/dports/deskutils/egroupware/egroupware/vendor/league/oauth2-server/src/ |
H A D | CryptKey.php | 25 protected $keyPath; variable in League\\OAuth2\\Server\\CryptKey 33 * @param string $keyPath 40 $keyPath = $this->saveKeyToFile($keyPath); 44 $keyPath = 'file://' . $keyPath; 47 if (!file_exists($keyPath) || !is_readable($keyPath)) { 57 $keyPath, 63 $this->keyPath = $keyPath; 79 if (file_exists($keyPath)) { 83 if (!touch($keyPath)) { 101 return 'file://' . $keyPath; [all …]
|
/dports/www/tikiwiki/tiki-21.2/vendor_bundled/vendor/league/oauth2-server/src/ |
H A D | CryptKey.php | 25 protected $keyPath; variable in League\\OAuth2\\Server\\CryptKey 33 * @param string $keyPath 40 $keyPath = $this->saveKeyToFile($keyPath); 44 $keyPath = 'file://' . $keyPath; 47 if (!file_exists($keyPath) || !is_readable($keyPath)) { 57 $keyPath, 63 $this->keyPath = $keyPath; 79 if (file_exists($keyPath)) { 83 if (!touch($keyPath)) { 101 return 'file://' . $keyPath; [all …]
|
/dports/www/groupoffice/groupoffice-6.4.231-php-71/vendor/league/oauth2-server/src/ |
H A D | CryptKey.php | 25 protected $keyPath; variable in League\\OAuth2\\Server\\CryptKey 33 * @param string $keyPath 40 $keyPath = $this->saveKeyToFile($keyPath); 48 $keyPath = 'file://' . $keyPath; 51 if (!\file_exists($keyPath) || !\is_readable($keyPath)) { 61 $keyPath, 67 $this->keyPath = $keyPath; 83 if (\file_exists($keyPath)) { 84 return 'file://' . $keyPath; 99 return 'file://' . $keyPath; [all …]
|
/dports/misc/usd/USD-21.11/pxr/usd/usd/ |
H A D | object.cpp | 54 return _GetMetadataImpl(key, value, keyPath); in GetMetadataByDictKey() 62 *this, key, keyPath, /*useFallbacks=*/true, value); in _GetMetadataImpl() 75 return _SetMetadataImpl(key, value, keyPath); in SetMetadataByDictKey() 81 const TfToken &keyPath) const in _SetMetadataImpl() 94 const TfToken& key, const TfToken &keyPath) const in ClearMetadataByDictKey() 116 return _GetStage()->_HasMetadata(*this, key, keyPath, in HasMetadataDictKey() 122 const TfToken& key, const TfToken &keyPath) const in HasAuthoredMetadataDictKey() 124 return _GetStage()->_HasMetadata(*this, key, keyPath, in HasAuthoredMetadataDictKey() 171 const TfToken &keyPath, const VtValue &value) const in SetCustomDataByKey() argument 239 const TfToken &keyPath, const VtValue &value) const in SetAssetInfoByKey() argument [all …]
|
H A D | object.h | 377 const TfToken& key, const TfToken& keyPath) const; 387 const TfToken& key, const TfToken &keyPath) const; 397 const TfToken& key, const TfToken &keyPath) const; 523 bool HasCustomDataKey(const TfToken &keyPath) const; 595 bool HasAssetInfoKey(const TfToken &keyPath) const; 740 const TfToken &keyPath, 743 return _GetMetadataImpl(key, value, keyPath); 750 const TfToken &keyPath, 753 return _SetMetadataImpl(key, value, keyPath); 760 const TfToken &keyPath) const [all …]
|
H A D | wrapObject.cpp | 66 self.GetMetadataByDictKey(key, keyPath, &result); in _GetMetadataByDictKey() 81 return UsdPythonToMetadataValue(key, keyPath, obj, &value) && in _SetMetadataByDictKey() 82 self.SetMetadataByDictKey(key, keyPath, value); in _SetMetadataByDictKey() 90 const UsdObject &self, const TfToken &keyPath) { in _GetCustomDataByKey() argument 104 UsdObject &self, const TfToken &keyPath, object obj) { in _SetCustomDataByKey() argument 107 SdfFieldKeys->CustomData, keyPath, obj, &value)) { in _SetCustomDataByKey() 108 self.SetCustomDataByKey(keyPath, value); in _SetCustomDataByKey() 117 const UsdObject &self, const TfToken &keyPath) { in _GetAssetInfoByKey() argument 131 UsdObject &self, const TfToken &keyPath, object obj) { in _SetAssetInfoByKey() argument 134 SdfFieldKeys->AssetInfo, keyPath, obj, &value)) { in _SetAssetInfoByKey() [all …]
