Home
last modified time | relevance | path

Searched refs:SecurityConfig (Results 1 – 25 of 527) sorted by relevance

12345678910>>...22

/dports/security/xray-core/Xray-core-1.5.0/common/protocol/
H A Dheaders.pb.go84 type SecurityConfig struct { struct
92 func (x *SecurityConfig) Reset() { argument
93 *x = SecurityConfig{}
101 func (x *SecurityConfig) String() string { argument
105 func (*SecurityConfig) ProtoMessage() {} argument
107 func (x *SecurityConfig) ProtoReflect() protoreflect.Message { argument
120 func (*SecurityConfig) Descriptor() ([]byte, []int) { argument
124 func (x *SecurityConfig) GetType() SecurityType { argument
174 (*SecurityConfig)(nil), // 1: xray.common.protocol.SecurityConfig
192 switch v := v.(*SecurityConfig); i {
/dports/net/v2ray/v2ray-core-4.36.2/common/protocol/
H A Dheaders.pb.go89 type SecurityConfig struct { struct
97 func (x *SecurityConfig) Reset() { argument
98 *x = SecurityConfig{}
106 func (x *SecurityConfig) String() string { argument
110 func (*SecurityConfig) ProtoMessage() {} argument
112 func (x *SecurityConfig) ProtoReflect() protoreflect.Message { argument
125 func (*SecurityConfig) Descriptor() ([]byte, []int) { argument
129 func (x *SecurityConfig) GetType() SecurityType { argument
181 (*SecurityConfig)(nil), // 1: v2ray.core.common.protocol.SecurityConfig
199 switch v := v.(*SecurityConfig); i {
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go62 type SecurityConfig struct { struct
136 return &SecurityConfig{
150 func (s *SecurityConfig) RootCA() *RootCA { argument
158 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
163 func (s *SecurityConfig) KeyReader() KeyReader { argument
168 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
182 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
187 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
194 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
227 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go62 type SecurityConfig struct { struct
136 return &SecurityConfig{
150 func (s *SecurityConfig) RootCA() *RootCA { argument
158 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
163 func (s *SecurityConfig) KeyReader() KeyReader { argument
168 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
182 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
187 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
194 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
227 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go67 type SecurityConfig struct { struct
216 return &SecurityConfig{
230 func (s *SecurityConfig) RootCA() *RootCA { argument
238 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
243 func (s *SecurityConfig) KeyReader() KeyReader { argument
248 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
262 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
267 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
274 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
307 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/net-mgmt/promscale/promscale-0.6.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/net-mgmt/prometheus2/prometheus-2.30.3/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go67 type SecurityConfig struct { struct
216 return &SecurityConfig{
230 func (s *SecurityConfig) RootCA() *RootCA { argument
238 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
243 func (s *SecurityConfig) KeyReader() KeyReader { argument
248 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
262 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
267 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
274 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
307 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/docker/moby-20.10.2/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go65 type SecurityConfig struct { struct
214 return &SecurityConfig{
228 func (s *SecurityConfig) RootCA() *RootCA { argument
236 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
241 func (s *SecurityConfig) KeyReader() KeyReader { argument
246 func (s *SecurityConfig) UpdateRootCA(rootCA *RootCA) error { argument
260 func (s *SecurityConfig) Watch() (chan events.Event, func()) { argument
265 func (s *SecurityConfig) IssuerInfo() *IssuerInfo { argument
272 func (s *SecurityConfig) updateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
305 func (s *SecurityConfig) UpdateTLSCredentials(certificate *tls.Certificate, issuerInfo *IssuerInfo)… argument
[all …]
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/src/consumer/
H A Dbuilder.rs13 use client::SecurityConfig;
16 type SecurityConfig = ();
32 security_config: Option<SecurityConfig>,
110 pub fn with_security(mut self, sec: SecurityConfig) -> Builder {
204 fn new_kafka_client(hosts: Vec<String>, _: Option<SecurityConfig>) -> KafkaClient {
209 fn new_kafka_client(hosts: Vec<String>, security: Option<SecurityConfig>) -> KafkaClient {
/dports/www/gitea/gitea-1.16.5/vendor/google.golang.org/grpc/xds/internal/xdsclient/xdsresource/
H A Dunmarshal_cds.go120 var sc *SecurityConfig
213 func securityConfigFromCluster(cluster *v3clusterpb.Cluster) (*SecurityConfig, error) {
248 …onfigFromCommonTLSContext(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) {
260 if sc == nil || sc.Equal(&SecurityConfig{}) {
283 …ntextWithDeprecatedFields(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) {
288 sc := &SecurityConfig{}
345 …nTLSContextUsingNewFields(common *v3tlspb.CommonTlsContext, server bool) (*SecurityConfig, error) {
