Home
last modified time | relevance | path

Searched defs:backend (Results 101 – 125 of 12062) sorted by relevance

12345678910>>...483

/dports/security/py-cryptography/cryptography-3.3.2/tests/hazmat/primitives/
H A Dtest_poly1305.py30 def test_poly1305_unsupported(backend): argument
46 def test_vectors(self, vector, backend): argument
57 def test_key_with_no_additional_references(self, backend): argument
61 def test_raises_after_finalize(self, backend): argument
71 def test_reject_unicode(self, backend): argument
79 def test_verify(self, backend): argument
93 def test_invalid_verify(self, backend): argument
107 def test_verify_reject_unicode(self, backend): argument
115 def test_invalid_key_type(self, backend): argument
122 def test_invalid_key_length(self, backend): argument
[all …]
H A Dtest_keywrap.py37 def test_wrap(self, backend, params): argument
58 def test_unwrap(self, backend, params): argument
77 def test_wrap_invalid_key_length(self, backend): argument
89 def test_unwrap_invalid_key_length(self, backend): argument
100 def test_wrap_invalid_key_to_wrap_length(self, backend): argument
109 def test_unwrap_invalid_wrapped_key_length(self, backend): argument
136 def test_wrap(self, backend, params): argument
148 def test_wrap_additional_vectors(self, backend, params): argument
164 def test_unwrap(self, backend, params): argument
199 def test_wrap_invalid_key_length(self, backend): argument
[all …]
H A Dtest_ed25519.py50 def test_ed25519_unsupported(backend): argument
79 def test_sign_verify_input(self, vector, backend): argument
96 def test_invalid_signature(self, backend): argument
105 def test_generate(self, backend): argument
110 def test_load_public_bytes(self, backend): argument
120 def test_invalid_type_public_bytes(self, backend): argument
124 def test_invalid_type_private_bytes(self, backend): argument
128 def test_invalid_length_from_public_bytes(self, backend): argument
140 def test_invalid_private_bytes(self, backend): argument
163 def test_invalid_public_bytes(self, backend): argument
[all …]
/dports/security/py-cryptography/cryptography-3.3.2/tests/
H A Dtest_fernet.py98 def test_invalid_start_byte(self, backend): argument
103 def test_timestamp_too_short(self, backend): argument
108 def test_non_base64_token(self, backend): argument
113 def test_unicode(self, backend): argument
137 def test_roundtrips(self, message, backend): argument
141 def test_bad_key(self, backend): argument
163 def test_encrypt(self, backend): argument
170 def test_decrypt(self, backend): argument
181 def test_decrypt_at_time(self, backend): argument
192 def test_no_fernets(self, backend): argument
[all …]
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/misc/concourse/vault-bdd38fca2cff/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/security/vault/vault-1.8.2/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/sysutils/istio/vault-sdk-v0.1.12/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/builtin/credential/app-id/
H A Dbackend.go86 type backend struct { struct
87 *framework.Backend
89 salt *salt.Salt
90 SaltMutex sync.RWMutex
91 view logical.Storage
92 MapAppId *framework.PolicyMap
93 MapUserId *framework.PathMap
96 func (b *backend) Salt(ctx context.Context) (*salt.Salt, error) {
119 func (b *backend) invalidate(_ context.Context, key string) {
/dports/net/nbdkit/nbdkit-1.20.4/server/
H A Dinternal.h329 struct backend { struct
333 struct backend *next; argument
348 /* The file the backend was loaded from. */ argument
351 /* The dlopen handle for the backend. */ argument
355 void (*free) (struct backend *); argument
356 int (*thread_model) (struct backend *); argument
358 void (*usage) (struct backend *); argument
359 const char *(*version) (struct backend *); argument
360 void (*dump_fields) (struct backend *); argument
362 void (*config_complete) (struct backend *); argument
[all …]
/dports/sysutils/helmfile/vault-f6547fa8e820/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/misc/concourse/vault-bdd38fca2cff/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/security/vault/vault-1.8.2/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/sysutils/gomplate/vault-sdk-v0.1.13/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/builtin/logical/postgresql/
H A Dbackend.go56 type backend struct { struct
57 *framework.Backend
59 db *sql.DB
60 lock sync.Mutex
62 logger log.Logger
66 func (b *backend) DB(ctx context.Context, s logical.Storage) (*sql.DB, error) {
128 func (b *backend) ResetDB(_ context.Context) {
142 func (b *backend) invalidate(ctx context.Context, key string) {
150 func (b *backend) Lease(ctx context.Context, s logical.Storage) (*configLease, error) {

12345678910>>...483