Home
last modified time | relevance | path

Searched refs:masterKeys (Results 1 – 25 of 27) sorted by relevance

12

/dports/devel/hadoop2/hadoop-2.7.2-src/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-resourcemanager/src/main/java/org/apache/hadoop/yarn/server/resourcemanager/security/
H A DClientToAMTokenSecretManagerInRM.java34 private Map<ApplicationAttemptId, SecretKey> masterKeys = field in ClientToAMTokenSecretManagerInRM
44 this.masterKeys.put(applicationAttemptID, key); in registerApplication()
57 this.masterKeys.remove(applicationAttemptID); in unRegisterApplication()
63 return this.masterKeys.get(applicationAttemptID); in getMasterKey()
69 return this.masterKeys.containsKey(applicationAttemptID); in hasMasterKey()
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
110 c, masterKeys, _ := TestCoreUnsealed(t)
112 masterKeys[0][0]++
113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
152 c, masterKeys, _ := TestCoreUnsealed(t)
153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
239 c, masterKeys, _ := TestCoreUnsealed(t)
240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go24 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
25 if len(masterKeys) != 1 {
26 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
146 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
147 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
331 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil,
333 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
344 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
345 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/misc/concourse/vault-bdd38fca2cff/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
110 c, masterKeys, _ := TestCoreUnsealed(t)
112 masterKeys[0][0]++
113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
152 c, masterKeys, _ := TestCoreUnsealed(t)
153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
239 c, masterKeys, _ := TestCoreUnsealed(t)
240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go23 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
24 if len(masterKeys) != 1 {
25 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
145 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
146 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
330 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil,
332 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
343 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
344 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
110 c, masterKeys, _ := TestCoreUnsealed(t)
112 masterKeys[0][0]++
113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
152 c, masterKeys, _ := TestCoreUnsealed(t)
153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
239 c, masterKeys, _ := TestCoreUnsealed(t)
240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go23 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
24 if len(masterKeys) != 1 {
25 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
145 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
146 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
330 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil,
332 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
343 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
344 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/security/vault/vault-1.8.2/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
110 c, masterKeys, _ := TestCoreUnsealed(t)
112 masterKeys[0][0]++
113 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
152 c, masterKeys, _ := TestCoreUnsealed(t)
153 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
239 c, masterKeys, _ := TestCoreUnsealed(t)
240 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go24 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
25 if len(masterKeys) != 1 {
26 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
146 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
147 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
331 c, masterKeys, _, root := TestCoreUnsealedWithConfigSealOpts(t, bc, nil,
333 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
344 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
345 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/
H A Dgenerate_root_test.go14 c, masterKeys, _ := TestCoreUnsealed(t)
15 testCore_GenerateRoot_Lifecycle_Common(t, c, masterKeys)
109 c, masterKeys, _ := TestCoreUnsealed(t)
111 masterKeys[0][0]++
112 testCore_GenerateRoot_InvalidMasterNonce_Common(t, c, masterKeys)
151 c, masterKeys, _ := TestCoreUnsealed(t)
152 testCore_GenerateRoot_Update_OTP_Common(t, c, masterKeys)
238 c, masterKeys, _ := TestCoreUnsealed(t)
239 testCore_GenerateRoot_Update_PGP_Common(t, c, masterKeys)
H A Drekey_test.go21 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
22 if len(masterKeys) != 1 {
23 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
25 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
28 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
30 if _, err := c.RekeyUpdate(context.Background(), masterKeys[0], "", recovery); err == nil {
137 c, masterKeys, _, root := TestCoreUnsealedWithConfigs(t, bc, nil)
138 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
329 c, masterKeys, _, _ := TestCoreUnsealedWithConfigs(t, bc, nil)
330 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/vault/vault-0.6.0/vault/
H A Drekey_test.go18 c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc)
19 if len(masterKeys) != 3 {
20 t.Fatalf("expected %d keys, got %d", bc.SecretShares-bc.StoredShares, len(masterKeys))
22 testCore_Rekey_Lifecycle_Common(t, c, masterKeys, false)
26 func testCore_Rekey_Lifecycle_Common(t *testing.T, c *Core, masterKeys [][]byte, recovery bool) {
28 if _, err := c.RekeyUpdate(masterKeys[0], "", recovery); err == nil {
136 c, masterKeys, recoveryKeys, root := TestCoreUnsealedWithConfigs(t, bc, rc)
137 testCore_Rekey_Update_Common(t, c, masterKeys, root, false)
320 c, masterKeys, recoveryKeys, _ := TestCoreUnsealedWithConfigs(t, bc, rc)
321 testCore_Rekey_Invalid_Common(t, c, masterKeys, false)
/dports/security/keepassxc/keepassxc-2.6.6/src/format/
H A DOpVaultReader.cpp200 auto masterKeys = decodeB64CompositeKeys(masterKeyB64, encKey, hmacKey); in processProfileJson() local
201 if (masterKeys->error) { in processProfileJson()
203 m_errorStr = masterKeys->errorStr; in processProfileJson()
204 delete masterKeys; in processProfileJson()
207 m_masterKey = masterKeys->encrypt; in processProfileJson()
208 m_masterHmacKey = masterKeys->hmac; in processProfileJson()
209 delete masterKeys; in processProfileJson()

12