Home
last modified time | relevance | path

Searched refs:dr (Results 51 – 75 of 20288) sorted by relevance

12345678910>>...812

/dports/net-im/dendrite/dendrite-0.5.1/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/security/aws-iam-authenticator/aws-iam-authenticator-0.5.2/vendor/golang.org/x/crypto/crypto-bac4c82f6975/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net/yggdrasil/yggdrasil-go-0.3.11/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/dns/blocky/blocky-0.17/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/sysutils/chaoskube/chaoskube-0.22.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/sysutils/chezmoi/chezmoi-2.9.3/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/databases/cayley/cayley-0.7.5-2-gcf576ba/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/audio/gonic/gonic-0.8.4/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/databases/timescaledb-backup/timescaledb-backup-0.1.1/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/www/beehive/beehive-0.4.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net/croc/croc-9.5.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net/concourse-fly/concourse-6.7.1/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net/cloudquery/cloudquery-0.16.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net/drive/drive-0.4.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/textproc/sift/sift-0.9.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/sysutils/go-wtf/wtf-0.21.0/vendor/golang.org/x/crypto/crypto-4def268fd1a4/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/sysutils/gomi/gomi-1.1.1/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/security/vuls/vuls-0.13.7/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/shells/antibody/antibody-6.1.1/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/security/xray-core/Xray-core-1.5.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net-mgmt/pushgateway/pushgateway-1.4.2/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/security/go-cve-dictionary/go-cve-dictionary-0.5.5/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/net-mgmt/semaphore/semaphore-2.6.8/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]
/dports/security/gopass/gopass-1.13.0/vendor/golang.org/x/crypto/acme/autocert/
H A Drenewal.go33 dr.timerMu.Lock()
38 dr.timer = time.AfterFunc(dr.next(exp), dr.renew)
49 dr.timer.Stop()
50 dr.timer = nil
70 dr.timer = time.AfterFunc(next, dr.renew)
80 dr.m.state[dr.ck] = state
94 if tlscert, err := dr.m.cacheGet(ctx, dr.ck); err == nil {
110 der, leaf, err := dr.m.authorizedCert(ctx, dr.key, dr.ck)
115 key: dr.key,
123 if err := dr.m.cachePut(ctx, dr.ck, tlscert); err != nil {
[all …]

12345678910>>...812