Open(keyFilename) 108 stat, _ := keyFile.Stat() 111 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 114 keyFile.Close()
|
/dports/sysutils/terraform/terraform-1.0.11/vendor/github.com/aws/aws-sdk-go/aws/session/ |
H A D | client_tls_cert_test.go | 62 keyFile, err := os.Open(keyFilename) 69 ClientTLSKey: keyFile, 72 keyFile.Close() 82 keyFile, err := os.Open(keyFilename) 90 ClientTLSKey: keyFile, 93 keyFile.Close() 104 keyFile, err := os.Open(keyFilename) 109 stat, _ := keyFile.Stat() 112 ClientTLSKey: io.LimitReader(keyFile, stat.Size()/2), 115 keyFile.Close()
|
/dports/sysutils/helm/helm-3.5.2/internal/tlsutil/ |
H A D | tls.go | 28 func NewClientTLS(certFile, keyFile, caFile string) (*tls.Config, error) { argument 31 if certFile != "" && keyFile != "" { 32 cert, err := CertFromFilePair(certFile, keyFile) 70 func CertFromFilePair(certFile, keyFile string) (*tls.Certificate, error) { 71 cert, err := tls.LoadX509KeyPair(certFile, keyFile) 73 return nil, errors.Wrapf(err, "can't load key pair from cert %s and key %s", certFile, keyFile)
|
/dports/sysutils/istio/istio-1.6.7/vendor/helm.sh/helm/v3/internal/tlsutil/ |
H A D | tls.go | 28 func NewClientTLS(certFile, keyFile, caFile string) (*tls.Config, error) { argument 31 if certFile != "" && keyFile != "" { 32 cert, err := CertFromFilePair(certFile, keyFile) 70 func CertFromFilePair(certFile, keyFile string) (*tls.Certificate, error) { 71 cert, err := tls.LoadX509KeyPair(certFile, keyFile) 73 return nil, errors.Wrapf(err, "can't load key pair from cert %s and key %s", certFile, keyFile)
|