Searched full:gpg (Results 1 – 25 of 262) sorted by relevance
1234567891011
| /external/okio/docs/ |
| D | releasing.md | 9 ### Prerequisite: GPG Keys 11 Generate a GPG key (RSA, 4096 bit, 3650 day) expiry, or use an existing one. You should leave the 15 $ gpg --full-generate-key 18 Upload the GPG keys to public servers: 21 $ gpg --list-keys --keyid-format LONG 29 $ gpg --send-keys --keyserver keyserver.ubuntu.com XXXXXXXXXXXXXXXX 39 signing.secretKeyRingFile=/Users/jbarber/.gnupg/secring.gpg 42 `signing.keyId` is the GPG key's ID. Get it with this: 45 $ gpg --list-keys --keyid-format SHORT 50 `signing.secretKeyRingFile` is the absolute path for `secring.gpg`. You may need to export this [all …]
|
| /external/python/cpython3/Tools/msi/ |
| D | uploadrelease.bat | 26 if "%1" EQU "--skip-gpg" (set NOGPG=true) && shift && goto CheckOpts 49 set GPG= variable 50 echo Skipping GPG signature generation because of --skip-gpg 52 …if not defined GPG where gpg2 > "%TEMP%\gpg.loc" 2> nul && set /P GPG= < "%TEMP%\gpg.loc" & del "%… 53 …defined GPG where /R "%PCBUILD%..\externals\windows-installer" gpg2 > "%TEMP%\gpg.loc" 2> nul && s… 54 if not defined GPG echo Cannot locate gpg2.exe. Signatures will not be uploaded & pause 55 echo Found gpg2.exe at %GPG% 105 echo --skip-gpg Does not generate GPG signatures before uploading
|
| D | uploadrelease.proj | 42 …<Target Name="_RunGpg" Condition="'$(GPG)' != ''" Inputs="@(File)" Outputs="$(IntermediateOutputPa… 43 <MakeDir Directories="$(IntermediateOutputPath)gpg" /> 44 …les="$(IntermediateOutputPath)\gpg\%(File.FileName)%(File.Extension).asc" Condition="Exists('$(Int… 45 …<Exec Command=""$(GPG)" -ba -o "$(IntermediateOutputPath)\gpg\%(File.FileName)%(Fil… 48 <File Include="$(IntermediateOutputPath)\gpg\%(File.FileName)%(File.Extension).asc">
|
| /external/python/cpython3/.azure-pipelines/windows-release/ |
| D | gpg-sign.yml | 12 displayName: 'Download GPG key' 15 …https://github.com/python/cpython-bin-deps --branch gpg --single-branch --depth 1 --progress -v "g… 16 gpg/gpg2.exe --import "$(gpgkey.secureFilePath)" 18 gpg/gpg2.exe -ba --batch --passphrase ${{ parameters.GPGPassphrase }} $_ 21 displayName: 'Generate GPG signatures' 25 $p = gps "gpg-agent" -EA 0 27 displayName: 'Kill GPG agent'
|
| /external/grpc-grpc-java/buildscripts/kokoro/ |
| D | upload_artifacts.sh | 40 gpg --batch --import ~/java_signing/grpc-java-team-sonatype.asc 42 # gpg commands changed between v1 and v2 are different. 43 gpg --version 46 if gpg --version | grep 'gpg (GnuPG) 1.'; then 50 bash -c 'cat ~/java_signing/passphrase | gpg --batch --passphrase-fd 0 --detach-sign -a {}' \; 54 if gpg --version | grep 'gpg (GnuPG) 2.'; then 58 gpg --batch --passphrase-file ~/java_signing/passphrase --pinentry-mode loopback \
|
| /external/tpm2-tss/ |
| D | RELEASE.md | 38 Git supports GPG signed tags and for releases after the `1.1.0` release will have tags signed by a … 54 Additionally this tarball must be accompanied by a detached GPG signature. 59 Signatures must be generated using the `--detach-sign` and `--armor` options to the `gpg` command: 61 $ gpg --detach-sign --armor tpm2-tss-X.Y.Z.tar.gz 65 …e tarball requires the project maintainers public keys be installed in the GPG keyring of the veri… 68 $ gpg --verify tpm2-tss-X.Y.Z.tar.gz.asc 72 The GPG keys used to sign a release tag and the associated tarball must be the same. 75 * be discoverable using a public GPG key server 76 … maintainers github account (https://help.github.com/articles/adding-a-new-gpg-key-to-your-github-…
