/dports/devel/hadoop2/hadoop-2.7.2-src/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-resourcemanager/src/main/java/org/apache/hadoop/yarn/server/resourcemanager/security/ |
H A D | ClientToAMTokenSecretManagerInRM.java | 34 private Map<ApplicationAttemptId, SecretKey> masterKeys = field in ClientToAMTokenSecretManagerInRM 44 this.masterKeys.put(applicationAttemptID, key); in registerApplication() 57 this.masterKeys.remove(applicationAttemptID); in unRegisterApplication() 63 return this.masterKeys.get(applicationAttemptID); in getMasterKey() 69 return this.masterKeys.containsKey(applicationAttemptID); in hasMasterKey()
|
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 110 c, masterKeys, _ := TestCoreUnsealed(t) 112 masterKeys[0][0]++ 113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 152 c, masterKeys, _ := TestCoreUnsealed(t) 153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 239 c, masterKeys, _ := TestCoreUnsealed(t) 240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 24 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 25 if len(masterKeys) != 1 { 26 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 146 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 147 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 331 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil, 333 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 344 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 345 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/misc/concourse/vault-bdd38fca2cff/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 110 c, masterKeys, _ := TestCoreUnsealed(t) 112 masterKeys[0][0]++ 113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 152 c, masterKeys, _ := TestCoreUnsealed(t) 153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 239 c, masterKeys, _ := TestCoreUnsealed(t) 240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 23 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 24 if len(masterKeys) != 1 { 25 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 145 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 146 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 330 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil, 332 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 343 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 344 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 110 c, masterKeys, _ := TestCoreUnsealed(t) 112 masterKeys[0][0]++ 113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 152 c, masterKeys, _ := TestCoreUnsealed(t) 153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 239 c, masterKeys, _ := TestCoreUnsealed(t) 240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 23 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 24 if len(masterKeys) != 1 { 25 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 145 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 146 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 330 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil, 332 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 343 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 344 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/security/vault/vault-1.8.2/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 110 c, masterKeys, _ := TestCoreUnsealed(t) 112 masterKeys[0][0]++ 113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 152 c, masterKeys, _ := TestCoreUnsealed(t) 153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 239 c, masterKeys, _ := TestCoreUnsealed(t) 240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 24 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 25 if len(masterKeys) != 1 { 26 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 146 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 147 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 331 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil, 333 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 344 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 345 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/ |
H A D | generate_root_test.go | 14 c, masterKeys, _ := TestCoreUnsealed(t) 15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys) 109 c, masterKeys, _ := TestCoreUnsealed(t) 111 masterKeys[0][0]++ 112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys) 151 c, masterKeys, _ := TestCoreUnsealed(t) 152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys) 238 c, masterKeys, _ := TestCoreUnsealed(t) 239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
|
H A D | rekey_test.go | 21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 22 if len(masterKeys) != 1 { 23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil { 137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil) 138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil) 330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/vault/vault-0.6.0/vault/ |
H A D | rekey_test.go | 18 c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc) 19 if len(masterKeys) != 3 { 20 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys)) 22 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false) 26 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) { 28 if _, err := c.RekeyUpdate(masterKeys[0], "", recovery); err == nil { 136 c, masterKeys, recoveryKeys, root := TestCoreUnsealedWithConfigs(t, bc, rc) 137 testCore_Rekey_Update_Common(t, c, masterKeys, root, false) 320 c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc) 321 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
|
/dports/security/keepassxc/keepassxc-2.6.6/src/format/ |
H A D | OpVaultReader.cpp | 200 auto masterKeys = decodeB64CompositeKeys(masterKeyB64, encKey, hmacKey); in processProfileJson() local 201 if (masterKeys->error) { in processProfileJson() 203 m_errorStr = masterKeys->errorStr; in processProfileJson() 204 delete masterKeys; in processProfileJson() 207 m_masterKey = masterKeys->encrypt; in processProfileJson() 208 m_masterHmacKey = masterKeys->hmac; in processProfileJson() 209 delete masterKeys; in processProfileJson()
|