|
/dports/www/firefox/firefox-99.0/testing/web-platform/meta/IndexedDB/ |
H A D | keypath_invalid.htm.ini | 4 [Invalid keyPath - "j a"] 8 [Invalid keyPath - ".yo"] 12 [Invalid keyPath - "yo,lo"] 16 [Invalid keyPath - [\]] 28 [Invalid keyPath - "3m"] 56 [Invalid keyPath - "m.*"] 64 [Invalid keyPath - "m%"] 68 [Invalid keyPath - "m/"] 76 [Invalid keyPath - "m&"] 80 [Invalid keyPath - "m!"] [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/cli/cli-20.10.2/cli/command/trust/ |
H A D | key_load.go | 45 func loadPrivKey(streams command.Streams, keyPath string, options keyLoadOptions) error { 57 fmt.Fprintf(streams.Out(), "Loading key from \"%s\"...\n", keyPath) 61 keyBytes, err := getPrivKeyBytesFromPath(keyPath) 63 return errors.Wrapf(err, "refusing to load key from %s", keyPath) 66 return errors.Wrapf(err, "error importing key from %s", keyPath) 68 fmt.Fprintf(streams.Out(), "Successfully imported key from %s\n", keyPath) 72 func getPrivKeyBytesFromPath(keyPath string) ([]byte, error) { 74 fileInfo, err := os.Stat(keyPath) 79 return nil, fmt.Errorf("private key file %s must not be readable or writable by others", keyPath) 83 from, err := os.OpenFile(keyPath, os.O_RDONLY, notary.PrivExecPerms) [all …]
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/cli/cli/command/trust/ |
H A D | key_load.go | 45 func loadPrivKey(streams command.Streams, keyPath string, options keyLoadOptions) error { 57 fmt.Fprintf(streams.Out(), "Loading key from \"%s\"...\n", keyPath) 61 keyBytes, err := getPrivKeyBytesFromPath(keyPath) 63 return errors.Wrapf(err, "refusing to load key from %s", keyPath) 66 return errors.Wrapf(err, "error importing key from %s", keyPath) 68 fmt.Fprintf(streams.Out(), "Successfully imported key from %s\n", keyPath) 72 func getPrivKeyBytesFromPath(keyPath string) ([]byte, error) { 74 fileInfo, err := os.Stat(keyPath) 79 return nil, fmt.Errorf("private key file %s must not be readable or writable by others", keyPath) 83 from, err := os.OpenFile(keyPath, os.O_RDONLY, notary.PrivExecPerms) [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/cli/cli/command/trust/ |
H A D | key_load.go | 44 func loadPrivKey(streams command.Streams, keyPath string, options keyLoadOptions) error { 56 fmt.Fprintf(streams.Out(), "Loading key from \"%s\"...\n", keyPath) 60 keyBytes, err := getPrivKeyBytesFromPath(keyPath) 62 return errors.Wrapf(err, "refusing to load key from %s", keyPath) 65 return errors.Wrapf(err, "error importing key from %s", keyPath) 67 fmt.Fprintf(streams.Out(), "Successfully imported key from %s\n", keyPath) 71 func getPrivKeyBytesFromPath(keyPath string) ([]byte, error) { 72 fileInfo, err := os.Stat(keyPath) 77 return nil, fmt.Errorf("private key file %s must not be readable or writable by others", keyPath) 80 from, err := os.OpenFile(keyPath, os.O_RDONLY, notary.PrivExecPerms) [all …]
|
