/dports/security/xray-core/Xray-core-1.5.0/common/protocol/ |
H A D | headers.pb.go | 84 type SecurityConfig struct { struct 92 func (x *SecurityConfig) Reset() { argument 93 *x = SecurityConfig{} 101 func (x *SecurityConfig) String() string { argument 105 func (*SecurityConfig) ProtoMessage() {} argument 107 func (x *SecurityConfig) ProtoReflect() protoreflect.Message { argument 120 func (*SecurityConfig) Descriptor() ([]byte, []int) { argument 124 func (x *SecurityConfig) GetType() SecurityType { argument 174 (*SecurityConfig)(nil), // 1: xray.common.protocol.SecurityConfig 192 switch v := v.(*SecurityConfig); i {
|
/dports/net/v2ray/v2ray-core-4.36.2/common/protocol/ |
H A D | headers.pb.go | 89 type SecurityConfig struct { struct 97 func (x *SecurityConfig) Reset() { argument 98 *x = SecurityConfig{} 106 func (x *SecurityConfig) String() string { argument 110 func (*SecurityConfig) ProtoMessage() {} argument 112 func (x *SecurityConfig) ProtoReflect() protoreflect.Message { argument 125 func (*SecurityConfig) Descriptor() ([]byte, []int) { argument 129 func (x *SecurityConfig) GetType() SecurityType { argument 181 (*SecurityConfig)(nil), // 1: v2ray.core.common.protocol.SecurityConfig 199 switch v := v.(*SecurityConfig); i {
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 62 type SecurityConfig struct { struct 136 return &SecurityConfig{ 150 func (s *SecurityConfig) RootCA() *RootCA { argument 158 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 163 func (s *SecurityConfig) KeyReader() KeyReader { argument 168 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 182 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 187 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 194 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 227 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 62 type SecurityConfig struct { struct 136 return &SecurityConfig{ 150 func (s *SecurityConfig) RootCA() *RootCA { argument 158 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 163 func (s *SecurityConfig) KeyReader() KeyReader { argument 168 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 182 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 187 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 194 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 227 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 67 type SecurityConfig struct { struct 216 return &SecurityConfig{ 230 func (s *SecurityConfig) RootCA() *RootCA { argument 238 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 243 func (s *SecurityConfig) KeyReader() KeyReader { argument 248 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 262 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 267 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 274 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 307 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 67 type SecurityConfig struct { struct 216 return &SecurityConfig{ 230 func (s *SecurityConfig) RootCA() *RootCA { argument 238 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 243 func (s *SecurityConfig) KeyReader() KeyReader { argument 248 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 262 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 267 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 274 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 307 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 65 type SecurityConfig struct { struct 214 return &SecurityConfig{ 228 func (s *SecurityConfig) RootCA() *RootCA { argument 236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 241 func (s *SecurityConfig) KeyReader() KeyReader { argument 246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument 260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument 265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument 272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument 305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument [all …]
|
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/src/consumer/ |
H A D | builder.rs | 13 use client::SecurityConfig; 16 type SecurityConfig = (); 32 security_config: Option<SecurityConfig>, 110 pub fn with_security(mut self, sec: SecurityConfig) -> Builder { 204 fn new_kafka_client(hosts: Vec<String>, _: Option<SecurityConfig>) -> KafkaClient { 209 fn new_kafka_client(hosts: Vec<String>, security: Option<SecurityConfig>) -> KafkaClient {
|
/dports/www/gitea/gitea-1.16.5/vendor/google.golang.org/grpc/xds/internal/xdsclient/xdsresource/ |
H A D | unmarshal_cds.go | 120 var sc *SecurityConfig 213 func securityConfigFromCluster(cluster *v3clusterpb.Cluster) (*SecurityConfig, error) { 248 …onfigFromCommonTLSContext(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) { 260 if sc == nil || sc.Equal(&SecurityConfig{}) { 283 …ntextWithDeprecatedFields(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) { 288 sc := &SecurityConfig{} 345 …nTLSContextUsingNewFields(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) { 349 sc := &SecurityConfig{}
|