|
| /external/rust/crates/grpcio-sys/grpc/third_party/re2/ |
| D | .travis.yml | 83 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 95 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 107 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 119 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 131 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 143 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 155 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 167 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key' 179 key_url: 'https://apt.llvm.org/llvm-snapshot.gpg.key'
|
| /external/truth/util/ |
| D | mvn-deploy.sh | 2 keys="$(gpg --list-keys | grep ^pub | sed 's#/# #' | awk '{ print $3 }')" 21 echo "You are attempting to deploy a maven release without a GPG signing key." 30 keystatus=$(gpg --list-keys | grep ${key} | awk '{print $1}') 36 gpg --list-keys | grep --invert-match '^sub' 43 echo "You are attempting to deploy a maven release but have more than one GPG" 49 gpg --list-keys | grep --invert-match '^sub'
|
| /external/google-java-format/.github/workflows/ |
| D | release.yml | 18 gpg-agent --daemon --default-cache-ttl 7200 19 echo -e "${{ secrets.GPG_SIGNING_KEY }}" | gpg --batch --import --no-tty 21 …gpg --detach-sig --yes -v --output=/dev/null --pinentry-mode loopback --passphrase "${{ secrets.GP… 23 gpg --list-secret-keys --keyid-format LONG 59 …mvn --no-transfer-progress -pl 'eclipse_plugin' verify gpg:sign -DskipTests=true -Dgpg.passphrase=…
|
| /external/testng/ |
| D | README.dev | 3 Install GPG at http://www.gpgtools.org/gpgmail/index.html 4 Generate new key with gpg --gen-key 6 gpg --list-keys 8 gpg --keyserver hkp://pool.sks-keyservers.net --send-keys <public_key>
|
| /external/python/dateutil/ |
| D | RELEASING | 15 [ ] Sign the source and binary distributions with a GPG key (if not the one 82 gpg --armor --output <fname>.asc --detach-sig <fname> 86 for f in dist/*; do gpg --armor --output $f.asc --detach-sig $f; done 91 gpg --verify <fname>.asc <fname> 95 for f in $(find ./dist -type f | grep -v '.asc$'); do gpg --verify $f.asc $f; done
|
| D | release.py | 36 subprocess.check_call(['gpg', '--armor', '--output', fpath + '.asc', 44 subprocess.check_call(['gpg', '--verify', fpath + '.asc', fpath]) 58 gpg_call = subprocess.run(['gpg', '-d', passfile],
|
| /external/selinux/ |
| D | SECURITY.md | 29 * (GPG fingerprint) E25E 254C 8EE4 D303 554B F5AF EC70 1A1D A494 C5EB 33 * (GPG fingerprint) 4568 1128 449B 65F8 80C6 1797 3A84 A946 B4BA 62AE 35 * (GPG fingerprint) 7100 AADF AE6E 6E94 0D2E 0AD6 55E4 5A5A E8CA 7C8A 37 * (GPG fingerprint) 6319 1CE9 4183 0986 89CA B8DB 7EF1 37EC 935B 0EAF
|
| /external/swiftshader/tests/kokoro/gcp_ubuntu/ |