349 sc := &SecurityConfig{}
H A Dtype_rds.go185 type SecurityConfig struct { struct
218 func (sc *SecurityConfig) Equal(other *SecurityConfig) bool { argument
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/ca/
H A Dconfig.go54 type SecurityConfig struct { struct
78 …tCA *RootCA, krw *KeyReadWriter, clientTLSCreds, serverTLSCreds *MutableTLSCreds) *SecurityConfig {
89 return &SecurityConfig{
99 func (s *SecurityConfig) RootCA() *RootCA { argument
107 func (s *SecurityConfig) KeyWriter() KeyWriter { argument
112 func (s *SecurityConfig) KeyReader() KeyReader { argument
118 func (s *SecurityConfig) UpdateRootCA(cert, key []byte, certExpiry time.Duration) error { argument
245 …s, nodeInfo chan<- api.IssueNodeCertificateResponse, krw *KeyReadWriter) (*SecurityConfig, error) {
331 func RenewTLSConfigNow(ctx context.Context, s *SecurityConfig, r remotes.Remotes) error { argument
388 func RenewTLSConfig(ctx context.Context, s *SecurityConfig, remotes remotes.Remotes, renew <-chan s… argument
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/tests/
H A Dtest_kafka.rs26 use kafka::client::{KafkaClient, Compression, GroupOffsetStorage, SecurityConfig};
100 -> Option<Result<SecurityConfig, openssl::error::ErrorStack>>
114 ) -> Result<SecurityConfig, openssl::error::ErrorStack> {
122 let security_config = SecurityConfig::new(connector);
/dports/sysutils/flowgger/flowgger-0.2.10/cargo-crates/kafka-0.8.0/src/client/
H A Dnetwork.rs24 pub struct SecurityConfig {
30 impl SecurityConfig {
33 SecurityConfig {
40 pub fn with_hostname_verification(self, verify_hostname: bool) -> SecurityConfig {
41 SecurityConfig {
49 impl fmt::Debug for SecurityConfig {
90 security_config: Option<SecurityConfig>,
165 security: Option<SecurityConfig>,
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/vic/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go61 SecurityConfig *ca.SecurityConfig member
238 dekRotator, err := NewRaftDEKManager(config.SecurityConfig.KeyWriter())
244 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
250 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
256 grpc.Creds(config.SecurityConfig.ServerTLSCreds)}
524 securityConfig := m.config.SecurityConfig
525 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
562 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
732 rootCA := m.config.SecurityConfig.RootCA()
733 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]
/dports/security/vault/vault-1.8.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go72 SecurityConfig *ca.SecurityConfig member
220 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
226 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
232 grpc.Creds(config.SecurityConfig.ServerTLSCreds),
464 creds := m.config.SecurityConfig.ClientTLSCreds
679 securityConfig := m.config.SecurityConfig
680 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
735 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
930 rootCA := m.config.SecurityConfig.RootCA()
931 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]
/dports/sysutils/docker/docker-ce-18.09.5/components/engine/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go70 SecurityConfig *ca.SecurityConfig member
226 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
232 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
273 grpc.Creds(config.SecurityConfig.ServerTLSCreds),
505 creds := m.config.SecurityConfig.ClientTLSCreds
724 securityConfig := m.config.SecurityConfig
725 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
780 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
909 rootCA := m.config.SecurityConfig.RootCA()
910 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go69 SecurityConfig *ca.SecurityConfig member
229 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
235 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
276 grpc.Creds(config.SecurityConfig.ServerTLSCreds),
508 creds := m.config.SecurityConfig.ClientTLSCreds
727 securityConfig := m.config.SecurityConfig
728 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
783 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
912 rootCA := m.config.SecurityConfig.RootCA()
913 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go72 SecurityConfig *ca.SecurityConfig member
220 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
226 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
232 grpc.Creds(config.SecurityConfig.ServerTLSCreds),
464 creds := m.config.SecurityConfig.ClientTLSCreds
679 securityConfig := m.config.SecurityConfig
680 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
735 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
930 rootCA := m.config.SecurityConfig.RootCA()
931 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]
/dports/net-p2p/go-ethereum/go-ethereum-1.10.14/vendor/github.com/docker/docker/vendor/github.com/docker/swarmkit/manager/
H A Dmanager.go69 SecurityConfig *ca.SecurityConfig member
222 ID: config.SecurityConfig.ClientTLSCreds.NodeID(),
228 TLSCredentials: config.SecurityConfig.ClientTLSCreds,
269 grpc.Creds(config.SecurityConfig.ServerTLSCreds),
501 creds := m.config.SecurityConfig.ClientTLSCreds
720 securityConfig := m.config.SecurityConfig
721 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
776 clusterID := m.config.SecurityConfig.ClientTLSCreds.Organization()
905 rootCA := m.config.SecurityConfig.RootCA()
906 nodeID := m.config.SecurityConfig.ClientTLSCreds.NodeID()
[all …]

12345678910>>...22