H A D | type_rds.go | 185 type SecurityConfig struct { struct 218 func (sc *SecurityConfig) Equal(other *SecurityConfig) bool { argument
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/ca/ |
H A D | config.go | 54 type SecurityConfig struct { struct 78 …tCA *RootCA, krw *KeyReadWriter, clientTLSCreds, serverTLSCreds *MutableTLSCreds) *SecurityConfig { 89 return &SecurityConfig{ 99 func (s *SecurityConfig) RootCA() *RootCA { argument 107 func (s *SecurityConfig) KeyWriter() KeyWriter { argument 112 func (s *SecurityConfig) KeyReader() KeyReader { argument 118 func (s *SecurityConfig) UpdateRootCA(cert, key []byte, certExpiry time.Duration) error { argument 245 …s, nodeInfo chan<- api.IssueNodeCertificateResponse, krw *KeyReadWriter) (*SecurityConfig, error) { 331 func RenewTLSConfigNow(ctx context.Context, s *SecurityConfig, r remotes.Remotes) error { argument 388 func RenewTLSConfig(ctx context.Context, s *SecurityConfig, remotes remotes.Remotes, renew <-chan s… argument
|
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/tests/ |
H A D | test_kafka.rs | 26 use kafka::client::{KafkaClient, Compression, GroupOffsetStorage, SecurityConfig}; 100 -> Option<Result<SecurityConfig, openssl::error::ErrorStack>> 114 ) -> Result<SecurityConfig, openssl::error::ErrorStack> { 122 let security_config = SecurityConfig::new(connector);
|
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/src/client/ |
H A D | network.rs | 24 pub struct SecurityConfig { 30 impl SecurityConfig { 33 SecurityConfig { 40 pub fn with_hostname_verification(self, verify_hostname: bool) -> SecurityConfig { 41 SecurityConfig { 49 impl fmt::Debug for SecurityConfig { 90 security_config: Option<SecurityConfig>, 165 security: Option<SecurityConfig>,
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 61 SecurityConfig *ca.SecurityConfig member 238 dekRotator, err := NewRaftDEKManager(config.SecurityConfig.KeyWriter()) 244 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 250 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 256 grpc.Creds(config.SecurityConfig.ServerTLSCreds)} 524 securityConfig := m.config.SecurityConfig 525 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 562 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 732 rootCA := m.config.SecurityConfig.RootCA() 733 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 72 SecurityConfig *ca.SecurityConfig member 220 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 226 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 232 grpc.Creds(config.SecurityConfig.ServerTLSCreds), 464 creds := m.config.SecurityConfig.ClientTLSCreds 679 securityConfig := m.config.SecurityConfig 680 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 735 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 930 rootCA := m.config.SecurityConfig.RootCA() 931 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 70 SecurityConfig *ca.SecurityConfig member 226 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 232 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 273 grpc.Creds(config.SecurityConfig.ServerTLSCreds), 505 creds := m.config.SecurityConfig.ClientTLSCreds 724 securityConfig := m.config.SecurityConfig 725 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 780 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 909 rootCA := m.config.SecurityConfig.RootCA() 910 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 69 SecurityConfig *ca.SecurityConfig member 229 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 235 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 276 grpc.Creds(config.SecurityConfig.ServerTLSCreds), 508 creds := m.config.SecurityConfig.ClientTLSCreds 727 securityConfig := m.config.SecurityConfig 728 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 783 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 912 rootCA := m.config.SecurityConfig.RootCA() 913 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 72 SecurityConfig *ca.SecurityConfig member 220 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 226 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 232 grpc.Creds(config.SecurityConfig.ServerTLSCreds), 464 creds := m.config.SecurityConfig.ClientTLSCreds 679 securityConfig := m.config.SecurityConfig 680 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 735 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 930 rootCA := m.config.SecurityConfig.RootCA() 931 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/ |
H A D | manager.go | 69 SecurityConfig *ca.SecurityConfig member 222 ID: config.SecurityConfig.ClientTLSCreds.NodeID(), 228 TLSCredentials: config.SecurityConfig.ClientTLSCreds, 269 grpc.Creds(config.SecurityConfig.ServerTLSCreds), 501 creds := m.config.SecurityConfig.ClientTLSCreds 720 securityConfig := m.config.SecurityConfig 721 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() 776 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization() 905 rootCA := m.config.SecurityConfig.RootCA() 906 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID() [all …]
|