| D | check_style.sh | 12 gpg --import "${SCRIPT_DIR}/tstellar-gpg-key.asc" 13 gpg --verify "${SCRIPT_DIR}/${CLANG_PACKAGE}.tar.xz.sig" /tmp/clang.tar.xz
|
| /external/robolectric/scripts/ |
| D | README.md | 76 … GPG. See [Performing a Release](https://github.com/robolectric/robolectric-gradle-plugin/wiki/Per… 80 $ gpg-agent --daemon 85 $ export SIGNING_PASSWORD=<Passphrase for GPG signing key>
|
| D | install-android-prebuilt.sh | 23 read -p "Please set the GPG passphrase: " -s signingPassphrase 54 echo "Robolectric: Signing files with gpg..." 56 …( cd ${JAR_DIR} && gpg -ab --passphrase ${signingPassphrase} android-all-${ROBOLECTRIC_VERSION}$ex…
|
| /external/oss-fuzz/projects/gnupg/ |
| D | fuzz_verify.c | 25 #include "gpg.h" 46 //hack not to include gpg.c which has main function 102 filename=strdup("/tmp/fuzzdirverify/fuzz.gpg"); in LLVMFuzzerTestOneInput() 107 fd = open("/tmp/fuzzdirverify/fuzz.gpg", O_RDWR | O_CREAT, 0600); in LLVMFuzzerTestOneInput()
|
| D | fuzz_decrypt.c | 25 #include "gpg.h" 46 //hack not to include gpg.c which has main function 105 filename=strdup("/tmp/fuzzdirdecrypt/fuzz.gpg"); in LLVMFuzzerTestOneInput() 110 fd = open("/tmp/fuzzdirdecrypt/fuzz.gpg", O_RDWR | O_CREAT, 0600); in LLVMFuzzerTestOneInput()
|
| D | fuzzgnupg.diff | 26 g10/gpg.w32-manifest 27 tools/gpg-connect-agent.w32-manifest 34 # NB: We use noinst_ for gpg and gpgv so that we can install them with 36 noinst_PROGRAMS = gpg 42 gpg_SOURCES = gpg.c \ 224 +required_pgms = ../../g10/gpg$(EXEEXT)
|
| /external/ktfmt/.github/workflows/ |
| D | publish_artifacts_on_release.yaml | 26 name: Install gpg secret key 28 cat <(echo -e "${{ secrets.OSSRH_GPG_SECRET_KEY }}") | gpg --batch --import 29 gpg --list-secret-keys --keyid-format LONG
|
| /external/expat/expat/ |
| D | distribute.sh | 2 # Creates release tarball and detached GPG signature file for upload 52 gpg --armor --output ${archive}.asc --detach-sign ${archive} 53 gpg --verify ${archive}.asc ${archive}
|
| /external/zstd/.github/workflows/ |
| D | publish-release-artifacts.yml | 58 echo "$RELEASE_SIGNING_KEY" | gpg $GPG_BATCH_OPTS --import 59 …gpg $GPG_BATCH_OPTS --armor --sign --sign-with signing@zstd.net --detach-sig --passphrase "$RELEAS… 60 …gpg $GPG_BATCH_OPTS --armor --sign --sign-with signing@zstd.net --detach-sig --passphrase "$RELEAS…
|
| /external/libjpeg-turbo/ |
| D | .travis.yml | 88 gpg --batch --import ci/sign_ljt && 98 …-check-certificate "http://www.libjpeg-turbo.org/key/LJTPR-GPG-KEY" -O $HOME/rpmkeys/LJTPR-GPG-KEY… 99 …rpmkeys -t dcommander/buildljt:latest bash -c "rpm --import /rpmkeys/LJTPR-GPG-KEY && ~/src/builds…
|
| /external/conscrypt/release/ |
| D | README.md | 27 ### Setup OSSRH and GPG 40 (e.g. `gpg --keyserver pgp.mit.edu --send-key <key ID>`). 49 Add your OSSRH credentials, GPG key information, and the code signing keystore details 55 signing.secretKeyRingFile=<your-home-directory>/.gnupg/secring.gpg 160 `/root/.gradle/gradle.properties` to point to `/root/.gnupg/secring.gpg` and
|
| /external/freetype/docs/ |
| D | release | 87 GPG="/usr/bin/gpg --batch --no-tty --local-user $GPG_KEY_ID" 108 PATH=/empty echo -n "Enter GPG passphrase: " 126 echo $passphrase | $GPG --passphrase-fd 0 -ba -o $f.sig $f
|
1234567891011