/dports/net/concourse-fly/concourse-6.7.1/atc/db/dbfakes/ |
H A D | fake_user.go | 11 type FakeUser struct { struct 16 connectorReturns struct { 22 IDStub func() int 23 iDMutex sync.RWMutex 24 iDArgsForCall []struct { 26 iDReturns struct { 36 lastLoginReturns struct { 44 nameArgsForCall []struct { 46 nameReturns struct { 54 subArgsForCall []struct { [all …]
|
/dports/misc/concourse/concourse-6.7.2/atc/db/dbfakes/ |
H A D | fake_user.go | 11 type FakeUser struct { struct 16 connectorReturns struct { 22 IDStub func() int 23 iDMutex sync.RWMutex 24 iDArgsForCall []struct { 26 iDReturns struct { 36 lastLoginReturns struct { 44 nameArgsForCall []struct { 46 nameReturns struct { 54 subArgsForCall []struct { [all …]
|
/dports/security/keybase/client-v5.7.1/go/engine/ |
H A D | common_test.go | 41 type FakeUser struct { struct 42 Username string 43 Email string 44 Passphrase string 45 User *libkb.User 46 EncryptionKey libkb.GenericKey 47 DeviceName string 70 func (fu *FakeUser) LoadUser(tc libkb.TestContext) error { 76 func (fu FakeUser) UID() keybase1.UID { 81 func (fu FakeUser) UserVersion() keybase1.UserVersion { [all …]
|
H A D | track_test.go | 15 func runTrack(tc libkb.TestContext, fu *FakeUser, username string, sigVersion libkb.SigVersion) (id… 20 func runTrackWithOptions(tc libkb.TestContext, fu *FakeUser, username string, options keybase1.Trac… 66 func trackAlice(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) { 71 func trackUser(tc libkb.TestContext, fu *FakeUser, un libkb.NormalizedUsername, sigVersion libkb.Si… 77 func trackUserGetUI(tc libkb.TestContext, fu *FakeUser, un libkb.NormalizedUsername, sigVersion lib… 84 func trackAliceWithOptions(tc libkb.TestContext, fu *FakeUser, options keybase1.TrackOptions, secre… 93 func trackBob(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) { 98 func trackBobWithOptions(tc libkb.TestContext, fu *FakeUser, options keybase1.TrackOptions, secretU…
|
H A D | prove_help_test.go | 81 func proveRooter(g *libkb.GlobalContext, fu *FakeUser, sigVersion libkb.SigVersion) (*ProveUIMock, … 85 func proveRooterWithSecretUI(g *libkb.GlobalContext, fu *FakeUser, secretUI libkb.SecretUI, sigVers… 132 func proveRooterFail(g *libkb.GlobalContext, fu *FakeUser, sigVersion libkb.SigVersion) (*ProveUIMo… 188 func proveRooterOther(g *libkb.GlobalContext, fu *FakeUser, rooterUsername string, sigVersion libkb… 237 func proveGubbleSocial(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) keybase1.Si… 241 func proveGubbleCloud(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) keybase1.Sig… 245 func proveGubbleUniverse(tc libkb.TestContext, serviceName, endpoint string, fu *FakeUser, sigVersi… 331 func proveGubbleSocialFail(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) {
|
H A D | pgp_update_test.go | 13 func doUpdate(fingerprints []string, all bool, fu *FakeUser, tc libkb.TestContext) (err error) { 24 func getFakeUsersKeyBundleFromServer(tc libkb.TestContext, fu *FakeUser) *libkb.PGPKeyBundle { 38 func getFakeUsersBundlesList(tc libkb.TestContext, fu *FakeUser) []string {
|
H A D | revoke_test.go | 17 func getActiveDevicesAndKeys(tc libkb.TestContext, u *FakeUser) ([]libkb.DeviceWithDeviceNumber, []… 34 func doRevokeKey(tc libkb.TestContext, u *FakeUser, kid keybase1.KID) error { 45 func doRevokeSig(tc libkb.TestContext, u *FakeUser, sig keybase1.SigID) error { 56 func doRevokeDevice(tc libkb.TestContext, u *FakeUser, id keybase1.DeviceID, forceSelf, forceLast b… 67 func assertNumDevicesAndKeys(tc libkb.TestContext, u *FakeUser, numDevices, numKeys int) { 447 func revokeAnyPaperKey(tc libkb.TestContext, fu *FakeUser) *libkb.Device {
|
H A D | passphrase_change_test.go | 15 func withNewProvisionalLoginForFakeUser(m libkb.MetaContext, u *FakeUser) libkb.MetaContext { 20 func tryPassphrase(tc libkb.TestContext, u *FakeUser, pp string) error { 27 func verifyPassphraseChange(tc libkb.TestContext, u *FakeUser, newPassphrase string) { 37 func assertLoadSecretKeys(tc libkb.TestContext, u *FakeUser, msg string) { 83 func assertLoadPGPKeys(tc libkb.TestContext, u *FakeUser) {
|
H A D | untrack_test.go | 13 func runUntrack(tc libkb.TestContext, fu *FakeUser, username string, sigVersion libkb.SigVersion) e… 55 func untrackAlice(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) { 62 func untrackBob(tc libkb.TestContext, fu *FakeUser, sigVersion libkb.SigVersion) {
|
H A D | paperkey_test.go | 14 func paperDevs(tc libkb.TestContext, fu *FakeUser) (*libkb.User, []*libkb.Device) { 23 func hasZeroPaperDev(tc libkb.TestContext, fu *FakeUser) { 28 func hasOnePaperDev(tc libkb.TestContext, fu *FakeUser) keybase1.DeviceID {
|
H A D | kex2_test.go | 108 func provisionNewDeviceKex(tcX *libkb.TestContext, userX *FakeUser) (*libkb.TestContext, func()) {
