Home
last modified time | relevance | path

Searched refs:seal (Results 1 – 25 of 3652) sorted by relevance

12345678910>>...147

/dports/security/seal/SEAL-3.7.2/native/bench/
H A Dbench.h118 SEAL_NODISCARD seal::SecretKey &sk() in sk()
128 SEAL_NODISCARD seal::PublicKey &pk() in pk()
138 SEAL_NODISCARD seal::RelinKeys &rlk() in rlk()
302 seal::EncryptionParameters parms_;
303 seal::SEALContext context_;
315 seal::SecretKey sk_;
316 seal::PublicKey pk_;
317 seal::RelinKeys rlk_;
318 seal::GaloisKeys glk_;
322 std::vector<seal::Plaintext> pt_;
[all …]
/dports/sysutils/helmfile/vault-f6547fa8e820/vault/
H A Dseal_access.go13 seal Seal member
16 func NewSealAccess(seal Seal) *SealAccess {
17 return &SealAccess{seal: seal}
21 return s.seal.StoredKeysSupported()
25 return s.seal.BarrierType()
29 return s.seal.BarrierConfig(ctx)
33 return s.seal.RecoveryKeySupported()
37 return s.seal.RecoveryConfig(ctx)
45 s.seal.SetBarrierConfig(ctx, nil)
47 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/security/vault/vault-1.8.2/vault/
H A Dseal_access.go13 seal Seal member
16 func NewSealAccess(seal Seal) *SealAccess {
17 return &SealAccess{seal: seal}
21 return s.seal.StoredKeysSupported()
25 return s.seal.BarrierType()
29 return s.seal.BarrierConfig(ctx)
33 return s.seal.RecoveryKeySupported()
37 return s.seal.RecoveryConfig(ctx)
45 s.seal.SetBarrierConfig(ctx, nil)
47 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/gomplate/vault-sdk-v0.1.13/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/istio/vault-sdk-v0.1.12/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierType()
28 return s.seal.BarrierConfig(ctx)
32 return s.seal.RecoveryKeySupported()
36 return s.seal.RecoveryConfig(ctx)
44 s.seal.SetBarrierConfig(ctx, nil)
46 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/misc/concourse/vault-bdd38fca2cff/vault/
H A Dseal_access.go11 seal Seal member
14 func NewSealAccess(seal Seal) *SealAccess {
15 return &SealAccess{seal: seal}
19 return s.seal.StoredKeysSupported()
23 return s.seal.BarrierType()
27 return s.seal.BarrierConfig(ctx)
31 return s.seal.RecoveryKeySupported()
35 return s.seal.RecoveryConfig(ctx)
39 return s.seal.VerifyRecoveryKey(ctx, key)
43 s.seal.SetBarrierConfig(ctx, nil)
[all …]
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go11 seal Seal member
14 func NewSealAccess(seal Seal) *SealAccess {
15 return &SealAccess{seal: seal}
19 return s.seal.StoredKeysSupported()
23 return s.seal.BarrierType()
27 return s.seal.BarrierConfig(ctx)
31 return s.seal.RecoveryKeySupported()
35 return s.seal.RecoveryConfig(ctx)
39 return s.seal.VerifyRecoveryKey(ctx, key)
43 s.seal.SetBarrierConfig(ctx, nil)
[all …]
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierConfig(ctx)
28 return s.seal.RecoveryKeySupported()
32 return s.seal.RecoveryConfig(ctx)
36 return s.seal.VerifyRecoveryKey(ctx, key)
40 s.seal.SetBarrierConfig(ctx, nil)
42 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/www/fabio/fabio-1.5.14/vendor/github.com/hashicorp/consul/consul-1.4.2/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierConfig(ctx)
28 return s.seal.RecoveryKeySupported()
32 return s.seal.RecoveryConfig(ctx)
36 return s.seal.VerifyRecoveryKey(ctx, key)
40 s.seal.SetBarrierConfig(ctx, nil)
42 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/consul/vendor/github.com/hashicorp/vault/vault/
H A Dseal_access.go12 seal Seal member
15 func NewSealAccess(seal Seal) *SealAccess {
16 return &SealAccess{seal: seal}
20 return s.seal.StoredKeysSupported()
24 return s.seal.BarrierConfig(ctx)
28 return s.seal.RecoveryKeySupported()
32 return s.seal.RecoveryConfig(ctx)
36 return s.seal.VerifyRecoveryKey(ctx, key)
40 s.seal.SetBarrierConfig(ctx, nil)
42 s.seal.SetRecoveryConfig(ctx, nil)
[all …]
/dports/security/seal/SEAL-3.7.2/native/src/seal/util/
H A Ddefines.h121 namespace seal
126 namespace seal
162 #define SEAL_ITERATE seal::util::seal_for_each_n
232 auto SEAL_JOIN(_seal_temp_alloc_, __LINE__)(seal::util::allocate<type>(size, pool)); \
233 seal::util::PtrIter<type *> name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get());
239 …auto SEAL_JOIN(_seal_temp_alloc_, __LINE__)(seal::util::allocate<type>(seal::util::mul_safe(size, …
240 seal::util::StrideIter<type *> name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get(), stride);
261 seal::util::allocate_poly(poly_modulus_degree, coeff_modulus_size, pool)); \
269 seal::util::allocate_zero_poly(poly_modulus_degree, coeff_modulus_size, pool)); \
277 seal::util::CoeffIter name(SEAL_JOIN(_seal_temp_alloc_, __LINE__).get());
[all …]
/dports/sysutils/helmfile/helmfile-0.138.7/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/misc/concourse/vault-bdd38fca2cff/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/misc/concourse/concourse-6.7.2/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/sysutils/gomplate/vault-sdk-v0.1.13/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/hashicorp/vault/vault-api-v1.0.4/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/devel/gitlab-runner/vault-sdk-v0.1.13/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/sysutils/istio/vault-sdk-v0.1.12/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {
/dports/sysutils/istio/istio-1.6.7/vendor/github.com/hashicorp/vault/website/source/docs/configuration/seal/
H A Dindex.html.md4 sidebar_title: "<code>seal</code>"
5 sidebar_current: "docs-configuration-seal"
7 The seal stanza configures the seal type to use for additional data protection.
10 # `seal` Stanza
12 The `seal` stanza configures the seal type to use for additional data
18 As of Vault 0.9.0, the seal can also be used for [seal wrapping][sealwrap] to
28 `seal` stanza:
31 seal [NAME] {
39 seal "pkcs11" {

12345678910>>...147