/dports/security/keybase/client-v5.7.1/shared/ios/Pods/lottie-ios/lottie-swift/src/Private/Utility/Extensions/ |
H A D | AnimationKeypathExtension.swift | 15 guard let currentKey = keyPath.currentKey else { return nil } in animatorNodes() 18 guard let nextKeypath = keyPath.popKey(keypathName) else { in animatorNodes() 45 let nextKeypath = keyPath.nextKeypath, in animatorNodes() 47 let foundNodes = childNode.animatorNodes(for: keyPath) { in animatorNodes() 60 guard let nextKeypath = keyPath.popKey(keypathName) else { in nodeProperties() 91 func layer(for keyPath: AnimationKeypath) -> CALayer? { in layer() 92 …if keyPath.nextKeypath == nil, let layerKey = keyPath.currentKey, layerKey.equalsKeypath(keypathN… in layer() 96 guard let nextKeypath = keyPath.popKey(keypathName) else { in layer() 104 if let layer = child.layer(for: keyPath) { in layer() 112 func logKeypaths(for keyPath: AnimationKeypath?) { in logKeypaths() [all …]
|
/dports/net-mgmt/prometheus1/prometheus-1.8.2/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 29 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 31 keyReadable := canReadFile(keyPath) 42 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 79 func WriteKey(keyPath string, data []byte) error { 80 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 83 if err := ioutil.WriteFile(keyPath, data, os.FileMode(0600)); err != nil { 91 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 92 loadedData, err := ioutil.ReadFile(keyPath) 97 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 104 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/net/freerdp/freerdp-2.5.0/client/iOS/Models/ |
H A D | Bookmark.m | 18 - (void)willChangeValueForKeyPath:(NSString *)keyPath; 19 - (void)didChangeValueForKeyPath:(NSString *)keyPath; 214 [self willChangeValueForKeyPath:keyPath]; 215 [super setValue:value forKeyPath:keyPath]; 216 [self didChangeValueForKeyPath:keyPath]; 220 - (id)valueForKeyPath:(NSString *)keyPath 227 return [super valueForKeyPath:keyPath]; 230 - (void)observeValueForKeyPath:(NSString *)keyPath 236 [self willChangeValueForKeyPath:keyPath]; 238 [self didChangeValueForKeyPath:keyPath]; [all …]
|
/dports/benchmarks/bombardier/bombardier-1.2.5/ |
H A D | client_cert_test.go | 10 keyPath string 15 keyPath: "testclient.key", 20 keyPath: "doesnotexist.pem", 25 keyPath: "", 34 keyPath: e.keyPath, 38 t.Error(e.certPath, e.keyPath, r)
|
/dports/net-mgmt/bosun/bosun-0.9.0-preview/vendor/github.com/prometheus/prometheus/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/sysutils/docker/docker-ce-18.09.5/components/cli/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/vendor/k8s.io/client-go/util/cert/ |
H A D | io.go | 33 func CanReadCertAndKey(certPath, keyPath string) (bool, error) { 35 keyReadable := canReadFile(keyPath) 46 …turn false, fmt.Errorf("error reading %s, certificate and key must be supplied as a pair", keyPath) 80 func WriteKey(keyPath string, data []byte) error { 81 if err := os.MkdirAll(filepath.Dir(keyPath), os.FileMode(0755)); err != nil { 84 return ioutil.WriteFile(keyPath, data, os.FileMode(0600)) 89 func LoadOrGenerateKeyFile(keyPath string) (data []byte, wasGenerated bool, err error) { 90 loadedData, err := ioutil.ReadFile(keyPath) 96 return nil, false, fmt.Errorf("error loading key from %s: %v", keyPath, err) 103 if err := WriteKey(keyPath, generatedData); err != nil { [all …]