|
H A D | deprovision_test.go | 35 func isUserInConfigFile(tc libkb.TestContext, fu FakeUser) bool { 45 func getNumKeys(tc libkb.TestContext, fu FakeUser) int {
|
H A D | login_load_user_test.go | 163 func testLoginLoadUserEmail(t *testing.T, fu *FakeUser, input string) (*libkb.User, error) {
|
H A D | bug_3964_repairman_test.go | 216 func logoutLogin(t *testing.T, user *FakeUser, dev libkb.TestContext) { 262 func checkLKSWorked(t *testing.T, tctx libkb.TestContext, u *FakeUser) {
|
H A D | track_proof_test.go | 23 func checkTrack(tc libkb.TestContext, fu *FakeUser, username string, blocks []sb, outcome *keybase1… 31 func checkTrackForce(tc libkb.TestContext, fu *FakeUser, username string, blocks []sb, outcome *key…
|
/dports/security/keybase/client-v5.7.1/go/kbtest/ |
H A D | kbtest.go | 29 type FakeUser struct { struct 30 Username string 31 Email string 32 Passphrase string 33 User *libkb.User 34 EldestSeqno keybase1.Seqno 52 func (fu *FakeUser) NewSecretUI() *libkb.TestSecretUI { 56 func (fu *FakeUser) GetUID() keybase1.UID { 71 func (fu *FakeUser) Login(g *libkb.GlobalContext) error { 170 func ResetAccount(tc libkb.TestContext, u *FakeUser) { [all …]
|
/dports/security/keybase/client-v5.7.1/go/service/ |
H A D | saltpack_test.go | 50 func testEncryptDecryptString(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 73 func testSignVerifyString(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 87 func testEncryptDecryptFile(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 131 func testSignVerifyFile(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 150 func testSignToTextFile(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 168 func testEncryptToTextFile(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 195 func testDecryptBogusFile(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) { 210 func testEncryptDecryptDirectory(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser)… 238 func testSignVerifyDirectory(tc libkb.TestContext, h *SaltpackHandler, u1, u2 *kbtest.FakeUser) {
|
/dports/security/keybase/client-v5.7.1/go/chat/ |
H A D | server_test.go | 269 func createTeamWithWriters(tc libkb.TestContext, writers []*kbtest.FakeUser) string { 286 func teamKey(users []*kbtest.FakeUser) (res string) { 510 func mustCreateConversationForTest(t *testing.T, ctc *chatTestContext, creator *kbtest.FakeUser, 518 func mustCreateChannelForTest(t *testing.T, ctc *chatTestContext, creator *kbtest.FakeUser, 520 others ...*kbtest.FakeUser) (created chat1.ConversationInfoLocal) { 646 asUser *kbtest.FakeUser, conv chat1.ConversationInfoLocal, msg chat1.MessageBody) chat1.MessageID { 659 func mustSetConvRetentionLocal(t *testing.T, ctc *chatTestContext, asUser *kbtest.FakeUser, 669 func mustSetTeamRetentionLocal(t *testing.T, ctc *chatTestContext, asUser *kbtest.FakeUser, 679 func mustSetConvRetention(t *testing.T, ctc *chatTestContext, asUser *kbtest.FakeUser, 691 func mustSetTeamRetention(t *testing.T, ctc *chatTestContext, asUser *kbtest.FakeUser, [all …]
|
H A D | sbs_test.go | 62 func proveRooter(t *testing.T, g *libkb.GlobalContext, fu *kbtest.FakeUser) (sigID keybase1.SigID) { 101 func revokeRooter(t *testing.T, g *libkb.GlobalContext, fu *kbtest.FakeUser, sigID keybase1.SigID) {
|
H A D | boxer_test.go | 102 func getSigningKeyPairForTest(t *testing.T, tc *kbtest.ChatTestContext, u *kbtest.FakeUser) libkb.N… 115 func getActiveDevicesAndKeys(tc *kbtest.ChatTestContext, u *kbtest.FakeUser) ([]*libkb.Device, []li… 133 func doRevokeDevice(tc *kbtest.ChatTestContext, u *kbtest.FakeUser, id keybase1.DeviceID, force boo…
|
H A D | push_test.go | 29 sender types.Sender, conv chat1.Conversation, user *kbtest.FakeUser,
|
/dports/security/keybase/client-v5.7.1/go/teams/ |
H A D | multiple_use_invite_test.go | 557 …vite(t *testing.T, tc *libkb.TestContext, teamID keybase1.TeamID, user *kbtest.FakeUser, inviteLin… 594 …SeitanAndReturnsRejectCalls(t *testing.T, tc *libkb.TestContext, admin *kbtest.FakeUser, msg keyba…
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/arc/ |
H A D | arc_util_unittest.cc | 49 class FakeUser : public user_manager::User { class 51 explicit FakeUser(user_manager::UserType user_type) in FakeUser() function in arc::__anon702307800111::FakeUser
|
/dports/security/keybase/client-v5.7.1/go/git/ |
H A D | put_get_test.go | 128 func ResetAccountAndLogout(tc libkb.TestContext, u *kbtest.FakeUser) {
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/arc/ |
H A D | arc_util_unittest.cc | 51 class FakeUser : public user_manager::User { class 53 explicit FakeUser(user_manager::UserType user_type) in FakeUser() function in arc::__anon62207f850111::FakeUser
|