|
/dports/lang/fpc-source/fpc-3.2.2/packages/cocoaint/src/foundation/ |
H A D | NSKeyValueObserving.inc | 48 …procedure observeValueForKeyPath_ofObject_change_context (keyPath: NSString; object_: id; change: … 53 …procedure addObserver_forKeyPath_options_context (observer: NSObject; keyPath: NSString; options: … 54 …procedure removeObserver_forKeyPath_context (observer: NSObject; keyPath: NSString; context: point… 55 …procedure removeObserver_forKeyPath (observer: NSObject; keyPath: NSString); message 'removeObserv… 62 …romObjectsAtIndexes_forKeyPath (observer: NSObject; indexes: NSIndexSet; keyPath: NSString); messa… 64 …procedure removeObserver_forKeyPath_context (observer: NSObject; keyPath: NSString; context: point… 65 …procedure removeObserver_forKeyPath (observer: NSObject; keyPath: NSString); message 'removeObserv… 71 …procedure removeObserver_forKeyPath_context (observer: NSObject; keyPath: NSString; context: point… 72 …procedure removeObserver_forKeyPath (observer: NSObject; keyPath: NSString); message 'removeObserv… 78 …procedure removeObserver_forKeyPath_context (observer: NSObject; keyPath: NSString; context: point… [all …]
|
/dports/net-im/matterircd/matterircd-0.25.0/ |
H A D | tlsutil.go | 16 keyPath string member 20 func NewKeypairReloader(certPath, keyPath string) (*keypairReloader, error) { 23 keyPath: keyPath, 25 cert, err := tls.LoadX509KeyPair(certPath, keyPath) 34 … log.Printf("Received SIGHUP, reloading TLS certificate and key from %q and %q", certPath, keyPath) 44 newCert, err := tls.LoadX509KeyPair(kpr.certPath, kpr.keyPath)
|
/dports/www/gohugo/hugo-0.91.2/config/ |
H A D | configLoader.go | 138 var keyPath []string 144 keyPath = []string{name} 147 keyPath = []string{"languages", lang} 150 keyPath = append(keyPath, "menus") 152 keyPath = append(keyPath, "params") 158 if len(keyPath) > 0 { 161 for i, key := range keyPath { 162 if i >= len(keyPath)-1 {
|
/dports/security/tpm2-tss/tpm2-tss-3.1.0/src/tss2-fapi/api/ |
H A D | Fapi_Sign.c | 78 char const *keyPath, in Fapi_Sign() argument 93 check_not_null(keyPath); in Fapi_Sign() 111 r = Fapi_Sign_Async(context, keyPath, padding, digest, digestSize); in Fapi_Sign() 169 char const *keyPath, in Fapi_Sign_Async() argument 175 LOG_TRACE("keyPath: %s", keyPath); in Fapi_Sign_Async() 187 check_not_null(keyPath); in Fapi_Sign_Async() 209 strdup_check(command->keyPath, keyPath, r, error_cleanup); in Fapi_Sign_Async() 219 SAFE_FREE(command->keyPath); in Fapi_Sign_Async() 285 r = ifapi_load_key(context, command->keyPath, in Fapi_Sign_Finish() 331 SAFE_FREE(command->keyPath); in Fapi_Sign_Finish()
|
/dports/net/rclone/rclone-1.57.0/cmd/serve/sftp/ |
H A D | server.go | 233 for _, keyPath := range keyPaths { 234 private, err := loadPrivateKey(keyPath) 236 fs.Debugf(nil, "Failed to load %q: %v", keyPath, err) 245 err = makeRSASSHKeyPair(bits, keyPath+".pub", keyPath) 248 err = makeECDSASSHKeyPair(keyPath+".pub", keyPath) 250 fs.Logf(nil, "Generating Ed25519 key pair at %q", keyPath) 251 err = makeEd25519SSHKeyPair(keyPath+".pub", keyPath) 259 private, err = loadPrivateKey(keyPath) 264 fs.Debugf(nil, "Loaded private key from %q", keyPath) 313 func loadPrivateKey(keyPath string) (ssh.Signer, error) { [all …]
|